Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Physical Sciences and Mathematics

Interactive Football Summarization, Brandon B. Moon Dec 2009

Interactive Football Summarization, Brandon B. Moon

Theses and Dissertations

Football fans do not have the time to watch every game in its entirety and need an effective solution that summarizes them the story of the game. Human-generated summaries are often too short, requiring time and resources to create. We utilize the advantages of Interactive TV to create an automatic football summarization service that is cohesive, provides context, covers the necessary plays, and is concise. First, we construct a degree of interest function that ranks each play based on detailed, play-by-play game events as well as viewing statistics collected from an interactive viewing environment. This allows us to select the …


Bisecting Document Clustering Using Model-Based Methods, Aaron Samuel Davis Dec 2009

Bisecting Document Clustering Using Model-Based Methods, Aaron Samuel Davis

Theses and Dissertations

We all have access to large collections of digital text documents, which are useful only if we can make sense of them all and distill important information from them. Good document clustering algorithms that organize such information automatically in meaningful ways can make a difference in how effective we are at using that information. In this paper we use model-based document clustering algorithms as a base for bisecting methods in order to identify increasingly cohesive clusters from larger, more diverse clusters. We specifically use the EM algorithm and Gibbs Sampling on a mixture of multinomials as the base clustering algorithms …


Noninvasive Estimation Of Pulmonary Artery Pressure Using Heart Sound Analysis, Aaron W. Dennis Dec 2009

Noninvasive Estimation Of Pulmonary Artery Pressure Using Heart Sound Analysis, Aaron W. Dennis

Theses and Dissertations

Right-heart catheterization is the most accurate method for estimating pulmonary artery pressure (PAP). Because it is an invasive procedure it is expensive, exposes patients to the risk of infection, and is not suited for long-term monitoring situations. Medical researchers have shown that PAP influences the characteristics of heart sounds. This suggests that heart sound analysis is a potential noninvasive solution to the PAP estimation problem. This thesis describes the development of a prototype system, called PAPEr, which estimates PAP noninvasively using heart sound analysis. PAPEr uses patient data with machine learning algorithms to build models of how PAP affects heart …


Open Access Fiber To The Home Networking, Roger E. Timmerman Dec 2009

Open Access Fiber To The Home Networking, Roger E. Timmerman

Theses and Dissertations

The concept of open-access networks appeals to communities that want to invest in and improve their access to modern telecommunications services. By investing in, or building their own open-access telecommunications networks, communities can create an environment where several telecommunications service providers can co-exist on a common open-access infrastructure. This model promotes innovation and competition among several smaller service providers rather than having a monopoly or oligopoly from those companies that can afford the investment of infrastructure in the community. This research provides an analysis of two large open-access fiber-to-the-home networks in Utah to determine a set of recommendations and best-practices …


Using Operator Teams For Supervisory Control, Jonathan M. Whetten Nov 2009

Using Operator Teams For Supervisory Control, Jonathan M. Whetten

Theses and Dissertations

Robots and other automated systems have potential use in many different fields. As the scope of robot applications that robots are used for increases, there is a growing desire to have human operators manage multiple robots. Typical methods of enabling operators to multi-task in this way involve some combination of user interfaces that support human cognition and advanced robot autonomy. Our research explores a complementary method of managing multiple robots by utilizing operator teams. The evidence suggests that for appropriate task scenarios, two cooperating operators can be more than twice as effective as one operator working alone.


An Empirical Study Of Instance Hardness, Michael Reed Smith Nov 2009

An Empirical Study Of Instance Hardness, Michael Reed Smith

Theses and Dissertations

Most widely accepted measures of performance for learning algorithms, such as accuracy and area under the ROC curve, provide information about behavior at the data set level. They say nothing about which instances are misclassified, whether two learning algorithms with the same classification accuracy on a data set misclassify the same instances, or whether there are instances misclassified by all learning algorithms. These questions about behavior at the instance level motivate our empirical analysis of instance hardness, a measure of expected classification accuracy for an instance. We analyze the classification of 57 data sets using 9 learning algorithms. Of …


Feature-Based Interactive Terrain Sketching, Daniel B. Adams Nov 2009

Feature-Based Interactive Terrain Sketching, Daniel B. Adams

Theses and Dissertations

Procedural generation techniques are able to quickly and cheaply produce large areas of terrain. However, these techniques produce results that are not easily directable and often require artists to edit the results by hand to achieve the desired layout. This paper proposes a sketch-based system for controlling fractal terrain that allows for a wide variety of terrain feature types. Artists sketch features rather than constrained points or elevations. The system is interactive, provides quick on-demand previews of the terrain, and allows for iterative design modifications. Interaction between features is handled in a realistic fashion. An arbitrary vertex insertion order midpoint …


Guided Testing For Automatic Error Discovery In Concurrent Software, Neha Shyam Rungta Sep 2009

Guided Testing For Automatic Error Discovery In Concurrent Software, Neha Shyam Rungta

Theses and Dissertations

The quality and reliability of software systems, in terms of their functional correctness, critically relies on the effectiveness of the testing tools and techniques to detect errors in the system before deployment. A lack of testing tools for concurrent programs that systematically control thread scheduling choices has not allowed concurrent software development to keep abreast with hardware trends of multi-core and multi-processor technologies. This motivates a need for the development of systematic testing techniques that detect errors in concurrent programs. The work in this dissertation presents a potentially scalable technique that can be used to detect concurrency errors in production …


Kiwivault: Encryption Software For Portable Storage Devices, Trevor Bradshaw Florence Aug 2009

Kiwivault: Encryption Software For Portable Storage Devices, Trevor Bradshaw Florence

Theses and Dissertations

While many people use USB flash drives, most do not protect their stored documents. Solutions for protecting flash drives exist but inherently limit functionality found in unprotected drives such as portability, usability, and the ability to share documents between multiple people. In addition, other drawbacks are introduced such as the possibility of losing access to protected documents if a password is lost. Assuming protecting portable documents is important, in order for people to be willing to protect their documents they should be required to make as few sacrifices in functionality as possible. We introduce KiwiVault, a USB flash drive encryption …


Supporting Remote Manipulation: An Ecological Approach, John A. Atherton Aug 2009

Supporting Remote Manipulation: An Ecological Approach, John A. Atherton

Theses and Dissertations

User interfaces for remote robotic manipulation widely lack sufficient support for situation awareness and, consequently, can induce high mental workload. With poor situation awareness, operators may fail to notice task-relevant features in the environment often leading the robot to collide with the environment. With high workload, operators may not perform well over long periods of time and may feel stressed. We present an ecological visualization that improves operator situation awareness. Our user study shows that operators using the ecological interface collided with the environment on average half as many times compared with a typical interface, even with a poorly calibrated …


A Hop-By-Hop Architecture For Multicast Transport In Ad Hoc Wireless Networks, Manoj Kumar Pandey Jul 2009

A Hop-By-Hop Architecture For Multicast Transport In Ad Hoc Wireless Networks, Manoj Kumar Pandey

Theses and Dissertations

Ad hoc wireless networks are increasingly being used to provide connectivity where a wired networking infrastructure is either unavailable or inaccessible. Many deployments utilize group communication, where several senders communicate with several receivers; multicasting has long been seen as an efficient way to provide this service. While there has been a great deal of research on multicast routing in ad hoc networks, relatively little attention has been paid to the design of multicast transport protocols, which provide reliability and congestion control. In this dissertation we design and implement a complete multicast transport architecture that includes both routing and transport protocols. …


Musical Query-By-Content Using Self-Organizing Maps, Kyle B. Dickerson Jul 2009

Musical Query-By-Content Using Self-Organizing Maps, Kyle B. Dickerson

Theses and Dissertations

The ever-increasing density of computer storage devices has allowed the average user to store enormous quantities of multimedia content, and a large amount of this content is usually music. Current search techniques for musical content rely on meta-data tags which describe artist, album, year, genre, etc. Query-by-content systems, however, allow users to search based upon the actual acoustical content of the songs. Recent systems have mainly depended upon textual representations of the queries and targets in order to apply common string-matching algorithms and are often confined to a single query style (e.g., humming). These methods also lose much of the …


Finding Alternatives To The Hard Disk Drive For Virtual Memory, Bruce Albert Embry Jul 2009

Finding Alternatives To The Hard Disk Drive For Virtual Memory, Bruce Albert Embry

Theses and Dissertations

Current computer systems fill the demand of operating systems and applications for ever greater amounts of random access memory by paging the least recently used data to the hard disk drive. This paging process is called "virtual memory," to indicate that the hard disk drive is used to create the illusion that the computer has more random access memory than it actually has. Unfortunately, the fastest hard disk drives are over five orders of magnitude slower than the DRAM they are emulating. When the demand for memory increases to the point that processes are being continually saved to disk and …


Radio Determination On Mini-Uav Platforms: Tracking And Locating Radio Transmitters, Braden Russell Huber Jun 2009

Radio Determination On Mini-Uav Platforms: Tracking And Locating Radio Transmitters, Braden Russell Huber

Theses and Dissertations

Aircraft in the US are equipped with Emergency Locator Transmitters (ELTs). In emergency situations these beacons are activated, providing a radio signal that can be used to locate the aircraft. Recent developments in UAV technologies have enabled mini-UAVs (5-foot wingspan) to possess a high level of autonomy. Due to the small size of these aircraft they are human-packable and can be easily transported and deployed in the field. Using a custom-built Radio Direction Finder, we gathered readings from a known transmitter and used them to compare various Bayesian reasoning-based filtering algorithms. Using a custom-developed simulator, we were able to test …


A Functional Framework For Content Management, Robert Emer Broadbent Jun 2009

A Functional Framework For Content Management, Robert Emer Broadbent

Theses and Dissertations

This thesis proposes a functional framework for content management. This framework provides concepts and vocabulary for analysis and description of content management systems. The framework is derived from an analysis of eight content management systems. It describes forty-five conceptual functions organized into five functional groups. The functionality derived from the analysis of the content management systems is described using the vocabulary provided by the functional framework. Coverage of the concepts in the existing systems is verified. The utility of the framework is validated through the creation of a prototype that implements sufficient functionality to support a set of specific use …


Coalition Robustness Of Multiagent Systems, Nghia Cong Tran May 2009

Coalition Robustness Of Multiagent Systems, Nghia Cong Tran

Theses and Dissertations

Many multiagent systems are environments where distinct decision-makers compete, explicitly or implicitly, for scarce resources. In these competitive environments, itcan be advantageous for agents to cooperate and form teams, or coalitions; this cooperation gives agents strategic advantage to compete for scarce resources. Multiagent systems thus can be characterized in terms of competition and cooperation. To evaluate the effectiveness of cooperation for particular coalitions, we derive measures based on comparing these different coalitions at their respective equilibria. However, relying on equilibrium results leads to the interesting question of stability. Control theory and cooperative game theory have limitations that make it hard …


Easemail: Easy Accessible Secure Email, Ryan B. Segeberg May 2009

Easemail: Easy Accessible Secure Email, Ryan B. Segeberg

Theses and Dissertations

Traditional email encryption methods are difficult to set up, as they require senders to obtain a message recipient's public key before a secure communication can be sent. Easy Accessible Secure Email (EASEmail) addresses the key establishment and exchange issues of encrypted email by using a lightweight symmetric key server. Users can send a secure email without establishing or exchanging keys with the recipient in advance. With usability as its primary goal, EASEmail strives to bring usable secure email communication to the masses.


Uav Intelligent Path Planning For Wilderness Search And Rescue, Rongbin Lin Apr 2009

Uav Intelligent Path Planning For Wilderness Search And Rescue, Rongbin Lin

Theses and Dissertations

In Wilderness Search and Rescue (WiSAR), the incident commander (IC) creates a probability distribution map of the likely location of the missing person. This map is important because it guides the IC in allocating search resources and coordinating efforts, but it often depends almost exclusively on prior experience and subjective judgment. We propose a Bayesian model that utilizes publicly available terrain features data to help model lost-person behaviors. This approach enables domain experts to encode uncertainty in their prior estimations and also make it possible to incorporate human-behavior data collected in the form of posterior distributions, which are used to …


Progressive Spatial Networks, Samuel Curren Apr 2009

Progressive Spatial Networks, Samuel Curren

Theses and Dissertations

Digital street and trail maps are typically represented by an interconnected network of path segments. These spatial networks are used in map creation, route planning, and geo-location. Consumer GPS devices have become popular as a method of collecting data for use in spatial networks. Existing methods for creating spatial networks either require extensive hand editing or use inefficient algorithms that require re-computation when adding new data to an existing network. I demonstrate a method for creating and maintaining spatial networks that allows for incremental updates without complete re-computation. I also demonstrate how spatial limits on data set growth allows networks …


State Of Secure Application Development For 802.15.4, Janell Armstrong Apr 2009

State Of Secure Application Development For 802.15.4, Janell Armstrong

Theses and Dissertations

A wireless sensor network consists of small, limited-resource embedded systems exchanging environment data and activating controls. These networks can be deployed in hostile environments to monitor wildlife habitats, implemented in factories to locate mobile equipment, and installed in home environments to optimize the use of utilities. Each of these scenarios requires network security to protect the network data. The IEEE 802.15.4 standard is designed for WSN communication, yet the standard states that it is not responsible for defining the initialization, distribution, updating, or management of network public keys. Individuals seeking to research security topics will find that there are many …


Verifying Abstract Components Within Concrete Software Environments, Tonglaga Bao Mar 2009

Verifying Abstract Components Within Concrete Software Environments, Tonglaga Bao

Theses and Dissertations

In order to model check a software component which is not a standalone program, we need a model of the software which completes the program. This problem is important for software engineers who need to deploy an existing component into a new environment. The model is typically generated by abstracting the surrounding software environment in which the component will be executed. However, abstracting the surrounding software is a difficult and error-prone task, particularly when the surrounding software is a complex software artifact which can not be easily abstracted. In this dissertation, we present a new approach to the problem by …


Combined Visible And Infrared Video For Use In Wilderness Search And Rescue, Nathan D. Rasmussen Mar 2009

Combined Visible And Infrared Video For Use In Wilderness Search And Rescue, Nathan D. Rasmussen

Theses and Dissertations

Mini Unmanned Aerial Vehicles (mUAVs) have the potential to be a great asset to Wilderness Search and Rescue groups by providing a bird's eye view of the search area. These vehicles can carry a variety of sensors to better understand the world below. This paper proposes using both Infrared (IR) and Visible Spectrum cameras on a mUAV for Wilderness Search and Rescue. It details a method for combining the color and heat information from these two cameras into a single fused display to reduce needed screen space for remote field use. To align the video frames for fusion, a method …


Super-Resolution Via Image Recapture And Bayesian Effect Modeling, Neil B. Toronto Mar 2009

Super-Resolution Via Image Recapture And Bayesian Effect Modeling, Neil B. Toronto

Theses and Dissertations

The goal of super-resolution is to increase not only the size of an image, but also its apparent resolution, making the result more plausible to human viewers. Many super-resolution methods do well at modest magnification factors, but even the best suffer from boundary and gradient artifacts at high magnification factors. This thesis presents Bayesian edge inference (BEI), a novel method grounded in Bayesian inference that does not suffer from these artifacts and remains competitive in published objective quality measures. BEI works by modeling the image capture process explicitly, including any downsampling, and modeling a fictional recapture process, which together allow …


A Unified Approach To Gpu-Accelerated Aerial Video Enhancement Techniques, Stephen Thayn Cluff Feb 2009

A Unified Approach To Gpu-Accelerated Aerial Video Enhancement Techniques, Stephen Thayn Cluff

Theses and Dissertations

Video from aerial surveillance can provide a rich source of data for analysts. From the time-critical perspective of wilderness search and rescue operations, information extracted from aerial videos can mean the difference between a successful search and an unsuccessful search. When using low-cost, payload-limited mini-UAVs, as opposed to more expensive platforms, several challenges arise, including jittery video, narrow fields of view, low resolution, and limited time on screen for key features. These challenges make it difficult for analysts to extract key information in a timely manner. Traditional approaches may address some of these issues, but no existing system effectively addresses …