Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Masters Theses

2010

Discipline
Institution
Keyword

Articles 1 - 18 of 18

Full-Text Articles in Computer Sciences

Geophysical Study At Old Stone Fort State Archaeological Park, Manchester, Tennessee, Stephen Jay Yerka Dec 2010

Geophysical Study At Old Stone Fort State Archaeological Park, Manchester, Tennessee, Stephen Jay Yerka

Masters Theses

The Old Stone Fort State Archaeological Park covers over 800 acres within Manchester, Tennessee, and is owned and managed by the Tennessee Division of State Parks. The central archaeological site within the park boundary is The Old Stone Fort mounds that enclose about 50 acres on a plateau above the convergence of the Big Duck and the Little Duck Rivers. The hilltop enclosure dates to the Middle Woodland Period, and radiocarbon dates obtained at the site range from the first to the fifth century A. D. Because of its size and apparent complexity, previous investigations of the site have been …


Enterprise Users And Web Search Behavior, April Ann Lewis May 2010

Enterprise Users And Web Search Behavior, April Ann Lewis

Masters Theses

This thesis describes analysis of user web query behavior associated with Oak Ridge National Laboratory’s (ORNL) Enterprise Search System (Hereafter, ORNL Intranet). The ORNL Intranet provides users a means to search all kinds of data stores for relevant business and research information using a single query. The Global Intranet Trends for 2010 Report suggests the biggest current obstacle for corporate intranets is “findability and Siloed content”. Intranets differ from internets in the way they create, control, and share content which can make it often difficult and sometimes impossible for users to find information. Stenmark (2006) first noted studies of corporate …


Contribution-Based Priority Assessment In A Web-Based Intelligent Argumentation Network For Collaborative Software Development, Maithili Satyavolu Jan 2010

Contribution-Based Priority Assessment In A Web-Based Intelligent Argumentation Network For Collaborative Software Development, Maithili Satyavolu

Masters Theses

"Decision making is an important aspect of the collaborative software development process which usually involves complex process of conflict resolution. Stakeholders approach decision making process from multiple perspectives and their priorities play a vital role in it. The priority assessment methods used in the argumentation process so far are usually static. Priorities remain constant throughout the decision making process. In order to make the collaborative system more closely replicate real-world scenarios, this work incorporates dynamic priority assessment into a web-based collaborative system which is based on intelligent computational argumentation. It evaluates priorities dynamically for each cycle of decision process based …


Minimize End-To-End Delay Through Cross-Layer Optimization In Multi-Hop Wireless Sensor Networks, Yibo Xu Jan 2010

Minimize End-To-End Delay Through Cross-Layer Optimization In Multi-Hop Wireless Sensor Networks, Yibo Xu

Masters Theses

"End-to-end delay plays a very important role in wireless sensor networks. It refers to the total time taken for a single packet to be transmitted across a network from source to destination. There are many factors could affect the end-to-end delay, among them the routing path and the interference level along the path are the two basic elements that could have significant influence on the result of the end-to-end delay. This thesis presents a transmission scheduling scheme that minimizes the end-to-end delay when the node topology is given. The transmission scheduling scheme is designed based on integer linear programming and …


Content Based Image Retrieval For Bio-Medical Images, Vikas Nahar Jan 2010

Content Based Image Retrieval For Bio-Medical Images, Vikas Nahar

Masters Theses

"Content Based Image Retrieval System (CBIR) is used to retrieve images similar to the query image. These systems have a wide range of applications in various fields. Medical subject headings, key words, and bibliographic references can be augmented with the images present within the articles to help clinicians to potentially improve the relevance of articles found in the querying process. In this research, image feature analysis and classification techniques are explored to differentiate images found in biomedical articles which have been categorized based on modality and utility. Examples of features examined in this research include: features based on different histograms …


Impact Of Management Status, Gender, And Level Of Project Involvement On Corporate Governance In A Role-Based Enterprise Portal Environment, Daniel Augusto Pereira Brás Sequeira Jan 2010

Impact Of Management Status, Gender, And Level Of Project Involvement On Corporate Governance In A Role-Based Enterprise Portal Environment, Daniel Augusto Pereira Brás Sequeira

Masters Theses

"The underlying objective of this research project is to investigate the impact of management status, gender, and level of project involvement on corporate governance in a role-based enterprise portal environment. This is achieved through a case study which included the development of a role-based enterprise portal site prototype assessed through surveys targeted at different stakeholders at the case company. Six hypotheses were formulated addressing the core research question. The outcomes of the hypotheses testing suggest employees' perceptions of role-based enterprise portal's effectiveness, usability, and corporate identity design are, in general, not influenced by the employees' management role, gender, and project …


Representation And Validation Of Domain And Range Restrictions In A Relational Database Driven Ontology Maintenance System, Patrick Garrett. Edgett Jan 2010

Representation And Validation Of Domain And Range Restrictions In A Relational Database Driven Ontology Maintenance System, Patrick Garrett. Edgett

Masters Theses

"An ontology can be used to represent and organize the objects, properties, events, processes, and relations that embody an area of reality [1]. These knowledge bases may be created manually (by individuals or groups), and/or automatically using software tools, such as those developed for information retrieval and data mining. Recently, the National Science Foundation funded a large collaborative development project for the semi-automated construction of an ontology of amphibian anatomy (AmphibAnat [2]). To satisfy the extensive community curation requirements of that project, a generic, Web-based, multi-user, relational database ontology management system (RDBOM [3]) was constructed, based upon a novel theoretical …


Etherannotate: A Transparent Malware Analysis Tool For Integrating Dynamic And Static Examination, Joshua Michael Eads Jan 2010

Etherannotate: A Transparent Malware Analysis Tool For Integrating Dynamic And Static Examination, Joshua Michael Eads

Masters Theses

"Software security researchers commonly reverse engineer and analyze current malicious software (malware) to determine what the latest techniques malicious attackers are utilizing and how to protect computer systems from attack. The most common analysis methods involve examining how the program behaves during execution and interpreting its machine-level instructions. However, modern malicious applications use advanced anti-debugger, anti-virtualization, and code packing techniques to obfuscate the malware's true activities and divert security analysts. Malware analysts currently do not have a simple method for tracing malicious code activity at the instruction-level in a highly undetectable environment. There also lacks a simple method for combining …


2-D Path Planning For Direct Laser Deposition Process, Swathi Routhu Jan 2010

2-D Path Planning For Direct Laser Deposition Process, Swathi Routhu

Masters Theses

"The zigzag and offset path have been the two most popular path patterns for tool movement in machining process. Different from the traditional machining processes, the quality of parts produced by the metal deposition process is much more dependent upon the choice of deposition paths. Due to the nature of the metal deposition processes, various tool path patterns not only change the efficiency but also affect the deposition height, a critical quality for metal deposition process. This thesis presents the research conducted on calculating zigzag pattern to improve efficiency by minimizing the idle path. The deposition height is highly dependent …


A Pilot Study In An Application Of Text Mining To Learning System Evaluation, Nitsawan Katerattanakul Jan 2010

A Pilot Study In An Application Of Text Mining To Learning System Evaluation, Nitsawan Katerattanakul

Masters Theses

"Text mining concerns discovering and extracting knowledge from unstructured data. It transforms textual data into a usable, intelligible format that facilitates classifying documents, finding explicit relationships or associations between documents, and clustering documents into categories. Given a collection of survey comments evaluating the civil engineering learning system, text mining technique is applied to discover and extract knowledge from the comments. This research focuses on the study of a systematic way to apply a software tool, SAS Enterprise Miner, to the survey data. The purpose is to categorize the comments into different groups in an attempt to identify "major" concerns from …


An Artificial Life Approach To Evolutionary Computation: From Mobile Cellular Algorithms To Artificial Ecosystems, Shivakar Vulli Jan 2010

An Artificial Life Approach To Evolutionary Computation: From Mobile Cellular Algorithms To Artificial Ecosystems, Shivakar Vulli

Masters Theses

"This thesis presents a new class of evolutionary algorithms called mobile cellular evolutionary algorithms (mcEAs). These algorithms are characterized by individuals moving around on a spatial population structure. As a primary objective, this thesis aims to show that by controlling the population density and mobility in mcEAs, it is possible to achieve much better control over the rate of convergence than what is already possible in existing cellular EAs. Using the observations and results from this investigation into selection pressure in mcEAs, a general architecture for developing agent-based evolutionary algorithms called Artificial Ecosystems (AES) is presented. A simple agent-based EA …


Cloud Security Requirements Analysis And Security Policy Development Using A High-Order Object-Oriented Modeling Technique, Kenneth Kofi Fletcher Jan 2010

Cloud Security Requirements Analysis And Security Policy Development Using A High-Order Object-Oriented Modeling Technique, Kenneth Kofi Fletcher

Masters Theses

"Security continues to be a major challenge for cloud computing, and it is one that must be addressed if cloud computing is to be fully accepted. Most technological means of securing non-cloud computing systems can be either applied directly or modified to secure a cloud; however, no integrated model-based methodology is yet available to analyze cloud security requirements and develop policy to deal with both internal and external security challenges. This work proposes just such a methodology and demonstrates its application with specific cases. Cloud assets are represented by high order object models, and misuse cases together with malactivity swimlane …


Event Detection From Click-Through Data Via Query Clustering, Prabhu Kumar Angajala Jan 2010

Event Detection From Click-Through Data Via Query Clustering, Prabhu Kumar Angajala

Masters Theses

"The web is an index of real-world events and lot of knowledge can be mined from the web resources and their derivatives. Event detection is one recent research topic triggered from the domain of web data mining with the increasing popularity of search engines. In the visitor-centric approach, the click-through data generated by the web search engines is the start up resource with the intuition: often such data is event-driven. In this thesis, a retrospective algorithm is proposed to detect such real-world events from the click-through data. This approach differs from the existing work as it: (i) considers the click-through …


Population Control In Evolutionary Algorithms, Jason Edward Cook Jan 2010

Population Control In Evolutionary Algorithms, Jason Edward Cook

Masters Theses

"Traditional evolutionary algorithms (EAs) are powerful robust problem solvers that have several fixed parameters which require prior specification. Having to determine good values for any of these parameters can be problematic, as the performance of EAs is generally very sensitive to these parameters, requiring expert knowledge to set optimally without extensive use of trial and error. Parameter control is a promising approach to achieving this automation and has the added potential of increasing EA performance based on both theoretical and empirical evidence that the optimal values of EA strategy parameters change during the course of executing an evolutionary run. While …


Multi Axis Slicing For Rapid Prototyping, Divya Kanakanala Jan 2010

Multi Axis Slicing For Rapid Prototyping, Divya Kanakanala

Masters Theses

"With multi-axis capability, direct laser deposition process can produce a metal part without the usage of support structures. In order to fully utilize such a capability, a slicing method for multi-axis metal deposition process is discussed. Using the geometry information of adjacent layers, the slicing direction and layer thickness can be changed as needed. A hierarchy structure is designed to manage the topological information which is used to determine the slicing sequence. The parallel slicing process is studied to build hollow type structure. With such a character, the hole like feature can be deposited directly to save the required machining …


Intelligent Computational Argumentation For Evaluating Performance Scores In Multi-Criteria Decision Making, Rubal Wanchoo Jan 2010

Intelligent Computational Argumentation For Evaluating Performance Scores In Multi-Criteria Decision Making, Rubal Wanchoo

Masters Theses

"Multi Criteria Decision Making (MCDM) is a discipline aimed at assisting multiple stakeholders in contemplating a decision paradigm in an uncertain environment. The decision analysis to be performed involves numerous alternative positions assessed under varied criterion. A performance score is assigned for each alternative in terms of every criterion and it represents satisfaction of the criteria by that alternative. In a collaborative decision making environment, performance scores are either obtained when a consensus can be reached among stakeholders on a particular score or in some cases or controversial when stakeholders do not agree with each other about them. In the …


Dynamic Ant Colony Optimization For Globally Optimizing Consumer Preferences, Pavitra Dhruvanarayana Jan 2010

Dynamic Ant Colony Optimization For Globally Optimizing Consumer Preferences, Pavitra Dhruvanarayana

Masters Theses

"Consumer preference for any product or product feature can be expressed in the form of a utility function. Many such utility functions form a part of a preference map, where each of these are expressed in terms of the attributes defining the product or the product feature. In order to optimize the design, it is required to optimize the overall utility function obtained by a mathematical combination of individual utility functions defined in the preference map. The objective of this research is to devise and implement an algorithm to optimize all the individual utility functions comprised in a preference map …


Developing A Model For Evaluating Software Tools In Education, Vedant Jain Jan 2010

Developing A Model For Evaluating Software Tools In Education, Vedant Jain

Masters Theses

"This thesis proposes a research model to evaluate computer-mediated learning technology, user acceptance of the technology, and the effect of the technology on learning outcomes. This thesis also introduces two innovative research techniques for such evaluations, that is, eye-tracking and the think aloud protocol. Think aloud protocol allows us to understand a user's state of mind while he/she is interacting with the system. Eye-tracking provides additional insights into a user's cognitive state while using the system and can help triangulate the results. We demonstrated the application of the research model and research techniques in evaluating visualization software designed in a …