Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2010

Discipline
Institution
Keyword
Publication
File Type

Articles 1 - 30 of 484

Full-Text Articles in Computer Sciences

P300-Based Bci Performance Prediction Through Examination Of Paradigm Manipulations And Principal Components Analysis., Nicholas Edward Schwartz Dec 2010

P300-Based Bci Performance Prediction Through Examination Of Paradigm Manipulations And Principal Components Analysis., Nicholas Edward Schwartz

Electronic Theses and Dissertations

Severe neuromuscular disorders can produce locked-in syndrome (LIS), a loss of nearly all voluntary muscle control. A brain-computer interface (BCI) using the P300 event-related potential provides communication that does not depend on neuromuscular activity and can be useful for those with LIS. Currently, there is no way of determining the effectiveness of P300-based BCIs without testing a person's performance multiple times. Additionally, P300 responses in BCI tasks may not resemble the typical P300 response. I sought to clarify the relationship between the P300 response and BCI task parameters and examine the possibility of a predictive relationship between traditional oddball tasks …


Capture And Access Of Multiple Screen Presentations, Kelv H. Cutler Dec 2010

Capture And Access Of Multiple Screen Presentations, Kelv H. Cutler

Theses and Dissertations

Knowledge transferred during meetings is often ephemeral in nature and thus must be captured if it is to be retained. Ideally, a capture solution should be able to 1) accommodate any number of screens without sacrificing image quality and 2) allow dynamic access to a complete media capture while the capture is taking place. Both students and employees can benefit from the information captured during the lectures and meetings for enhanced discussion and afterward for knowledge retention. Current systems do not support multiple screen capture well, and no system supports dynamic access to the active meeting capture during the meeting. …


Advanced Topics On State Complexity Of Combined Operations, Yuan Gao Dec 2010

Advanced Topics On State Complexity Of Combined Operations, Yuan Gao

Electronic Thesis and Dissertation Repository

State complexity is a fundamental topic in formal languages and automata theory. The study of state complexity is also strongly motivated by applications of finite automata in software engineering, programming languages, natural language and speech processing and other practical areas. Since many of these applications use automata of large sizes, it is important to know the number of states of the automata. In this thesis, we firstly discuss the state complexities of individual operations on regular languages, including union, intersection, star, catenation, reversal and so on. The state complexity of an operation on unary languages is usually different from that …


A Reusable Persistence Framework For Replicating Empirical Studies On Data From Open Source Repositories, Scott Bong-Soo Chun Dec 2010

A Reusable Persistence Framework For Replicating Empirical Studies On Data From Open Source Repositories, Scott Bong-Soo Chun

Theses and Dissertations

Empirical research is inexact and error-prone leading researchers to agree that replication of experiments is a necessary step to validating empirical results. Unfortunately, replicating experiments requires substantial investments in manpower and time. These resource requirements can be reduced by incorporating component reuse when building tools for empirical experimentation. Bokeo is an initiative within the Sequoia Lab of the BYU Computer Science Department to develop a platform to assist in the empirical study of software engineering. The i3Persistence Framework is a component of Bokeo which enables researchers to easily build and rapidly deploy tools for empirical experiments by providing an easy-to-use …


Evaluation Real-Time Data Warehousing Challenges From A Theoretical And Practical Perspective, Dale Hargens Dec 2010

Evaluation Real-Time Data Warehousing Challenges From A Theoretical And Practical Perspective, Dale Hargens

Regis University Student Publications (comprehensive collection)

The concept of real-time data warehousing has grown in popularity in recent years as organizations demand access to critical pieces of data in real-time to produce analytics and make business decisions to gain competitive advantage. Real-time data warehousing systems differ substantially from traditional data warehousing systems, thus, presenting a unique set of organizational and operational challenges. The basis for the research was to investigate whether adequate information is available regarding the organizational and operational challenges of real-time data warehousing and whether that information is available to the database community. This exploration was done by gathering primary research, conducting a case …


Dynamic Data Driven Application System For Wildfire Spread Simulation, Feng Gu Dec 2010

Dynamic Data Driven Application System For Wildfire Spread Simulation, Feng Gu

Computer Science Dissertations

Wildfires have significant impact on both ecosystems and human society. To effectively manage wildfires, simulation models are used to study and predict wildfire spread. The accuracy of wildfire spread simulations depends on many factors, including GIS data, fuel data, weather data, and high-fidelity wildfire behavior models. Unfortunately, due to the dynamic and complex nature of wildfire, it is impractical to obtain all these data with no error. Therefore, predictions from the simulation model will be different from what it is in a real wildfire. Without assimilating data from the real wildfire and dynamically adjusting the simulation, the difference between the …


A Framework For Group Modeling In Agent-Based Pedestrian Crowd Simulations, Fasheng Qiu Dec 2010

A Framework For Group Modeling In Agent-Based Pedestrian Crowd Simulations, Fasheng Qiu

Computer Science Dissertations

Pedestrian crowd simulation explores crowd behaviors in virtual environments. It is extensively studied in many areas, such as safety and civil engineering, transportation, social science, entertainment industry and so on. As a common phenomenon in pedestrian crowds, grouping can play important roles in crowd behaviors. To achieve more realistic simulations, it is important to support group modeling in crowd behaviors. Nevertheless, group modeling is still an open and challenging problem. The influence of groups on the dynamics of crowd movement has not been incorporated into most existing crowd models because of the complexity nature of social groups. This research develops …


Web-Based Ide To Create Model And Controller Components For Mvc-Based Web Applications On Cakephp, Sugiharto Widjaja Dec 2010

Web-Based Ide To Create Model And Controller Components For Mvc-Based Web Applications On Cakephp, Sugiharto Widjaja

Master's Projects

A Web-based IDE that allows users to easily manage Model and Controller components of a CakePHP web application was developed. With this IDE, users are able to manage the model and controller components without having to write very much PHP code. They are able to create new model components without having to worry about creating the database tables for the models as the IDE creates them automatically. The IDE offers a simple interface for users to edit the schema of their models. Users can add or delete data from their models without dealing with the SQL insert/delete statements. The IDE …


Trusted Mobile Overlays, Robert Scott Robertson Dec 2010

Trusted Mobile Overlays, Robert Scott Robertson

Theses and Dissertations

Sensitive information is increasingly moving online and as data moves further from the control of its owner, there are increased opportunities for it to fall into malicious hands. The Web is comprised of three untrusted components where there is a risk of information compromise: networks, service providers, and clients. This thesis presents Trusted Mobile Overlays: a system that leverages trusted mobile devices to protect users from these untrusted components of the Web, while minimizing deployment difficulties. It presents a high-level design of the system as well as a prototype that implements the design.


Preventing Computer Identity Theft, Donald R. Mcdaniel Dec 2010

Preventing Computer Identity Theft, Donald R. Mcdaniel

Regis University Student Publications (comprehensive collection)

The arrival of the information age has created new challenges to the ability of individuals to protect the security and privacy of their personal information. One such challenge is that of identity theft, which has caused a number of hardships upon its victims. Perpetrators of this fraud may use identities of others to obtain loans, steal money, and violate the law. This paper will discuss the characteristics of the offenders and victims of identity theft. A systematic approach for preventing identity theft will also be presented with the hopes of curtailing this epidemic.


Gene Network Inference And Expression Prediction Using Recurrent Neural Networks And Evolutionary Algorithms, Heather Y. Chan Dec 2010

Gene Network Inference And Expression Prediction Using Recurrent Neural Networks And Evolutionary Algorithms, Heather Y. Chan

Theses and Dissertations

We demonstrate the success of recurrent neural networks in gene network inference and expression prediction using a hybrid of particle swarm optimization and differential evolution to overcome the classic obstacle of local minima in training recurrent neural networks. We also provide an improved validation framework for the evaluation of genetic network modeling systems that will result in better generalization and long-term prediction capability. Success in the modeling of gene regulation and prediction of gene expression will lead to more rapid discovery and development of therapeutic medicine, earlier diagnosis and treatment of adverse conditions, and vast advancements in life science research.


Test-Driven Web Application Development: Increasing The Quality Of Web Development By Providing Framework With An Emphasis On Test-Driven Design And Development Methodologies, Jason Hall Dec 2010

Test-Driven Web Application Development: Increasing The Quality Of Web Development By Providing Framework With An Emphasis On Test-Driven Design And Development Methodologies, Jason Hall

Regis University Student Publications (comprehensive collection)

Web applications , especially those based on interpreted programming languages , are quickly becoming more utilized and more commonplace than traditional client applications. Despite this growth, no open solution has yet fulfilled the need of a risk-reducing development framework that supports test-driven methodologies and tools designed to coordinate the resources responsible for the most effective development of web applications based on interpreted programming languages. This research paper presents a test-driven development framework consisting of openly available components that can be used by development teams writing web applications based on interpreted programming languages based on the methodologies and tools used by …


Asynchronous Database Drivers, Michael Adam Heath Dec 2010

Asynchronous Database Drivers, Michael Adam Heath

Theses and Dissertations

Existing database drivers use blocking socket I/O to exchange data with relational database management systems (RDBMS). To concurrently send multiple requests to a RDBMS with blocking database drivers, a separate thread must be used for each request. This approach has been used successfully for many years. However, we propose that using non-blocking socket I/O is faster and scales better under load. In this paper we introduce the Asynchronous Database Connectivity in Java (ADBCJ) framework. ADBCJ provides a common API for asynchronous RDBMS interaction. Various implementations of the ADBCJ API are used to show how utilizing non-blocking socket I/O is faster …


Drop-In Concurrent Api Replacement For Exploration, Test, And Debug, Everett Allen Morse Dec 2010

Drop-In Concurrent Api Replacement For Exploration, Test, And Debug, Everett Allen Morse

Theses and Dissertations

Complex concurrent APIs are difficult to reason about annually due to the exponential growth in the number of feasible schedules. Testing against reference solutions of these APIs is equally difficult as reference solutions implement an unknown set of allowed behaviors, and programmers have no way to directly control schedules or API internals to expose or reproduce errors. The work in this paper mechanically generates a drop-in replacement for a concurrent API from a formal specification. The specification is a guarded command system with first-order logic that is compiled into a core calculus. The term rewriting system is connected to actual …


A Type Analysis Of Rewrite Strategies, Azamat Mametjanov Dec 2010

A Type Analysis Of Rewrite Strategies, Azamat Mametjanov

Student Work

Rewrite strategies provide an algorithmic rewriting of terms using strategic compositions of rewrite rules. Due to the programmability of rewrites, errors are often made due to incorrect compositions of rewrites or incorrect application of rewrites to a term within a strategic rewriting program. In practical applications of strategic rewriting, testing and debugging becomes substantially time-intensive for large programs applied to large inputs derived from large term grammars. In essence, determining which rewrite in what position in a term did or did not re comes down to logging, tracing and/or di -like comparison of inputs to outputs. In this thesis, we …


A Visual Approach To Automated Text Mining And Knowledge Discovery, Andrey A. Puretskiy Dec 2010

A Visual Approach To Automated Text Mining And Knowledge Discovery, Andrey A. Puretskiy

Doctoral Dissertations

The focus of this dissertation has been on improving the non-negative tensor factorization technique of text mining. The improvements have been made in both pre-processing and post-processing stages, with the goal of making the non-negative tensor factorization algorithm accessible to the casual user. The improved implementation allows the user to construct and modify the contents of the tensor, experiment with relative term weights and trust measures, and experiment with the total number of algorithm output features. Non-negative tensor factorization output feature production is closely integrated with a visual post-processing tool, FutureLens, that allows the user to perform in depth analysis …


A Framework For Virtual Device Driver Development And Virtual Device-Based Performance Modeling, Zachary Jones Dec 2010

A Framework For Virtual Device Driver Development And Virtual Device-Based Performance Modeling, Zachary Jones

All Dissertations

Operating system virtualization tools such as VMWare, XEN, and Linux KVM export only minimally capable SVGA graphics adapters. This paper describes the design and implementation of system
that virtualizes high-performance graphics cards of arbitrary design to support the construction of authentic device drivers. Drivers written for the virtual cards can be used verbatim, without special function calls or kernel modifications, as drivers for real cards, should real cards of the same design exist. While this allows for arbitrary design, it is not able to model performance characteristics. We describe a new kernel system that allows for arbitrarily changing the performance …


Evolutionary Strategies For Data Mining, Rose Lowe Dec 2010

Evolutionary Strategies For Data Mining, Rose Lowe

All Dissertations

Learning classifier systems (LCS) have been successful in generating rules for solving classification problems in data mining. The rules are of the form IF condition THEN action. The condition encodes the features of the input space and the action encodes the class label. What is lacking in those systems is the ability to express each feature using a function that is appropriate for that feature. The genetic algorithm is capable of doing this but cannot because only one type of membership function
is provided. Thus, the genetic algorithm learns only the shape and placement of the membership function, and in …


An Evolutionary Approach To Optimization Of Compound Stock Trading Indicators Used To Confirm Buy Signals, Allan W. Teeples Dec 2010

An Evolutionary Approach To Optimization Of Compound Stock Trading Indicators Used To Confirm Buy Signals, Allan W. Teeples

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

This thesis examines the application of genetic algorithms to the optimization of a composite set of technical indicator filters to confirm or reject buy signals in stock trading, based on probabilistic values derived from historical data. The simplicity of the design, which gives each filter within the composite filter the ability to act independently of the other filters, is outlined, and the cumulative indirect effect each filter has on all the others is discussed. This system is contrasted with the complexity of systems from previous research that attempt to merge several indicator filters together by giving each one a weight …


Analysis Of A Database Insider Threat Model, Andrea Samuel Dec 2010

Analysis Of A Database Insider Threat Model, Andrea Samuel

Computer Science and Computer Engineering Undergraduate Honors Theses

According to Silicon.com's CIO Insight - Beware the Insider Security Threat, insiders are bigger threats to corporate security than external threats such as denial of service attacks or malware. Statistics show that 70% of fraud is perpetrated by staff and that the main data security threat comes from poorly trained or disgruntled employees who are authorized to have access to data and file stores [4]. This research project focuses specifically on the problem of insider threat in relational database systems. The project involves simulating research conducted in Qussai Yaseen and Brajendra Panda's research paper, Predicting and Preventing Insider Threat in …


Geophysical Study At Old Stone Fort State Archaeological Park, Manchester, Tennessee, Stephen Jay Yerka Dec 2010

Geophysical Study At Old Stone Fort State Archaeological Park, Manchester, Tennessee, Stephen Jay Yerka

Masters Theses

The Old Stone Fort State Archaeological Park covers over 800 acres within Manchester, Tennessee, and is owned and managed by the Tennessee Division of State Parks. The central archaeological site within the park boundary is The Old Stone Fort mounds that enclose about 50 acres on a plateau above the convergence of the Big Duck and the Little Duck Rivers. The hilltop enclosure dates to the Middle Woodland Period, and radiocarbon dates obtained at the site range from the first to the fifth century A. D. Because of its size and apparent complexity, previous investigations of the site have been …


Efficacy Of The United States Safe Harbor Framework, Margaret M. Beck Dec 2010

Efficacy Of The United States Safe Harbor Framework, Margaret M. Beck

Regis University Student Publications (comprehensive collection)

This study assessed the efficacy of the United States Safe Harbor Framework by approximating the size of a population of large United States organizations (50,000 - 500,000 employees) that were eligible to participate in the Safe Harbor that did not participate. The Safe Harbor Framework, administered by the United States Department of Commerce, is a voluntary program that assists United States organizations in complying with the European Union Data Privacy Directive. Out of a population of 337 large organizations, 168 were potentially eligible to participate in the Safe Harbor Framework. One hundred and ten, or 66%, of these organizations did …


Two Essays On The Accounting Treatment For Information Technology Expenditures, Kimberly Swanson Church Dec 2010

Two Essays On The Accounting Treatment For Information Technology Expenditures, Kimberly Swanson Church

Graduate Theses and Dissertations

The current accounting measurement and reporting system is ill-equipped to provide intangible investment information that is decision useful for stakeholders in the information economy. Potentially relevant intangible items are not reported on the balance sheet, since current standards mandate the immediate expensing of these intangible items. Presumably FASB's uncertainty with the fundamental issues of extent and timing of future benefits to the firm has led to concerns with relevance, reliability, and objectivity of capitalizing some intangibles, which results in potential long term value generating expenditures being immediately expensed on the income statement. Prior research has demonstrated extent and timing of …


Stereo Matching Using A Modified Efficient Belief Propagation In A Level Set Framework, Stephen Goyer Rogers Dec 2010

Stereo Matching Using A Modified Efficient Belief Propagation In A Level Set Framework, Stephen Goyer Rogers

Dissertations

Stereo matching determines correspondence between pixels in two or more images of the same scene taken from different angles; this can be handled either locally or globally. The two most common global approaches are belief propagation (BP) and graph cuts.

Efficient belief propagation (EBP), which is the most widely used BP approach, uses a multi-scale message passing strategy, an O(k) smoothness cost algorithm, and a bipartite message passing strategy to speed up the convergence of the standard BP approach. As in standard belief propagation, every pixel sends messages to and receives messages from its four neighboring pixels in EBP. Each …


Learning-Based Fusion For Data Deduplication: A Robust And Automated Solution, Jared Dinerstein Dec 2010

Learning-Based Fusion For Data Deduplication: A Robust And Automated Solution, Jared Dinerstein

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

This thesis presents two deduplication techniques that overcome the following critical and long-standing weaknesses of rule-based deduplication: (1) traditional rule-based deduplication requires significant manual tuning of the individual rules, including the selection of appropriate thresholds; (2) the accuracy of rule-based deduplication degrades when there are missing data values, significantly reducing the efficacy of the expert-defined deduplication rules.

The first technique is a novel rule-level match-score fusion algorithm that employs kernel-machine-based learning to discover the decision threshold for the overall system automatically. The second is a novel clue-level match-score fusion algorithm that addresses both Problem 1 and 2. This unique solution …


Novel Approaches To Image Segmentation Based On Neutrosophic Logic, Ming Zhang Dec 2010

Novel Approaches To Image Segmentation Based On Neutrosophic Logic, Ming Zhang

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Neutrosophy studies the origin, nature, scope of neutralities, and their interactions with different ideational spectra. It is a new philosophy that extends fuzzy logic and is the basis of neutrosophic logic, neutrosophic probability, neutrosophic set theory, and neutrosophic statistics.

Because the world is full of indeterminacy, the imperfection of knowledge that a human receives/observes from the external world also causes imprecision. Neutrosophy introduces a new concept , which is the representation of indeterminacy. However, this theory is mostly discussed in physiology and mathematics. Thus, applications to prove this theory can solve real problems are needed.

Image segmentation is the first …


Batch Testing, Adaptive Algorithms, And Heuristic Applications For Stable Marriage Problems, John Dabney Dec 2010

Batch Testing, Adaptive Algorithms, And Heuristic Applications For Stable Marriage Problems, John Dabney

All Dissertations

In this dissertation we focus on different variations of the stable matching (marriage) problem, initially posed by Gale and Shapley in 1962. In this problem, preference lists are used to match n men with n women in such a way that no (man, woman) pair exists that would both prefer each other over their current partners. These two would be considered a blocking pair, preventing a matching from being considered stable. In our research, we study three different versions of this problem.
First, we consider batch testing of stable marriage solutions. Gusfield and Irving presented an open problem in their …


A Ptas For The Uncertain Capacity Knapsack Problem, Matthew Dabney Dec 2010

A Ptas For The Uncertain Capacity Knapsack Problem, Matthew Dabney

All Theses

The standard NP-hard knapsack problem can be interpreted as a scheduling problem with n jobs with weights w1 . . .wn and processing times p1 . . . pn, where our goal is to order the jobs on a single machine so as to maximize the weight of all jobs completing prior to a known common deadline d. In this paper, we study the uncertain capacity knapsack problem (UCKP), a generalization of this problem in which the deadline d is not known with certainty, but rather is provided as a probability distribution, and our goal …


Approximation Algorithms For Network Interdiction And Fortification Problems, Adam Whitley Dec 2010

Approximation Algorithms For Network Interdiction And Fortification Problems, Adam Whitley

All Dissertations

This dissertation discusses algorithms and results on several NP–hard graph problems which can all be classified as network interdiction and network fortification problems.
The first problem studied, the multiway cut problem, is a generalization of the well–studied s–t min–cut problem, in which we must remove a minimum–cost subset of edges from a graph so that r > 2 designated terminals become disconnected from each other. We investigate an approximation algorithm for general r with a relatively simple analysis guaranteeing an approximation ratio ≤ 1.4647 − epsilonr, where epsilonr is a small constant related to the number of terminals …


A Reasoning Framework For Dependability In Software Architectures, Tacksoo Im Dec 2010

A Reasoning Framework For Dependability In Software Architectures, Tacksoo Im

All Dissertations

The degree to which a software system possesses specified levels of software quality attributes, such as performance and modifiability, often have more influence on the success and failure of those systems than the functional requirements. One method of improving the level of a software quality that a product possesses is to reason about the structure of the software architecture in terms of how well the structure supports the quality. This is accomplished by reasoning through software quality attribute scenarios while designing the software architecture of the system.
As society relies more heavily on software systems, the dependability of those systems …