Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,202 Full-Text Articles 71,984 Authors 23,183,657 Downloads 375 Institutions

All Articles in Computer Sciences

Faceted Search

55,202 full-text articles. Page 1676 of 2009.

Automatic Detection Of Abnormal Behavior In Computing Systems, James Frank Roberts 2013 University of Kentucky

Automatic Detection Of Abnormal Behavior In Computing Systems, James Frank Roberts

Theses and Dissertations--Computer Science

I present RAACD, a software suite that detects misbehaving computers in large computing systems and presents information about those machines to the system administrator. I build this system using preexisting anomaly detection techniques. I evaluate my methods using simple synthesized data, real data containing coerced abnormal behavior, and real data containing naturally occurring abnormal behavior. I find that the system adequately detects abnormal behavior and significantly reduces the amount of uninteresting computer health data presented to a system administrator.


A Novel Computational Framework For Transcriptome Analysis With Rna-Seq Data, Yin Hu 2013 University of Kentucky

A Novel Computational Framework For Transcriptome Analysis With Rna-Seq Data, Yin Hu

Theses and Dissertations--Computer Science

The advance of high-throughput sequencing technologies and their application on mRNA transcriptome sequencing (RNA-seq) have enabled comprehensive and unbiased profiling of the landscape of transcription in a cell. In order to address the current limitation of analyzing accuracy and scalability in transcriptome analysis, a novel computational framework has been developed on large-scale RNA-seq datasets with no dependence on transcript annotations. Directly from raw reads, a probabilistic approach is first applied to infer the best transcript fragment alignments from paired-end reads. Empowered by the identification of alternative splicing modules, this framework then performs precise and efficient differential analysis at automatically detected …


Towards An Early Software Estimation Using Log-Linear Regression And A Multilayer Perceptron Model, Ali Bou Nassif, NFA-Estimation, Luiz Fernando Capretz 2013 University of Western Ontario

Towards An Early Software Estimation Using Log-Linear Regression And A Multilayer Perceptron Model, Ali Bou Nassif, Nfa-Estimation, Luiz Fernando Capretz

Electrical and Computer Engineering Publications

Software estimation is a tedious and daunting task in project management and software development. Software estimators are notorious in predicting software effort and they have been struggling in the past decades to provide new models to enhance software estimation. The most critical and crucial part of software estimation is when estimation is required in the early stages of the software life cycle where the problem to be solved has not yet been completely revealed. This paper presents a novel log-linear regression model based on the use case point model (UCP) to calculate the software effort based on use case diagrams. …


Physical Unclonable Function Techniques Applied For Digital Hardware Protection, Anthony Barrera 2013 CUNY City College

Physical Unclonable Function Techniques Applied For Digital Hardware Protection, Anthony Barrera

Dissertations and Theses

"Privacy is an important property that is growing harder to keep as people develop new ways to steal information from users on their computers. Software alone cannot ensure privacy since an infected system is untrustworthy. This paper presents several challenges malware brings that can be solved by using an external processor. Techniques such as keystroke encryption and message authentication can be used to protect users from having their passwords and other private data stolen. To take advantage of the external hardware, a physical unclonable function can be used to generate private keys without the need for storing them in memory. …


Discrete Transforms With Good Time-Frequency And Spatial-Frequency Localization, David Chisholm 2013 CUNY City College

Discrete Transforms With Good Time-Frequency And Spatial-Frequency Localization, David Chisholm

Dissertations and Theses

Discrete orthonormal time-frequency basis functions are described and used for both analysis and synthesis of complex-valued signals. We derive expressions for complex-valued expansion coefficients in time-frequency lattices in the discrete one dimensional case. This derivation is based on Professor I. Gertner's previous construction of a complete orthonormal set of basis functions well localized in the temporal-spatial-frequency domain in the continuous case. We describe how these can be generalized to any number of dimensions. Example applications are presented in one and two dimensions. Three dimensional basis functions are visualized and discussed. Finally, a full a Matlab implementation of this work is …


A Semantics-Based Approach To Machine Perception, Cory Andrew Henson 2013 Wright State University

A Semantics-Based Approach To Machine Perception, Cory Andrew Henson

Browse all Theses and Dissertations

Machine perception can be formalized using semantic web technologies in order to derive abstractions from sensor data using background knowledge on the Web, and efficiently executed on resource-constrained devices. Advances in sensing technology hold the promise to revolutionize our ability to observe and understand the world around us. Yet the gap between observation and understanding is vast. As sensors are becoming more advanced and cost-effective, the result is an avalanche of data of high volume, velocity, and of varied type, leading to the problem of too much data and not enough knowledge (i.e., insights leading to actions). Current estimates predict …


Mining Diversified Decision Trees Across Multiple Datasets To Capture Similarities And Alignable Differences, Qian Han 2013 Wright State University

Mining Diversified Decision Trees Across Multiple Datasets To Capture Similarities And Alignable Differences, Qian Han

Browse all Theses and Dissertations

This dissertation studies the problem of mining shared and alignable difference knowledge structures across multiple datasets/applications. Shared and alignable difference knowledge structures are important for identifying analogies between application domains and for forming new hypothesis in challenging research applications, and for assessing the degree and types of knowledge-level similarities and differences between application domains for use in learning transfer. Generally speaking, shared knowledge structures characterize underlying datasets and highlight conceptual-level structural similarities among the datasets. This dissertation studies the mining of shared decision trees, which are a special type of shared knowledge structures. We first consider building one shared decision …


Rssi Based Indoor Localization For Smartphone Using Fixed And Mobile Wireless Node, Md O. Gani, Casey O'Brien, Sheikh Iqbal Ahamed, Roger O. Smith 2013 Marquette University

Rssi Based Indoor Localization For Smartphone Using Fixed And Mobile Wireless Node, Md O. Gani, Casey O'Brien, Sheikh Iqbal Ahamed, Roger O. Smith

Mathematics, Statistics and Computer Science Faculty Research and Publications

Nowadays with the dispersion of wireless networks, smartphones and diverse related services, different localization techniques have been developed. Global Positioning System (GPS) has a high rate of accuracy for outdoor localization but the signal is not available inside of buildings. Also other existing methods for indoor localization have low accuracy. In addition, they use fixed infrastructure support. In this paper, we present a novel system for indoor localization, which also works well outside. We have developed a mathematical model for estimating location (distance and direction) of a mobile device using wireless technology. Our experimental results on Smartphones (Android and iOS) …


Cross‐Campus Collaboration: A Scientometric And Network Case Study Of Publication Activity Across Two Campuses Of A Single Institution, Jeremy Birnholtz, Shion Guha, Y. Connie Yuan, Geri Gay, Caren Heller 2013 Cornell University

Cross‐Campus Collaboration: A Scientometric And Network Case Study Of Publication Activity Across Two Campuses Of A Single Institution, Jeremy Birnholtz, Shion Guha, Y. Connie Yuan, Geri Gay, Caren Heller

Mathematics, Statistics and Computer Science Faculty Research and Publications

Team science and collaboration have become crucial to addressing key research questions confronting society. Institutions that are spread across multiple geographic locations face additional challenges. To better understand the nature of cross‐campus collaboration within a single institution and the effects of institutional efforts to spark collaboration, we conducted a case study of collaboration at Cornell University using scientometric and network analyses. Results suggest that cross‐campus collaboration is increasingly common, but is accounted for primarily by a relatively small number of departments and individual researchers. Specific researchers involved in many collaborative projects are identified, and their unique characteristics are described. Institutional …


Visual Semantic Segmentation And Its Applications, Jizhou Gao 2013 University of Kentucky

Visual Semantic Segmentation And Its Applications, Jizhou Gao

Theses and Dissertations--Computer Science

This dissertation addresses the difficulties of semantic segmentation when dealing with an extensive collection of images and 3D point clouds. Due to the ubiquity of digital cameras that help capture the world around us, as well as the advanced scanning techniques that are able to record 3D replicas of real cities, the sheer amount of visual data available presents many opportunities for both academic research and industrial applications. But the mere quantity of data also poses a tremendous challenge. In particular, the problem of distilling useful information from such a large repository of visual data has attracted ongoing interests in …


California State University, San Bernardino Managing Cloud Computing Resources With Cloudstack Using Kvm Hypervisor, Ian Buckner Jacobs 2013 California State University, San Bernardino

California State University, San Bernardino Managing Cloud Computing Resources With Cloudstack Using Kvm Hypervisor, Ian Buckner Jacobs

Theses Digitization Project

The purpose of this project is to present a detailed description of the Enterprise Cloud Computing implementation of CloudStack using KVM. It will explain the purpose and features of the system, the interfaces of the system, what the system will do, and the constraints or limitations implementing CloudStack with the hardware available for this study.


Gradebadge: Development Of A Cloud-Based Reward Application, Erwin Toni Soekianto 2013 California State University, San Bernardino

Gradebadge: Development Of A Cloud-Based Reward Application, Erwin Toni Soekianto

Theses Digitization Project

The purpose of this project is to investigate the use of cloud-based services to deliver cutting edge applications. For this purpose, a prototype of a reward application using badges, called Gradebadge, was developed to illustrate and explore this emerging paradigm.


Stereotactic Localization And Targeting Accuracy For Experimental Proton Radiosurgery, Yin Chen 2013 California State University, San Bernardino

Stereotactic Localization And Targeting Accuracy For Experimental Proton Radiosurgery, Yin Chen

Theses Digitization Project

The purpose of this study was to improve an existing experimental proton radiosurgery system at Loma Linda University Medical Center to reach sub-millimeter accuracy before proton radiosurgery with narrow beams can be used in a clinical trial. Protons, different from photons (i.e., x-rays or gamma rays), are charged with particles that slow down in matter and release a burst of energy near the end of their range (maximum depth of penetration), which is called the Bragg peak, named after the physicist William Henry Bragg who discovered it in 1903. Photon beams deliver most doses over a large area near the …


Use Of General Purpose Graphical Processing Units In Blowfish Encryption Algorithm, Cankat Duman 2013 California State University, San Bernardino

Use Of General Purpose Graphical Processing Units In Blowfish Encryption Algorithm, Cankat Duman

Theses Digitization Project

The purpose of this project is to present the findings of the work that has been completed on exploring the possibilities of speedup gained when using General Purpose Graphical Processing Units for the Blowfish encryption algorithm with the use of the CUDA (Computer Unified Device Architecture) programming language and architecture.


Alternative Hull Detection Techniques For Preprocessing In Proton Computed Tomography Reconstruction, Blake Edward Schultze 2013 California State University, San Bernardino

Alternative Hull Detection Techniques For Preprocessing In Proton Computed Tomography Reconstruction, Blake Edward Schultze

Theses Digitization Project

The purpose of this study was to develop computationally efficient hull detection techniques appropriate for image reconstruction using sparse matrices. The hull detection techniques investigated were space carving (SC), modified space carving (MSC), and space modeling (SM) and these were compared to the cone-beam version of filtered back projection (FBP) algorithm in terms of their computation time and the quality of the object hull they produced.


Fiducial-Free Alignment Verification Techniques For Intracranial Radiosurgery, Kenneth Matthew Williams 2013 California State University, San Bernardino

Fiducial-Free Alignment Verification Techniques For Intracranial Radiosurgery, Kenneth Matthew Williams

Theses Digitization Project

This thesis serves as the basis for a method using image registration to automate patient alignment in an effort to eliminate the dependency on the fiducial markers as well as improve the accuracy efficiency of the alignment process. Proton beams are an external beam modality of radiation therapy that can be used effectively for radiosurgical applications due to the dosimetry advantage of the Bragg peak. The Bragg peak is a phenomenon exploited by proton beam therapy to concentrate the effect of the beams on the tumor while minimizing damage to critical structures and other health tissues within the patient.


Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough 2013 California State University, San Bernardino

Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough

Theses Digitization Project

The purpose of this study is that formalized policy specifications and focused penetration testing are needed to effectively audit any information system. Designing and maintaining the security system information is the primary duty of the cyber security professional. In today's world, nearly all government agencies manage some form of financial, defense, national security, and/or privacy information security policies. It is also necessary in this environment that agencies are accountable for auditing the security systems that protect this information.


The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In 2013 California State University, San Bernardino

The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In

Theses Digitization Project

The purpose of this project is to introduce and analyze a thin client solution that could enhance the overall Department of Defense (DoD) network system as well as its IT security posture, minimize risk from external threats, and ease of network operations.


Asynchronous Cellular Automata, Kelechi Chidi Anuforo 2013 California State University, San Bernardino

Asynchronous Cellular Automata, Kelechi Chidi Anuforo

Theses Digitization Project

This study will investigate floating-point asynchronous cellular automata models implemented on Field-Programmable Gate Array (FPGA). It includes single grid and random schedules for individual cells. Cellular automata (CA) are basic representations of calculations that show interesting elaborate responses.


Quantum Cryptography, Razvan Augustin Dinu 2013 California State University, San Bernardino

Quantum Cryptography, Razvan Augustin Dinu

Theses Digitization Project

This study builds a case for using a quantum computer for solving cryptographic problems. It looks at the quantum turing machine concept, explores why use quantum computers and presents Deutsch's problem which allows one to select from amongst the parallel paths a quantum computer calculates.


Digital Commons powered by bepress