Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Three Dimensional Modeling And Animation Of Facial Expressions, Alice J. Lin Jan 2011

Three Dimensional Modeling And Animation Of Facial Expressions, Alice J. Lin

University of Kentucky Doctoral Dissertations

Facial expression and animation are important aspects of the 3D environment featuring human characters. These animations are frequently used in many kinds of applications and there have been many efforts to increase the realism. Three aspects are still stimulating active research: the detailed subtle facial expressions, the process of rigging a face, and the transfer of an expression from one person to another. This dissertation focuses on the above three aspects.

A system for freely designing and creating detailed, dynamic, and animated facial expressions is developed. The presented pattern functions produce detailed and animated facial expressions. The system produces realistic …


On Simple But Hard Random Instances Of Propositional Theories And Logic Programs, Gayathri Namasivayam Jan 2011

On Simple But Hard Random Instances Of Propositional Theories And Logic Programs, Gayathri Namasivayam

University of Kentucky Doctoral Dissertations

In the last decade, Answer Set Programming (ASP) and Satisfiability (SAT) have been used to solve combinatorial search problems and practical applications in which they arise. In each of these formalisms, a tool called a solver is used to solve problems. A solver takes as input a specification of the problem – a logic program in the case of ASP, and a CNF theory for SAT – and produces as output a solution to the problem. Designing fast solvers is important for the success of this general-purpose approach to solving search problems. Classes of instances that pose challenges to solvers …


Modeling And Quantitative Analysis Of White Matter Fiber Tracts In Diffusion Tensor Imaging, Xuwei Liang Jan 2011

Modeling And Quantitative Analysis Of White Matter Fiber Tracts In Diffusion Tensor Imaging, Xuwei Liang

University of Kentucky Doctoral Dissertations

Diffusion tensor imaging (DTI) is a structural magnetic resonance imaging (MRI) technique to record incoherent motion of water molecules and has been used to detect micro structural white matter alterations in clinical studies to explore certain brain disorders. A variety of DTI based techniques for detecting brain disorders and facilitating clinical group analysis have been developed in the past few years. However, there are two crucial issues that have great impacts on the performance of those algorithms. One is that brain neural pathways appear in complicated 3D structures which are inappropriate and inaccurate to be approximated by simple 2D structures, …


Resource Allocation And Efficient Routing In Wireless Networks, Jianjun Yang Jan 2011

Resource Allocation And Efficient Routing In Wireless Networks, Jianjun Yang

University of Kentucky Doctoral Dissertations

In wireless networks, devices (nodes) are connected by wireless links. An important issue is to set up high quality (high bandwidth) and efficient routing paths when one node wants to send packets to other nodes. Resource allocation is the foundation to guarantee high quality connections. In addition, it is critical to handle void areas in order to set up detour-free paths. Moreover, fast message broadcasting is essential in mobile wireless networks. Thus, my research includes dynamic channel allocation in wireless mesh networks, geographic routing in Ad Hoc networks, and message broadcasting in vehicular networks.

The quality of connections in a …


Construction Of Efficient Authentication Schemes Using Trapdoor Hash Functions, Santosh Chandrasekhar Jan 2011

Construction Of Efficient Authentication Schemes Using Trapdoor Hash Functions, Santosh Chandrasekhar

University of Kentucky Doctoral Dissertations

In large-scale distributed systems, where adversarial attacks can have widespread impact, authentication provides protection from threats involving impersonation of entities and tampering of data. Practical solutions to authentication problems in distributed systems must meet specific constraints of the target system, and provide a reasonable balance between security and cost. The goal of this dissertation is to address the problem of building practical and efficient authentication mechanisms to secure distributed applications. This dissertation presents techniques to construct efficient digital signature schemes using trapdoor hash functions for various distributed applications. Trapdoor hash functions are collision-resistant hash functions associated with a secret trapdoor …