Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences

PDF

2013

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 94

Full-Text Articles in Computer Sciences

Analysis Of Windows 8 Registry Artifacts, Jeremy M. Stormo Dec 2013

Analysis Of Windows 8 Registry Artifacts, Jeremy M. Stormo

University of New Orleans Theses and Dissertations

Microsoft’s series of Windows operating systems represents some of the most commonly encountered technologies in the field of digital forensics. It is then fair to say that Microsoft’s design decisions greatly affect forensic efforts. Because of this, it is exceptionally important for the forensics community to keep abreast of new developments in the Windows product line. With each new release, the Windows operating system may present investigators with significant new artifacts to explore. Described by some as the heart of the Windows operating system, the Windows registry has been proven to contain many of these forensically interesting artifacts. Given the …


Curated Reasoning By Formal Modeling Of Provenance, Kevin B. Shaw Dec 2013

Curated Reasoning By Formal Modeling Of Provenance, Kevin B. Shaw

University of New Orleans Theses and Dissertations

The core problem addressed in this research is the current lack of an ability to repurpose and curate scientific data among interdisciplinary scientists within a research enterprise environment. Explosive growth in sensor technology as well as the cost of collecting ocean data and airborne measurements has allowed for exponential increases in scientific data collection as well as substantial enterprise resources required for data collection. There is currently no framework for efficiently curating this scientific data for repurposing or intergenerational use.

There are several reasons why this problem has eluded solution to date to include the competitive requirements for funding and …


Categorization Of Large Corpora Of Malicious Software, Deekshit Kura Dec 2013

Categorization Of Large Corpora Of Malicious Software, Deekshit Kura

University of New Orleans Theses and Dissertations

Malware is computer software written by someone with mischievous or, more usually, malicious and/or criminal intent and specifically designed to damage data, hosts or networks. The variety of malware is increasing proportionally with the increase in computers and we are not aware of newly emerging malware. Tools are needed to categorize families of malware, so that analysts can compare new malware samples to ones that have been previously analyzed and determine steps to detect and prevent malware infections.

In this thesis, I developed a technique to catalog and characterize the behavior of malware, so that malware families, the level of …


A New Algorithm For Protein-Protein Interaction Prediction, Yiwei Li Dec 2013

A New Algorithm For Protein-Protein Interaction Prediction, Yiwei Li

Electronic Thesis and Dissertation Repository

Protein-protein interactions (PPI) are vital processes in molecular biology. However, the current understanding of PPIs is far from satisfactory. Improved methods of pre- dicting PPIs are very much needed. Since experimental methods are labour and time consuming and lack accuracy, the improvement is expected to come from the area of computational methods. We designed and implemented a new algorithm based on protein primary structure to predict PPIs using C++ and OpenMP for parallel computing. We compared our method with four leading methods. Our results are better than the competition for most of the important values. Furthermore, it succeeds in surpassing …


New Algorithms For Structural Variation Detection By De Novo Genome Assembly, Ehsan Haghshenas Dec 2013

New Algorithms For Structural Variation Detection By De Novo Genome Assembly, Ehsan Haghshenas

Electronic Thesis and Dissertation Repository

Structural variations (SVs) are changes in the human genome that are reported in several studies to be associated with some diseases. Therefore, designing methods to find these types of variations would help us for early detection of those diseases and utilizing new treatment methods such as personalized medicine. Currently computational methods are applied to find structural variations from short reads obtained by Next Generation Sequencing (NGS) platforms. Usually each method has more power in finding particular types or sizes of SVs and limitations in finding others. Thus, still new approaches and methods are on demand for SV discovery.

In this …


The Applicability Of Greulich And Pyle Atlas To Assess Skeletal Age For Four Ethnic Groups, Sameem Abdul Kareem Dec 2013

The Applicability Of Greulich And Pyle Atlas To Assess Skeletal Age For Four Ethnic Groups, Sameem Abdul Kareem

Sameem Abdul Kareem

Background: Recently, determination of skeletal age, defined as the assessment of bone age, has rapidly become an important task between forensic experts and radiologists. The GreulichePyle (GP) atlas is one of the most frequently used methods for the assessment of skeletal age around the world. After presentation of the GP approach for the estimation of the bone age, much research has been conducted to examine the usability of this method in various geographic or ethnic categories. This study investigates on a small-scale and compares the reliability of the GP atlas for assessment of the bone age for four ethnic groups …


Reconstructing Point Clouds Of Mid-Size Objects, Spencer Woodworth Dec 2013

Reconstructing Point Clouds Of Mid-Size Objects, Spencer Woodworth

Computer Science and Software Engineering

This project explores the use of an inexpensive 3D camera for the acquisition and reconstruction of mid-size objects. The disparity of objects between stereo image pairs are used to calculate depth and generate a depth map. The depth map is used to generate a point cloud representation of the object from a single view. Finally, point clouds are generated from several views of an object and then aligned and merged into a seamless 360-degree point cloud.


Openorbiter Ground Station Software, Alexander Lewis, Jacob Huhn, Jeremy Straub, Travis Desell, Scott Kerlin Dec 2013

Openorbiter Ground Station Software, Alexander Lewis, Jacob Huhn, Jeremy Straub, Travis Desell, Scott Kerlin

Jeremy Straub

OpenOrbiter is a student project at the University of North Dakota to design and build a low cost1 and open-hardware / open-source software CubeSat2. The Ground Station is the user interface for operators of the satellite. The ground station software must manage spacecraft communications, track its orbital location , manage task assignment, provide security and retrieve the data from the spacecraft. This will be presented via a graphical user interface that allows a user to easily perform these tasks.


Openorbiter Payload Software, Tim Whitney, Kyle Goehner, Jeremy Straub, Scott Kerlin Dec 2013

Openorbiter Payload Software, Tim Whitney, Kyle Goehner, Jeremy Straub, Scott Kerlin

Jeremy Straub

The Payload Software team is responsible for developing the image processing and task decomposition systems on the Open Orbiter satellite1. The image processing software performs operations to enhance the quality of the images collected by the onboard camera, specifically, mosaicking, which takes multiple images and stitches them together to make a larger image and super resolution, which takes multiple low resolution images of the same area to produce a higher resolution image2,3,4. The task decomposition part of the system decomposes tasks defined by the user into jobs that then get sent to the operating system to be performed. This system …


Project Management For The Openorbiter Operating Software Team, Kelton Karboviak, Dayln Limesand, Michael Hlas, Eric Berg, Christoffer Korvald, Jeremy Straub, Ronald Marsh, Scott Kerlin Dec 2013

Project Management For The Openorbiter Operating Software Team, Kelton Karboviak, Dayln Limesand, Michael Hlas, Eric Berg, Christoffer Korvald, Jeremy Straub, Ronald Marsh, Scott Kerlin

Jeremy Straub

OpenOrbiter is producing a 1-U CubeSat spacecraft1 to facilitate the construction of low-cost2 spacecraft by others in the future. The Operating Software team is in charge of designing and creating the software that controls most of the CubeSat’s operations such as image capturing, storage management, and temperature sensing. The project management deliverables that we have worked on as a team are the Project Definition, Work Breakdown Structure, and the Project Schedule. The Project Definition defines exactly what our project team will be developing including, but not limited to, what the team is in charge of developing, what its not in …


Ground Station Software Team Project Management, Zach Maguire, Marshall Mattingly, Christoffer Korvald, Jeremy Straub, Scott Kerlin Dec 2013

Ground Station Software Team Project Management, Zach Maguire, Marshall Mattingly, Christoffer Korvald, Jeremy Straub, Scott Kerlin

Jeremy Straub

In CSCI 297 class we partake in learning the roles of software team leads and developers. With hands on activities that get us involved in what a real manager of a software team may do such as: defining a project, planning a project, developing a work breakdown structure, estimating the work, developing a project schedule, etc. This work is performed in the context of the OpenOrbiter project which seeks to build a low-cost spacecraft1 that can be produced with a parts budget of approxi-mately $5,0002 by schools worldwide. The ground station software team’s purpose within Open Orbiter project is to …


Software For Openorbiter, Christoffer Korvald, Jeremy Straub, Scott Kerlin, Ronald Marsh Dec 2013

Software For Openorbiter, Christoffer Korvald, Jeremy Straub, Scott Kerlin, Ronald Marsh

Jeremy Straub

The software development effort for the OpenOrbiter project consists of four teams: operating software development, payload software development, ground station software development and testing. These teams are designing and developing the software required to create a turn-key spacecraft design1 which can be produced at a price point of under USD $5,000 by faculty, students and researchers world-wide2. Through this process, students are gaining valuable real-world experience3,4 in areas of indicated interest5. Each team is headed by a team lead who is responsible for conducting weekly meetings and organizing the activities of the team. During the Fall, 2013 semester, team leads …


A Bandwidth-Conserving Architecture For Crawling Virtual Worlds, Dipesh Gautam Dec 2013

A Bandwidth-Conserving Architecture For Crawling Virtual Worlds, Dipesh Gautam

Graduate Theses and Dissertations

A virtual world is a computer-based simulated environment intended for its users to inhabit via avatars. Content in virtual worlds such as Second Life or OpenSimulator is increasingly presented using three-dimensional (3D) dynamic presentation technologies that challenge traditional search technologies. As 3D environments become both more prevalent and more fragmented, the need for a data crawler and distributed search service will continue to grow. By increasing the visibility of content across virtual world servers in order to better collect and integrate the 3D data we can also improve the crawling and searching efficiency and accuracy by avoiding crawling unchanged regions …


Representation, Recognition And Collaboration With Digital Ink, Rui Hu Nov 2013

Representation, Recognition And Collaboration With Digital Ink, Rui Hu

Electronic Thesis and Dissertation Repository

Pen input for computing devices is now widespread, providing a promising interaction mechanism for many purposes. Nevertheless, the diverse nature of digital ink and varied application domains still present many challenges. First, the sampling rate and resolution of pen-based devices keep improving, making input data more costly to process and store. At the same time, existing applications typically record digital ink either in proprietary formats, which are restricted to single platforms and consequently lack portability, or simply as images, which lose important information. Moreover, in certain domains such as mathematics, current systems are now achieving good recognition rates on individual …


Hardware Acceleration Technologies In Computer Algebra: Challenges And Impact, Sardar Anisul Haque Nov 2013

Hardware Acceleration Technologies In Computer Algebra: Challenges And Impact, Sardar Anisul Haque

Electronic Thesis and Dissertation Repository

The objective of high performance computing (HPC) is to ensure that the computational power of hardware resources is well utilized to solve a problem. Various techniques are usually employed to achieve this goal. Improvement of algorithm to reduce the number of arithmetic operations, modifications in accessing data or rearrangement of data in order to reduce memory traffic, code optimization at all levels, designing parallel algorithms to reduce span are some of the attractive areas that HPC researchers are working on. In this thesis, we investigate HPC techniques for the implementation of basic routines in computer algebra targeting hardware acceleration technologies. …


A Generalized Adaptive Mathematical Morphological Filter For Lidar Data, Zheng Cui Nov 2013

A Generalized Adaptive Mathematical Morphological Filter For Lidar Data, Zheng Cui

FIU Electronic Theses and Dissertations

Airborne Light Detection and Ranging (LIDAR) technology has become the primary method to derive high-resolution Digital Terrain Models (DTMs), which are essential for studying Earth’s surface processes, such as flooding and landslides. The critical step in generating a DTM is to separate ground and non-ground measurements in a voluminous point LIDAR dataset, using a filter, because the DTM is created by interpolating ground points. As one of widely used filtering methods, the progressive morphological (PM) filter has the advantages of classifying the LIDAR data at the point level, a linear computational complexity, and preserving the geometric shapes of terrain features. …


Network Construction And Graph Theoretical Analysis Of Functional Language Networks In Pediatric Epilepsy, Anas Salah Eddin Nov 2013

Network Construction And Graph Theoretical Analysis Of Functional Language Networks In Pediatric Epilepsy, Anas Salah Eddin

FIU Electronic Theses and Dissertations

This dissertation introduces a new approach for assessing the effects of pediatric epilepsy on the language connectome. Two novel data-driven network construction approaches are presented. These methods rely on connecting different brain regions using either extent or intensity of language related activations as identified by independent component analysis of fMRI data. An auditory description decision task (ADDT) paradigm was used to activate the language network for 29 patients and 30 controls recruited from three major pediatric hospitals. Empirical evaluations illustrated that pediatric epilepsy can cause, or is associated with, a network efficiency reduction. Patients showed a propensity to inefficiently employ …


As Strong As The Weakest Link: Mining Diverse Cliques In Weighted Graphs, Petko Bogdanov, Ben Baumer, Prithwish Basu, Amotz Bar-Noy, Ambuj K. Singh Oct 2013

As Strong As The Weakest Link: Mining Diverse Cliques In Weighted Graphs, Petko Bogdanov, Ben Baumer, Prithwish Basu, Amotz Bar-Noy, Ambuj K. Singh

Statistical and Data Sciences: Faculty Publications

Mining for cliques in networks provides an essential tool for the discovery of strong associations among entities. Applications vary, from extracting core subgroups in team performance data arising in sports, entertainment, research and business; to the discovery of functional complexes in high-throughput gene interaction data. A challenge in all of these scenarios is the large size of real-world networks and the computational complexity associated with clique enumeration. Furthermore, when mining for multiple cliques within the same network, the results need to be diversified in order to extract meaningful information that is both comprehensive and representative of the whole dataset. We …


Is Real-Time Mobile Content-Based Image Retrieval Feasible?, Colin G. Graber, Anup Mohan, Yung-Hsiang Lu Oct 2013

Is Real-Time Mobile Content-Based Image Retrieval Feasible?, Colin G. Graber, Anup Mohan, Yung-Hsiang Lu

The Summer Undergraduate Research Fellowship (SURF) Symposium

Content-based image retrieval (CBIR) is a method of searching through a database of images by using another image as a query instead of text. Recent advances in the processing power of smart phones and tablets, collectively known as mobile devices, have prompted researchers to attempt to construct mobile CBIR systems. Most of the research that has been conducted on mobile CBIR has focused on improving either its accuracy or its run-time, but not both simultaneously. We set out to answer the question: is real-time CBIR with manageable accuracy possible on current mobile devices? To find the answer to this question, …


Static Saliency Vs. Dynamic Saliency: A Comparative Study, Tam Nguyen, Mengdi Xu, Guangyu Gao, Mohan Kankanhalli, Qi Tian, Shuicheng Yan Oct 2013

Static Saliency Vs. Dynamic Saliency: A Comparative Study, Tam Nguyen, Mengdi Xu, Guangyu Gao, Mohan Kankanhalli, Qi Tian, Shuicheng Yan

Computer Science Faculty Publications

Recently visual saliency has attracted wide attention of researchers in the computer vision and multimedia field. However, most of the visual saliency-related research was conducted on still images for studying static saliency. In this paper, we give a comprehensive comparative study for the first time of dynamic saliency (video shots) and static saliency (key frames of the corresponding video shots), and two key observations are obtained: 1) video saliency is often different from, yet quite related with, image saliency, and 2) camera motions, such as tilting, panning or zooming, affect dynamic saliency significantly.

Motivated by these observations, we propose a …


Embodied Tuning: Interfacing Danish Radio Heritage, Christian Hviid Mortensen, Vitus Vestergaard Sep 2013

Embodied Tuning: Interfacing Danish Radio Heritage, Christian Hviid Mortensen, Vitus Vestergaard

Journal of Interactive Humanities

Most museum exhibitions favor vision, not hearing. When there is audio in exhibitions, it tends to take on a secondary role as a soundtrack or commentary. In some cases, however, audio should be the primary object of interest. Radio heritage is such a case. The traditional way of showcasing audio is through webaccessible archives or through listening kiosks in the exhibition. Neither one takes advantage of the unique affordances of the spatiality and physicality of an exhibition. We therefore propose an alternative way of exhibiting radio heritage in a listening exhibition where users move around and explore the physical gallery …


Modding The Humanities: Experiments In Historic Narratives, Elizabeth S. Goins, Christopher Egert, Andrew Phelps, Chandra Reedy, Joel Kincaid Sep 2013

Modding The Humanities: Experiments In Historic Narratives, Elizabeth S. Goins, Christopher Egert, Andrew Phelps, Chandra Reedy, Joel Kincaid

Journal of Interactive Humanities

While the ludology versus narratology debate raged within game studies circles [1], game designers continued building games and developing methods to improve player experience. Today however, while designers may have their personal preferences, there is no longer any doubt that both mechanics and story can have an important role to play in a game [2,3, 4, 5, 6, 7].


You Have Died Of Dysentery: A First Attempt At Navigating A Course In Educational Games, Adrienne Decker, David Simkins Sep 2013

You Have Died Of Dysentery: A First Attempt At Navigating A Course In Educational Games, Adrienne Decker, David Simkins

Journal of Interactive Humanities

This paper describes our experiences developing and piloting a course in educational games. We discuss the structure of the course, the topics we included in the course, as well as the final projects the students created for the course. Of particular interest to non-technical educators interested in exploring games in their courses is the fact that our course incorporated many critical thinking skills as part of the coursework. We felt that an important part of the student’s immersion in this material was not just the production of the game, but also a deeper understanding of the issues surrounding education and …


Reinforcement Learning With Motivations For Realistic Agents, Jacquelyne T. Forgette Sep 2013

Reinforcement Learning With Motivations For Realistic Agents, Jacquelyne T. Forgette

Electronic Thesis and Dissertation Repository

Believable virtual humans have important applications in various fields, including computer based video games. The challenge in programming video games is to produce a non-player controlled character that is autonomous, and capable of action selections that appear human. In this thesis, motivations are used as a basis for learning using reinforcements. With motives driving the decisions of the agents, their actions will appear less structured and repetitious, and more human in nature. This will also allow developers to easily create game agents with specific motivations, based mostly on their narrative purposes. With minimum and maximum desirable motive values, the agents …


Vehicular Instrumentation And Data Processing For The Study Of Driver Intent, Taha Kowsari Sep 2013

Vehicular Instrumentation And Data Processing For The Study Of Driver Intent, Taha Kowsari

Electronic Thesis and Dissertation Repository

The primary goal of this thesis is to provide processed experimental data needed to determine whether driver intentionality and driving-related actions can be predicted from quantitative and qualitative analysis of driver behaviour. Towards this end, an instrumented experimental vehicle capable of recording several synchronized streams of data from the surroundings of the vehicle, the driver gaze with head pose and the vehicle state in a naturalistic driving environment was designed and developed. Several driving data sequences in both urban and rural environments were recorded with the instrumented vehicle. These sequences were automatically annotated for relevant artifacts such as lanes, vehicles …


Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola Sep 2013

Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola

Electronic Thesis and Dissertation Repository

With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …


Evaluating The Presence Of A Victim Cache On An Arm Processor, Lakshmi Vidya Peri Sep 2013

Evaluating The Presence Of A Victim Cache On An Arm Processor, Lakshmi Vidya Peri

Computer Science Graduate Projects and Theses

Mobile processor is a CPU designed to save power. It is found in mobile computers and cell phones. A CPU chip, designed for portable computers, is typically housed in a smaller chip package, but more importantly, in order to run cooler, it uses lower voltages than its desktop counterpart and has more "sleep mode" capability. A mobile processor can be throttled down to different power levels and/or sections of the chip can be turned off entirely when not in use. ARM is a 32-bit reduced instruction set computer (RISC) instruction set architecture (ISA). The relative simplicity of ARM processors makes …


A Robust Rgbd Slam System For 3d Environment With Planar Surfaces, Po-Chang Su, Ju Shen, Sen-Ching S. Cheung Sep 2013

A Robust Rgbd Slam System For 3d Environment With Planar Surfaces, Po-Chang Su, Ju Shen, Sen-Ching S. Cheung

Computer Science Faculty Publications

With the increasing popularity of RGB-depth (RGB-D) sensors such as the Microsoft Kinect, there have been much research on capturing and reconstructing 3D environments using a movable RGB-D sensor. The key process behind these kinds of simultaneous location and mapping (SLAM) systems is the iterative closest point or ICP algorithm, which is an iterative algorithm that can estimate the rigid movement of the camera based on the captured 3D point clouds. While ICP is a well-studied algorithm, it is problematic when it is used in scanning large planar regions such as wall surfaces in a room. The lack of depth …


Tourguide: Augmented Reality Based On Structure Recognition, Michael Jipping Aug 2013

Tourguide: Augmented Reality Based On Structure Recognition, Michael Jipping

Faculty Presentations

TourGuide is software for Android phones and tablets that allows users to use augmented reality to see the world. TourGuide uses realtime video to search for images that match those in its database. When these images are found, TourGuide overlays the image with a number of options – from URLs/Web to video viewing – that are used to access more information about the image by touching the screen.

The software is designed so that configuring it is easy. In addition to the viewer, there is also a TourGuide Editor that allows configuration on a tablet or phone.


Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur Aug 2013

Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur

University of New Orleans Theses and Dissertations

Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …