Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

University of South Florida

2015

Discipline
Keyword
Publication
Publication Type

Articles 1 - 21 of 21

Full-Text Articles in Computer Sciences

Data To Decisions For Cyberspace Operations, Steve Stone Dec 2015

Data To Decisions For Cyberspace Operations, Steve Stone

Military Cyber Affairs

In 2011, the United States (U.S.) Department of Defense (DOD) named cyberspace a new operational domain. The U.S. Cyber Command and the Military Services are working to make the cyberspace environment a suitable place for achieving national objectives and enabling military command and control (C2). To effectively conduct cyberspace operations, DOD requires data and analysis of the Mission, Network, and Adversary. However, the DOD’s current data processing and analysis capabilities do not meet mission needs within critical operational timelines. This paper presents a summary of the data processing and analytics necessary to effectively conduct cyberspace operations.


Direct Solutions To Perceptual Organization Problems, Ravi Kumar Panchumarthy Nov 2015

Direct Solutions To Perceptual Organization Problems, Ravi Kumar Panchumarthy

USF Tampa Graduate Theses and Dissertations

Quadratic optimization problems arise in various real world application domains including engineering design, microeconomics, genetic algorithms, integrated circuit chip design, probabilistic graphical models and computer vision. In particular, there are many problems in computer vision that require binary quadratic optimization such as motion segmentation, correspondences, figure-ground segmentation, clustering, grouping, subgraph matching, and digital matting. The objective of an optimization algorithm can be related to the state of a physical system, where the goal is to bring the initial arbitrary state of the system to a state with minimum possible energy. By recognizing that the Hamiltonian of nanomagnets can be expressed …


Predictive Analytics Of Organizational Decisions And The Role Of Rationality, Arash Barfar Nov 2015

Predictive Analytics Of Organizational Decisions And The Role Of Rationality, Arash Barfar

USF Tampa Graduate Theses and Dissertations

How can we predict key decisions made by organizations in the presence of big data and on-demand information? In this dissertation we exploit a large repository of B2B real-time transactional data with service quality indicators and present evidence that organizational decision analytics apply both rational and boundedly-rational (i.e. behavioral) economic models. The dissertation’s findings demonstrate that both utility and heuristic models, respectively, play significant roles in predicting organizational decisions on churn, a key decision in this context. In the presence of a large data set the assumed rationality of organizations appears to provide accurate predictions in uncontrolled experiences and selected …


Content Abuse And Privacy Concerns In Online Social Networks, Md Imrul Kayes Nov 2015

Content Abuse And Privacy Concerns In Online Social Networks, Md Imrul Kayes

USF Tampa Graduate Theses and Dissertations

Online Social Networks (OSNs) have seen an exponential growth over the last decade, with Facebook having more than 1.49 billion monthly active users and Twitter having 135,000 new users signing up every day as of 2015. Users are sharing 70 million photos per day on the Instagram photo-sharing network. Yahoo Answers question-answering community has more than 1 billion posted answers. The meteoric rise in popularity has made OSNs important social platforms for computer-mediated communications and embedded themselves into society’s daily life, with direct consequences to the offline world and activities. OSNs are built on a foundation of trust, where users …


Computational Methods For Biomarker Identification In Complex Disease, Amin Ahmadi Adl Nov 2015

Computational Methods For Biomarker Identification In Complex Disease, Amin Ahmadi Adl

USF Tampa Graduate Theses and Dissertations

In a modern systematic view of biology, cell functions arise from the interaction between molecular components. One of the challenging problems in systems biology with high-throughput measurements is discovering the important components involved in the development and progression of complex diseases, which may serve as biomarkers for accurate predictive modeling and as targets for therapeutic purposes. Due to the non-linearity and heterogeneity of these complex diseases, traditional biomarker identification approaches have had limited success at finding clinically useful biomarkers. In this dissertation we propose novel methods for biomarker identification that explicitly take into account the non-linearity and heterogeneity of complex …


A Comparative Study Of Formal Verification Techniques For Authentication Protocols, Hernan Miguel Palombo Nov 2015

A Comparative Study Of Formal Verification Techniques For Authentication Protocols, Hernan Miguel Palombo

USF Tampa Graduate Theses and Dissertations

Protocol verification is an exciting area of network security that intersects engineering and formal methods. This thesis presents a comparison of formal verification tools for security protocols for their respective strengths and weaknesses supported by the results from several case studies. The formal verification tools considered are based on explicit model checking (SPIN), symbolic analysis (Proverif) and theorem proving (Coq). We formalize and provide models of several well-known authentication and key-establishment protocols in each of the specification languages, and use the tools to find attacks that show protocols insecurity. We contrast the modelling process on each of the tools by …


Precise Detection Of Injection Attacks On Concrete Systems, Clayton Whitelaw Nov 2015

Precise Detection Of Injection Attacks On Concrete Systems, Clayton Whitelaw

USF Tampa Graduate Theses and Dissertations

Injection attacks, including SQL injection, cross-site scripting, and operating system command injection, rank the top two entries in the MITRE Common Vulnerability Enumeration (CVE) [1]. Under this attack model, an application (e.g., a web application) uses some untrusted input to produce an output program (e.g., a SQL query). Applications may be vulnerable to injection attacks because the untrusted input may alter the output program in malicious ways. Recent work has established a rigorous definition of injection attacks. Injections are benign iff they obey the NIE property, which states that injected symbols strictly insert or expand noncode tokens in the output …


Embedded System Design Of A Real-Time Parking Guidance System, Omkar Dokur Oct 2015

Embedded System Design Of A Real-Time Parking Guidance System, Omkar Dokur

USF Tampa Graduate Theses and Dissertations

The primary objective of this work is to design a parking guidance system to reliably detect entering/exiting vehicles to a parking garage in a cost-efficient manner. Existing solutions (inductive loops, RFID based systems, and video image processors) at shopping malls, universities, airports etc., are expensive due to high installation and maintenance costs. There is a need for a parking guidance system that is reliable, accurate, and cost-effective. The proposed parking guidance system is designed to optimize the use of parking spaces and to reduce wait times. Based on a literature review we identify that the ultrasonic sensor is suitable to …


Developing A Compiler For A Regular Expression Based Policy Specification Language, Cory Michael Juhlin Oct 2015

Developing A Compiler For A Regular Expression Based Policy Specification Language, Cory Michael Juhlin

USF Tampa Graduate Theses and Dissertations

Security policy specification languages are a response to today's complex and vulnerable software climate. These languages allow an individual or organization to restrict and modify the behavior of third-party applications such that they adhere to the rules specified in the policy. As software grows in complexity, so do the security policies that govern them. Existing policy specification languages have not adapted to the growing complexity of the software they govern and as a result do not scale well, often resulting in code that is overly complex or unreadable. Writing small, isolated policies as separate modules and combining them is known …


Blindcanseeql: Improved Blind Sql Injection For Db Schema Discovery Using A Predictive Dictionary From Web Scraped Word Based Lists, Ryan Wheeler Oct 2015

Blindcanseeql: Improved Blind Sql Injection For Db Schema Discovery Using A Predictive Dictionary From Web Scraped Word Based Lists, Ryan Wheeler

USF Tampa Graduate Theses and Dissertations

SQL Injections are still a prominent threat on the web. Using a custom built tool, BlindCanSeeQL (BCSQL), we will explore how to automate Blind SQL attacks to discover database schema using fewer requests than the standard methods, thus helping avoid detection from overloading a server with hits. This tool uses a web crawler to discover keywords that assist with autocompleting schema object names, along with improvements in ASCII bisection to lower the number of requests sent to the server. Along with this tool, we will discuss ways to prevent and protect against such attacks.


Evaporite Geo-Hazard In The Sauris Area (Friuli Venezia Giulia Region - Ne Italy), Chiara Calligaris, Stefano Devoto, Luca Zini, Franco Cucchi Oct 2015

Evaporite Geo-Hazard In The Sauris Area (Friuli Venezia Giulia Region - Ne Italy), Chiara Calligaris, Stefano Devoto, Luca Zini, Franco Cucchi

Sinkhole Conference 2015

Evaporite sinkholes represent a severe threat to many European countries, including Italy. Among the Italian regions, of the area most affected is the northern sector of Friuli Venezia Giulia Region (NE Italy). Here chalks had two main depositional periods first in the Late Permian and then during the Late Carnian (Late Triassic). Evaporites outcrop mainly in the Alpine valleys or are partially mantled by Quaternary deposits, as occur along the Tagliamento River Valley. Furthermore, evaporites make up some portions of mountains and Alpine slopes, generating hundreds of karst depressions. This paper presents the preliminary results of the research activities carried …


Authentication Via Multiple Associated Devices, Jean-Baptiste Subils Sep 2015

Authentication Via Multiple Associated Devices, Jean-Baptiste Subils

USF Tampa Graduate Theses and Dissertations

This thesis presents a practical method of authentication utilizing multiple devices. The factors contributing to the practicality of the method are: the utilization of devices already commonly possessed by users and the amenability to being implemented on a wide variety of devices. The term “device” refers to anything able to perform cryptographic operations, store data, and communicate with another such device.

In the method presented herein, multiple devices need to be associated with a single user to provide this user an identity in the system. A public key infrastructure is used to provide this identity. Each of the devices associated …


Information Technology & Sustainability: An Empirical Study Of The Value Of The Building Automation System, Daphne Marie Simmonds Sep 2015

Information Technology & Sustainability: An Empirical Study Of The Value Of The Building Automation System, Daphne Marie Simmonds

USF Tampa Graduate Theses and Dissertations

This study examines the environmental and economic effects of green information technology (IT). Green IT describes two sets of IT innovations: one set includes innovations that are implemented to reduce the environmental impact of IT services in organizations; and the other IT to reduce the environmental impact of other organizational processes. The two sets respond to the call for more environmentally friendly or “greener” organizational processes.

I developed and tested a preliminary model. The model applied the resource based view (RBV) of the firm (Wernerfelt 1984) the stakeholder theory (Freeman 1984) and included four constructs: (1) BAS implementation; environmental …


Spatiotemporal Sensing And Informatics For Complex Systems Monitoring, Fault Identification And Root Cause Diagnostics, Gang Liu Sep 2015

Spatiotemporal Sensing And Informatics For Complex Systems Monitoring, Fault Identification And Root Cause Diagnostics, Gang Liu

USF Tampa Graduate Theses and Dissertations

In order to cope with system complexity and dynamic environments, modern industries are investing in a variety of sensor networks and data acquisition systems to increase information visibility. Multi-sensor systems bring the proliferation of high-dimensional functional Big Data that capture rich information on the evolving dynamics of natural and engineered processes. With spatially and temporally dense data readily available, there is an urgent need to develop advanced methodologies and associated tools that will enable and assist (i) the handling of the big data communicated by the contemporary complex systems, (ii) the extraction and identification of pertinent knowledge about the environmental …


Large-Scale And High-Resolution 3-D Cave Mapping By Terrestrial Laser Scanning: A Case Study Of The Domica Cave, Slovakia, Michal Gallay, Ján Kaňuk, Zdenko Hochmuth, John D. Meneely, Jaroslav Hofierka, Vladimír Sedlák Aug 2015

Large-Scale And High-Resolution 3-D Cave Mapping By Terrestrial Laser Scanning: A Case Study Of The Domica Cave, Slovakia, Michal Gallay, Ján Kaňuk, Zdenko Hochmuth, John D. Meneely, Jaroslav Hofierka, Vladimír Sedlák

International Journal of Speleology

Mapping and modelling the complicated geometry of caves is a challenging task that has traditionally been undertaken by tacheometric surveying methods. These methods are excellent for capturing the general shape of a cave system but they are not suitable for high-speed, high-resolution mapping of complex surfaces found in this environment. Terrestrial laser scanning (TLS) technologies can acquire millions of points represented by 3-D coordinates, at very high spatial densities on complex multifaceted surfaces within minutes. In the last few years, advances in measurement speed, reduction in size / cost and increased portability of this technology has revolutionised the collection of …


Active Tile Self-Assembly And Simulations Of Computational Systems, Daria Karpenko Apr 2015

Active Tile Self-Assembly And Simulations Of Computational Systems, Daria Karpenko

USF Tampa Graduate Theses and Dissertations

Algorithmic self-assembly has been an active area of research at the intersection of computer science, chemistry, and mathematics for almost two decades now, motivated by the natural self-assembly mechanism found in DNA and driven by the desire for precise control of nanoscale material manufacture and for the development of nanocomputing and nanorobotics. At the theoretical core of this research is the Abstract Tile Assembly Model (aTAM), the original abstract model of DNA tile self-assembly. Recent advancements in DNA nanotechnology have been made in developing strand displacement mechanisms that could allow DNA tiles to modify themselves during the assembly process by …


Dcms: A Data Analytics And Management System For Molecular Simulation, Meryem Berrada Mar 2015

Dcms: A Data Analytics And Management System For Molecular Simulation, Meryem Berrada

USF Tampa Graduate Theses and Dissertations

Despite the fact that Molecular Simulation systems represent a major research tool in multiple scientific and engineering fields, there is still a lack of systems for effective data management and fast data retrieval and processing. This is mainly due to the nature of MS which generate a very large amount of data - a system usually encompass millions of data information, and one query usually runs for tens of thousands of time frames. For this purpose, we designed and developed a new application, DCMS (A data Analytics and Management System for molecular Simulation), that intends to speed up the process …


Relational Agency, Networked Technology, And The Social Media Aftermath Of The Boston Marathon Bombing, Megan M. Mcintyre Jan 2015

Relational Agency, Networked Technology, And The Social Media Aftermath Of The Boston Marathon Bombing, Megan M. Mcintyre

USF Tampa Graduate Theses and Dissertations

Agency is a foundational and ongoing concern for the field of Rhetoric and Composition. Long thought to be a product and possession of human action, rhetorical agency represents the most obvious connection between the educational and theoretical work of the field and the civic project of liberal arts and humanities education. Existing theories of anthropocentric rhetorical agency are insufficient, however, to account for the complex technological work of digitally enmeshed networks of humans and nonhumans. To better account for these complex networks, this project argues for the introduction of new materialist theories of distributed agency into conversations about agency within …


Design, Testing And Implementation Of A New Authentication Method Using Multiple Devices, Cagri Cetin Jan 2015

Design, Testing And Implementation Of A New Authentication Method Using Multiple Devices, Cagri Cetin

USF Tampa Graduate Theses and Dissertations

Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or something’s identity in digital and physical systems.

This thesis presents a new and robust authentication method based on users’ multiple devices. Due to the popularity of mobile devices, users are becoming more likely to have more than one device (e.g., smartwatch, smartphone, laptop, tablet, smart-car, smart-ring, etc.). The authentication system presented here takes advantage of these multiple devices to implement authentication mechanisms. In particular, the system requires the devices to collaborate with each other in order for the authentication to succeed. This new authentication protocol is robust …


The Use Of Textural Kinetic Habitats To Mine Diagnostic Information From Dce Mr Images Of Breast Tumors, Baishali Chaudhury Jan 2015

The Use Of Textural Kinetic Habitats To Mine Diagnostic Information From Dce Mr Images Of Breast Tumors, Baishali Chaudhury

USF Tampa Graduate Theses and Dissertations

Dynamic contrast enhanced magnetic resonance imaging (DCE-MRI) of the breast is a widely used non-invasive approach to gather information about the underlying physiology of breast tumors. Recent studies indicate that breast tumor heterogeneity may reflect the presence of different levels of cellular aggressiveness or habitats within the tumor. This heterogeneity has been correlated to the variations in the contrast enhancement patterns within the tumor apparent on gadolinium-enhanced DCE-MRI. Although pathological and qualitative (based on contrast enhancement patterns) studies suggest the presence of clini- cal and molecular predictive tumor sub-regions, this has not been fully investigated in the quantitative domain.

The …


Reducing The Control Burden Of Legged Robotic Locomotion Through Biomimetic Consonance In Mechanical Design And Control, Caitrin Elizabeth Eaton Jan 2015

Reducing The Control Burden Of Legged Robotic Locomotion Through Biomimetic Consonance In Mechanical Design And Control, Caitrin Elizabeth Eaton

USF Tampa Graduate Theses and Dissertations

Terrestrial robots must be capable of negotiating rough terrain if they are to become autonomous outside of the lab. Although the control mechanism offered by wheels is attractive in its simplicity, any wheeled system is confined to relatively flat terrain. Wheels will also only ever be useful for rolling, while limbs observed in nature are highly multimodal. The robust locomotive utility of legs is evidenced by the many animals that walk, run, jump, swim, and climb in a world full of challenging terrain.

On the other hand, legs with multiple degrees of freedom (DoF) require much more complex control and …