Automatic Detection Of Abnormal Behavior In Computing Systems, 2013 University of Kentucky
Automatic Detection Of Abnormal Behavior In Computing Systems, James Frank Roberts
Theses and Dissertations--Computer Science
I present RAACD, a software suite that detects misbehaving computers in large computing systems and presents information about those machines to the system administrator. I build this system using preexisting anomaly detection techniques. I evaluate my methods using simple synthesized data, real data containing coerced abnormal behavior, and real data containing naturally occurring abnormal behavior. I find that the system adequately detects abnormal behavior and significantly reduces the amount of uninteresting computer health data presented to a system administrator.
A Novel Computational Framework For Transcriptome Analysis With Rna-Seq Data, 2013 University of Kentucky
A Novel Computational Framework For Transcriptome Analysis With Rna-Seq Data, Yin Hu
Theses and Dissertations--Computer Science
The advance of high-throughput sequencing technologies and their application on mRNA transcriptome sequencing (RNA-seq) have enabled comprehensive and unbiased profiling of the landscape of transcription in a cell. In order to address the current limitation of analyzing accuracy and scalability in transcriptome analysis, a novel computational framework has been developed on large-scale RNA-seq datasets with no dependence on transcript annotations. Directly from raw reads, a probabilistic approach is first applied to infer the best transcript fragment alignments from paired-end reads. Empowered by the identification of alternative splicing modules, this framework then performs precise and efficient differential analysis at automatically detected …
Towards An Early Software Estimation Using Log-Linear Regression And A Multilayer Perceptron Model, 2013 University of Western Ontario
Towards An Early Software Estimation Using Log-Linear Regression And A Multilayer Perceptron Model, Ali Bou Nassif, Nfa-Estimation, Luiz Fernando Capretz
Electrical and Computer Engineering Publications
Software estimation is a tedious and daunting task in project management and software development. Software estimators are notorious in predicting software effort and they have been struggling in the past decades to provide new models to enhance software estimation. The most critical and crucial part of software estimation is when estimation is required in the early stages of the software life cycle where the problem to be solved has not yet been completely revealed. This paper presents a novel log-linear regression model based on the use case point model (UCP) to calculate the software effort based on use case diagrams. …
Physical Unclonable Function Techniques Applied For Digital Hardware Protection, 2013 CUNY City College
Physical Unclonable Function Techniques Applied For Digital Hardware Protection, Anthony Barrera
Dissertations and Theses
"Privacy is an important property that is growing harder to keep as people develop new ways to steal information from users on their computers. Software alone cannot ensure privacy since an infected system is untrustworthy. This paper presents several challenges malware brings that can be solved by using an external processor. Techniques such as keystroke encryption and message authentication can be used to protect users from having their passwords and other private data stolen. To take advantage of the external hardware, a physical unclonable function can be used to generate private keys without the need for storing them in memory. …
Discrete Transforms With Good Time-Frequency And Spatial-Frequency Localization, 2013 CUNY City College
Discrete Transforms With Good Time-Frequency And Spatial-Frequency Localization, David Chisholm
Dissertations and Theses
Discrete orthonormal time-frequency basis functions are described and used for both analysis and synthesis of complex-valued signals. We derive expressions for complex-valued expansion coefficients in time-frequency lattices in the discrete one dimensional case. This derivation is based on Professor I. Gertner's previous construction of a complete orthonormal set of basis functions well localized in the temporal-spatial-frequency domain in the continuous case. We describe how these can be generalized to any number of dimensions. Example applications are presented in one and two dimensions. Three dimensional basis functions are visualized and discussed. Finally, a full a Matlab implementation of this work is …
A Semantics-Based Approach To Machine Perception, 2013 Wright State University
A Semantics-Based Approach To Machine Perception, Cory Andrew Henson
Browse all Theses and Dissertations
Machine perception can be formalized using semantic web technologies in order to derive abstractions from sensor data using background knowledge on the Web, and efficiently executed on resource-constrained devices. Advances in sensing technology hold the promise to revolutionize our ability to observe and understand the world around us. Yet the gap between observation and understanding is vast. As sensors are becoming more advanced and cost-effective, the result is an avalanche of data of high volume, velocity, and of varied type, leading to the problem of too much data and not enough knowledge (i.e., insights leading to actions). Current estimates predict …
Mining Diversified Decision Trees Across Multiple Datasets To Capture Similarities And Alignable Differences, 2013 Wright State University
Mining Diversified Decision Trees Across Multiple Datasets To Capture Similarities And Alignable Differences, Qian Han
Browse all Theses and Dissertations
This dissertation studies the problem of mining shared and alignable difference knowledge structures across multiple datasets/applications. Shared and alignable difference knowledge structures are important for identifying analogies between application domains and for forming new hypothesis in challenging research applications, and for assessing the degree and types of knowledge-level similarities and differences between application domains for use in learning transfer. Generally speaking, shared knowledge structures characterize underlying datasets and highlight conceptual-level structural similarities among the datasets. This dissertation studies the mining of shared decision trees, which are a special type of shared knowledge structures. We first consider building one shared decision …
Rssi Based Indoor Localization For Smartphone Using Fixed And Mobile Wireless Node, 2013 Marquette University
Rssi Based Indoor Localization For Smartphone Using Fixed And Mobile Wireless Node, Md O. Gani, Casey O'Brien, Sheikh Iqbal Ahamed, Roger O. Smith
Mathematics, Statistics and Computer Science Faculty Research and Publications
Nowadays with the dispersion of wireless networks, smartphones and diverse related services, different localization techniques have been developed. Global Positioning System (GPS) has a high rate of accuracy for outdoor localization but the signal is not available inside of buildings. Also other existing methods for indoor localization have low accuracy. In addition, they use fixed infrastructure support. In this paper, we present a novel system for indoor localization, which also works well outside. We have developed a mathematical model for estimating location (distance and direction) of a mobile device using wireless technology. Our experimental results on Smartphones (Android and iOS) …
Cross‐Campus Collaboration: A Scientometric And Network Case Study Of Publication Activity Across Two Campuses Of A Single Institution, 2013 Cornell University
Cross‐Campus Collaboration: A Scientometric And Network Case Study Of Publication Activity Across Two Campuses Of A Single Institution, Jeremy Birnholtz, Shion Guha, Y. Connie Yuan, Geri Gay, Caren Heller
Mathematics, Statistics and Computer Science Faculty Research and Publications
Team science and collaboration have become crucial to addressing key research questions confronting society. Institutions that are spread across multiple geographic locations face additional challenges. To better understand the nature of cross‐campus collaboration within a single institution and the effects of institutional efforts to spark collaboration, we conducted a case study of collaboration at Cornell University using scientometric and network analyses. Results suggest that cross‐campus collaboration is increasingly common, but is accounted for primarily by a relatively small number of departments and individual researchers. Specific researchers involved in many collaborative projects are identified, and their unique characteristics are described. Institutional …
Visual Semantic Segmentation And Its Applications, 2013 University of Kentucky
Visual Semantic Segmentation And Its Applications, Jizhou Gao
Theses and Dissertations--Computer Science
This dissertation addresses the difficulties of semantic segmentation when dealing with an extensive collection of images and 3D point clouds. Due to the ubiquity of digital cameras that help capture the world around us, as well as the advanced scanning techniques that are able to record 3D replicas of real cities, the sheer amount of visual data available presents many opportunities for both academic research and industrial applications. But the mere quantity of data also poses a tremendous challenge. In particular, the problem of distilling useful information from such a large repository of visual data has attracted ongoing interests in …
California State University, San Bernardino Managing Cloud Computing Resources With Cloudstack Using Kvm Hypervisor, 2013 California State University, San Bernardino
California State University, San Bernardino Managing Cloud Computing Resources With Cloudstack Using Kvm Hypervisor, Ian Buckner Jacobs
Theses Digitization Project
The purpose of this project is to present a detailed description of the Enterprise Cloud Computing implementation of CloudStack using KVM. It will explain the purpose and features of the system, the interfaces of the system, what the system will do, and the constraints or limitations implementing CloudStack with the hardware available for this study.
Gradebadge: Development Of A Cloud-Based Reward Application, 2013 California State University, San Bernardino
Gradebadge: Development Of A Cloud-Based Reward Application, Erwin Toni Soekianto
Theses Digitization Project
The purpose of this project is to investigate the use of cloud-based services to deliver cutting edge applications. For this purpose, a prototype of a reward application using badges, called Gradebadge, was developed to illustrate and explore this emerging paradigm.
Stereotactic Localization And Targeting Accuracy For Experimental Proton Radiosurgery, 2013 California State University, San Bernardino
Stereotactic Localization And Targeting Accuracy For Experimental Proton Radiosurgery, Yin Chen
Theses Digitization Project
The purpose of this study was to improve an existing experimental proton radiosurgery system at Loma Linda University Medical Center to reach sub-millimeter accuracy before proton radiosurgery with narrow beams can be used in a clinical trial. Protons, different from photons (i.e., x-rays or gamma rays), are charged with particles that slow down in matter and release a burst of energy near the end of their range (maximum depth of penetration), which is called the Bragg peak, named after the physicist William Henry Bragg who discovered it in 1903. Photon beams deliver most doses over a large area near the …
Use Of General Purpose Graphical Processing Units In Blowfish Encryption Algorithm, 2013 California State University, San Bernardino
Use Of General Purpose Graphical Processing Units In Blowfish Encryption Algorithm, Cankat Duman
Theses Digitization Project
The purpose of this project is to present the findings of the work that has been completed on exploring the possibilities of speedup gained when using General Purpose Graphical Processing Units for the Blowfish encryption algorithm with the use of the CUDA (Computer Unified Device Architecture) programming language and architecture.
Alternative Hull Detection Techniques For Preprocessing In Proton Computed Tomography Reconstruction, 2013 California State University, San Bernardino
Alternative Hull Detection Techniques For Preprocessing In Proton Computed Tomography Reconstruction, Blake Edward Schultze
Theses Digitization Project
The purpose of this study was to develop computationally efficient hull detection techniques appropriate for image reconstruction using sparse matrices. The hull detection techniques investigated were space carving (SC), modified space carving (MSC), and space modeling (SM) and these were compared to the cone-beam version of filtered back projection (FBP) algorithm in terms of their computation time and the quality of the object hull they produced.
Fiducial-Free Alignment Verification Techniques For Intracranial Radiosurgery, 2013 California State University, San Bernardino
Fiducial-Free Alignment Verification Techniques For Intracranial Radiosurgery, Kenneth Matthew Williams
Theses Digitization Project
This thesis serves as the basis for a method using image registration to automate patient alignment in an effort to eliminate the dependency on the fiducial markers as well as improve the accuracy efficiency of the alignment process. Proton beams are an external beam modality of radiation therapy that can be used effectively for radiosurgical applications due to the dosimetry advantage of the Bragg peak. The Bragg peak is a phenomenon exploited by proton beam therapy to concentrate the effect of the beams on the tumor while minimizing damage to critical structures and other health tissues within the patient.
Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, 2013 California State University, San Bernardino
Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough
Theses Digitization Project
The purpose of this study is that formalized policy specifications and focused penetration testing are needed to effectively audit any information system. Designing and maintaining the security system information is the primary duty of the cyber security professional. In today's world, nearly all government agencies manage some form of financial, defense, national security, and/or privacy information security policies. It is also necessary in this environment that agencies are accountable for auditing the security systems that protect this information.
The Implementation Of A Thin Client In The Department Of Defense Network System, 2013 California State University, San Bernardino
The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In
Theses Digitization Project
The purpose of this project is to introduce and analyze a thin client solution that could enhance the overall Department of Defense (DoD) network system as well as its IT security posture, minimize risk from external threats, and ease of network operations.
Asynchronous Cellular Automata, 2013 California State University, San Bernardino
Asynchronous Cellular Automata, Kelechi Chidi Anuforo
Theses Digitization Project
This study will investigate floating-point asynchronous cellular automata models implemented on Field-Programmable Gate Array (FPGA). It includes single grid and random schedules for individual cells. Cellular automata (CA) are basic representations of calculations that show interesting elaborate responses.
Quantum Cryptography, 2013 California State University, San Bernardino
Quantum Cryptography, Razvan Augustin Dinu
Theses Digitization Project
This study builds a case for using a quantum computer for solving cryptographic problems. It looks at the quantum turing machine concept, explores why use quantum computers and presents Deutsch's problem which allows one to select from amongst the parallel paths a quantum computer calculates.