Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Master's Projects

2009

Articles 1 - 30 of 45

Full-Text Articles in Physical Sciences and Mathematics

Improving Web Recommendations Using Web Usage Mining And Web Semantics, Neha Saxena Jan 2009

Improving Web Recommendations Using Web Usage Mining And Web Semantics, Neha Saxena

Master's Projects

This project addresses the topic of improving web recommendations. With the immense increase in the number of websites and web pages on the internet, the issue of suggesting users with the web pages in the area of their interest needs to be addressed as best as possible. Various approaches have been proposed over the years by many researchers and each of them has taken the solution of creating personalized web recommendations a step ahead. Yet, owing to the large possibilities of further improvement, the system proposed in this report takes generating web recommendations one more step ahead. The proposed system …


Mrcraig: Mapreduce And Ensemble Classifiers For Parallelizing Data Classification Problems, Glenn Jahnke Jan 2009

Mrcraig: Mapreduce And Ensemble Classifiers For Parallelizing Data Classification Problems, Glenn Jahnke

Master's Projects

In this paper, a novel technique for parallelizing data-classification problems is applied to finding genes in sequences of DNA. The technique involves various ensem- ble classification methods such as Bagging and Select Best. It then distributes the classifier training and prediction using MapReduce. A novel sequence classification voting algorithm is evaluated in the Bagging method, as well as compared against the Select Best method.


Hunting For Undetectable Metamorphic Viruses, Da Lin Jan 2009

Hunting For Undetectable Metamorphic Viruses, Da Lin

Master's Projects

Commercial anti-virus scanners are generally signature based, that is, they scan for known patterns to determine whether a file is infected by a virus or not. To evade signature-based detection, virus writers have adopted code obfuscation techniques to create highly metamorphic computer viruses. Since metamorphic viruses change their appearance from generation to generation, signature-based scanners cannot detect all instances of such viruses. To combat metamorphic viruses, detection tools based on statistical analysis have been studied. A tool based on hidden Markov models (HMMs) was previously developed and the results are encouraging—it has been shown that metamorphic viruses created by a …


Video Conferencing Tool, Sapna Blesson Jan 2009

Video Conferencing Tool, Sapna Blesson

Master's Projects

Video Conferencing Tool (VCT) is a web-based video chat application that allows users anywhere in the world to join real-time streaming video chat rooms. This product is similar to social networking sites that allow web-based video conferencing. The main advantage of VCT compared to existing tools is that it is easy to use and does not require users to download and set up additional hardware. Since this product is a browser-based solution, it allows users from multiple platforms like Windows, Linux, or Mac to join a chat room. My VCT allows users to create new public or private chat rooms …


Visualization Of Tree-Structured Data Through A Multi Touch User Interface, David Andrews Jan 2009

Visualization Of Tree-Structured Data Through A Multi Touch User Interface, David Andrews

Master's Projects

This writing project examines different types of visualizations for tree-structured data sets. Visualizations discussed include link-node diagrams and treemap diagrams. Also discussed is recent innovations with regards to distinguishing multi touch from single touch technology. I explore the requirements needed to build a multi touch table top surface, and describe the process of building one. I then describe my proposed method of visualizing tree-structured data and how it can be implemented using Core Animation technology. I also propose a means of interacting with the data through a multi touch interface, and discuss which gestures can be used to navigate the …


Priority Based Power Management And Reduced Downtime In Data Centers, Barath Kuppuswamy Jan 2009

Priority Based Power Management And Reduced Downtime In Data Centers, Barath Kuppuswamy

Master's Projects

The project deals successfully with software that performs priority based power management and reduced downtime for virtual machines running in data centers. The software deals with power management only at the processor level. The software automatically performs load distribution among servers in data centers to save power. In addition, the software also lets administrator of data centers to mark certain virtual machines, which run user applications, as critical to minimize downtimes for these virtual machines. The software reveals that energy consumption can be minimized while maintaining high runtime availability for the mission critical applications. The software operates in Green mode …


Visualized Architecture Knowledge Management Collaboration Services, Ashish Kaul Jan 2009

Visualized Architecture Knowledge Management Collaboration Services, Ashish Kaul

Master's Projects

Software (system) architecture knowledge is a critical element in making effective design/ implementation decisions for Information Technology departments within companies. This knowledge can be codified and/ or personalized so as to harness the advantages and avoid the missed steps of implementers before us. In research of architecture knowledge enablement, there have been a few ventures, including but not limited to, Processcentric Architecture Knowledge Management Environment (PAKME) [3] and Architecture Design Decision Support System (ADDSS) [4]. In study of these ventures, we find modest attempts at focusing on dissecting types of architecture knowledge and enabling access to details through web tools. …


Wormulator: Simulator For Rapidly Spreading Malware, Jyotsna Krishnaswamy Jan 2009

Wormulator: Simulator For Rapidly Spreading Malware, Jyotsna Krishnaswamy

Master's Projects

This project addresses the need for an application level simulator to simulate Internet-wide phenomenon such as flash worms, botnets, Distributed Denial-of-Service attacks, etc. There are many network simulators intended for parallel and distributed simulation, but most are designed to simulate low level communication protocols such as TCP/IP. The desire to simulate rapidly spreading malware for research and teaching purposes lead us to explore the Spamulator, which was designed to simulate spam email on an Internet-wide scale. The Spamulator was developed by a team at the University of Calgary. It is a lightweight, application level simulator, which implements limited set of …


Information Flow Model For Commercial Security, Jene Pan Jan 2009

Information Flow Model For Commercial Security, Jene Pan

Master's Projects

Information flow in Discretionary Access Control (DAC) is a well-known difficult problem. This paper formalizes the fundamental concepts and establishes a theory of information flow security. A DAC system is information flow secure (IFS), if any data never flows into the hands of owner’s enemies (explicitly denial access list.)


Automated Artice Generation Using The Web, Gaurang Patel Jan 2009

Automated Artice Generation Using The Web, Gaurang Patel

Master's Projects

An article generation application is an intelligent mining engine that looks for web content, then combines and organizes this content in a meaningful way to generate an article. This contrasts with a search engine which generates a list of links to pages containing keywords. This writing project is about such an article generation tool. Our tool generates articles on the topic entered by the user using information available on the web. The articles have well defined sections, each talking about different aspect of the topic.


Evaluations And Enhancements In 802.11n Wlans – Error-Sensitive Adaptive Frame Aggregation, Ken Chan Jan 2009

Evaluations And Enhancements In 802.11n Wlans – Error-Sensitive Adaptive Frame Aggregation, Ken Chan

Master's Projects

IEEE 802.11n is a developing next-generation standard for wireless local area network (LAN). Seamless multimedia traffic connection will become possible with the 802.11n improvement in the Physical and MAC layer. The new 802.11n frame aggregation technique is particularly important for enhancing MAC layer efficiency under high speed wireless LAN. Although the frame aggregation can increase the efficiency in the MAC layer, it does not provide good performance in high BER channels when using large frame aggregation size. An Optimal Frame Aggregation (OFA) technique for AMSDU frame under different BERs in 802.11n WLANs was proposed. However, the suggested algorithm does not …


Versatile Extensible Security System For Mobile Ad Hoc Networks, Jung Chang Jan 2009

Versatile Extensible Security System For Mobile Ad Hoc Networks, Jung Chang

Master's Projects

Mobile Ad hoc Network (MANET) is becoming more and more popular in scientific, government, and general applications, but security system for MANET is still at infant stage. Currently, there are not many security systems that provide extensive security coverage for MANET. Moreover, most of these security systems assume nodes have infinite computation power and energy; an assumption that is not true for many mobiles. Versatile and Extensible System (VESS) is a powerful and versatile general-purpose security suite that comprises of modified versions of existing encryption and authentication schemes. VESS uses a simple and network-efficient but still reliable authentication scheme. The …


Performance Study Of Fmipv6-Based Cross-Layer Wimax Handover Scheme For Supporting Voip Service, Heejung Kim Jan 2009

Performance Study Of Fmipv6-Based Cross-Layer Wimax Handover Scheme For Supporting Voip Service, Heejung Kim

Master's Projects

This report presents performance study of the FMIPv6-based cross-layer handover scheme for VoIP supports over mobile WiMAX network. For this performance validation and evaluation, the handover delays for four different handover mechanisms are formulated and ns2 based simulation module has been developed. The handover delay, the total delay, and the R factor representing VoIP quality are measured to evaluate the VoIP support characteristics of the FMIPv6-based cross-layer scheme. Simulation results verified that the proposed FMIPv6-based cross-layer handover scheme, compared to the non-cross-layer scheme, successfully reduces total handover delay by almost 50% for the case of layer-3 handover. Further, simulation was …


Active Lecture: An Interactive Lecturing System, Himavanthara Sajja Jan 2009

Active Lecture: An Interactive Lecturing System, Himavanthara Sajja

Master's Projects

Classroom lecturing has been improving with the advances in information technology. The Active Lecture, an advanced lecturing system, is developed as part of this project. The Active Lecture system allows the students to be more interactive during a lecture process. The Active Lecture system has features that are helpful to both the instructors and the students before, during, and after the lectures. The Active Lecture system is deployed and is made available for use in a classroom. The usage of the Active Lecture system is compared with the usage of Ubiquitous Presenter in a classroom setting.


Available Bandwidth Inference Based On Node-Centric Clusters, Seetharam Samptur Jan 2009

Available Bandwidth Inference Based On Node-Centric Clusters, Seetharam Samptur

Master's Projects

End-to-End Available Bandwidth (AB) is a real-time network metric that is useful for a wide range of applications including content distribution networks, multimedia streaming applications and overlay networks. In a large network with several thousand nodes, it is infeasible to perform all-pair bandwidth measurements as AB measurements could induce traffic overhead along the path. Also because of its dynamic nature, the measurements have to be performed frequently thus imposing significant probe traffic overhead on the network. In this paper, we discuss a clustering based distributed algorithm to infer the AB between any pair of nodes in a large network based …


Clustering Algorithm For Enhanced Bibliography Visualization, Sriram Krishnan Jan 2009

Clustering Algorithm For Enhanced Bibliography Visualization, Sriram Krishnan

Master's Projects

A Bibliography is a list of books, publications, journals etc., with details such as authors and references. Visualization could be used as a data analysis tool to represent various types of data, analyze huge chunks of data easily and arrive at interesting results. The idea of this project is to provide a medium which eases the combination of bibliography with visualization. Though there are many sources of bibliographic data like the Digital Bibliography and Library Project (DBLP), Citeseer, Google Scholar, none of these data could be used directly for deducing relations between various entities or for visualizing the relationship between …


Total Recall For Ajax Applications – Firefox Extension, Smita Periyapatna Jan 2009

Total Recall For Ajax Applications – Firefox Extension, Smita Periyapatna

Master's Projects

Ajax, or AJAX (Asynchronous JavaScript and XML), is a group of interrelated web development techniques used to create interactive web applications or rich Internet applications[9]. Web applications can retrieve data from the server asynchronously in the background without interfering with the display and behavior of an existing web page. [9] One of the biggest problems with Ajax applications is saving state and accommodating the succession of the history controls, (Back/forward buttons). Ajax allows documents to become stateful, but when the user intuitively goes for the history controls in the browser window, things go wrong. The user expects to see the …


Knowledge Engineering From Data Perspective: Granular Computing Approach, Rushin Barot Jan 2009

Knowledge Engineering From Data Perspective: Granular Computing Approach, Rushin Barot

Master's Projects

The concept of rough set theory is a mathematical approach to uncertainly and vagueness in data analysis, introduced by Zdzislaw Pawlak in 1980s. Rough set theory assumes the underlying structure of knowledge is a partition. We have extended Pawlak’s concept of knowledge to coverings. We have taken a soft approach regarding any generalized subset as a basic knowledge. We regard a covering as basic knowledge from which the theory of knowledge approximations and learning, knowledge dependency and reduct are developed.


Msg: A Gap-Oriented Genetic Algorithm For Multiple Sequence Alignment, Philip Heller Jan 2009

Msg: A Gap-Oriented Genetic Algorithm For Multiple Sequence Alignment, Philip Heller

Master's Projects

Traditional Multiple Sequence Alignment (MSA) Algorithms are deterministic. Genetic algorithms for protein MSA have been documented. However, these are not able to exceed in all cases the scores obtained by Clustal­W, the freely available de­facto standard. My solution, called “MSG”, places gaps rather than amino acids. The algorithm is multi­tribal, uses only a few very simple operators with adaptive frequencies, and jumpstarts one population from the Clustal­W solution. Results are reported for 14 data sets, on all of which MSG exceeds the Clustal­W score.


Distributed Port Scanning Detection, Himanshu Singh Jan 2009

Distributed Port Scanning Detection, Himanshu Singh

Master's Projects

Conventional Network Intrusion Detection System (NIDS) have heavyweight processing and memory requirements as they maintain per flow state using data structures like linked lists or trees. This is required for some specialized jobs such as Stateful Packet Inspection (SPI) where the network communications between entities are recreated in its entirety to inspect application level data. The downside to this approach is that the NIDS must be in a position to view all inbound and outbound traffic of the protected network. The NIDS can be overwhelmed by a DDoS attack since most of these try and exhaust the available state of …


Improving Location Determination For Non-Gps Devices, Varun Sud Jan 2009

Improving Location Determination For Non-Gps Devices, Varun Sud

Master's Projects

Location awareness is one of the most important information that an individual looks for, both in an outdoor and indoor environment. One of the primary location determination techniques is the Global Positioning system, though this system provides a good accuracy in an outdoor environment, its accuracy decreases in densely populated areas and in an indoor environment a GPS system ceases to provide location information since the satellite signal cannot permeate through the roof and the walls. Various location estimation techniques have been proposed for location estimation in an indoor environment, some utilizing the signal strength of a wifi transmitter, while …


Removing The Digital Divide For Senior Web Users, Chiu Luk Jan 2009

Removing The Digital Divide For Senior Web Users, Chiu Luk

Master's Projects

It is hard for the elderly to use the internet to find the resource they want. Usually help is needed for them to complete the task on the technology things. The main reason for this project is to research ideas on encourage senior people to make use of the web to locate helps they want, such as finding volunteers and professional helps. The scope of this project is to develop a new way of web access and content presentation methodologies that let senior people getting help from volunteers and various service providers more easily that incorporates social networking technology e.g. …


Hunting For Undetectable Metamorphic Viruses, Da Lin Jan 2009

Hunting For Undetectable Metamorphic Viruses, Da Lin

Master's Projects

Commercial anti-virus scanners are generally signature based, that is, they scan for known patterns to determine whether a file is infected by a virus or not. To evade signature-based detection, virus writers have adopted code obfuscation techniques to create highly metamorphic computer viruses. Since metamorphic viruses change their appearance from generation to generation, signature-based scanners cannot detect all instances of such viruses. To combat metamorphic viruses, detection tools based on statistical analysis have been studied. A tool based on hidden Markov models (HMMs) was previously developed and the results are encouraging—it has been shown that metamorphic viruses created by a …


Intrusion Detection And Prevention System: Cgi Attacks, Tejinder Aulakh Jan 2009

Intrusion Detection And Prevention System: Cgi Attacks, Tejinder Aulakh

Master's Projects

Over the past decade, the popularity of the Internet has been on the rise. The Internet is being used by its clients to access both static and dynamic data residing on remote servers. In the client-server interaction, the client asks the server to provide information, and, in addition, the server may also request that clients provide information such as in “web forms.” Therefore, the Internet is being used for many different purposes which also include the web servers collecting the information from the clients. Consequently, attacks on the web servers have been increasing over the years. Due to the fact …


Analysis Of An Openmp Program For Race Detection, Dhaval Shah Jan 2009

Analysis Of An Openmp Program For Race Detection, Dhaval Shah

Master's Projects

The race condition in a shared memory parallel program is subtle and harder to find than in a sequential program. The race conditions cause non-deterministic and unexpected results from the program. It should be avoided in the parallel region of OpenMP programs. The proposed OpenMP Race Avoidance Tool statically analyzes the parallel region. It gives alerts regarding possible data races in that parallel region. The proposed tool has the capability to analyze the basic frequently occurring non-nested ‘for loop(s)’. We are comparing the results of the proposed tool with the commercially available static analysis tool named Intel Parallel Lint and …


Intrusion Alerts Analysis Using Attack Graphs And Clustering, Hardik Patel Jan 2009

Intrusion Alerts Analysis Using Attack Graphs And Clustering, Hardik Patel

Master's Projects

Network and information security is very crucial in keeping large information infrastructures safe and secure. Many researchers have been working on different issues to strengthen and measure security of a network. An important problem is to model security in order to apply analysis schemes efficiently to that model. An attack graph is a tool to model security of a network which considers individual vulnerabilities in a global view where individual hosts are interconnected. The analysis of intrusion alert information is very important for security evaluation of the system. Because of the huge number of alerts raised by intrusion detection systems, …


Objective Measurement Of Speech Quality In Voip Over Wireless Lan During Handoff, Nidhi Marwaha Gambhir Jan 2009

Objective Measurement Of Speech Quality In Voip Over Wireless Lan During Handoff, Nidhi Marwaha Gambhir

Master's Projects

Quality of Service is a very important factor to determine the quality of a VoIP call. Different subjective and objective models exist for evaluating the speech quality in VoIP. E-model is one of the objective methods of measuring the speech quality; it considers various factors like packet loss, delay and codec impairments. The calculations of Emodel are not very accurate in case of handovers – when a VoIP call moves from one wireless LAN to another. This project conducted experimental evaluation of performance of E-model during handovers and proposes a new approach to accurately calculate the speech quality of VoIP …


Expert Finding Using Social Networking, Parin Shah Jan 2009

Expert Finding Using Social Networking, Parin Shah

Master's Projects

In today’s world, knowledge transfer is considered an important and essential activity for the success of an enterprise. Large corporations have realized the need to reuse existing knowledge rather than spend time and effort on solving the same problems again. For these reasons, most corporations now have knowledge repositories. These repositories are visited for possible solutions whenever there is a problem that cannot be easily resolved by using the expertise of the existing team. Apart from this, the problems faced by the people in the company can also be resolved by asking for help from expert in that problem domain. …


Online Circular Calendar, Praveen Athmanathan Panneerselvam Jan 2009

Online Circular Calendar, Praveen Athmanathan Panneerselvam

Master's Projects

A calendar is a system to organize days for social, commercial or administrative purpose. Many calendar systems are available today. The calendar system helps the user in scheduling his/her events or tasks over a time period. This period may be an hour, a day, or even months. Due to increase in user’s activities, events that need to be scheduled in the calendar grow tremendously. Moreover, there are events that occur every year which require a good visualization for mental manipulation. As a result there is a difficulty in organizing these events in the current calendar system. The main idea of …


Triggering Of Just-In-Time Compilation In The Java Virtual Machine, Rouhollah Gougol Jan 2009

Triggering Of Just-In-Time Compilation In The Java Virtual Machine, Rouhollah Gougol

Master's Projects

The Java Virtual Machine (Standard Edition) normally interprets Java byte code but also compiles Java methods that are frequently interpreted and runs them natively. The purpose is to take advantage of native execution without having too much overhead for Just-In-Time compilation. A former SJSU thesis tried to enhance the standard policy by predicting frequently called methods ahead of their actual frequent interpretation. The project also tried to increase the compilation throughput by prioritizing the method compilations, if there is more than one hot method to compile at the same time. The paper claimed significant speedup. In this project, we tried …