Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Master's Projects

Discipline
Keyword
Publication Year

Articles 811 - 840 of 850

Full-Text Articles in Physical Sciences and Mathematics

Design & Evaluation Of Path-Based Reputation System For Manet Routing, Ji Li Jan 2008

Design & Evaluation Of Path-Based Reputation System For Manet Routing, Ji Li

Master's Projects

Most of the existing reputation systems in mobile ad hoc networks (MANET) consider only node reputations when selecting routes. Reputation and trust are therefore generally ensured within a one-hop distance when routing decisions are made, which often fail to provide the most reliable, trusted route. In this report, we first summarize the background studies on the security of MANET. Then, we propose a system that is based on path reputation, which is computed from reputation and trust values of each and every node in the route. The use of path reputation greatly enhances the reliability of resulting routes. The detailed …


Trust-Networks In Recommender Systems, Kristen Mori Jan 2008

Trust-Networks In Recommender Systems, Kristen Mori

Master's Projects

Similarity-based recommender systems suffer from significant limitations, such as data sparseness and scalability. The goal of this research is to improve recommender systems by incorporating the social concepts of trust and reputation. By introducing a trust model we can improve the quality and accuracy of the recommended items. Three trust-based recommendation strategies are presented and evaluated against the popular MovieLens [8] dataset.


Practical Detection Of Metamorphic Computer Viruses, Sharmidha Govindaraj Jan 2008

Practical Detection Of Metamorphic Computer Viruses, Sharmidha Govindaraj

Master's Projects

Metamorphic virus employs code obfuscation techniques to mutate itself. It absconds from signature-based detection system by modifying internal structure without compromising original functionality. However, it has been proved that machine learning technique like Hidden Markov model (HMM) can detect such viruses with high probability. HMM is a state machine where each state observes the input data with appropriate observation probability. HMM learns statistical properties of “virus features” rather than “signatures” and relies on such statistics to detect same family virus. Each HMM is trained with variants of same family viruses that are generated by same metamorphic engine so that HMM …


Iphone Securtity Analysis, Vaibhav Ranchhoddas Pandya Jan 2008

Iphone Securtity Analysis, Vaibhav Ranchhoddas Pandya

Master's Projects

The release of Apple’s iPhone was one of the most intensively publicized product releases in the history of mobile devices. While the iPhone wowed users with its exciting design and features, it also outraged many for not allowing installation of third party applications and for working exclusively with AT&T wireless services for the first two years. Software attacks have been developed to get around both limitations. The development of those attacks and further evaluation revealed several vulnerabilities in iPhone security. In this paper, we examine several of the attacks developed for the iPhone as a way of investigating the iPhone’s …


Online Recommendation System, Ankit Khera Jan 2008

Online Recommendation System, Ankit Khera

Master's Projects

The vast amount of data available on the Internet has led to the development of recommendation systems. This project proposes the use of soft computing techniques to develop recommendation systems. It addresses the limitations of current algorithms used to implement recommendation systems, evaluation of experimental results, and conclusion. This report provides a detailed summary of the project “Online Recommendation System” as part of fulfillment of the Master's Writing Project, Computer Science Department, San Jose State University’s. The report includes a description of the topic, system architecture, and provides a detailed description of the work done till point. Included in the …


Bibliography Data Mining And Data Visualization, Deepthi Pullannagari Jan 2008

Bibliography Data Mining And Data Visualization, Deepthi Pullannagari

Master's Projects

Data mining is a concept of discovering meaningful patterns from large data repositories, and Data visualization is a graphical representation of data using shapes, colors and images for a better conceptualization. These two techniques have been in use for a long time now and are used together in number of fields to gain a better perception of the data. Bibliographic data is widely used in academic and scientific literature fields and this project deals with data mining and data visualization of bibliographic data downloaded from Citeseer Citation Indexing system. The downloaded metadata is extracted into the database, looking for patterns …


Validation And Verification Of Aircraft Control Software For Control Improvement, Thien-Anh Pham Jan 2007

Validation And Verification Of Aircraft Control Software For Control Improvement, Thien-Anh Pham

Master's Projects

Validation and Verification are important processes used to ensure software safety and reliability. The Cooper-Harper Aircraft Handling Qualities Rating is one of the techniques developed and used by NASA researchers to verify and validate control systems for aircrafts. Using the Validation and Verification result of controller software to improve controller's performance will be one of the main objectives of this process. Real user feedback will be used to tune PI controller in order for it to perform better. The Cooper-Harper Aircraft Handling Qualities Rating can be used to justify the performance of the improved system.


A Hierarchical Trusted Third-Party System For Secure Peer-To-Peer Transactions, Khoi Nguyen Jan 2007

A Hierarchical Trusted Third-Party System For Secure Peer-To-Peer Transactions, Khoi Nguyen

Master's Projects

A peer-to-peer (P2P) network is a distributed network of peer computers loosely connected through the Internet. Transactions in a P2P network are often conducted on a no-security basis. Moreover, peer anonymity is often highly desirable, which makes security even more difficult to achieve. In most cases, a peer executes a transaction solely based on the faith that the other peer plays by the rules. Here we propose a hierarchical Trusted Third-Party (TTP) system that facilitates secure transactions between peers in an existing P2P network. This system is designed to provide mutual authentication by using public key cryptography for peers to …


Securing Wireless Networks From Arp Cache Poisoning, Roney Philip Jan 2007

Securing Wireless Networks From Arp Cache Poisoning, Roney Philip

Master's Projects

Wireless networks have become an integral part of today’s networks. The ease of deployment, low cost, mobility and high data rates have contributed significantly to their popularity. The medium of data transmission in wireless networks makes them inherently less secure than wired networks. For wireless networks to access the Internet they must be connected to a wired network via an Access Point or a wireless router. This has led wireless network equipment manufacturers to implement wireless Access Points and wireless routers with a built in switch for wired clients and a WiFi access point for wireless clients. The set up …


Cryptanalysis Of Sigaba, Wing Chan Jan 2007

Cryptanalysis Of Sigaba, Wing Chan

Master's Projects

SIGABA is a World War II cipher machine used by the United States. Both the United States Army and the United States Navy used it for tactical communication. In this paper, we consider an attack on SIGABA using the largest practical keyspace for the machine. This attack will highlight the strengths and weaknesses of the machine, as well as provide an insight into the strength of the security provided by the cipher.


Emotional And Domain Concept Enhancements To Alicebot, Alvin Cho Jan 2007

Emotional And Domain Concept Enhancements To Alicebot, Alvin Cho

Master's Projects

Extensive research and development have been done in the area of human simulation and artificial intelligence and their related fields, such as common sense knowledge bases, chatterbots, natural language parsing, semantic analysis, synthetic actors, and cognitive sciences. This paper takes part in that extensive research by focusing on the improvement of human simulation in chatterbots, specifically in Alicebot, a prominent non-emotional pattern-matching chatbot. An emotion and personality model is added to Alicebot so that it can make decisions based on its emotions and personality. Alicebot is also augmented with the ability to determine what it likes or does not like …


Operon Prediction With Bayesian Classifiers, Natalia Khuri Jan 2007

Operon Prediction With Bayesian Classifiers, Natalia Khuri

Master's Projects

In this work, we present an approach to predicting transcription units based on Bayesian classifiers. The predictor uses publicly available data to train the classifier, such as genome sequence data from Genbank, expression values from microarray experiments, and a collection of experimentally verified transcription units. We have studied the importance of each of the data source on the performance of the predictor by developing three classifier models and evaluating their outcomes. The predictor was trained and validated on the E. coli genome, but can be extended to other organisms. Using the full Bayesian classifier, we were able to correctly identify …


A Multiple-Copy Scheme For Multi-Channel Stop-And-Wait Harq, Yucheng Shih Jan 2007

A Multiple-Copy Scheme For Multi-Channel Stop-And-Wait Harq, Yucheng Shih

Master's Projects

HARQ (Hybrid Automatic Repeat Request) combines ARQ (Automatic Repeat Request) with FEC (Forward Error Correction) to provide a reliable way to ensure that data are received correctly and in sequence. A multiple-copy HARQ scheme is proposed for WiMAX (Worldwide Interoperability for Microwave Access) to reduce the waiting time of erroneously received data in the receivers’ buffer. In this project, the performances of WiMAX multi-channel stop-and-wait HARQ scheme are compared with that of the proposed multiple-copy HARQ scheme. The multiple-copy HARQ can send the same copy of a data burst on contiguous channels during noisy channel conditions so that the required …


Prediction Of Alternative Splice Sites In Human Genes, Douglas Simmons Jan 2007

Prediction Of Alternative Splice Sites In Human Genes, Douglas Simmons

Master's Projects

This thesis addresses the problem of predicting alternative splice sites in human genes. The most common way to identify alternative splice sites are the use of expressed sequence tags and microarray data. Since genes only produce alternative proteins under certain conditions, these methods are limited to detecting only alternative splice sites in genes whose alternative protein forms are expressed under the tested conditions. I have introduced three multiclass support vector machines that predict upstream and downstream alternative 3’ splice sites, upstream and downstream alternative 5’ splice sites, and the 3’ splice site of skipped and cryptic exons. On a test …


Case Studies In Proof Checking, Robert Kam Jan 2007

Case Studies In Proof Checking, Robert Kam

Master's Projects

The aim of computer proof checking is not to find proofs, but to verify them. This is different from automated deduction, which is the use of computers to find proofs that humans have not devised first. Currently, checking a proof by computer is done by taking a known mathematical proof and entering it into the special language recognized by a proof verifier program, and then running the verifier to hopefully obtain no errors. Of course, if the proof checker approves the proof, there are considerations of whether or not the proof checker is correct, and this has been complicated by …


Blog Analysis With Fuzzy Tfidf, Chi-Shu Ho Jan 2007

Blog Analysis With Fuzzy Tfidf, Chi-Shu Ho

Master's Projects

These days blogs are becoming increasingly popular because it allows anyone to share their personal diary, opinions, and comments on the World Wide Wed. Many blogs contain valuable information, but it is a difficult task to extract this information from a high number of blog comments. The goal is to analyze a high number of blog comments by clustering all blog comments by their similarity based on keyword relevance into smaller groups. TF-IDF weight has been used in classifying documents by measuring appearance frequency of each keyword in a document, but it is not effective in differentiating semantic similarities between …


Mobile Multimedia Streaming Library, Bao Ho Jan 2007

Mobile Multimedia Streaming Library, Bao Ho

Master's Projects

In recent years, multimedia has become a commonly used tool for presenting contents to the users. The employment of multimedia is no longer limited to only the entertainment industry, but spans in other areas as well. In academics, lectures are recorded to audio and video for storage and distribution to students. Free online multimedia hosting services are popularly cherished, such as “youtube.com” and “yahoo video”, and with the increasing affordability of digital camera, hundreds, or maybe thousands, of home-made videos and music audio are created daily and published online. Low-cost digital recorders such as webcams also help promote the use …


Clustering Blog Information, Mayank Prakash Jaiswal Jan 2007

Clustering Blog Information, Mayank Prakash Jaiswal

Master's Projects

Blogs form an important source of information in today’s internet world. There are blogs on different topics such as technical, health, electronic gadgets, shopping, etc. However, most of the blog websites have the blogs arranged in chronological order rather than its contents. Such arrangement of blogs makes it difficult for the user searching information about a particular topic from the blog. To resolve this problem, we propose an approach to cluster the blogs based on its content. We studied several clustering algorithms available. The objective of this report is to understand various steps involved in clustering blog information and working …


Pairwise Alignment Of Metamorphic Computer Viruses, Scott Mcghee Jan 2007

Pairwise Alignment Of Metamorphic Computer Viruses, Scott Mcghee

Master's Projects

Computer viruses and other forms of malware pose a threat to virtually any software system (with only a few exceptions). A computer virus is a piece of software which takes advantage of known weaknesses in a software system, and usually has the ability to deliver a malicious payload. A common technique that virus writers use to avoid detection is to enable the virus to change itself by having some kind of self-modifying code. This kind of virus is commonly known as a metamorphic virus, and can be particularly difficult to detect [17]. Existing virus detection software is continually being improved …


A Differential Power Analysis Resistant Randomized Algorithm Using Multiple Aes Ciphers, Richard Tran Jan 2007

A Differential Power Analysis Resistant Randomized Algorithm Using Multiple Aes Ciphers, Richard Tran

Master's Projects

Differential power analysis (DPA) side channel attacks have been shown to have great effectiveness in breaking ciphers (such as the Advanced Encryption Standard or AES) that were previously though to be unbreakable. There are currently many methods published that prevent differential power analysis on AES. The method proposed for this project is based on the increased usage of multiprocessors and multicore processors. By using multiple copies of the same AES cipher, a randomly chosen cipher is used to encrypt each plaintext. The other ciphers are then used to obfuscate the data made available to the attacker for DPA in the …


Concept Analysis In Web Documents, Rajesh Singh Jan 2007

Concept Analysis In Web Documents, Rajesh Singh

Master's Projects

A Keyword within a text/web document represents some human thought. The interaction of keywords leads to narrowing of scope of human thought by forming a more precise semantic entity called concepts. Analyzing a set of document not only requires analysis of the keywords within those documents but also their interactions within a document. In this new approach a set of documents can be analyzed where by the interactions of its keywords is also considered in finding the important concepts. These concepts can be used to cluster them into smaller subsets such that documents in each cluster will be semantically similar.


Juice: An Svg Rendering Peer For Java Swing, Ignatius Yuwono Jan 2006

Juice: An Svg Rendering Peer For Java Swing, Ignatius Yuwono

Master's Projects

SVG—a W3C XML standard—is a relatively new language for describing low-level vector drawings. Due to its cross-platform capabilities and support for events, SVG may potentially be used in interactive GUIs/graphical front-ends. However, a complete and full-featured widget set for SVG does not exist at the time of this writing. I have researched and implemented a framework which retargets a complete and mature raster- based widget library—the JFC Swing GUI library—into a vector-based display substrate: SVG. My framework provides SVG with a full-featured widget set, as well as augmenting Swing’s platform coverage. Furthermore, by using bytecode instrumentation techniques, my Swing to …


A Fast Algorithm For Data Mining, Aarathi Raghu Jan 2006

A Fast Algorithm For Data Mining, Aarathi Raghu

Master's Projects

In the past few years, there has been a keen interest in mining frequent itemsets in large data repositories. Frequent itemsets correspond to the set of items that occur frequently in transactions in a database. Several novel algorithms have been developed recently to mine closed frequent itemsets - these itemsets are a subset of the frequent itemsets. These algorithms are of practical value: they can be applied to real-world applications to extract patterns of interest in data repositories. However, prior to using an algorithm in practice, it is necessary to know its performance as well implementation issues. In this project, …


Implementing Built-In Properties For The Java Programming Language, Alexandre Alves Jan 2006

Implementing Built-In Properties For The Java Programming Language, Alexandre Alves

Master's Projects

The purpose of this project is to improve the programming experience of using the Java language by implementing properties as a built-in facility. In this project, the Java compiler tool, and the Java documentation tool were modified. In addition, a new Java annotation processor that generates Java BeanInfo source files was created. These new features result in a more productive development environment for the Java programming language.


Bluetooth Security Protocol Analysis And Improvements, Chi Shing Lee Jan 2006

Bluetooth Security Protocol Analysis And Improvements, Chi Shing Lee

Master's Projects

Since its creation, Bluetooth has transformed itself from a cable replacement technology to a wireless technology that connects people and machines. Bluetooth has been widely adapted on mobile phones and PDAs. Many other vendors in other industries are integrating Bluetooth into their products. Although vendors are adapting to the technology, Bluetooth hasn’t been a big hit among users. Security remains a major concern. Poor implementation of the Bluetooth architecture on mobile devices leads to some high profiled Bluetooth hacks. Weak security protocol designs expose the Bluetooth system to some devastating protocol attacks. This paper first explores four Bluetooth protocol-level attacks …


Finding Optimal Reduct For Rough Sets By Using A Decision Tree Learning Algorithm, Xin Li Jan 2006

Finding Optimal Reduct For Rough Sets By Using A Decision Tree Learning Algorithm, Xin Li

Master's Projects

Rough Set theory is a mathematical theory for classification based on structural analysis of relational data. It can be used to find the minimal reduct. Minimal reduct is the minimal knowledge representation for the relational data. The theory has been successfully applied to various domains in data mining. However, a major limitation in Rough Set theory is that finding the minimal reduct is an NP-hard problem. C4.5 is a very popular decision tree-learning algorithm. It is very efficient at generating a decision tree. This project uses the decision tree generated by C4.5 to find the optimal reduct for a relational …


Engineering Enterprise Software Systems With Interactive Uml Models And Aspect-Oriented Middleware, Paul Nguyen Jan 2006

Engineering Enterprise Software Systems With Interactive Uml Models And Aspect-Oriented Middleware, Paul Nguyen

Master's Projects

Large scale enterprise software systems are inherently complex and hard to maintain. To deal with this complexity, current mainstream software engineering practices aim at raising the level of abstraction to visual models described in OMG’s UML modeling language. Current UML tools, however, produce static design diagrams for documentation which quickly become out-of-sync with the software, and thus obsolete. To address this issue, current model-driven software development approaches aim at software automation using generators that translate models into code. However, these solutions don’t have a good answer for dealing with legacy source code and the evolution of existing enterprise software systems. …


Authoring Xml Documents With Xhtml And Mathml Support, Xiaoheng Wu Jan 2006

Authoring Xml Documents With Xhtml And Mathml Support, Xiaoheng Wu

Master's Projects

Since the late 1970s, a large number of scientific documents have been authored in TeX or its derivations such as LaTeX. These typesetting systems allow anybody to write highquality books and articles. But the TeX syntax is not compatible with HTML or XML. So the WWW consortium's answer is MathML. The primary goal of MathML is to enable mathematical documents to be communicated, exchanged, and processed on the Web. Therefore, MathML documents are usually embedded with XHTML documents. Currently, there are several XHTML+MathML editors. The most popular editors use two common approaches. The first approach offers a WhatYouSeeIsWhatYouGet (WYSIWYG) interface. …


Cooperative Interval Caching In Clustered Multimedia Servers, Kim Tran Jan 2006

Cooperative Interval Caching In Clustered Multimedia Servers, Kim Tran

Master's Projects

In this project, we design a cooperative interval caching (CIC) algorithm for clustered video servers, and evaluate its performance through simulation. The CIC algorithm describes how distributed caches in the cluster cooperate to serve a given request. With CIC, a clustered server can accommodate twice (95%) more number of cached streams than the clustered server without cache cooperation. There are two major processes of CIC to find available cache space for a given request in the cluster: to find the server containing the information about the preceding request of the given request; and to find another server which may have …


Analysis And Detection Of Metamorphic Computer Viruses, Wing Wong Jan 2006

Analysis And Detection Of Metamorphic Computer Viruses, Wing Wong

Master's Projects

Virus writers and anti-virus researches generally agree that metamorphism is the way to generate undetectable viruses. Several virus writers have released virus creation kits and claimed that they possess the ability to automatically produce morphed virus variants that look substantially different from one another. To see how effective these code morphing engines are, and how much difference exists between variants of a same virus, we measured the similarity between virus variants generated by four virus generators downloaded from the Internet. Our result shows that the effectiveness of these generators varies widely. While the best generator, NGVCK, is able to create …