Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Computer Sciences

Integrating Expert System And Geographic Information System For Spatial Decision Making, Sriharsha Shesham Dec 2012

Integrating Expert System And Geographic Information System For Spatial Decision Making, Sriharsha Shesham

Masters Theses & Specialist Projects

Spatial decision making is a process of providing an effective solution for a problem that encompasses semi-structured spatial data. It is a challenging task which involves various factors to consider. For example, in order to build a new industry, an appropriate site must be selected for which several factors have to be taken into consideration. Some of the factors, which can affect the decision in this particular case, are air pollution, noise pollution, and distance from living areas, which makes the decision difficult. The geographic information systems (GIS) and the expert systems (ES) have many advantages in solving problems in …


Contour Extraction Of Drosophila Embryos Using Active Contours In Scale Space, Soujanya Siddavaram Ananta Dec 2012

Contour Extraction Of Drosophila Embryos Using Active Contours In Scale Space, Soujanya Siddavaram Ananta

Masters Theses & Specialist Projects

Contour extraction of Drosophila embryos is an important step to build a computational system for pattern matching of embryonic images which aids in the discovery of genes. Automatic contour extraction of embryos is challenging due to several image variations such as size, shape, orientation and neigh- boring embryos such as touching and non-touching embryos. In this thesis, we introduce a framework for contour extraction based on the connected components in the gaussian scale space of an embryonic image. The active contour model is applied on the images to refine embryo contours. Data cleaning methods are applied to smooth the jaggy …


A Novel Dataset-Similarity-Aware Approach For Evaluating Stability Of Software Metric Selection Techniques, Taghi M. Khoshgoftaar, Huanjing Wang, Randall Wald, Amri Napolitano Aug 2012

A Novel Dataset-Similarity-Aware Approach For Evaluating Stability Of Software Metric Selection Techniques, Taghi M. Khoshgoftaar, Huanjing Wang, Randall Wald, Amri Napolitano

Computer Science Faculty Publications

Software metric (feature) selection is an important preprocessing step before building software defect prediction models. Although much research has been done analyzing the classification performance of feature selection methods, fewer works have focused on their stability (robustness). Stability is important because feature selection methods which reliably produce the same results despite changes to the data are more trustworthy. Of the papers studying stability, most either compare the features chosen from different random subsamples of the dataset or compare each random subsample with the original dataset. These either result in an unknown degree of overlap between the subsamples, or comparing datasets …


Dynamic Scoping For Browser Based Access Control System, Vinaykumar Nadipelly May 2012

Dynamic Scoping For Browser Based Access Control System, Vinaykumar Nadipelly

Masters Theses & Specialist Projects

We have inorganically increased the use of web applications to the point of using them for almost everything and making them an essential part of our everyday lives. As a result, the enhancement of privacy and security policies for the web applications is becoming increasingly essential. The importance and stateless nature of the web infrastructure made the web a preferred target of attacks. The current web access control system is a reason behind the victory of attacks. The current web consists of two major components, the browser and the server, where the effective access control system needs to be implemented. …


Efficient Algorithm To Construct Phi Function In Vector Space Secret Sharing Scheme And Application Of Secret Sharing Scheme In Visual Cryptography, Sunny Potay May 2012

Efficient Algorithm To Construct Phi Function In Vector Space Secret Sharing Scheme And Application Of Secret Sharing Scheme In Visual Cryptography, Sunny Potay

Masters Theses & Specialist Projects

Secret Sharing refers to a method through which a secret key K can be shared among a group of authorized participants, such that when they come together later, they can figure out the secret key K to decrypt the encrypted message. Any group which is not authorized cannot determine the secret key K. Some of the important secret schemes are Shamir Threshold Scheme, Monotone Circuit Scheme, and Brickell Vector Space Scheme. Brikell’s vector space secret sharing construction requires the existence of a function from a set of participant P in to vector space Zdp, where p is a …


Dynamic Data Extraction And Data Visualization With Application To The Kentucky Mesonet, Anoop Rao Paidipally May 2012

Dynamic Data Extraction And Data Visualization With Application To The Kentucky Mesonet, Anoop Rao Paidipally

Masters Theses & Specialist Projects

There is a need to integrate large-scale database, high-performance computing engines and geographical information system technologies into a user-friendly web interface as a platform for data visualization and customized statistical analysis. We present some concepts and design ideas regarding dynamic data storage and extraction by making use of open-source computing and mapping technologies. We implemented our methods to the Kentucky Mesonet automated weather mapping workflow. The main components of the work flow includes a web based interface, a robust database and computing infrastructure designed for both general users and power users such as modelers and researchers.


Organizational Search In Email Systems, Sruthi Bhushan Pitla May 2012

Organizational Search In Email Systems, Sruthi Bhushan Pitla

Masters Theses & Specialist Projects

The storage space for emails has been increasing at a rapid pace day by day. Email systems still serve as very important data repositories for many users to store different kinds of information which they use in their daily activities. Due to the rapidly increasing volume of email data, there is a need to maintain the data in a most efficient way. It is also very important to provide intuitive and flexible search utilities to provide better access to the information in the email repositories, especially in an enterprise or organizational setting. In order to implement the functionality, we are …


Manipulation Of 3d Knotted Polygons, Sairaj Rachamadugu May 2012

Manipulation Of 3d Knotted Polygons, Sairaj Rachamadugu

Masters Theses & Specialist Projects

This thesis discusses the development of software architecture to support the computational investigation of random polygons in 3 space. The random polygons themselves are a simple model of long polymer chains. (A DNA molecule is one example of a polymer.)

This software architecture includes "building blocks" which specify the actual manipulations and computations to be performed, and a structural framework which allows the user to specify which manipulations/computations to perform, in which order and with how many repetitions. The overall framework is designed in such a way that new building blocks can easily be added in the future. The development …


Ensemble Of Feature Selection Techniques For High Dimensional Data, Sri Harsha Vege May 2012

Ensemble Of Feature Selection Techniques For High Dimensional Data, Sri Harsha Vege

Masters Theses & Specialist Projects

Data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships from large amounts of data stored in databases, data warehouses, or other information repositories. Feature selection is an important preprocessing step of data mining that helps increase the predictive performance of a model. The main aim of feature selection is to choose a subset of features with high predictive information and eliminate irrelevant features with little or no predictive information. Using a single feature selection technique may generate local optima.

In this thesis we propose an ensemble approach for feature selection, where multiple …


A Normal Truncated Skewed-Laplace Model In Stochastic Frontier Analysis, Junyi Wang May 2012

A Normal Truncated Skewed-Laplace Model In Stochastic Frontier Analysis, Junyi Wang

Masters Theses & Specialist Projects

Stochastic frontier analysis is an exciting method of economic production modeling that is relevant to hospitals, stock markets, manufacturing factories, and services. In this paper, we create a new model using the normal distribution and truncated skew-Laplace distribution, namely the normal-truncated skew-Laplace model. This is a generalized model of the normal-exponential case. Furthermore, we compute the true technical efficiency and estimated technical efficiency of the normal-truncated skewed-Laplace model. Also, we compare the technical efficiencies of normal-truncated skewed-Laplace model and normal-exponential model.