Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 58

Full-Text Articles in Physical Sciences and Mathematics

Large-Scale Distributed Coalition Formation, Daniel R. Karrels Dec 2009

Large-Scale Distributed Coalition Formation, Daniel R. Karrels

Theses and Dissertations

The CyberCraft project is an effort to construct a large scale Distributed Multi-Agent System (DMAS) to provide autonomous Cyberspace defense and mission assurance for the DoD. It employs a small but flexible agent structure that is dynamically reconfigurable to accommodate new tasks and policies. This document describes research into developing protocols and algorithms to ensure continued mission execution in a system of one million or more agents, focusing on protocols for coalition formation and Command and Control. It begins by building large-scale routing algorithms for a Hierarchical Peer to Peer structured overlay network, called Resource-Clustered Chord (RC-Chord). RC-Chord introduces the …


Bisecting Document Clustering Using Model-Based Methods, Aaron Samuel Davis Dec 2009

Bisecting Document Clustering Using Model-Based Methods, Aaron Samuel Davis

Theses and Dissertations

We all have access to large collections of digital text documents, which are useful only if we can make sense of them all and distill important information from them. Good document clustering algorithms that organize such information automatically in meaningful ways can make a difference in how effective we are at using that information. In this paper we use model-based document clustering algorithms as a base for bisecting methods in order to identify increasingly cohesive clusters from larger, more diverse clusters. We specifically use the EM algorithm and Gibbs Sampling on a mixture of multinomials as the base clustering algorithms …


Interactive Football Summarization, Brandon B. Moon Dec 2009

Interactive Football Summarization, Brandon B. Moon

Theses and Dissertations

Football fans do not have the time to watch every game in its entirety and need an effective solution that summarizes them the story of the game. Human-generated summaries are often too short, requiring time and resources to create. We utilize the advantages of Interactive TV to create an automatic football summarization service that is cohesive, provides context, covers the necessary plays, and is concise. First, we construct a degree of interest function that ranks each play based on detailed, play-by-play game events as well as viewing statistics collected from an interactive viewing environment. This allows us to select the …


Noninvasive Estimation Of Pulmonary Artery Pressure Using Heart Sound Analysis, Aaron W. Dennis Dec 2009

Noninvasive Estimation Of Pulmonary Artery Pressure Using Heart Sound Analysis, Aaron W. Dennis

Theses and Dissertations

Right-heart catheterization is the most accurate method for estimating pulmonary artery pressure (PAP). Because it is an invasive procedure it is expensive, exposes patients to the risk of infection, and is not suited for long-term monitoring situations. Medical researchers have shown that PAP influences the characteristics of heart sounds. This suggests that heart sound analysis is a potential noninvasive solution to the PAP estimation problem. This thesis describes the development of a prototype system, called PAPEr, which estimates PAP noninvasively using heart sound analysis. PAPEr uses patient data with machine learning algorithms to build models of how PAP affects heart …


Open Access Fiber To The Home Networking, Roger E. Timmerman Dec 2009

Open Access Fiber To The Home Networking, Roger E. Timmerman

Theses and Dissertations

The concept of open-access networks appeals to communities that want to invest in and improve their access to modern telecommunications services. By investing in, or building their own open-access telecommunications networks, communities can create an environment where several telecommunications service providers can co-exist on a common open-access infrastructure. This model promotes innovation and competition among several smaller service providers rather than having a monopoly or oligopoly from those companies that can afford the investment of infrastructure in the community. This research provides an analysis of two large open-access fiber-to-the-home networks in Utah to determine a set of recommendations and best-practices …


Statistical Tools For Linking Engine-Generated Malware To Its Engine, Edna Chelangat Milgo Dec 2009

Statistical Tools For Linking Engine-Generated Malware To Its Engine, Edna Chelangat Milgo

Theses and Dissertations

Malware-generating engines challenge typical malware analysts by requiring them to quickly extract and upload to their customers' machines, a signature for each of a possi- bly vast number of never-before-seen malware instances that an engine can generate in a short amount of time In this thesis we propose and evaluate two methods for'linking va- riants of engine-generated malware to its engine. The proposed methods use the w-gram frequency vector (NFV) of the opcode mnemonics of an engine-generated malware in- stance as a feature vector for the instance. An NFV is a tuple that maps «-grams with their frequencies. The in-formation …


Using Operator Teams For Supervisory Control, Jonathan M. Whetten Nov 2009

Using Operator Teams For Supervisory Control, Jonathan M. Whetten

Theses and Dissertations

Robots and other automated systems have potential use in many different fields. As the scope of robot applications that robots are used for increases, there is a growing desire to have human operators manage multiple robots. Typical methods of enabling operators to multi-task in this way involve some combination of user interfaces that support human cognition and advanced robot autonomy. Our research explores a complementary method of managing multiple robots by utilizing operator teams. The evidence suggests that for appropriate task scenarios, two cooperating operators can be more than twice as effective as one operator working alone.


An Empirical Study Of Instance Hardness, Michael Reed Smith Nov 2009

An Empirical Study Of Instance Hardness, Michael Reed Smith

Theses and Dissertations

Most widely accepted measures of performance for learning algorithms, such as accuracy and area under the ROC curve, provide information about behavior at the data set level. They say nothing about which instances are misclassified, whether two learning algorithms with the same classification accuracy on a data set misclassify the same instances, or whether there are instances misclassified by all learning algorithms. These questions about behavior at the instance level motivate our empirical analysis of instance hardness, a measure of expected classification accuracy for an instance. We analyze the classification of 57 data sets using 9 learning algorithms. Of …


Feature-Based Interactive Terrain Sketching, Daniel B. Adams Nov 2009

Feature-Based Interactive Terrain Sketching, Daniel B. Adams

Theses and Dissertations

Procedural generation techniques are able to quickly and cheaply produce large areas of terrain. However, these techniques produce results that are not easily directable and often require artists to edit the results by hand to achieve the desired layout. This paper proposes a sketch-based system for controlling fractal terrain that allows for a wide variety of terrain feature types. Artists sketch features rather than constrained points or elevations. The system is interactive, provides quick on-demand previews of the terrain, and allows for iterative design modifications. Interaction between features is handled in a realistic fashion. An arbitrary vertex insertion order midpoint …


Guided Testing For Automatic Error Discovery In Concurrent Software, Neha Shyam Rungta Sep 2009

Guided Testing For Automatic Error Discovery In Concurrent Software, Neha Shyam Rungta

Theses and Dissertations

The quality and reliability of software systems, in terms of their functional correctness, critically relies on the effectiveness of the testing tools and techniques to detect errors in the system before deployment. A lack of testing tools for concurrent programs that systematically control thread scheduling choices has not allowed concurrent software development to keep abreast with hardware trends of multi-core and multi-processor technologies. This motivates a need for the development of systematic testing techniques that detect errors in concurrent programs. The work in this dissertation presents a potentially scalable technique that can be used to detect concurrency errors in production …


Application Of Dual-Tree Complex Wavelet Transforms To Burst Detection And Rf Fingerprint Classification, Randall W. Klein Aug 2009

Application Of Dual-Tree Complex Wavelet Transforms To Burst Detection And Rf Fingerprint Classification, Randall W. Klein

Theses and Dissertations

This work addresses various Open Systems Interconnection (OSI) Physical (PHY) layer mechanisms to extract and exploit RF waveform features (”fingerprints”) that are inherently unique to specific devices and that may be used to provide hardware specific identification (manufacturer, model, and/or serial number). This is addressed by applying a Dual-Tree Complex Wavelet Transform (DT-CWT) to improve burst detection and RF fingerprint classification. A ”Denoised VT” technique is introduced to improve performance at lower SNRs, with denoising implemented using a DT-CWT decomposition prior to Traditional VT processing. A newly developed Wavelet Domain (WD) fingerprinting technique is presented using statistical WD fingerprints with …


Kiwivault: Encryption Software For Portable Storage Devices, Trevor Bradshaw Florence Aug 2009

Kiwivault: Encryption Software For Portable Storage Devices, Trevor Bradshaw Florence

Theses and Dissertations

While many people use USB flash drives, most do not protect their stored documents. Solutions for protecting flash drives exist but inherently limit functionality found in unprotected drives such as portability, usability, and the ability to share documents between multiple people. In addition, other drawbacks are introduced such as the possibility of losing access to protected documents if a password is lost. Assuming protecting portable documents is important, in order for people to be willing to protect their documents they should be required to make as few sacrifices in functionality as possible. We introduce KiwiVault, a USB flash drive encryption …


Supporting Remote Manipulation: An Ecological Approach, John A. Atherton Aug 2009

Supporting Remote Manipulation: An Ecological Approach, John A. Atherton

Theses and Dissertations

User interfaces for remote robotic manipulation widely lack sufficient support for situation awareness and, consequently, can induce high mental workload. With poor situation awareness, operators may fail to notice task-relevant features in the environment often leading the robot to collide with the environment. With high workload, operators may not perform well over long periods of time and may feel stressed. We present an ecological visualization that improves operator situation awareness. Our user study shows that operators using the ecological interface collided with the environment on average half as many times compared with a typical interface, even with a poorly calibrated …


A Hop-By-Hop Architecture For Multicast Transport In Ad Hoc Wireless Networks, Manoj Kumar Pandey Jul 2009

A Hop-By-Hop Architecture For Multicast Transport In Ad Hoc Wireless Networks, Manoj Kumar Pandey

Theses and Dissertations

Ad hoc wireless networks are increasingly being used to provide connectivity where a wired networking infrastructure is either unavailable or inaccessible. Many deployments utilize group communication, where several senders communicate with several receivers; multicasting has long been seen as an efficient way to provide this service. While there has been a great deal of research on multicast routing in ad hoc networks, relatively little attention has been paid to the design of multicast transport protocols, which provide reliability and congestion control. In this dissertation we design and implement a complete multicast transport architecture that includes both routing and transport protocols. …


Musical Query-By-Content Using Self-Organizing Maps, Kyle B. Dickerson Jul 2009

Musical Query-By-Content Using Self-Organizing Maps, Kyle B. Dickerson

Theses and Dissertations

The ever-increasing density of computer storage devices has allowed the average user to store enormous quantities of multimedia content, and a large amount of this content is usually music. Current search techniques for musical content rely on meta-data tags which describe artist, album, year, genre, etc. Query-by-content systems, however, allow users to search based upon the actual acoustical content of the songs. Recent systems have mainly depended upon textual representations of the queries and targets in order to apply common string-matching algorithms and are often confined to a single query style (e.g., humming). These methods also lose much of the …


Finding Alternatives To The Hard Disk Drive For Virtual Memory, Bruce Albert Embry Jul 2009

Finding Alternatives To The Hard Disk Drive For Virtual Memory, Bruce Albert Embry

Theses and Dissertations

Current computer systems fill the demand of operating systems and applications for ever greater amounts of random access memory by paging the least recently used data to the hard disk drive. This paging process is called "virtual memory," to indicate that the hard disk drive is used to create the illusion that the computer has more random access memory than it actually has. Unfortunately, the fastest hard disk drives are over five orders of magnitude slower than the DRAM they are emulating. When the demand for memory increases to the point that processes are being continually saved to disk and …


Radio Determination On Mini-Uav Platforms: Tracking And Locating Radio Transmitters, Braden Russell Huber Jun 2009

Radio Determination On Mini-Uav Platforms: Tracking And Locating Radio Transmitters, Braden Russell Huber

Theses and Dissertations

Aircraft in the US are equipped with Emergency Locator Transmitters (ELTs). In emergency situations these beacons are activated, providing a radio signal that can be used to locate the aircraft. Recent developments in UAV technologies have enabled mini-UAVs (5-foot wingspan) to possess a high level of autonomy. Due to the small size of these aircraft they are human-packable and can be easily transported and deployed in the field. Using a custom-built Radio Direction Finder, we gathered readings from a known transmitter and used them to compare various Bayesian reasoning-based filtering algorithms. Using a custom-developed simulator, we were able to test …


A Functional Framework For Content Management, Robert Emer Broadbent Jun 2009

A Functional Framework For Content Management, Robert Emer Broadbent

Theses and Dissertations

This thesis proposes a functional framework for content management. This framework provides concepts and vocabulary for analysis and description of content management systems. The framework is derived from an analysis of eight content management systems. It describes forty-five conceptual functions organized into five functional groups. The functionality derived from the analysis of the content management systems is described using the vocabulary provided by the functional framework. Coverage of the concepts in the existing systems is verified. The utility of the framework is validated through the creation of a prototype that implements sufficient functionality to support a set of specific use …


An Efficient And Effective Implementation Of The Trust System For Power Grid Compartmentalization, Juan M. Carlos Gonzalez Jun 2009

An Efficient And Effective Implementation Of The Trust System For Power Grid Compartmentalization, Juan M. Carlos Gonzalez

Theses and Dissertations

As utility companies develop and incorporate new technologies, such as moving to utility Internet technology based architecture and standard; it is crucial that we do so with history in mind. We know that traditional utility protection and control systems were not designed with security in their top priorities. This presents a danger in an environment where near real-time responses are required to ensure safe operations. As a consequence, system security becomes a burden to the system rather than necessary protection. Unfortunately, technology implementation is not the only concern. The number of utility privately-owned companies has multiplied as the market has …


Coalition Robustness Of Multiagent Systems, Nghia Cong Tran May 2009

Coalition Robustness Of Multiagent Systems, Nghia Cong Tran

Theses and Dissertations

Many multiagent systems are environments where distinct decision-makers compete, explicitly or implicitly, for scarce resources. In these competitive environments, itcan be advantageous for agents to cooperate and form teams, or coalitions; this cooperation gives agents strategic advantage to compete for scarce resources. Multiagent systems thus can be characterized in terms of competition and cooperation. To evaluate the effectiveness of cooperation for particular coalitions, we derive measures based on comparing these different coalitions at their respective equilibria. However, relying on equilibrium results leads to the interesting question of stability. Control theory and cooperative game theory have limitations that make it hard …


Video Scene Detection Using Closed Caption Text, Gregory Smith May 2009

Video Scene Detection Using Closed Caption Text, Gregory Smith

Theses and Dissertations

Issues in Automatic Video Biography Editing are similar to those in Video Scene Detection and Topic Detection and Tracking (TDT). The techniques of Video Scene Detection and TDT can be applied to interviews to reduce the time necessary to edit a video biography. The system has attacked the problems of extraction of video text, story segmentation, and correlation. This thesis project was divided into three parts: extraction, scene detection, and correlation. The project successfully detected scene breaks in series television episodes and displayed scenes that had similar content.


Easemail: Easy Accessible Secure Email, Ryan B. Segeberg May 2009

Easemail: Easy Accessible Secure Email, Ryan B. Segeberg

Theses and Dissertations

Traditional email encryption methods are difficult to set up, as they require senders to obtain a message recipient's public key before a secure communication can be sent. Easy Accessible Secure Email (EASEmail) addresses the key establishment and exchange issues of encrypted email by using a lightweight symmetric key server. Users can send a secure email without establishing or exchanging keys with the recipient in advance. With usability as its primary goal, EASEmail strives to bring usable secure email communication to the masses.


Uav Intelligent Path Planning For Wilderness Search And Rescue, Rongbin Lin Apr 2009

Uav Intelligent Path Planning For Wilderness Search And Rescue, Rongbin Lin

Theses and Dissertations

In Wilderness Search and Rescue (WiSAR), the incident commander (IC) creates a probability distribution map of the likely location of the missing person. This map is important because it guides the IC in allocating search resources and coordinating efforts, but it often depends almost exclusively on prior experience and subjective judgment. We propose a Bayesian model that utilizes publicly available terrain features data to help model lost-person behaviors. This approach enables domain experts to encode uncertainty in their prior estimations and also make it possible to incorporate human-behavior data collected in the form of posterior distributions, which are used to …


Progressive Spatial Networks, Samuel Curren Apr 2009

Progressive Spatial Networks, Samuel Curren

Theses and Dissertations

Digital street and trail maps are typically represented by an interconnected network of path segments. These spatial networks are used in map creation, route planning, and geo-location. Consumer GPS devices have become popular as a method of collecting data for use in spatial networks. Existing methods for creating spatial networks either require extensive hand editing or use inefficient algorithms that require re-computation when adding new data to an existing network. I demonstrate a method for creating and maintaining spatial networks that allows for incremental updates without complete re-computation. I also demonstrate how spatial limits on data set growth allows networks …


State Of Secure Application Development For 802.15.4, Janell Armstrong Apr 2009

State Of Secure Application Development For 802.15.4, Janell Armstrong

Theses and Dissertations

A wireless sensor network consists of small, limited-resource embedded systems exchanging environment data and activating controls. These networks can be deployed in hostile environments to monitor wildlife habitats, implemented in factories to locate mobile equipment, and installed in home environments to optimize the use of utilities. Each of these scenarios requires network security to protect the network data. The IEEE 802.15.4 standard is designed for WSN communication, yet the standard states that it is not responsible for defining the initialization, distribution, updating, or management of network public keys. Individuals seeking to research security topics will find that there are many …


Verifying Abstract Components Within Concrete Software Environments, Tonglaga Bao Mar 2009

Verifying Abstract Components Within Concrete Software Environments, Tonglaga Bao

Theses and Dissertations

In order to model check a software component which is not a standalone program, we need a model of the software which completes the program. This problem is important for software engineers who need to deploy an existing component into a new environment. The model is typically generated by abstracting the surrounding software environment in which the component will be executed. However, abstracting the surrounding software is a difficult and error-prone task, particularly when the surrounding software is a complex software artifact which can not be easily abstracted. In this dissertation, we present a new approach to the problem by …


Frequency Diversity For Improving Synthetic Aperture Radar Imaging, Jawad L. Farooq Mar 2009

Frequency Diversity For Improving Synthetic Aperture Radar Imaging, Jawad L. Farooq

Theses and Dissertations

In this work, a novel theoretical framework is presented for using recent advances in frequency diversity arrays (FDAs). Unlike a conventional array, the FDA simultaneously transmits a unique frequency from each element in the array. As a result, special time and space properties of the radiation pattern are exploited to improve cross-range resolution. The idealized FDA radiation pattern is compared with and validated against a full-wave electromagnetic solver, and it is shown that the conventional array is a special case of the FDA. A new signal model, based on the FDA, is used to simulate SAR imagery of ideal point …


Social Networking Website Users And Privacy Concerns: A Mixed Methods Investigation, Stephanie J. Mills Mar 2009

Social Networking Website Users And Privacy Concerns: A Mixed Methods Investigation, Stephanie J. Mills

Theses and Dissertations

Social networking websites are the fastest growing entity on the Internet. Users of social networking websites post personal information and pictures on these websites. Privacy and social networking websites has been previously studied, however, since those studies were conducted the rules for those websites have changed dramatically. A mixed methods approach was used in this study to examine what privacy concerns users of social networking websites have, whether it’s regarding information on their accounts or the pictures they have posted. This study also considered if there were common personality traits present in people with those concerns. A comparison of user …


Exploitation Of Geographic Information Systems For Vehicular Destination Prediction, Richard T. Muster Mar 2009

Exploitation Of Geographic Information Systems For Vehicular Destination Prediction, Richard T. Muster

Theses and Dissertations

Much of the recent successes in the Iraqi theater have been achieved with the aid of technology so advanced that celebrated journalist Bob Woodward recently compared it to the Manhattan Project of WWII. Intelligence, Surveillance, and Reconnaissance (ISR) platforms have emerged as the rising star of Air Force operational capabilities as they are enablers in the quest to track and disrupt terrorist and insurgent forces. This thesis argues that ISR systems have been severely under-exploited. The proposals herein seek to improve the machine-human interface of current ISR systems such that a predictive battle-space awareness may be achieved, leading to shorter …


Bit-Error-Rate-Minimizing Channel Shortening Using Post-Feq Diversity Combining And A Genetic Algorithm, Gokhan Altin Mar 2009

Bit-Error-Rate-Minimizing Channel Shortening Using Post-Feq Diversity Combining And A Genetic Algorithm, Gokhan Altin

Theses and Dissertations

In advanced wireline or wireless communication systems, i.e., DSL, IEEE 802.11a/g, HIPERLAN/2, etc., a cyclic prefix which is proportional to the channel impulse response is needed to append a multicarrier modulation (MCM) frame for operating the MCM accurately. This prefix is used to combat inter symbol interference (ISI). In some cases, the channel impulse response can be longer than the cyclic prefix (CP). One of the most useful techniques to mitigate this problem is reuse of a Channel Shortening Equalizer (CSE) as a linear preprocessor before the MCM receiver in order to shorten the effective channel length. Channel shortening filter …