Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Master's Projects

2008

Articles 1 - 30 of 39

Full-Text Articles in Physical Sciences and Mathematics

Personalized Web Content With Fuzzy System, Bassam Almogahed Jan 2008

Personalized Web Content With Fuzzy System, Bassam Almogahed

Master's Projects

In this paper, we will develop a new computational intelligence methodology to automatically analyze and summarize web content during a user surfing sessions. The output of this process is meaningful keywords or phrases which will be used to bring the user other contents such as images that closely relate to the web pages that he or she is currently surfing.


Peer-To-Peer Botnets: Analysis And Detection, Jeet Morparia Jan 2008

Peer-To-Peer Botnets: Analysis And Detection, Jeet Morparia

Master's Projects

Attacks such as spamming, distributed denial of service and phishing have become commonplace on the Internet. In the past, attackers would use high bandwidth Internet connection servers to accomplish their tasks. Since desktop users today have high-speed Internet connections, attackers infect users’ desktops and harness their computing power to perform malicious activities over the Internet. As attackers develop new methods to attack from distributed locations as well as avoid being detected, there is a need to develop efficient methods to detect and mitigate this epidemic of infection of hosts on the network. In this project, we aim to analyze the …


A Seeded Genetic Algorithm For Rna Secondary Structural Prediction With Pseudoknots, Ryan Pham Jan 2008

A Seeded Genetic Algorithm For Rna Secondary Structural Prediction With Pseudoknots, Ryan Pham

Master's Projects

This work explores a new approach in using genetic algorithm to predict RNA secondary structures with pseudoknots. Since only a small portion of most RNA structures is comprised of pseudoknots, the majority of structural elements from an optimal pseudoknot-free structure are likely to be part of the true structure. Thus seeding the genetic algorithm with optimal pseudoknot-free structures will more likely lead it to the true structure than a randomly generated population. The genetic algorithm uses the known energy models with an additional augmentation to allow complex pseudoknots. The nearest-neighbor energy model is used in conjunction with Turner’s thermodynamic parameters …


Motif Discovery In Biological Sequences, Medha Pradhan Jan 2008

Motif Discovery In Biological Sequences, Medha Pradhan

Master's Projects

With the large amount of biological data generated due to DNA sequencing of various organisms, it is becoming necessary to identify techniques that can help in finding useful information amongst all the data. Finding motifs involves determining meaningful short sequences that may be repeated over many sequences in various species. Various approaches for the motif discovery problem have been proposed in the literature. One method suggests using genetic algorithms. In this project, an evolutionary approach for motif discovery has been explored. The population is clustered during every generation of the algorithm and then evolved locally within the clusters to allow …


Firefox Extension To Add Contacts, Events, And View Addresses, Vijay Rao Jan 2008

Firefox Extension To Add Contacts, Events, And View Addresses, Vijay Rao

Master's Projects

Users of the Firefox browser have the ability to download plugins to manage their contacts. This usually involves typing or copying the details from some source to add contacts. Event and meeting invitations are sent by mail and are added to the user’s calendar once the user accepts the invitation. Users viewing address data on websites are limited to the mapping capabilities provided by the webpage viewed by the user. We developed a Firefox extension that allows the user to select portions of text with contact or event information and add it as a contact or an event in the …


Fuzzy Content Mining For Targeted Advertisement, Yezhou Wang Jan 2008

Fuzzy Content Mining For Targeted Advertisement, Yezhou Wang

Master's Projects

Content-targeted advertising system is becoming an increasingly important part of the funding source of free web services. Highly efficient content analysis is the pivotal key of such a system. This project aims to establish a content analysis engine involving fuzzy logic that is able to automatically analyze real user-posted Web documents such as blog entries. Based on the analysis result, the system matches and retrieves the most appropriate Web advertisements. The focus and complexity is on how to better estimate and acquire the keywords that represent a given Web document. Fuzzy Web mining concept will be applied to synthetically consider …


Online Collaborative Time Management System Using Artificial Intelligence, Anand Sivaramakrishnan Jan 2008

Online Collaborative Time Management System Using Artificial Intelligence, Anand Sivaramakrishnan

Master's Projects

Online Collaborative Time Management System is a system that will plan events and help achieve goals intelligently using Partial Order Planning. This product is similar to a social networking site, which plans events for collaborative set of people. For this masters’ project, such a system is developed. Our site allows multiple people to add items to a collaborative To-Do list. The user interface for our site allows people to add actions and preconditions to the existing system, enabling the system to grow constantly. In order to generate a sequence of actions to the most complex problems, partial order generators are …


Fuzzy Range Query In Xml, Dexiong Zhang Jan 2008

Fuzzy Range Query In Xml, Dexiong Zhang

Master's Projects

This writing project presents a new approach to implement a fuzzy range query solution for retrieving Extensible Markup Language (XML) data. Ever since XML was introduced, it has become a web standard to describe data on the Internet. The need for performing range query against XML data is growing day by day. Many search service providers are eager to improve their solutions on range query against XML data. The project studies and analyzes the limitations on the current range query solutions. The project also proposes a new solution using fuzzy semantic analysis to quantify XML data so that it can …


Multi-Dimensional Partitioning In Buc For Data Cubes, Kenneth Yeung Jan 2008

Multi-Dimensional Partitioning In Buc For Data Cubes, Kenneth Yeung

Master's Projects

Bottom-Up Computation (BUC) is one of the most studied algorithms for data cube generation in on-line analytical processing. Its computation in the bottom-up style allows the algorithm to efficiently generate a data cube for memory-sized input data. When the entire input data cannot fit into memory, many literatures suggest partitioning the data by a dimension and run the algorithm on each of the single-dimensional partitioned data. For very large sized input data, the partitioned data might still not be able to fit into the memory and partitioning by additional dimensions is required; however, this multi- dimensional partitioning is more complicated …


Algorithm To Obtain Total Order From Partial Orders For Social Networks, Chandrika Satyavolu Jan 2008

Algorithm To Obtain Total Order From Partial Orders For Social Networks, Chandrika Satyavolu

Master's Projects

We developed an algorithm for generating total orders from partial orders based on a variant of QuickSort. We also constructed a website: 100 best movies! that would generate and display the total order of the best 100 movies from partial orders that are humanly ordered and stored in a database. The users of the website can add new movies of different categories to the database. The users can also generate partial rankings within specific categories. The total order of 100 best movies! would be calculated from the humanly computed partial orders stored in the database.


Providing Vcr Functionality In Vod Servers, Ngyat Tsui Jan 2008

Providing Vcr Functionality In Vod Servers, Ngyat Tsui

Master's Projects

Resource-sharing techniques are widely used by VOD servers. Stream merging is one of the most efficient resource-sharing techniques. ERMT is able to achieve merge trees with the closest cost of optimal merge tree. Full VCR support has become a “must have” feature for VOD services. This researcher proposed an algorithm to enable VCR support on ERMT. Furthermore, client local buffer and fixed-interval periodical multicasting were also deployed by the algorithm to improve the stream-client ratio. After thorough runs of simulations and numerous comparisons to BEP, the highly efficient resource- sharing technique, the proposed algorithm with client local buffer utilization and …


Web Security Detection Tool, Abhishek Agashe Jan 2008

Web Security Detection Tool, Abhishek Agashe

Master's Projects

According to Government Computer News (GCN) web attacks have been marked as all- time high this year. GCN says that some of the leading security software like SOPHOS detected about 15,000 newly infected web pages daily in initial three months of 2008 [13]. This has lead to the need of efficient software to make web applications robust and sustainable to these attacks. While finding information on different types of attacks, I found that SQL injection and cross site scripting are the most famous among attackers. These attacks are used extensively since, they can be performed using different techniques and it …


Investigating The Effectiveness Of Active Interaction Tools On Student Learning, Lurie Andrei Jan 2008

Investigating The Effectiveness Of Active Interaction Tools On Student Learning, Lurie Andrei

Master's Projects

In this project, we investigate the effectiveness of active interaction animation tools for learning. We limit our scope to a particular computer science course that teaches graph algorithms on an undergraduate level. More specifically, we evaluate student understanding of basic graph algorithms when two kinds of interactive animation tools are used by the students to learn the algorithms: active interaction and passive interaction. We hypothesize that animations which engage students in active interaction are more effective and more beneficial to learning and comprehension than the animations which do not explicitly engage students in active interaction. We conduct an experiment and …


Heuristic Health Resource Referral (H2r2) Engine, Duy Vo Jan 2008

Heuristic Health Resource Referral (H2r2) Engine, Duy Vo

Master's Projects

Searching for health resources is difficult for many individuals because it requires domain knowledge and understanding of search engines techniques. Our system proposes a paradigm shift whereby users provide as much or as little information as they feel comfortable, and we endeavor to match them with relevant health resources. The system first attempts to identify risk factors through a heuristic engine that employs fuzzy logic and then searches for health resources based on the user’s profile. We aim to unburden the user from having to understand complex health information and sometimes esoteric search techniques. Our preliminary findings show that a …


Study Of Tcp Issues Over Wireless And Implementation Of Iscsi Over Wireless For Storage Area Networks, Rahul Sharma Jan 2008

Study Of Tcp Issues Over Wireless And Implementation Of Iscsi Over Wireless For Storage Area Networks, Rahul Sharma

Master's Projects

The Transmission Control Protocol (TCP) has proved to be proficient in classical wired networks, presenting an ability to acclimatize to modern, high-speed networks and present new scenarios for which it was not formerly designed. Wireless access to the Internet requires that information reliability be reserved while data is transmitted over the radio channel. Automatic repeat request (ARQ) schemes and TCP techniques are often used for error-control at the link layer and at the transport layer, respectively. TCP/IP is becoming a communication standard [1]. Initially it was designed to present reliable transmission over IP protocol operating principally in wired networks. Wireless …


Towards An Undetectable Computer Virus, Priti Desai Jan 2008

Towards An Undetectable Computer Virus, Priti Desai

Master's Projects

Metamorphic viruses modify their own code to produce viral copies which are syntactically different from their parents. The viral copies have the same functionality as the parent but may have different signatures. This makes signature-based virus scanners unreliable for detecting metamorphic viruses. But statistical pattern analysis tool such as Hidden Markov Models (HMMs) can detect metamorphic viruses. Virus writers use many different code obfuscation techniques to generate metamorphic viruses. In this project we develop a metamorphic engine using code obfuscation techniques. Our metamorphic engine is designed to produce highly diverse morphed copies of the base virus. We show that commercial …


A Comparative Xeon And Cbe Performance Analysis, Randy Fort Jan 2008

A Comparative Xeon And Cbe Performance Analysis, Randy Fort

Master's Projects

The Cell Broadband Engine is a high performance multicore processor with superb performance on certain types of problems. However, it does not perform as well running other algorithms, particularly those with heavy branching. The Intel Xeon processor is a high performance superscalar processor. It utilizes a high clock speed and deep pipelines to help it achieve superior performance. But deep pipelines can perform poorly with frequent memory accesses. This paper is a study and attempt at quantifying the types of programmatic structures that are more suitable to a particular architecture. It focuses on the issues of pipelines, memory access and …


Adaptive Software Transactional Memory: Dynamic Contention Management, Joel Frank Jan 2008

Adaptive Software Transactional Memory: Dynamic Contention Management, Joel Frank

Master's Projects

This thesis addresses the problem of contention management in Software Transactional Memory (STM), which is a scheme for managing shared memory in a concurrent programming environment. STM views shared memory in a way similar to that of a database; read and write operations are handled through transactions, with changes to the shared memory becoming permanent through commit operations. Research on this subject reveals that there are currently varying methods for collision detection, data validation, and contention management, each of which has different situations in which they become the preferred method. This thesis introduces a dynamic contention manager that monitors current …


Intelligent Query For Real Estate Search, Mandeep Jandir Jan 2008

Intelligent Query For Real Estate Search, Mandeep Jandir

Master's Projects

The purpose of this project is to improve search query accuracy in a real estate website by developing an intelligent query system which provides the best matching result for standard search criteria. This intelligent query website utilizes fuzzy logic and partial membership to filter query results based on user input data. Fuzzy logic helps obtain results that are otherwise not attainable from a non-fuzzy search. A non-fuzzy search entails search results that match exactly with the given criteria. This project also allows a user to do a free keyword search. This type of search uses synonyms of the keywords to …


The Prosody Of Uncertainty For Spoken Dialogue Intelligent Tutoring Systems, Bevan Jones Jan 2008

The Prosody Of Uncertainty For Spoken Dialogue Intelligent Tutoring Systems, Bevan Jones

Master's Projects

The speech medium is more than an audio conveyance of word strings. It contains meta information about the content of the speech. The prosody of speech, pauses and intonation, adds an extra dimension of diagnostic information about the quality of a speaker's answers, suggesting an important avenue of research for spoken dialogue tutoring systems. Tutoring systems that are sensitive to such cues may employ different tutoring strategies based on detected student uncertainty, and they may be able to perform more precise assessment of the area of student difficulty. However, properly identifying the cues can be challenging, typically requiring thousands of …


Dna Fragment Assembly Algorithms: Toward A Solution For Long Repeats, Ching Li Jan 2008

Dna Fragment Assembly Algorithms: Toward A Solution For Long Repeats, Ching Li

Master's Projects

In this work, we describe our efforts to seek optimal solutions for the DNA Fragment Assembly Problem in terms of assembly accuracy and runtime efficiency. The main obstacles for the DNA Fragment Assembly are analyzed. After reviewing various advanced algorithms adopted by some assemblers in the bioinformatics industry, this work explores the feasibility of assembling fragments for a target sequence containing perfect long repeats, which is deemed theoretically impossible without tedious finishing reaction experiments. Innovative algorithms incorporating statistical analysis proposed in this work make the restoration of DNA sequences containing long perfect repeats an attainable goal.


Accelerometer Based Motion Gestures For Mobile Devices, Neel Parikh Jan 2008

Accelerometer Based Motion Gestures For Mobile Devices, Neel Parikh

Master's Projects

Many smart phones today use tiny sensors called accelerometers to provide enhanced user interface controls. Accelerometers measure the linear acceleration in the x, y, z directions based on the movement of the phone. These sensors basically reduce the need of dedicated navigation and function keys on the mobile device. Accelerometer based mobile devices use this principle for creating applications like games, controlling the orientation of the display screen, etc. The goal of this project is to extend the WebKit browser interface of Google’s mobile development platform called ‘Android’ by creating accelerometer based motion features like shake feature, orientation of images, …


Botnets And Distributed Denial Of Service Attacks, Anilkumar Panicker Jan 2008

Botnets And Distributed Denial Of Service Attacks, Anilkumar Panicker

Master's Projects

With their ever increasing malicious capabilities and potential to infect a vast majority of computers on the Internet, botnets are emerging as the single biggest threat to Internet security. The aim of this project is to perform a detailed analysis of botnets and the vulnerabilities exploited by them to spread themselves and perform various malicious activities such as DDoS attacks. DDoS attacks are without doubt the most potent form of attacks carried out by botnets. In order to better understand this growing phenomenon and develop effective counter measures, it is necessary to be able to simulate DDoS attacks in a …


Exact And Approximation Algorithms For Computing Reversal Distances In Genome Rearrangement, Euna Park Jan 2008

Exact And Approximation Algorithms For Computing Reversal Distances In Genome Rearrangement, Euna Park

Master's Projects

Genome rearrangement is a research area capturing wide attention in molecular biology. The reversal distance problem is one of the most widely studied models of genome rearrangements in inferring the evolutionary relationship between two genomes at chromosome level. The problem of estimating reversal distance between two genomes is modeled as sorting by reversals. While the problem of sorting signed permutations can have polynomial time solutions, the problem of sorting unsigned permutations has been proven to be NP-hard [4]. This work introduces an exact greedy algorithm for sorting by reversals focusing on unsigned permutations. An improved method of producing cycle decompositions …


Semantic Categorization Of Online Video, Supraja Swarna Jan 2008

Semantic Categorization Of Online Video, Supraja Swarna

Master's Projects

As internet users are increasing day by day, the users of video-sharing site are also increasing. Video-sharing is becoming more and more popular in e-learing, but the current famous websites like youtube are not structured when it come to serving the purpose of providing educational videos for preschool and high school students. There is a need to fill building more educationally focused video site, where the content is more structured, easy to use, support both direct search and browsing, and follow a particular curriculum for preschool and high school students. This report discuss the issues like categorization and search interface …


Visualization Web Portal On The Grid, Sandhya Turaga Jan 2008

Visualization Web Portal On The Grid, Sandhya Turaga

Master's Projects

Grid-based visualization portals help scientists explore data that is distributed across the globe and to visualize the data. Visualization allows scientists to explore data effectively and helps them to obtain further insights into the data. We developed a visualization grid portal whose main aim is to be able to store large data sets across machines in a cluster in a distributed fashion, and to allow users of the Grid Portal to visualize the data set effectively. This Grid portal uses HADOOP, a grid platform that facilitates flexible data storage in a distributed fashion, and supports distributed computation as well. The …


Code Obfuscation And Virus Detection, Ashwini Venkatesan Jan 2008

Code Obfuscation And Virus Detection, Ashwini Venkatesan

Master's Projects

Typically, computer viruses and other malware are detected by searching for a string of bits which is found in the virus or malware. Such a string can be viewed as a “fingerprint” of the virus. These “fingerprints” are not generally unique; however they can be used to make rapid malware scanning feasible. This fingerprint is often called a signature and the technique of detecting viruses using signatures is known as signaturebased detection [8]. Today, virus writers often camouflage their viruses by using code obfuscation techniques in an effort to defeat signature-based detection schemes. So-called metamorphic viruses are viruses in which …


Online Visualization Of Bibliography Using Visualization Techniques, Bharath Kumar Manur Venkataramana Jan 2008

Online Visualization Of Bibliography Using Visualization Techniques, Bharath Kumar Manur Venkataramana

Master's Projects

Visualization is a concept where we can represent some raw data in the form of graphs, images, charts, etc. which will be very helpful for the end-user to correlate and be able to understand the relationships between the data elements in a single screen. Representing the bibliographic information of the computer science journals and proceedings using Visualization technique would help user choose a particular author and navigate through the hierarchy and find out what papers the author has published, the keywords of the papers, what papers cite them, the co-authors along with the main author, and how many papers are …


Javafx As A Domain-Specific Language In Scala / Groovy, Sadiya Hameed Jan 2008

Javafx As A Domain-Specific Language In Scala / Groovy, Sadiya Hameed

Master's Projects

Domain-Specific Languages (DSLs) are optimized for developing applications in a particular domain. JavaFX is such a DSL for creating rich graphical user interfaces.One method to create a DSL is to implement it in an existing language. This offers the advantage that existing users of the language do not need to learn a new language to work in the DSL. Scala and Groovy are two upcoming Java based languages which boast a feature set that can be used to extend existing languages and facilitate DSL creation. In this project my goal was to evaluate the ability of Scala and Groovy to …


Authoring And Sharing Of Programming Exercises, Somyajit Jena Jan 2008

Authoring And Sharing Of Programming Exercises, Somyajit Jena

Master's Projects

In recent years, a number of exercises have been developed and published for educating students in the field of Computer Science. But these exercises exist in their own silos. There is no apparent mechanism to share these exercises among researchers and instructors in an effective and efficient manner. Moreover, the developers of these programming exercises are generally using a proprietary system for automatic submission and grading of these exercises. Each of these systems dictates the persistent format of an exercise that may not be inter-operable with other automatic submission and grading systems. This project provides a solution to this problem …