Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Graphics and Human Computer Interfaces (13)
- Engineering (11)
- Information Security (8)
- Computer Engineering (7)
- Databases and Information Systems (7)
-
- Artificial Intelligence and Robotics (3)
- Digital Communications and Networking (3)
- Numerical Analysis and Scientific Computing (3)
- Other Computer Sciences (3)
- Social and Behavioral Sciences (3)
- Software Engineering (3)
- Systems Architecture (3)
- Communication (2)
- Hardware Systems (2)
- Nanoscience and Nanotechnology (2)
- Accounting (1)
- Anthropology (1)
- Archaeological Anthropology (1)
- Business (1)
- Computer and Systems Architecture (1)
- Electrical and Computer Engineering (1)
- Industrial Engineering (1)
- Interpersonal and Small Group Communication (1)
- Management Information Systems (1)
- OS and Networks (1)
- Operational Research (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Other Computer Engineering (1)
Articles 1 - 30 of 36
Full-Text Articles in Computer Sciences
Molecular Dynamics Simulations Of Dna-Functionalized Nanoparticle Building Blocks On Gpus, Tyler Landon Fochtman
Molecular Dynamics Simulations Of Dna-Functionalized Nanoparticle Building Blocks On Gpus, Tyler Landon Fochtman
Graduate Theses and Dissertations
This thesis discusses massively parallel molecular dynamics simulations of nBLOCKs using graphical processing units. nBLOCKs are nanoscale building blocks composed of gold nanoparticles functionalized with single-stranded DNA molecules. To explore greater simulation time scales we implement our nBLOCK computational model as an extension to the coarse grain molecular simulator oxDNA. oxDNA is parameterized to match the thermodynamics of DNA strand hybridization as well as the mechanics of single stranded DNA and double stranded DNA. In addition to an in-depth review of our implementation details we also provide results of the model validation and performance tests. These validation and performance tests …
A Hybrid Partially Reconfigurable Overlay Supporting Just-In-Time Assembly Of Custom Accelerators On Fpgas, Zeyad Tariq Aklah
A Hybrid Partially Reconfigurable Overlay Supporting Just-In-Time Assembly Of Custom Accelerators On Fpgas, Zeyad Tariq Aklah
Graduate Theses and Dissertations
The state of the art in design and development flows for FPGAs are not sufficiently mature to allow programmers to implement their applications through traditional software development flows. The stipulation of synthesis as well as the requirement of background knowledge on the FPGAs' low-level physical hardware structure are major challenges that prevent programmers from using FPGAs. The reconfigurable computing community is seeking solutions to raise the level of design abstraction at which programmers must operate, and move the synthesis process out of the programmers' path through the use of overlays. A recent approach, Just-In-Time Assembly (JITA), was proposed that enables …
Exploiting Semantic Distance In Linked Open Data For Recommendation, Sultan Dawood Alfarhood
Exploiting Semantic Distance In Linked Open Data For Recommendation, Sultan Dawood Alfarhood
Graduate Theses and Dissertations
The use of Linked Open Data (LOD) has been explored in recommender systems in different ways, primarily through its graphical representation. The graph structure of LOD is utilized to measure inter-resource relatedness via their semantic distance in the graph. The intuition behind this approach is that the more connected resources are to each other, the more related they are. One drawback of this approach is that it treats all inter-resource connections identically rather than prioritizing links that may be more important in semantic relatedness calculations. Another drawback of current approaches is that they only consider resources that are connected directly …
Dpweka: Achieving Differential Privacy In Weka, Srinidhi Katla
Dpweka: Achieving Differential Privacy In Weka, Srinidhi Katla
Graduate Theses and Dissertations
Organizations belonging to the government, commercial, and non-profit industries collect and store large amounts of sensitive data, which include medical, financial, and personal information. They use data mining methods to formulate business strategies that yield high long-term and short-term financial benefits. While analyzing such data, the private information of the individuals present in the data must be protected for moral and legal reasons. Current practices such as redacting sensitive attributes, releasing only the aggregate values, and query auditing do not provide sufficient protection against an adversary armed with auxiliary information. In the presence of additional background information, the privacy protection …
Just In Time Assembly (Jita) - A Run Time Interpretation Approach For Achieving Productivity Of Creating Custom Accelerators In Fpgas, Sen Ma
Graduate Theses and Dissertations
The reconfigurable computing community has yet to be successful in allowing programmers to access FPGAs through traditional software development flows. Existing barriers that prevent programmers from using FPGAs include: 1) knowledge of hardware programming models, 2) the need to work within the vendor specific CAD tools and hardware synthesis. This thesis presents a series of published papers that explore different aspects of a new approach being developed to remove the barriers and enable programmers to compile accelerators on next generation reconfigurable manycore architectures. The approach is entitled Just In Time Assembly (JITA) of hardware accelerators. The approach has been defined …
Automatic Assessment Of Environmental Hazards For Fall Prevention Using Smart-Cameras, Jeffrey Kutchka
Automatic Assessment Of Environmental Hazards For Fall Prevention Using Smart-Cameras, Jeffrey Kutchka
Graduate Theses and Dissertations
As technology advances in the field of Computer Vision, new applications will emerge. One device that has emerged is the smart-camera, a camera attached to an embedded system that can perform routines a regular camera could not, such as object or event detection. In this thesis we describe a smart-camera system we designed, implemented, and evaluated for fall prevention monitoring of at-risk people while in bed, whether it be for a hospital patient, nursing home resident, or at home elderly resident. The camera will give a nurse or caregiver environmental awareness of the at-risk person and notify them when that …
Enabling Runtime Profiling To Hide And Exploit Heterogeneity Within Chip Heterogeneous Multiprocessor Systems (Chmps), Eugene Cartwright
Enabling Runtime Profiling To Hide And Exploit Heterogeneity Within Chip Heterogeneous Multiprocessor Systems (Chmps), Eugene Cartwright
Graduate Theses and Dissertations
The heterogeneity of multiprocessor systems on chip (MPSoC) has presented unique opportunities for furthering today’s diverse application needs. FPGA-based MPSoCs have the potential of bridging the gap between generality and specialization but has traditionally been limited to device experts. The flexibility of these systems can enable computation without compromise but can only be realized if this flexibility extends throughout the software stack. At the top of this stack, there has been significant effort for leveraging the heterogeneity of the architecture. However, the betterment of these abstractions are limited to what the bottom of the stack exposes: the runtime system.
The …
Enabling Usage Pattern-Based Logical Status Inference For Mobile Phones, Jon C. Hammer
Enabling Usage Pattern-Based Logical Status Inference For Mobile Phones, Jon C. Hammer
Graduate Theses and Dissertations
Logical statuses of mobile users, such as isBusy and isAlone, are the key enabler for a plethora of context-aware mobile applications. While on-board hardware sensors (such as motion, proximity, and location sensors) have been extensively studied for logical status inference, continuous usage typically requires formidable energy consumption, which degrades the user experience. In this thesis, we argue that smartphone usage statistics can be used for logical status inference with negligible energy cost. To validate this argument, we present a continuous inference engine that (1) intercepts multiple operating system events, in particular foreground app, notifications, screen states, and connected networks; (2) …
Hardware Trojan Detection Via Golden Reference Library Matching, Lucas Weaver
Hardware Trojan Detection Via Golden Reference Library Matching, Lucas Weaver
Graduate Theses and Dissertations
Due to the proliferation of hardware Trojans in third party Intellectual Property (IP) designs, the issue of hardware security has risen to the forefront of computer engineering. Because of the miniscule size yet devastating effects of hardware Trojans, few detection methods have been presented that adequately address this problem facing the hardware industry. One such method with the ability to detect hardware Trojans is Structural Checking. This methodology analyzes a soft IP at the register-transfer level to discover malicious inclusions. An extension of this methodology is presented that expands the list of signal functionalities, termed assets, in addition to introducing …
Data Partitioning Methods To Process Queries On Encrypted Databases On The Cloud, Osama M. Omran
Data Partitioning Methods To Process Queries On Encrypted Databases On The Cloud, Osama M. Omran
Graduate Theses and Dissertations
Many features and advantages have been brought to organizations and computer users by Cloud computing. It allows different service providers to distribute many applications and services in an economical way. Consequently, many users and companies have begun using cloud computing. However, the users and companies are concerned about their data when data are stored and managed in the Cloud or outsourcing servers. The private data of individual users and companies is stored and managed by the service providers on the Cloud, which offers services on the other side of the Internet in terms of its users, and consequently results in …
Exploring Privacy Leakage From The Resource Usage Patterns Of Mobile Apps, Amin Rois Sinung Nugroho
Exploring Privacy Leakage From The Resource Usage Patterns Of Mobile Apps, Amin Rois Sinung Nugroho
Graduate Theses and Dissertations
Due to the popularity of smart phones and mobile apps, a potential privacy risk with the usage of mobile apps is that, from the usage information of mobile apps (e.g., how many hours a user plays mobile games in each day), private information about a user’s living habits and personal activities can be inferred. To assess this risk, this thesis answers the following research question: can the type of a mobile app (e.g., email, web browsing, mobile game, music streaming, etc.) used by a user be inferred from the resource (e.g., CPU, memory, network, etc.) usage patterns of the mobile …
Neural Decomposition Of Time-Series Data For Effective Generalization, Luke Godfrey
Neural Decomposition Of Time-Series Data For Effective Generalization, Luke Godfrey
Graduate Theses and Dissertations
We present a neural network technique for the analysis and extrapolation of time-series data called Neural Decomposition (ND). Units with a sinusoidal activation function are used to perform a Fourier-like decomposition of training samples into a sum of sinusoids, augmented by units with nonperiodic activation functions to capture linear trends and other nonperiodic components. We show how careful weight initialization can be combined with regularization to form a simple model that generalizes well. Our method generalizes effectively on the Mackey-Glass series, a dataset of unemployment rates as reported by the U.S. Department of Labor Statistics, a time-series of monthly international …
Evaluating The Intrinsic Similarity Between Neural Networks, Stephen Charles Ashmore
Evaluating The Intrinsic Similarity Between Neural Networks, Stephen Charles Ashmore
Graduate Theses and Dissertations
We present Forward Bipartite Alignment (FBA), a method that aligns the topological structures of two neural networks. Neural networks are considered to be a black box, because neural networks contain complex model surface determined by their weights that combine attributes non-linearly. Two networks that make similar predictions on training data may still generalize differently. FBA enables a diversity of applications, including visualization and canonicalization of neural networks, ensembles, and cross-over between unrelated neural networks in evolutionary optimization. We describe the FBA algorithm, and describe implementations for three applications: genetic algorithms, visualization, and ensembles. We demonstrate FBA's usefulness by comparing a …
Automatic User Profile Construction For A Personalized News Recommender System Using Twitter, Shiva Theja Reddy Gopidi
Automatic User Profile Construction For A Personalized News Recommender System Using Twitter, Shiva Theja Reddy Gopidi
Graduate Theses and Dissertations
Modern society has now grown accustomed to reading online or digital news. However, the huge corpus of information available online poses a challenge to users when trying to find relevant articles. A hybrid system “Personalized News Recommender Using Twitter’ has been developed to recommend articles to a user based on the popularity of the articles and also the profile of the user. The hybrid system is a fusion of a collaborative recommender system developed using tweets from the “Twitter” public timeline and a content recommender system based the user’s past interests summarized in their conceptual user profile. In previous work, …
Interpretation At The Controller's Edge: The Role Of Graphical User Interfaces In Virtual Archaeology, Tyler Duane Johnson
Interpretation At The Controller's Edge: The Role Of Graphical User Interfaces In Virtual Archaeology, Tyler Duane Johnson
Graduate Theses and Dissertations
The important role of graphical user interfaces (GUIs) as a medium of interaction with technology is well established in the world of media design, but has not received significant attention in the field of virtual archaeology. GUIs provide interactive capabilities and contextual information for 3D content such as structure-from-motion (SFM) models, and can represent the difference between "raw data" and thoughtful, skilled scholarly publications. This project explores the implications of a GUI created with the game engine Unity 3D (Unity) for a series of SFM models recorded at a structure known as the Area B House at the ancient central …
Efficient Ray Tracing For Mobile Devices, Rafael De Melo Aroxa
Efficient Ray Tracing For Mobile Devices, Rafael De Melo Aroxa
Graduate Theses and Dissertations
The demand for mobile devices with higher graphics performance has increased substantially in the past few years. Most mobile applications that demand 3D graphics use commonly available frameworks, such as Unity and Unreal Engine. In mobile devices, these frameworks are built on top of OpenGL ES and use a graphics technique called rasterization, a simple concept that yields good performance without sacrificing graphic quality. However, rasterization cannot easily handle some physical phenomena of light (i.e. reflection and refraction). In order to support such effects, the graphics framework has to emulate them, thereby leading to suboptimal results in term of quality. …
A Bandwidth-Conserving Architecture For Crawling Virtual Worlds, Dipesh Gautam
A Bandwidth-Conserving Architecture For Crawling Virtual Worlds, Dipesh Gautam
Graduate Theses and Dissertations
A virtual world is a computer-based simulated environment intended for its users to inhabit via avatars. Content in virtual worlds such as Second Life or OpenSimulator is increasingly presented using three-dimensional (3D) dynamic presentation technologies that challenge traditional search technologies. As 3D environments become both more prevalent and more fragmented, the need for a data crawler and distributed search service will continue to grow. By increasing the visibility of content across virtual world servers in order to better collect and integrate the 3D data we can also improve the crawling and searching efficiency and accuracy by avoiding crawling unchanged regions …
Conceptual, Impact-Based Publications Recommendations, Ann Smittu Joseph
Conceptual, Impact-Based Publications Recommendations, Ann Smittu Joseph
Graduate Theses and Dissertations
CiteSeerx is a digital library for scientific publications by computer science researchers. It also functions as a search engine with several features including autonomous citation indexing, automatic metadata extraction, full-text indexing and reference linking. Users are able to retrieve relevant documents from the CiteSeerx database directly using search queries and will further benefit if the system suggests document recommendations to the user based on their preferences and search history. Therefore, recommender systems were initially developed and continue to evolve to recommend more relevant documents to the CiteSeerx users. In this thesis, we introduce the Conceptual, Impact-Based Recommender (CIBR), …
Attitudes And Behaviors In Online Communities: Empirical Studies Of The Effects Of Social, Community, And Individual Characteristics, Richard Kumi
Graduate Theses and Dissertations
Online communities and communities of practice bring people together to promote and support shared goals and exchange information. Personal interactions are important to many of these communities and one of the important outcomes of personal interactions in online communities and communities of practice is user-generated content. The three essays in the current study examines behavior motivation in online communities and communities of practice to understand how Social and personal psychological factors, and user-generated influence attitudes, intentions and behaviors in online communities.
The first essay addresses two research questions. First, how does Social capital influence exchange and combination behaviors in online …
A Solar-Powered And Multi-Tiered Mesh Node For A Portable In Situ Emergency Response System, Adam Matthews
A Solar-Powered And Multi-Tiered Mesh Node For A Portable In Situ Emergency Response System, Adam Matthews
Graduate Theses and Dissertations
The aftermath of a natural disaster is typically characterized by lack of a reliable medium for dissemination of information to survivors. Current state-of-the-art emergency response systems rely on satellite radio-enabled devices, but survivors, unlike first responders, do not have access to such devices. To mitigate this problem, we present PERPETUU a solar-powered portable GIS microserver. The microserver node can be deployed in a disaster scene, and can serve maps to survivors viewable on browsers of off-the-shelf mobile systems. A key innovation in the design of the PERPETUU node is a multi-tiered hardware architecture-the system combines a low-power micro-controller, a medium-power …
Traveltant: Social Interaction Based Personalized Recommendation System, Sultan Dawood Alfarhood
Traveltant: Social Interaction Based Personalized Recommendation System, Sultan Dawood Alfarhood
Graduate Theses and Dissertations
Trip planning is a time consuming task that most people do before going to any destination. Traveltant is an intelligent system that analyzes a user's Social network and suggests a complete trip plan detailed for every single day based on the user's interests extracted from the Social network. Traveltant also considers the interests of friends the user interacts with most by building a ranked friends list of interactivity, and then uses the interests of those people in this list to enrich the recommendation results. Traveltant provides a smooth user interface through a Windows Phone 7 application while doing most of …
Directed Percolation And The Abstract Tile Assembly Model, Tyler Garrett Moore
Directed Percolation And The Abstract Tile Assembly Model, Tyler Garrett Moore
Graduate Theses and Dissertations
Self-assembly is a process by which simple components build complex structures through local interactions. Directed percolation is a statistical physical model for describing competitive spreading processes on lattices. The author describes an algorithm which can transform a tile assembly system in the abstract Tile Assembly Model into a directed percolation problem, and then shows simulations of the aTAM which support this algorithm. The author also investigates two new constructs designed for Erik Winfree's abstract Tile Assembly Model called the NULL tile and temperature 1.5. These constructs aid the translation between self-assembly and directed percolation and may assist self-assembly researchers in …
Identifying Robust Sift Features For Improved Image Alignment, Sanjay Abhinav Vemuri
Identifying Robust Sift Features For Improved Image Alignment, Sanjay Abhinav Vemuri
Graduate Theses and Dissertations
In this thesis, we will study different ways to improve feature matching by increasing the quality and reducing the number of SIFT features. We created an algorithm to identify robust SIFT features by evaluating how invariant individual feature points are to changes in scale. This allows us to exclude poor SIFT feature points from the matching process and obtain better matching results in reduced time. We also developed techniques consider scale ratios and changes in object orientation when performing feature matching. This allows us to exclude false-positive feature matches and obtain better image alignment results.
Gesture Based Home Automation For The Physically Disabled, Alexander Hugh Nelson
Gesture Based Home Automation For The Physically Disabled, Alexander Hugh Nelson
Graduate Theses and Dissertations
Paralysis and motor-impairments can greatly reduce the autonomy and quality of life of a patient while presenting a major recurring cost in home-healthcare. Augmented with a non-invasive wearable sensor system and home-automation equipment, the patient can regain a level of autonomy at a fraction of the cost of home nurses. A system which utilizes sensor fusion, low-power digital components, and smartphone cellular capabilities can extend the usefulness of such a system to allow greater adaptivity for patients with various needs. This thesis develops such a system as a Bluetooth enabled glove device which communicates with a remote web server to …
Personalized News Recommender Using Twitter, Satya Srinivasa Nirmal Jonnalagedda
Personalized News Recommender Using Twitter, Satya Srinivasa Nirmal Jonnalagedda
Graduate Theses and Dissertations
Online news reading has become a widely popular way to read news articles from news sources around the globe. With the enormous amount of news articles available, users are easily swamped by information of little interest to them. News recommender systems are one approach to help users find interesting articles to read. News recommender systems present the articles to individual users based on their interests rather than presenting articles in order of their occurrence. In this thesis, we present our research on developing personalized news recommendation system with the help of a popular micro-blogging service "Twitter". The news articles are …
A Secure And Fair Resource Sharing Model For Community Clouds, Santhosh S. Anand
A Secure And Fair Resource Sharing Model For Community Clouds, Santhosh S. Anand
Graduate Theses and Dissertations
Cloud computing has gained a lot of importance and has been one of the most discussed segment of today's IT industry. As enterprises explore the idea of using clouds, concerns have emerged related to cloud security and standardization. This thesis explores whether the Community Cloud Deployment Model can provide solutions to some of the concerns associated with cloud computing. A secure framework based on trust negotiations for resource sharing within the community is developed as a means to provide standardization and security while building trust during resource sharing within the community. Additionally, a model for fair sharing of resources is …
Locating And Protecting Facilities Subject To Random Disruptions And Attacks, Hugh Medal
Locating And Protecting Facilities Subject To Random Disruptions And Attacks, Hugh Medal
Graduate Theses and Dissertations
Recent events such as the 2011 Tohoku earthquake and tsunami in Japan have revealed the vulnerability of networks such as supply chains to disruptive events. In particular, it has become apparent that the failure of a few elements of an infrastructure system can cause a system-wide disruption. Thus, it is important to learn more about which elements of infrastructure systems are most critical and how to protect an infrastructure system from the effects of a disruption. This dissertation seeks to enhance the understanding of how to design and protect networked infrastructure systems from disruptions by developing new mathematical models and …
A Domain Specific Model For Generating Etl Workflows From Business Intents, Wesley Deneke
A Domain Specific Model For Generating Etl Workflows From Business Intents, Wesley Deneke
Graduate Theses and Dissertations
Extract-Transform-Load (ETL) tools have provided organizations with the ability to build and maintain workflows (consisting of graphs of data transformation tasks) that can process the flood of digital data. Currently, however, the specification of ETL workflows is largely manual, human time intensive, and error prone. As these workflows become increasingly complex, the users that build and maintain them must retain an increasing amount of knowledge specific to how to produce solutions to business objectives using their domain's ETL workflow system. A program that can reduce the human time and expertise required to define such workflows, producing accurate ETL solutions with …
Three-Dimensional Scene Reconstruction Using Multiple Microsoft Kinects, Matt Miller
Three-Dimensional Scene Reconstruction Using Multiple Microsoft Kinects, Matt Miller
Graduate Theses and Dissertations
The Microsoft Kinect represents a leap forward in the form of cheap, consumer friendly, depth sensing cameras. Through the use of the depth information as well as the accompanying RGB camera image, it becomes possible to represent the scene, what the camera sees, as a three-dimensional geometric model. In this thesis, we explore how to obtain useful data from the Kinect, and how to use it for the creation of a three-dimensional geometric model of the scene. We develop and test multiple ways of improving the depth information received from the Kinect, in order to create smoother three-dimensional models. We …
Insider Threat Mitigation Models Based On Thresholds And Dependencies, Harini Ragavan
Insider Threat Mitigation Models Based On Thresholds And Dependencies, Harini Ragavan
Graduate Theses and Dissertations
Insider threat causes great damage to data in any organization and is considered a serious issue. In spite of the presence of threat prevention mechanisms, sophisticated insiders still continue to attack a database with new techniques. One such technique which remains an advantage for insiders to attack databases is the dependency relationship among data items. This thesis investigates the ways by which an authorized insider detects dependencies in order to perform malicious write operations. The goal is to monitor malicious write operations performed by an insider by taking advantage of dependencies. A term called `threshold' is associated with every data …