Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 36

Full-Text Articles in Computer Sciences

Molecular Dynamics Simulations Of Dna-Functionalized Nanoparticle Building Blocks On Gpus, Tyler Landon Fochtman May 2017

Molecular Dynamics Simulations Of Dna-Functionalized Nanoparticle Building Blocks On Gpus, Tyler Landon Fochtman

Graduate Theses and Dissertations

This thesis discusses massively parallel molecular dynamics simulations of nBLOCKs using graphical processing units. nBLOCKs are nanoscale building blocks composed of gold nanoparticles functionalized with single-stranded DNA molecules. To explore greater simulation time scales we implement our nBLOCK computational model as an extension to the coarse grain molecular simulator oxDNA. oxDNA is parameterized to match the thermodynamics of DNA strand hybridization as well as the mechanics of single stranded DNA and double stranded DNA. In addition to an in-depth review of our implementation details we also provide results of the model validation and performance tests. These validation and performance tests …


A Hybrid Partially Reconfigurable Overlay Supporting Just-In-Time Assembly Of Custom Accelerators On Fpgas, Zeyad Tariq Aklah May 2017

A Hybrid Partially Reconfigurable Overlay Supporting Just-In-Time Assembly Of Custom Accelerators On Fpgas, Zeyad Tariq Aklah

Graduate Theses and Dissertations

The state of the art in design and development flows for FPGAs are not sufficiently mature to allow programmers to implement their applications through traditional software development flows. The stipulation of synthesis as well as the requirement of background knowledge on the FPGAs' low-level physical hardware structure are major challenges that prevent programmers from using FPGAs. The reconfigurable computing community is seeking solutions to raise the level of design abstraction at which programmers must operate, and move the synthesis process out of the programmers' path through the use of overlays. A recent approach, Just-In-Time Assembly (JITA), was proposed that enables …


Exploiting Semantic Distance In Linked Open Data For Recommendation, Sultan Dawood Alfarhood May 2017

Exploiting Semantic Distance In Linked Open Data For Recommendation, Sultan Dawood Alfarhood

Graduate Theses and Dissertations

The use of Linked Open Data (LOD) has been explored in recommender systems in different ways, primarily through its graphical representation. The graph structure of LOD is utilized to measure inter-resource relatedness via their semantic distance in the graph. The intuition behind this approach is that the more connected resources are to each other, the more related they are. One drawback of this approach is that it treats all inter-resource connections identically rather than prioritizing links that may be more important in semantic relatedness calculations. Another drawback of current approaches is that they only consider resources that are connected directly …


Dpweka: Achieving Differential Privacy In Weka, Srinidhi Katla May 2017

Dpweka: Achieving Differential Privacy In Weka, Srinidhi Katla

Graduate Theses and Dissertations

Organizations belonging to the government, commercial, and non-profit industries collect and store large amounts of sensitive data, which include medical, financial, and personal information. They use data mining methods to formulate business strategies that yield high long-term and short-term financial benefits. While analyzing such data, the private information of the individuals present in the data must be protected for moral and legal reasons. Current practices such as redacting sensitive attributes, releasing only the aggregate values, and query auditing do not provide sufficient protection against an adversary armed with auxiliary information. In the presence of additional background information, the privacy protection …


Just In Time Assembly (Jita) - A Run Time Interpretation Approach For Achieving Productivity Of Creating Custom Accelerators In Fpgas, Sen Ma Dec 2016

Just In Time Assembly (Jita) - A Run Time Interpretation Approach For Achieving Productivity Of Creating Custom Accelerators In Fpgas, Sen Ma

Graduate Theses and Dissertations

The reconfigurable computing community has yet to be successful in allowing programmers to access FPGAs through traditional software development flows. Existing barriers that prevent programmers from using FPGAs include: 1) knowledge of hardware programming models, 2) the need to work within the vendor specific CAD tools and hardware synthesis. This thesis presents a series of published papers that explore different aspects of a new approach being developed to remove the barriers and enable programmers to compile accelerators on next generation reconfigurable manycore architectures. The approach is entitled Just In Time Assembly (JITA) of hardware accelerators. The approach has been defined …


Automatic Assessment Of Environmental Hazards For Fall Prevention Using Smart-Cameras, Jeffrey Kutchka Dec 2016

Automatic Assessment Of Environmental Hazards For Fall Prevention Using Smart-Cameras, Jeffrey Kutchka

Graduate Theses and Dissertations

As technology advances in the field of Computer Vision, new applications will emerge. One device that has emerged is the smart-camera, a camera attached to an embedded system that can perform routines a regular camera could not, such as object or event detection. In this thesis we describe a smart-camera system we designed, implemented, and evaluated for fall prevention monitoring of at-risk people while in bed, whether it be for a hospital patient, nursing home resident, or at home elderly resident. The camera will give a nurse or caregiver environmental awareness of the at-risk person and notify them when that …


Enabling Runtime Profiling To Hide And Exploit Heterogeneity Within Chip Heterogeneous Multiprocessor Systems (Chmps), Eugene Cartwright May 2016

Enabling Runtime Profiling To Hide And Exploit Heterogeneity Within Chip Heterogeneous Multiprocessor Systems (Chmps), Eugene Cartwright

Graduate Theses and Dissertations

The heterogeneity of multiprocessor systems on chip (MPSoC) has presented unique opportunities for furthering today’s diverse application needs. FPGA-based MPSoCs have the potential of bridging the gap between generality and specialization but has traditionally been limited to device experts. The flexibility of these systems can enable computation without compromise but can only be realized if this flexibility extends throughout the software stack. At the top of this stack, there has been significant effort for leveraging the heterogeneity of the architecture. However, the betterment of these abstractions are limited to what the bottom of the stack exposes: the runtime system.

The …


Enabling Usage Pattern-Based Logical Status Inference For Mobile Phones, Jon C. Hammer May 2016

Enabling Usage Pattern-Based Logical Status Inference For Mobile Phones, Jon C. Hammer

Graduate Theses and Dissertations

Logical statuses of mobile users, such as isBusy and isAlone, are the key enabler for a plethora of context-aware mobile applications. While on-board hardware sensors (such as motion, proximity, and location sensors) have been extensively studied for logical status inference, continuous usage typically requires formidable energy consumption, which degrades the user experience. In this thesis, we argue that smartphone usage statistics can be used for logical status inference with negligible energy cost. To validate this argument, we present a continuous inference engine that (1) intercepts multiple operating system events, in particular foreground app, notifications, screen states, and connected networks; (2) …


Hardware Trojan Detection Via Golden Reference Library Matching, Lucas Weaver May 2016

Hardware Trojan Detection Via Golden Reference Library Matching, Lucas Weaver

Graduate Theses and Dissertations

Due to the proliferation of hardware Trojans in third party Intellectual Property (IP) designs, the issue of hardware security has risen to the forefront of computer engineering. Because of the miniscule size yet devastating effects of hardware Trojans, few detection methods have been presented that adequately address this problem facing the hardware industry. One such method with the ability to detect hardware Trojans is Structural Checking. This methodology analyzes a soft IP at the register-transfer level to discover malicious inclusions. An extension of this methodology is presented that expands the list of signal functionalities, termed assets, in addition to introducing …


Data Partitioning Methods To Process Queries On Encrypted Databases On The Cloud, Osama M. Omran May 2016

Data Partitioning Methods To Process Queries On Encrypted Databases On The Cloud, Osama M. Omran

Graduate Theses and Dissertations

Many features and advantages have been brought to organizations and computer users by Cloud computing. It allows different service providers to distribute many applications and services in an economical way. Consequently, many users and companies have begun using cloud computing. However, the users and companies are concerned about their data when data are stored and managed in the Cloud or outsourcing servers. The private data of individual users and companies is stored and managed by the service providers on the Cloud, which offers services on the other side of the Internet in terms of its users, and consequently results in …


Exploring Privacy Leakage From The Resource Usage Patterns Of Mobile Apps, Amin Rois Sinung Nugroho May 2016

Exploring Privacy Leakage From The Resource Usage Patterns Of Mobile Apps, Amin Rois Sinung Nugroho

Graduate Theses and Dissertations

Due to the popularity of smart phones and mobile apps, a potential privacy risk with the usage of mobile apps is that, from the usage information of mobile apps (e.g., how many hours a user plays mobile games in each day), private information about a user’s living habits and personal activities can be inferred. To assess this risk, this thesis answers the following research question: can the type of a mobile app (e.g., email, web browsing, mobile game, music streaming, etc.) used by a user be inferred from the resource (e.g., CPU, memory, network, etc.) usage patterns of the mobile …


Neural Decomposition Of Time-Series Data For Effective Generalization, Luke Godfrey Dec 2015

Neural Decomposition Of Time-Series Data For Effective Generalization, Luke Godfrey

Graduate Theses and Dissertations

We present a neural network technique for the analysis and extrapolation of time-series data called Neural Decomposition (ND). Units with a sinusoidal activation function are used to perform a Fourier-like decomposition of training samples into a sum of sinusoids, augmented by units with nonperiodic activation functions to capture linear trends and other nonperiodic components. We show how careful weight initialization can be combined with regularization to form a simple model that generalizes well. Our method generalizes effectively on the Mackey-Glass series, a dataset of unemployment rates as reported by the U.S. Department of Labor Statistics, a time-series of monthly international …


Evaluating The Intrinsic Similarity Between Neural Networks, Stephen Charles Ashmore Dec 2015

Evaluating The Intrinsic Similarity Between Neural Networks, Stephen Charles Ashmore

Graduate Theses and Dissertations

We present Forward Bipartite Alignment (FBA), a method that aligns the topological structures of two neural networks. Neural networks are considered to be a black box, because neural networks contain complex model surface determined by their weights that combine attributes non-linearly. Two networks that make similar predictions on training data may still generalize differently. FBA enables a diversity of applications, including visualization and canonicalization of neural networks, ensembles, and cross-over between unrelated neural networks in evolutionary optimization. We describe the FBA algorithm, and describe implementations for three applications: genetic algorithms, visualization, and ensembles. We demonstrate FBA's usefulness by comparing a …


Automatic User Profile Construction For A Personalized News Recommender System Using Twitter, Shiva Theja Reddy Gopidi Jul 2015

Automatic User Profile Construction For A Personalized News Recommender System Using Twitter, Shiva Theja Reddy Gopidi

Graduate Theses and Dissertations

Modern society has now grown accustomed to reading online or digital news. However, the huge corpus of information available online poses a challenge to users when trying to find relevant articles. A hybrid system “Personalized News Recommender Using Twitter’ has been developed to recommend articles to a user based on the popularity of the articles and also the profile of the user. The hybrid system is a fusion of a collaborative recommender system developed using tweets from the “Twitter” public timeline and a content recommender system based the user’s past interests summarized in their conceptual user profile. In previous work, …


Interpretation At The Controller's Edge: The Role Of Graphical User Interfaces In Virtual Archaeology, Tyler Duane Johnson May 2015

Interpretation At The Controller's Edge: The Role Of Graphical User Interfaces In Virtual Archaeology, Tyler Duane Johnson

Graduate Theses and Dissertations

The important role of graphical user interfaces (GUIs) as a medium of interaction with technology is well established in the world of media design, but has not received significant attention in the field of virtual archaeology. GUIs provide interactive capabilities and contextual information for 3D content such as structure-from-motion (SFM) models, and can represent the difference between "raw data" and thoughtful, skilled scholarly publications. This project explores the implications of a GUI created with the game engine Unity 3D (Unity) for a series of SFM models recorded at a structure known as the Area B House at the ancient central …


Efficient Ray Tracing For Mobile Devices, Rafael De Melo Aroxa May 2014

Efficient Ray Tracing For Mobile Devices, Rafael De Melo Aroxa

Graduate Theses and Dissertations

The demand for mobile devices with higher graphics performance has increased substantially in the past few years. Most mobile applications that demand 3D graphics use commonly available frameworks, such as Unity and Unreal Engine. In mobile devices, these frameworks are built on top of OpenGL ES and use a graphics technique called rasterization, a simple concept that yields good performance without sacrificing graphic quality. However, rasterization cannot easily handle some physical phenomena of light (i.e. reflection and refraction). In order to support such effects, the graphics framework has to emulate them, thereby leading to suboptimal results in term of quality. …


A Bandwidth-Conserving Architecture For Crawling Virtual Worlds, Dipesh Gautam Dec 2013

A Bandwidth-Conserving Architecture For Crawling Virtual Worlds, Dipesh Gautam

Graduate Theses and Dissertations

A virtual world is a computer-based simulated environment intended for its users to inhabit via avatars. Content in virtual worlds such as Second Life or OpenSimulator is increasingly presented using three-dimensional (3D) dynamic presentation technologies that challenge traditional search technologies. As 3D environments become both more prevalent and more fragmented, the need for a data crawler and distributed search service will continue to grow. By increasing the visibility of content across virtual world servers in order to better collect and integrate the 3D data we can also improve the crawling and searching efficiency and accuracy by avoiding crawling unchanged regions …


Conceptual, Impact-Based Publications Recommendations, Ann Smittu Joseph Dec 2013

Conceptual, Impact-Based Publications Recommendations, Ann Smittu Joseph

Graduate Theses and Dissertations

CiteSeerx is a digital library for scientific publications by computer science researchers. It also functions as a search engine with several features including autonomous citation indexing, automatic metadata extraction, full-text indexing and reference linking. Users are able to retrieve relevant documents from the CiteSeerx database directly using search queries and will further benefit if the system suggests document recommendations to the user based on their preferences and search history. Therefore, recommender systems were initially developed and continue to evolve to recommend more relevant documents to the CiteSeerx users. In this thesis, we introduce the Conceptual, Impact-Based Recommender (CIBR), …


Attitudes And Behaviors In Online Communities: Empirical Studies Of The Effects Of Social, Community, And Individual Characteristics, Richard Kumi Dec 2013

Attitudes And Behaviors In Online Communities: Empirical Studies Of The Effects Of Social, Community, And Individual Characteristics, Richard Kumi

Graduate Theses and Dissertations

Online communities and communities of practice bring people together to promote and support shared goals and exchange information. Personal interactions are important to many of these communities and one of the important outcomes of personal interactions in online communities and communities of practice is user-generated content. The three essays in the current study examines behavior motivation in online communities and communities of practice to understand how Social and personal psychological factors, and user-generated influence attitudes, intentions and behaviors in online communities.

The first essay addresses two research questions. First, how does Social capital influence exchange and combination behaviors in online …


A Solar-Powered And Multi-Tiered Mesh Node For A Portable In Situ Emergency Response System, Adam Matthews Dec 2013

A Solar-Powered And Multi-Tiered Mesh Node For A Portable In Situ Emergency Response System, Adam Matthews

Graduate Theses and Dissertations

The aftermath of a natural disaster is typically characterized by lack of a reliable medium for dissemination of information to survivors. Current state-of-the-art emergency response systems rely on satellite radio-enabled devices, but survivors, unlike first responders, do not have access to such devices. To mitigate this problem, we present PERPETUU a solar-powered portable GIS microserver. The microserver node can be deployed in a disaster scene, and can serve maps to survivors viewable on browsers of off-the-shelf mobile systems. A key innovation in the design of the PERPETUU node is a multi-tiered hardware architecture-the system combines a low-power micro-controller, a medium-power …


Traveltant: Social Interaction Based Personalized Recommendation System, Sultan Dawood Alfarhood Aug 2013

Traveltant: Social Interaction Based Personalized Recommendation System, Sultan Dawood Alfarhood

Graduate Theses and Dissertations

Trip planning is a time consuming task that most people do before going to any destination. Traveltant is an intelligent system that analyzes a user's Social network and suggests a complete trip plan detailed for every single day based on the user's interests extracted from the Social network. Traveltant also considers the interests of friends the user interacts with most by building a ranked friends list of interactivity, and then uses the interests of those people in this list to enrich the recommendation results. Traveltant provides a smooth user interface through a Windows Phone 7 application while doing most of …


Directed Percolation And The Abstract Tile Assembly Model, Tyler Garrett Moore May 2013

Directed Percolation And The Abstract Tile Assembly Model, Tyler Garrett Moore

Graduate Theses and Dissertations

Self-assembly is a process by which simple components build complex structures through local interactions. Directed percolation is a statistical physical model for describing competitive spreading processes on lattices. The author describes an algorithm which can transform a tile assembly system in the abstract Tile Assembly Model into a directed percolation problem, and then shows simulations of the aTAM which support this algorithm. The author also investigates two new constructs designed for Erik Winfree's abstract Tile Assembly Model called the NULL tile and temperature 1.5. These constructs aid the translation between self-assembly and directed percolation and may assist self-assembly researchers in …


Identifying Robust Sift Features For Improved Image Alignment, Sanjay Abhinav Vemuri May 2013

Identifying Robust Sift Features For Improved Image Alignment, Sanjay Abhinav Vemuri

Graduate Theses and Dissertations

In this thesis, we will study different ways to improve feature matching by increasing the quality and reducing the number of SIFT features. We created an algorithm to identify robust SIFT features by evaluating how invariant individual feature points are to changes in scale. This allows us to exclude poor SIFT feature points from the matching process and obtain better matching results in reduced time. We also developed techniques consider scale ratios and changes in object orientation when performing feature matching. This allows us to exclude false-positive feature matches and obtain better image alignment results.


Gesture Based Home Automation For The Physically Disabled, Alexander Hugh Nelson May 2013

Gesture Based Home Automation For The Physically Disabled, Alexander Hugh Nelson

Graduate Theses and Dissertations

Paralysis and motor-impairments can greatly reduce the autonomy and quality of life of a patient while presenting a major recurring cost in home-healthcare. Augmented with a non-invasive wearable sensor system and home-automation equipment, the patient can regain a level of autonomy at a fraction of the cost of home nurses. A system which utilizes sensor fusion, low-power digital components, and smartphone cellular capabilities can extend the usefulness of such a system to allow greater adaptivity for patients with various needs. This thesis develops such a system as a Bluetooth enabled glove device which communicates with a remote web server to …


Personalized News Recommender Using Twitter, Satya Srinivasa Nirmal Jonnalagedda May 2013

Personalized News Recommender Using Twitter, Satya Srinivasa Nirmal Jonnalagedda

Graduate Theses and Dissertations

Online news reading has become a widely popular way to read news articles from news sources around the globe. With the enormous amount of news articles available, users are easily swamped by information of little interest to them. News recommender systems are one approach to help users find interesting articles to read. News recommender systems present the articles to individual users based on their interests rather than presenting articles in order of their occurrence. In this thesis, we present our research on developing personalized news recommendation system with the help of a popular micro-blogging service "Twitter". The news articles are …


A Secure And Fair Resource Sharing Model For Community Clouds, Santhosh S. Anand May 2013

A Secure And Fair Resource Sharing Model For Community Clouds, Santhosh S. Anand

Graduate Theses and Dissertations

Cloud computing has gained a lot of importance and has been one of the most discussed segment of today's IT industry. As enterprises explore the idea of using clouds, concerns have emerged related to cloud security and standardization. This thesis explores whether the Community Cloud Deployment Model can provide solutions to some of the concerns associated with cloud computing. A secure framework based on trust negotiations for resource sharing within the community is developed as a means to provide standardization and security while building trust during resource sharing within the community. Additionally, a model for fair sharing of resources is …


Locating And Protecting Facilities Subject To Random Disruptions And Attacks, Hugh Medal Aug 2012

Locating And Protecting Facilities Subject To Random Disruptions And Attacks, Hugh Medal

Graduate Theses and Dissertations

Recent events such as the 2011 Tohoku earthquake and tsunami in Japan have revealed the vulnerability of networks such as supply chains to disruptive events. In particular, it has become apparent that the failure of a few elements of an infrastructure system can cause a system-wide disruption. Thus, it is important to learn more about which elements of infrastructure systems are most critical and how to protect an infrastructure system from the effects of a disruption. This dissertation seeks to enhance the understanding of how to design and protect networked infrastructure systems from disruptions by developing new mathematical models and …


A Domain Specific Model For Generating Etl Workflows From Business Intents, Wesley Deneke Aug 2012

A Domain Specific Model For Generating Etl Workflows From Business Intents, Wesley Deneke

Graduate Theses and Dissertations

Extract-Transform-Load (ETL) tools have provided organizations with the ability to build and maintain workflows (consisting of graphs of data transformation tasks) that can process the flood of digital data. Currently, however, the specification of ETL workflows is largely manual, human time intensive, and error prone. As these workflows become increasingly complex, the users that build and maintain them must retain an increasing amount of knowledge specific to how to produce solutions to business objectives using their domain's ETL workflow system. A program that can reduce the human time and expertise required to define such workflows, producing accurate ETL solutions with …


Three-Dimensional Scene Reconstruction Using Multiple Microsoft Kinects, Matt Miller May 2012

Three-Dimensional Scene Reconstruction Using Multiple Microsoft Kinects, Matt Miller

Graduate Theses and Dissertations

The Microsoft Kinect represents a leap forward in the form of cheap, consumer friendly, depth sensing cameras. Through the use of the depth information as well as the accompanying RGB camera image, it becomes possible to represent the scene, what the camera sees, as a three-dimensional geometric model. In this thesis, we explore how to obtain useful data from the Kinect, and how to use it for the creation of a three-dimensional geometric model of the scene. We develop and test multiple ways of improving the depth information received from the Kinect, in order to create smoother three-dimensional models. We …


Insider Threat Mitigation Models Based On Thresholds And Dependencies, Harini Ragavan May 2012

Insider Threat Mitigation Models Based On Thresholds And Dependencies, Harini Ragavan

Graduate Theses and Dissertations

Insider threat causes great damage to data in any organization and is considered a serious issue. In spite of the presence of threat prevention mechanisms, sophisticated insiders still continue to attack a database with new techniques. One such technique which remains an advantage for insiders to attack databases is the dependency relationship among data items. This thesis investigates the ways by which an authorized insider detects dependencies in order to perform malicious write operations. The goal is to monitor malicious write operations performed by an insider by taking advantage of dependencies. A term called `threshold' is associated with every data …