Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Computer Sciences

Combining Geospatial And Temporal Ontologies, Kripa Joshi Dec 2007

Combining Geospatial And Temporal Ontologies, Kripa Joshi

Electronic Theses and Dissertations

Publicly available ontologies are growing in number at present. These ontologies describe entities in a domain and the relations among these entities. This thesis describes a method to automatically combine a pair of orthogonal ontologies using cross products. A geospatial ontology and a temporal ontology are combined in this work. Computing the cross product of the geospatial and the temporal ontologies gives a complete set of pairwise combination of terms from the two ontologies. This method offers researchers the benefit of using ontologies that are already existing and available rather than building new ontologies for areas outside their scope of …


Linking Moving Object Databases With Ontologies, Kraig King Dec 2007

Linking Moving Object Databases With Ontologies, Kraig King

Electronic Theses and Dissertations

This work investigates the supporting role of ontologies for supplementing the information contained in moving object databases. Details of the spatial representation as well as the sensed location of moving objects are frequently stored within a database schema. However, this knowledge lacks the semantic detail necessary for reasoning about characteristics that are specific to each object. Ontologies contribute semantic descriptions for moving objects and provide the foundation for discovering similarities between object types. These similarities can be drawn upon to extract additional details about the objects around us. The primary focus of the research is a framework for linking ontologies …


A Computational Chemistry Study Of Spin Traps., Jacob Fosso-Tande Aug 2007

A Computational Chemistry Study Of Spin Traps., Jacob Fosso-Tande

Electronic Theses and Dissertations

Many defects in physiological processes are due to free radical damage: reactive oxygen species, nitric oxide, and hydroxyl radicals have been implicated in the parthenogenesis of cancer, diabetes mellitus, and rheumatoid arthritis. We herein characterize the phenyl-N-ter-butyl nitrone (PBN) type spin traps in conjunction with the most studied dimethyl-1-pyrroline-N-oxide (DMPO) type spin traps using the hydroxyl radical. In this study, theoretical calculations are carried out on the two main types of spin traps (DMPO and PBN) at the density functional theory level (DFT). The energies of the optimized structures, hyperfine calculations in gaseous and aqueous phases of the spin traps …


Arrow Symbols: Theory For Interpretation, Yohei Kurata May 2007

Arrow Symbols: Theory For Interpretation, Yohei Kurata

Electronic Theses and Dissertations

People often sketch diagrams when they communicate successfully among each other. Such an intuitive collaboration would also be possible with computers if the machines understood the meanings of the sketches. Arrow symbols are a frequent ingredient of such sketched diagrams. Due to the arrows’ versatility, however, it remains a challenging problem to make computers distinguish the various semantic roles of arrow symbols. The solution to this problem is highly desirable for more effective and user-friendly pen-based systems. This thesis, therefore, develops an algorithm for deducing the semantic roles of arrow symbols, called the arrow semantic interpreter (ASI). The …


Physically-Based Visualization Of Residential Building Damage Process In Hurricane, Dezhi Liao Jan 2007

Physically-Based Visualization Of Residential Building Damage Process In Hurricane, Dezhi Liao

Electronic Theses and Dissertations

This research provides realistic techniques to visualize the process of damage to residential building caused by hurricane force winds. Three methods are implemented to make the visualization useful for educating the public about mitigation measures for their homes. First, the underline physics uses Quick Collision Response Calculation. This is an iterative method, which can tune the accuracy and the performance to calculate collision response between building components. Secondly, the damage process is designed as a Time-scalable Process. By attaching a damage time tag for each building component, the visualization process is treated as a geometry animation allowing users to navigate …


Learning Geometry-Free Face Re-Lighting, Thomas Brendan Moore Jan 2007

Learning Geometry-Free Face Re-Lighting, Thomas Brendan Moore

Electronic Theses and Dissertations

The accurate modeling of the variability of illumination in a class of images is a fundamental problem that occurs in many areas of computer vision and graphics. For instance, in computer vision there is the problem of facial recognition. Simply, one would hope to be able to identify a known face under any illumination. On the other hand, in graphics one could imagine a system that, given an image, the illumination model could be identified and then used to create new images. In this thesis we describe a method for learning the illumination model for a class of images. Once …


Image-Space Approach To Real-Time Realistic Rendering, Musawir Shah Jan 2007

Image-Space Approach To Real-Time Realistic Rendering, Musawir Shah

Electronic Theses and Dissertations

One of the main goals of computer graphics is the fast synthesis of photorealistic image of virtual 3D scenes. The work presented in this thesis addresses this goal of speed and realism. In real-time realistic rendering, we encounter certain problems that are difficult to solve in the traditional 3-dimensional geometric space. We show that using an image-space approach can provide effective solutions to these problems. Unlike geometric space algorithms that operate on 3D primitives such as points, edges, and polygons, image-space algorithms operate on 2D snapshot images of the 3D geometric data. Operating in image-space effectively decouples the geometric complexity …


Behavior Of Variable-Length Genetic Algorithms Under Random Selection, Harold Stringer Jan 2007

Behavior Of Variable-Length Genetic Algorithms Under Random Selection, Harold Stringer

Electronic Theses and Dissertations

In this work, we show how a variable-length genetic algorithm naturally evolves populations whose mean chromosome length grows shorter over time. A reduction in chromosome length occurs when selection is absent from the GA. Specifically, we divide the mating space into five distinct areas and provide a probabilistic and empirical analysis of the ability of matings in each area to produce children whose size is shorter than the parent generation's average size. Diversity of size within a GA's population is shown to be a necessary condition for a reduction in mean chromosome length to take place. We show how a …


Augmentation In Visual Reality (Avr), Yunjun Zhang Jan 2007

Augmentation In Visual Reality (Avr), Yunjun Zhang

Electronic Theses and Dissertations

Human eyes, as the organs for sensing light and processing visual information, enable us to see the real world. Though invaluable, they give us no way to "edit" the received visual stream or to "switch" to a different channel. The invention of motion pictures and computer technologies in the last century enables us to add an extra layer of modifications between the real world and our eyes. There are two major approaches to modifications that we consider here, offline augmentation and online augmentation. The movie industry has pushed offline augmentation to an extreme level; audiences can experience visual surprises that …


Optimizing The High Dynamic Range Imaging Pipeline, Ahmet Oguz Akyuz Jan 2007

Optimizing The High Dynamic Range Imaging Pipeline, Ahmet Oguz Akyuz

Electronic Theses and Dissertations

High dynamic range (HDR) imaging is a rapidly growing field in computer graphics and image processing. It allows capture, storage, processing, and display of photographic information within a scene-referred framework. The HDR imaging pipeline consists of the major steps an HDR image is expected to go through from capture to display. It involves various techniques to create HDR images, pixel encodings and file formats for storage, tone mapping for display on conventional display devices and direct display on HDR capable screens. Each of these stages have important open problems, which need to be addressed for a smoother transition to an …


Medium Access Control Protocols And Routing Algorithms For Wireless Sensor Networks, Anirban Bag Jan 2007

Medium Access Control Protocols And Routing Algorithms For Wireless Sensor Networks, Anirban Bag

Electronic Theses and Dissertations

In recent years, the development of a large variety of mobile computing devices has led to wide scale deployment and use of wireless ad hoc and sensor networks. Wireless Sensor Networks consist of battery powered, tiny and cheap "motes", having sensing and wireless communication capabilities. Although wireless motes have limited battery power, communication and computation capabilities, the range of their application is vast. In the first part of the dissertation, we have addressed the specific application of Biomedical Sensor Networks. To solve the problem of data routing in these networks, we have proposed the Adaptive Least Temperature Routing (ALTR) algorithm …


Learning, Detection, Representation, Indexing And Retrieval Of Multi-Agent Events In Videos, Asaad Hakeem Jan 2007

Learning, Detection, Representation, Indexing And Retrieval Of Multi-Agent Events In Videos, Asaad Hakeem

Electronic Theses and Dissertations

The world that we live in is a complex network of agents and their interactions which are termed as events. An instance of an event is composed of directly measurable low-level actions (which I term sub-events) having a temporal order. Also, the agents can act independently (e.g. voting) as well as collectively (e.g. scoring a touch-down in a football game) to perform an event. With the dawn of the new millennium, the low-level vision tasks such as segmentation, object classification, and tracking have become fairly robust. But a representational gap still exists between low-level measurements and high-level understanding of video …


Multi-View Geometric Constraints For Human Action Recognition And Tracking, Alexei Gritai Jan 2007

Multi-View Geometric Constraints For Human Action Recognition And Tracking, Alexei Gritai

Electronic Theses and Dissertations

Human actions are the essence of a human life and a natural product of the human mind. Analysis of human activities by a machine has attracted the attention of many researchers. This analysis is very important in a variety of domains including surveillance, video retrieval, human-computer interaction, athlete performance investigation, etc. This dissertation makes three major contributions to automatic analysis of human actions. First, we conjecture that the relationship between body joints of two actors in the same posture can be described by a 3D rigid transformation. This transformation simultaneously captures different poses and various sizes and proportions. As a …


Resource-Constraint And Scalable Data Distribution Management For High Level Architecture, Pankaj Gupta Jan 2007

Resource-Constraint And Scalable Data Distribution Management For High Level Architecture, Pankaj Gupta

Electronic Theses and Dissertations

In this dissertation, we present an efficient algorithm, called P-Pruning algorithm, for data distribution management problem in High Level Architecture. High Level Architecture (HLA) presents a framework for modeling and simulation within the Department of Defense (DoD) and forms the basis of IEEE 1516 standard. The goal of this architecture is to interoperate multiple simulations and facilitate the reuse of simulation components. Data Distribution Management (DDM) is one of the six components in HLA that is responsible for limiting and controlling the data exchanged in a simulation and reducing the processing requirements of federates. DDM is also an important problem …


Real-Time Tree Simulation Using Verlet Integration, Bobak Manavi Jan 2007

Real-Time Tree Simulation Using Verlet Integration, Bobak Manavi

Electronic Theses and Dissertations

One of the most important challenges in real-time simulation of large trees and vegetation is the vast number of calculations required to simulate the interactions between all the branches in the tree when external forces are applied to it. This paper will propose the use of algorithms employed by applications like cloth and soft body simulations, where objects can be represented by a finite system of particles connected via spring-like constraints, for the structural representation and manipulation of trees in real-time. We will then derive and show the use of Verlet integration and the constraint configuration used for simulating trees …


Mac Layer And Routing Protocols For Wireless Ad Hoc Networks With Asymmetric Links And Performance Evaluation Studies, Guoqiang Wang Jan 2007

Mac Layer And Routing Protocols For Wireless Ad Hoc Networks With Asymmetric Links And Performance Evaluation Studies, Guoqiang Wang

Electronic Theses and Dissertations

In a heterogeneous mobile ad hoc network (MANET), assorted devices with different computation and communication capabilities co-exist. In this thesis, we consider the case when the nodes of a MANET have various degrees of mobility and range, and the communication links are asymmetric. Many routing protocols for ad hoc networks routinely assume that all communication links are symmetric, if node A can hear node B and node B can also hear node A. Most current MAC layer protocols are unable to exploit the asymmetric links present in a network, thus leading to an inefficient overall bandwidth utilization, or, in the …


Bluetooth-Base Worm Modeling And Simulation, Haiou Xiang Jan 2007

Bluetooth-Base Worm Modeling And Simulation, Haiou Xiang

Electronic Theses and Dissertations

Bluetooth is one of the most popular technologies in the world in the new century. Meanwhile it attracts attackers to develop new worm and malicious code attacking Bluetooth wireless network. So far the growth of mobile malicious code is very fast and they have become a great potential threat to our society. In this thesis, we study Bluetooth worm in Mobile Wireless Network. Firstly we investigate the Bluetooth technology and several previously appeared Bluetooth worms, e.g. "Caribe","Comwar", and we find the infection cycle of a Bluetooth worm. Next, we develop a new simulator, Bluetooth Worm simulator (BTWS), which simulates Bluetooth …


Extending Distributed Temporal Protocol Logic To A Proof Based Framework For Authentication Protocols, Shahabuddin Muhammad Jan 2007

Extending Distributed Temporal Protocol Logic To A Proof Based Framework For Authentication Protocols, Shahabuddin Muhammad

Electronic Theses and Dissertations

Running critical applications, such as e-commerce, in a distributed environment requires assurance of the identities of the participants communicating with each other. Providing such assurance in a distributed environment is a difficult task. The goal of a security protocol is to overcome the vulnerabilities of a distributed environment by providing a secure way to disseminate critical information into the network. However, designing a security protocol is itself an error-prone process. In addition to employing an authentication protocol, one also needs to make sure that the protocol successfully achieves its authentication goals. The Distributed Temporal Protocol Logic (DTPL) provides a language …


Towards A Self-Calibrating Video Camera Network For Content Analysis And Forensics, Imran Junejo Jan 2007

Towards A Self-Calibrating Video Camera Network For Content Analysis And Forensics, Imran Junejo

Electronic Theses and Dissertations

Due to growing security concerns, video surveillance and monitoring has received an immense attention from both federal agencies and private firms. The main concern is that a single camera, even if allowed to rotate or translate, is not sufficient to cover a large area for video surveillance. A more general solution with wide range of applications is to allow the deployed cameras to have a non-overlapping field of view (FoV) and to, if possible, allow these cameras to move freely in 3D space. This thesis addresses the issue of how cameras in such a network can be calibrated and how …


Studies Of A Quantum Scheduling Algorithm And On Quantum Error Correction, Feng Lu Jan 2007

Studies Of A Quantum Scheduling Algorithm And On Quantum Error Correction, Feng Lu

Electronic Theses and Dissertations

Quantum computation has been a rich field of study for decades because it promises possible spectacular advances, some of which may run counter to our classically rooted intuitions. At the same time, quantum computation is still in its infancy in both theoretical and practical areas. Efficient quantum algorithms are very limited in number and scope; no real breakthrough has yet been achieved in physical implementations. Grover's search algorithm can be applied to a wide range of problems; even problems not generally regarded as searching problems can be reformulated to take advantage of quantum parallelism and entanglement leading to algorithms which …


Developing Strand Space Based Models And Proving The Correctness Of The Ieee 802.11i Authentication Protocol With Restricted Sec, Zeeshan Furqan Jan 2007

Developing Strand Space Based Models And Proving The Correctness Of The Ieee 802.11i Authentication Protocol With Restricted Sec, Zeeshan Furqan

Electronic Theses and Dissertations

The security objectives enforce the security policy, which defines what is to be protected in a network environment. The violation of these security objectives induces security threats. We introduce an explicit notion of security objectives for a security protocol. This notion should precede the formal verification process. In the absence of such a notion, the security protocol may be proven correct despite the fact that it is not equipped to defend against all potential threats. In order to establish the correctness of security objectives, we present a formal model that provides basis for the formal verification of security protocols. We …


Graph Theoretic Modeling: Case Studies In Redundant Arrays Of Independent Disks And Network Defense, Sanjeeb Nanda Jan 2007

Graph Theoretic Modeling: Case Studies In Redundant Arrays Of Independent Disks And Network Defense, Sanjeeb Nanda

Electronic Theses and Dissertations

Graph theoretic modeling has served as an invaluable tool for solving a variety of problems since its introduction in Euler's paper on the Bridges of Königsberg in 1736 . Two amongst them of contemporary interest are the modeling of Redundant Arrays of Inexpensive Disks (RAID), and the identification of network attacks. While the former is vital to the protection and uninterrupted availability of data, the latter is crucial to the integrity of systems comprising networks. Both are of practical importance due to the continuing growth of data and its demand at increasing numbers of geographically distributed locations through the use …