Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 47

Full-Text Articles in Physical Sciences and Mathematics

Web Based Recommender Systems And Rating Prediction, Tho Nguyen Jan 2009

Web Based Recommender Systems And Rating Prediction, Tho Nguyen

Master's Projects

This project implements a recommender system on large dataset of Netflix’s movies. This project also tries to improve recommender systems by incorporating confidence interval and genres of movies. This new approach enhances the performance and quality of service of recommender systems and gives better result than Netflix commercial recommender system, Cinematch.


Evaluations And Enhancements In 802.11n Wlans – Error-Sensitive Adaptive Frame Aggregation, Ken Chan Jan 2009

Evaluations And Enhancements In 802.11n Wlans – Error-Sensitive Adaptive Frame Aggregation, Ken Chan

Master's Projects

IEEE 802.11n is a developing next-generation standard for wireless local area network (LAN). Seamless multimedia traffic connection will become possible with the 802.11n improvement in the Physical and MAC layer. The new 802.11n frame aggregation technique is particularly important for enhancing MAC layer efficiency under high speed wireless LAN. Although the frame aggregation can increase the efficiency in the MAC layer, it does not provide good performance in high BER channels when using large frame aggregation size. An Optimal Frame Aggregation (OFA) technique for AMSDU frame under different BERs in 802.11n WLANs was proposed. However, the suggested algorithm does not …


Clustering Algorithm For Enhanced Bibliography Visualization, Sriram Krishnan Jan 2009

Clustering Algorithm For Enhanced Bibliography Visualization, Sriram Krishnan

Master's Projects

A Bibliography is a list of books, publications, journals etc., with details such as authors and references. Visualization could be used as a data analysis tool to represent various types of data, analyze huge chunks of data easily and arrive at interesting results. The idea of this project is to provide a medium which eases the combination of bibliography with visualization. Though there are many sources of bibliographic data like the Digital Bibliography and Library Project (DBLP), Citeseer, Google Scholar, none of these data could be used directly for deducing relations between various entities or for visualizing the relationship between …


Hunting For Undetectable Metamorphic Viruses, Da Lin Jan 2009

Hunting For Undetectable Metamorphic Viruses, Da Lin

Master's Projects

Commercial anti-virus scanners are generally signature based, that is, they scan for known patterns to determine whether a file is infected by a virus or not. To evade signature-based detection, virus writers have adopted code obfuscation techniques to create highly metamorphic computer viruses. Since metamorphic viruses change their appearance from generation to generation, signature-based scanners cannot detect all instances of such viruses. To combat metamorphic viruses, detection tools based on statistical analysis have been studied. A tool based on hidden Markov models (HMMs) was previously developed and the results are encouraging—it has been shown that metamorphic viruses created by a …


Automatic Video Classification, Don Jayakody Jan 2009

Automatic Video Classification, Don Jayakody

Master's Projects

Within the past few years video usage has grown in a multi-fold fashion. One of the major reasons for this explosive video growth is the rising Internet bandwidth speeds. As of today, a significant human effort is needed to categorize these video data files. A successful automatic video classification method can substantially help to reduce the growing amount of cluttered video data on the Internet. This research project is based on finding a successful model for video classification. We have utilized various schemes of visual and audio data analysis methods to build a successful classification model. As far as the …


Expert Finding Using Social Networking, Parin Shah Jan 2009

Expert Finding Using Social Networking, Parin Shah

Master's Projects

In today’s world, knowledge transfer is considered an important and essential activity for the success of an enterprise. Large corporations have realized the need to reuse existing knowledge rather than spend time and effort on solving the same problems again. For these reasons, most corporations now have knowledge repositories. These repositories are visited for possible solutions whenever there is a problem that cannot be easily resolved by using the expertise of the existing team. Apart from this, the problems faced by the people in the company can also be resolved by asking for help from expert in that problem domain. …


An Automata Based Text Analysis System, Yue Lu Jan 2009

An Automata Based Text Analysis System, Yue Lu

Master's Projects

This report describes and implements an automata based text analysis system. We have collected some of the writing samples. Each sample establishes a tree, and uses the ALERGIA algorithm to merge all compatible nodes in order to get a merged stochastic finite automaton. We store these automatons which demonstrate writing style of the sample texts in the hard drive. For a new testing piece, we can test if it has similar writing style compared to those sample texts.


Hybrid Clustering With Application To Web Pages, Ameya Sabnis Jan 2009

Hybrid Clustering With Application To Web Pages, Ameya Sabnis

Master's Projects

This project explains the process of clustering web pages. With the immense increase in the number of web pages available on the internet, it has become difficult to search for web pages. The clustering of web pages will improve the presentation of web pages to the user and saves the time spent on searching web pages. Various clustering techniques have been proposed by various research scientists to cluster the web pages, but all the techniques suggested have some drawbacks. Since there is lot of scope for further improvement in the field of clustering, the system proposed in this report takes …


Performance Study Of Fmipv6-Based Cross-Layer Wimax Handover Scheme For Supporting Voip Service, Heejung Kim Jan 2009

Performance Study Of Fmipv6-Based Cross-Layer Wimax Handover Scheme For Supporting Voip Service, Heejung Kim

Master's Projects

This report presents performance study of the FMIPv6-based cross-layer handover scheme for VoIP supports over mobile WiMAX network. For this performance validation and evaluation, the handover delays for four different handover mechanisms are formulated and ns2 based simulation module has been developed. The handover delay, the total delay, and the R factor representing VoIP quality are measured to evaluate the VoIP support characteristics of the FMIPv6-based cross-layer scheme. Simulation results verified that the proposed FMIPv6-based cross-layer handover scheme, compared to the non-cross-layer scheme, successfully reduces total handover delay by almost 50% for the case of layer-3 handover. Further, simulation was …


Visualization Of Tree-Structured Data Through A Multi Touch User Interface, David Andrews Jan 2009

Visualization Of Tree-Structured Data Through A Multi Touch User Interface, David Andrews

Master's Projects

This writing project examines different types of visualizations for tree-structured data sets. Visualizations discussed include link-node diagrams and treemap diagrams. Also discussed is recent innovations with regards to distinguishing multi touch from single touch technology. I explore the requirements needed to build a multi touch table top surface, and describe the process of building one. I then describe my proposed method of visualizing tree-structured data and how it can be implemented using Core Animation technology. I also propose a means of interacting with the data through a multi touch interface, and discuss which gestures can be used to navigate the …


Total Recall For Ajax Applications – Firefox Extension, Smita Periyapatna Jan 2009

Total Recall For Ajax Applications – Firefox Extension, Smita Periyapatna

Master's Projects

Ajax, or AJAX (Asynchronous JavaScript and XML), is a group of interrelated web development techniques used to create interactive web applications or rich Internet applications[9]. Web applications can retrieve data from the server asynchronously in the background without interfering with the display and behavior of an existing web page. [9] One of the biggest problems with Ajax applications is saving state and accommodating the succession of the history controls, (Back/forward buttons). Ajax allows documents to become stateful, but when the user intuitively goes for the history controls in the browser window, things go wrong. The user expects to see the …


Mrcraig: Mapreduce And Ensemble Classifiers For Parallelizing Data Classification Problems, Glenn Jahnke Jan 2009

Mrcraig: Mapreduce And Ensemble Classifiers For Parallelizing Data Classification Problems, Glenn Jahnke

Master's Projects

In this paper, a novel technique for parallelizing data-classification problems is applied to finding genes in sequences of DNA. The technique involves various ensem- ble classification methods such as Bagging and Select Best. It then distributes the classifier training and prediction using MapReduce. A novel sequence classification voting algorithm is evaluated in the Bagging method, as well as compared against the Select Best method.


Objective Measurement Of Speech Quality In Voip Over Wireless Lan During Handoff, Nidhi Marwaha Gambhir Jan 2009

Objective Measurement Of Speech Quality In Voip Over Wireless Lan During Handoff, Nidhi Marwaha Gambhir

Master's Projects

Quality of Service is a very important factor to determine the quality of a VoIP call. Different subjective and objective models exist for evaluating the speech quality in VoIP. E-model is one of the objective methods of measuring the speech quality; it considers various factors like packet loss, delay and codec impairments. The calculations of Emodel are not very accurate in case of handovers – when a VoIP call moves from one wireless LAN to another. This project conducted experimental evaluation of performance of E-model during handovers and proposes a new approach to accurately calculate the speech quality of VoIP …


Analysis Of An Openmp Program For Race Detection, Dhaval Shah Jan 2009

Analysis Of An Openmp Program For Race Detection, Dhaval Shah

Master's Projects

The race condition in a shared memory parallel program is subtle and harder to find than in a sequential program. The race conditions cause non-deterministic and unexpected results from the program. It should be avoided in the parallel region of OpenMP programs. The proposed OpenMP Race Avoidance Tool statically analyzes the parallel region. It gives alerts regarding possible data races in that parallel region. The proposed tool has the capability to analyze the basic frequently occurring non-nested ‘for loop(s)’. We are comparing the results of the proposed tool with the commercially available static analysis tool named Intel Parallel Lint and …


Visualized Architecture Knowledge Management Collaboration Services, Ashish Kaul Jan 2009

Visualized Architecture Knowledge Management Collaboration Services, Ashish Kaul

Master's Projects

Software (system) architecture knowledge is a critical element in making effective design/ implementation decisions for Information Technology departments within companies. This knowledge can be codified and/ or personalized so as to harness the advantages and avoid the missed steps of implementers before us. In research of architecture knowledge enablement, there have been a few ventures, including but not limited to, Processcentric Architecture Knowledge Management Environment (PAKME) [3] and Architecture Design Decision Support System (ADDSS) [4]. In study of these ventures, we find modest attempts at focusing on dissecting types of architecture knowledge and enabling access to details through web tools. …


Is Four File Chess A Draw?, Michael Karbushev Jan 2009

Is Four File Chess A Draw?, Michael Karbushev

Master's Projects

In this work, we prove that in the game of FOUR FILE Chess, White has at least a Draw. FOUR FILE is a chess variant proposed by John Selfridge, in which only the `a', `c', `e', and `g' les are used. All chess rules are as usual, except that all moves must end on one of these les, and the game starts with the other four les vacant. Here, we prove that the White has at least a draw, by showing that White has a strategy to avoid a loss. We also show that Black can avoid a loss for …


Removing The Digital Divide For Senior Web Users, Chiu Luk Jan 2009

Removing The Digital Divide For Senior Web Users, Chiu Luk

Master's Projects

It is hard for the elderly to use the internet to find the resource they want. Usually help is needed for them to complete the task on the technology things. The main reason for this project is to research ideas on encourage senior people to make use of the web to locate helps they want, such as finding volunteers and professional helps. The scope of this project is to develop a new way of web access and content presentation methodologies that let senior people getting help from volunteers and various service providers more easily that incorporates social networking technology e.g. …


Information Flow Model For Commercial Security, Jene Pan Jan 2009

Information Flow Model For Commercial Security, Jene Pan

Master's Projects

Information flow in Discretionary Access Control (DAC) is a well-known difficult problem. This paper formalizes the fundamental concepts and establishes a theory of information flow security. A DAC system is information flow secure (IFS), if any data never flows into the hands of owner’s enemies (explicitly denial access list.)


Hunting For Undetectable Metamorphic Viruses, Da Lin Jan 2009

Hunting For Undetectable Metamorphic Viruses, Da Lin

Master's Projects

Commercial anti-virus scanners are generally signature based, that is, they scan for known patterns to determine whether a file is infected by a virus or not. To evade signature-based detection, virus writers have adopted code obfuscation techniques to create highly metamorphic computer viruses. Since metamorphic viruses change their appearance from generation to generation, signature-based scanners cannot detect all instances of such viruses. To combat metamorphic viruses, detection tools based on statistical analysis have been studied. A tool based on hidden Markov models (HMMs) was previously developed and the results are encouraging—it has been shown that metamorphic viruses created by a …


Dna Sequence Representation By Use Of Statistical Finite Automata, Asmi Shah Jan 2009

Dna Sequence Representation By Use Of Statistical Finite Automata, Asmi Shah

Master's Projects

This project defines and intends to solve the problem of representing information carried by DNA sequences in terms of amino acids, through application of the theory of finite automata. Sequences can be compared against each other to find existing patterns, if any, which may include important genetic information. Comparison can state whether the DNA sequences belong to the same, related or entirely different species in the ‘Tree of Life’ (phylogeny). This is achieved by using extended and statistical finite automata. In order to solve this problem, the concepts of automata and their extension, i.e. Alergia algorithm have been used. In …


A Running Time Improvement For Two Thresholds Two Divisors Algorithm, Bingchun Chang Jan 2009

A Running Time Improvement For Two Thresholds Two Divisors Algorithm, Bingchun Chang

Master's Projects

Chunking algorithms play an important role in data de-duplication systems. The Basic Sliding Window (BSW) algorithm is the first prototype of the content-based chunking algorithm which can handle most types of data. The Two Thresholds Two Divisors (TTTD) algorithm was proposed to improve the BSW algorithm in terms of controlling the variations of the chunk-size. In this project, we investigate and compare the BSW algorithm and TTTD algorithm from different factors by a series of systematic experiments. Up to now, no paper conducts these experimental evaluations for these two algorithms. This is the first value of this paper. According to …


Intrusion Detection And Prevention System: Cgi Attacks, Tejinder Aulakh Jan 2009

Intrusion Detection And Prevention System: Cgi Attacks, Tejinder Aulakh

Master's Projects

Over the past decade, the popularity of the Internet has been on the rise. The Internet is being used by its clients to access both static and dynamic data residing on remote servers. In the client-server interaction, the client asks the server to provide information, and, in addition, the server may also request that clients provide information such as in “web forms.” Therefore, the Internet is being used for many different purposes which also include the web servers collecting the information from the clients. Consequently, attacks on the web servers have been increasing over the years. Due to the fact …


Randomized Greedy Hot-Potato Routing On The Multi-Dimensional Torus, Raymond Y. Chi Jan 2009

Randomized Greedy Hot-Potato Routing On The Multi-Dimensional Torus, Raymond Y. Chi

Master's Projects

We present extensive simulation and analysis on a traditional, simple, efficient dynamic hot potato routing algorithm on a multi-dimensional torus network. These simulations are performed under a more recent network model than previous, more limited studies, with dynamic (rather than batch) models, no flow-control, and extended high dimensional scenarios. We collect more comprehensive statistics on system performance, and empirically show that the system can recover from worst-case scenarios to quickly re-achieve its standard steady-state delivery rates, with expected delivery time for a packet of O(n), where n is the initial packet distance from its destination. Experiments also show that for …


Intrusion Alerts Analysis Using Attack Graphs And Clustering, Hardik Patel Jan 2009

Intrusion Alerts Analysis Using Attack Graphs And Clustering, Hardik Patel

Master's Projects

Network and information security is very crucial in keeping large information infrastructures safe and secure. Many researchers have been working on different issues to strengthen and measure security of a network. An important problem is to model security in order to apply analysis schemes efficiently to that model. An attack graph is a tool to model security of a network which considers individual vulnerabilities in a global view where individual hosts are interconnected. The analysis of intrusion alert information is very important for security evaluation of the system. Because of the huge number of alerts raised by intrusion detection systems, …


Triggering Of Just-In-Time Compilation In The Java Virtual Machine, Rouhollah Gougol Jan 2009

Triggering Of Just-In-Time Compilation In The Java Virtual Machine, Rouhollah Gougol

Master's Projects

The Java Virtual Machine (Standard Edition) normally interprets Java byte code but also compiles Java methods that are frequently interpreted and runs them natively. The purpose is to take advantage of native execution without having too much overhead for Just-In-Time compilation. A former SJSU thesis tried to enhance the standard policy by predicting frequently called methods ahead of their actual frequent interpretation. The project also tried to increase the compilation throughput by prioritizing the method compilations, if there is more than one hot method to compile at the same time. The paper claimed significant speedup. In this project, we tried …


Analysis Of Machine Learning Based Methods For Identifying Microrna Precursors, Steve Ikeoka Jan 2009

Analysis Of Machine Learning Based Methods For Identifying Microrna Precursors, Steve Ikeoka

Master's Projects

MicroRNAs are a type of non-coding RNA that were discovered less than a decade ago but are now known to be incredibly important in regulating gene expression despite their small size. However, due to their small size, and several other limiting factors, experimental procedures have had limited success in discovering new microRNAs. Computational methods are therefore vital to discovering novel microRNAs. Many different approaches have been used to scan genomic sequences for novel microRNAs with varying degrees of success. This work provides an overview of these computational methods, focusing particularly on those methods based on machine learning techniques. The results …


Heuristic Search Cryptanalysis Of The Zodiac 340 Cipher, Pallavi Kanagalakatte Basavaraju Jan 2009

Heuristic Search Cryptanalysis Of The Zodiac 340 Cipher, Pallavi Kanagalakatte Basavaraju

Master's Projects

The Zodiac 340 cipher is one of the most famous unsolved ciphers of all time. It was allegedly written by “the Zodiac”, whose identity remains unknown to date. The Zodiac was a serial killer who killed a number of people in and around the San Francisco Bay area during the 1960s. He is confirmed to have seven victims, two of whom survived [1], although in taunting letters to the news media he claims to have killed 37 people. During this time, an encrypted message known as the Zodiac 408 cipher was mailed to 3 different newspapers in the San Francisco …


Chinese Wall Security Policy, Varun Gupta Jan 2009

Chinese Wall Security Policy, Varun Gupta

Master's Projects

This project establishes a Chinese wall security policy model in the environment of cloud computing. In 1988 Brewer and Nash proposed a very nice commercial security policy in British financial world. Though the policy was well accepted, but the model was incorrect. A decade later, Dr. Lin provided a model in 2003 that meets Brewer & Nash’s Policy. One of the important components in Cloud computing is data center. In order for any company to store data in the center, a trustable security policy model is a must; Chinese wall security policy model will provide this assurance. The heart of …


World Wide Web – Common Communication Language, Mohamed Ali Jan 2009

World Wide Web – Common Communication Language, Mohamed Ali

Master's Projects

The purpose for the World Wide Web – Common Communication Language (W3-CCL) is to allow internet users around the world communicate using a single common language. This common language is based on images / symbols and other known communication tactics such as Sign Language, Ancient Egyptian Language, etc. The W3- CCL is to be used in building sites’ contents, chatting, sending messages / e-mails, and any information sharing related operations on the internet. The scope of this project is limited to W3-CCL proof of concept via building an e-commerce website for a specific domain; moreover, the W3-CCL usage will be …


Versatile Extensible Security System For Mobile Ad Hoc Networks, Jung Chang Jan 2009

Versatile Extensible Security System For Mobile Ad Hoc Networks, Jung Chang

Master's Projects

Mobile Ad hoc Network (MANET) is becoming more and more popular in scientific, government, and general applications, but security system for MANET is still at infant stage. Currently, there are not many security systems that provide extensive security coverage for MANET. Moreover, most of these security systems assume nodes have infinite computation power and energy; an assumption that is not true for many mobiles. Versatile and Extensible System (VESS) is a powerful and versatile general-purpose security suite that comprises of modified versions of existing encryption and authentication schemes. VESS uses a simple and network-efficient but still reliable authentication scheme. The …