Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Physical Sciences and Mathematics

Web Site Personalization Based On Link Analysis And Navigational Patterns, Magdalini Eirinaki, Michalis Vazirgiannis Oct 2007

Web Site Personalization Based On Link Analysis And Navigational Patterns, Magdalini Eirinaki, Michalis Vazirgiannis

Magdalini Eirinaki

The continuous growth in the size and use of the World Wide Web imposes new methods of design and development of online information services. The need for predicting the users' needs in order to improve the usability and user retention of a Web site is more than evident and can be addressed by personalizing it. Recommendation algorithms aim at proposing “next” pages to users based on their current visit and past users' navigational patterns. In the vast majority of related algorithms, however, only the usage data is used to produce recommendations, disregarding the structural properties of the Web graph. Thus …


Finding Molecular Complexes Through Multiple Layer Clustering Of Protein Interaction Networks, Bill Andreopoulos, Aijun An, Xiangji Huang, Xiaogang Wang Jan 2007

Finding Molecular Complexes Through Multiple Layer Clustering Of Protein Interaction Networks, Bill Andreopoulos, Aijun An, Xiangji Huang, Xiaogang Wang

Faculty Publications, Computer Science

Clustering protein-protein interaction networks (PINs) helps to identify complexes that guide the cell machinery. Clustering algorithms often create a flat clustering, without considering the layered structure of PINs. We propose the MULIC clustering algorithm that produces layered clusters. We applied MULIC to five PINs. Clusters correlate with known MIPS protein complexes. For example, a cluster of 79 proteins overlaps with a known complex of 88 proteins. Proteins in top cluster layers tend to be more representative of complexes than proteins in bottom layers. Lab work on finding unknown complexes or determining drug effects can be guided by top layer proteins.


Cryptanalysis Of Sigaba, Wing Chan Jan 2007

Cryptanalysis Of Sigaba, Wing Chan

Master's Projects

SIGABA is a World War II cipher machine used by the United States. Both the United States Army and the United States Navy used it for tactical communication. In this paper, we consider an attack on SIGABA using the largest practical keyspace for the machine. This attack will highlight the strengths and weaknesses of the machine, as well as provide an insight into the strength of the security provided by the cipher.


Securing Wireless Networks From Arp Cache Poisoning, Roney Philip Jan 2007

Securing Wireless Networks From Arp Cache Poisoning, Roney Philip

Master's Projects

Wireless networks have become an integral part of today’s networks. The ease of deployment, low cost, mobility and high data rates have contributed significantly to their popularity. The medium of data transmission in wireless networks makes them inherently less secure than wired networks. For wireless networks to access the Internet they must be connected to a wired network via an Access Point or a wireless router. This has led wireless network equipment manufacturers to implement wireless Access Points and wireless routers with a built in switch for wired clients and a WiFi access point for wireless clients. The set up …


Mobile Multimedia Streaming Library, Bao Ho Jan 2007

Mobile Multimedia Streaming Library, Bao Ho

Master's Projects

In recent years, multimedia has become a commonly used tool for presenting contents to the users. The employment of multimedia is no longer limited to only the entertainment industry, but spans in other areas as well. In academics, lectures are recorded to audio and video for storage and distribution to students. Free online multimedia hosting services are popularly cherished, such as “youtube.com” and “yahoo video”, and with the increasing affordability of digital camera, hundreds, or maybe thousands, of home-made videos and music audio are created daily and published online. Low-cost digital recorders such as webcams also help promote the use …


Operon Prediction With Bayesian Classifiers, Natalia Khuri Jan 2007

Operon Prediction With Bayesian Classifiers, Natalia Khuri

Master's Projects

In this work, we present an approach to predicting transcription units based on Bayesian classifiers. The predictor uses publicly available data to train the classifier, such as genome sequence data from Genbank, expression values from microarray experiments, and a collection of experimentally verified transcription units. We have studied the importance of each of the data source on the performance of the predictor by developing three classifier models and evaluating their outcomes. The predictor was trained and validated on the E. coli genome, but can be extended to other organisms. Using the full Bayesian classifier, we were able to correctly identify …


Validation And Verification Of Aircraft Control Software For Control Improvement, Thien-Anh Pham Jan 2007

Validation And Verification Of Aircraft Control Software For Control Improvement, Thien-Anh Pham

Master's Projects

Validation and Verification are important processes used to ensure software safety and reliability. The Cooper-Harper Aircraft Handling Qualities Rating is one of the techniques developed and used by NASA researchers to verify and validate control systems for aircrafts. Using the Validation and Verification result of controller software to improve controller's performance will be one of the main objectives of this process. Real user feedback will be used to tune PI controller in order for it to perform better. The Cooper-Harper Aircraft Handling Qualities Rating can be used to justify the performance of the improved system.


Case Studies In Proof Checking, Robert Kam Jan 2007

Case Studies In Proof Checking, Robert Kam

Master's Projects

The aim of computer proof checking is not to find proofs, but to verify them. This is different from automated deduction, which is the use of computers to find proofs that humans have not devised first. Currently, checking a proof by computer is done by taking a known mathematical proof and entering it into the special language recognized by a proof verifier program, and then running the verifier to hopefully obtain no errors. Of course, if the proof checker approves the proof, there are considerations of whether or not the proof checker is correct, and this has been complicated by …


Pairwise Alignment Of Metamorphic Computer Viruses, Scott Mcghee Jan 2007

Pairwise Alignment Of Metamorphic Computer Viruses, Scott Mcghee

Master's Projects

Computer viruses and other forms of malware pose a threat to virtually any software system (with only a few exceptions). A computer virus is a piece of software which takes advantage of known weaknesses in a software system, and usually has the ability to deliver a malicious payload. A common technique that virus writers use to avoid detection is to enable the virus to change itself by having some kind of self-modifying code. This kind of virus is commonly known as a metamorphic virus, and can be particularly difficult to detect [17]. Existing virus detection software is continually being improved …


Clustering Blog Information, Mayank Prakash Jaiswal Jan 2007

Clustering Blog Information, Mayank Prakash Jaiswal

Master's Projects

Blogs form an important source of information in today’s internet world. There are blogs on different topics such as technical, health, electronic gadgets, shopping, etc. However, most of the blog websites have the blogs arranged in chronological order rather than its contents. Such arrangement of blogs makes it difficult for the user searching information about a particular topic from the blog. To resolve this problem, we propose an approach to cluster the blogs based on its content. We studied several clustering algorithms available. The objective of this report is to understand various steps involved in clustering blog information and working …


Concept Analysis In Web Documents, Rajesh Singh Jan 2007

Concept Analysis In Web Documents, Rajesh Singh

Master's Projects

A Keyword within a text/web document represents some human thought. The interaction of keywords leads to narrowing of scope of human thought by forming a more precise semantic entity called concepts. Analyzing a set of document not only requires analysis of the keywords within those documents but also their interactions within a document. In this new approach a set of documents can be analyzed where by the interactions of its keywords is also considered in finding the important concepts. These concepts can be used to cluster them into smaller subsets such that documents in each cluster will be semantically similar.


A Differential Power Analysis Resistant Randomized Algorithm Using Multiple Aes Ciphers, Richard Tran Jan 2007

A Differential Power Analysis Resistant Randomized Algorithm Using Multiple Aes Ciphers, Richard Tran

Master's Projects

Differential power analysis (DPA) side channel attacks have been shown to have great effectiveness in breaking ciphers (such as the Advanced Encryption Standard or AES) that were previously though to be unbreakable. There are currently many methods published that prevent differential power analysis on AES. The method proposed for this project is based on the increased usage of multiprocessors and multicore processors. By using multiple copies of the same AES cipher, a randomly chosen cipher is used to encrypt each plaintext. The other ciphers are then used to obfuscate the data made available to the attacker for DPA in the …


A Hierarchical Trusted Third-Party System For Secure Peer-To-Peer Transactions, Khoi Nguyen Jan 2007

A Hierarchical Trusted Third-Party System For Secure Peer-To-Peer Transactions, Khoi Nguyen

Master's Projects

A peer-to-peer (P2P) network is a distributed network of peer computers loosely connected through the Internet. Transactions in a P2P network are often conducted on a no-security basis. Moreover, peer anonymity is often highly desirable, which makes security even more difficult to achieve. In most cases, a peer executes a transaction solely based on the faith that the other peer plays by the rules. Here we propose a hierarchical Trusted Third-Party (TTP) system that facilitates secure transactions between peers in an existing P2P network. This system is designed to provide mutual authentication by using public key cryptography for peers to …


Emotional And Domain Concept Enhancements To Alicebot, Alvin Cho Jan 2007

Emotional And Domain Concept Enhancements To Alicebot, Alvin Cho

Master's Projects

Extensive research and development have been done in the area of human simulation and artificial intelligence and their related fields, such as common sense knowledge bases, chatterbots, natural language parsing, semantic analysis, synthetic actors, and cognitive sciences. This paper takes part in that extensive research by focusing on the improvement of human simulation in chatterbots, specifically in Alicebot, a prominent non-emotional pattern-matching chatbot. An emotion and personality model is added to Alicebot so that it can make decisions based on its emotions and personality. Alicebot is also augmented with the ability to determine what it likes or does not like …


Prediction Of Alternative Splice Sites In Human Genes, Douglas Simmons Jan 2007

Prediction Of Alternative Splice Sites In Human Genes, Douglas Simmons

Master's Projects

This thesis addresses the problem of predicting alternative splice sites in human genes. The most common way to identify alternative splice sites are the use of expressed sequence tags and microarray data. Since genes only produce alternative proteins under certain conditions, these methods are limited to detecting only alternative splice sites in genes whose alternative protein forms are expressed under the tested conditions. I have introduced three multiclass support vector machines that predict upstream and downstream alternative 3’ splice sites, upstream and downstream alternative 5’ splice sites, and the 3’ splice site of skipped and cryptic exons. On a test …


A Multiple-Copy Scheme For Multi-Channel Stop-And-Wait Harq, Yucheng Shih Jan 2007

A Multiple-Copy Scheme For Multi-Channel Stop-And-Wait Harq, Yucheng Shih

Master's Projects

HARQ (Hybrid Automatic Repeat Request) combines ARQ (Automatic Repeat Request) with FEC (Forward Error Correction) to provide a reliable way to ensure that data are received correctly and in sequence. A multiple-copy HARQ scheme is proposed for WiMAX (Worldwide Interoperability for Microwave Access) to reduce the waiting time of erroneously received data in the receivers’ buffer. In this project, the performances of WiMAX multi-channel stop-and-wait HARQ scheme are compared with that of the proposed multiple-copy HARQ scheme. The multiple-copy HARQ can send the same copy of a data burst on contiguous channels during noisy channel conditions so that the required …


Blog Analysis With Fuzzy Tfidf, Chi-Shu Ho Jan 2007

Blog Analysis With Fuzzy Tfidf, Chi-Shu Ho

Master's Projects

These days blogs are becoming increasingly popular because it allows anyone to share their personal diary, opinions, and comments on the World Wide Wed. Many blogs contain valuable information, but it is a difficult task to extract this information from a high number of blog comments. The goal is to analyze a high number of blog comments by clustering all blog comments by their similarity based on keyword relevance into smaller groups. TF-IDF weight has been used in classifying documents by measuring appearance frequency of each keyword in a document, but it is not effective in differentiating semantic similarities between …