Hydrobase: An Iot Gardening Application, 2016 San Jose State University
Hydrobase: An Iot Gardening Application, Nandini Kant Goyal
As the world is moving towards urban agriculture, there are many IoT Hydroponic Control Systems being introduced these days. There are many different platforms emerging, but they all suffer from the same flaw, the software and hardware are so tightly integrated that most of the times the individuals have no freedom of how to use the product, or they need to completely hack the system. This brings us to the need of a system that is designed to allow the user more flexibility in platform configuration, as well as assist in platform construction. We propose a model called Hydrobase to ...
Agora: A Knowledge Marketplace For Machine Learning, 2016 The University of Western Ontario
Agora: A Knowledge Marketplace For Machine Learning, Mauro Ribeiro
Electronic Thesis and Dissertation Repository
More and more data are becoming part of people's lives. With the popularization of technologies like sensors, and the Internet of Things, data gathering is becoming possible and accessible for users. With these data in hand, users should be able to extract insights from them, and they want results as soon as possible. Average users have little or no experience in data analytics and machine learning and are not great observers who can collect enough data to build their own machine learning models. With large quantities of similar data being generated around the world and many machine learning models ...
Improving The Performance Of Ice Sheet Modeling Through Embedded Simulation, 2016 University of Maine
Improving The Performance Of Ice Sheet Modeling Through Embedded Simulation, Christopher G. Dufour
Electronic Theses and Dissertations
Understanding the impact of global climate change is a critical concern for society at large. One important piece of the climate puzzle is how large-scale ice sheets, such as those covering Greenland and Antarctica, respond to a warming climate. Given such ice sheets are under constant change, developing models that can accurately capture their dynamics represents a significant challenge to researchers. The problem, however, is properly capturing the dynamics of an ice sheet model requires a high model resolution and simulating these models is intractable even for state-of-the-art supercomputers.
This thesis presents a revolutionary approach to accurately capture ice sheet ...
Achieving High Reliability And Efficiency In Maintaining Large-Scale Storage Systems Through Optimal Resource Provisioning And Data Placement, 2016 University of Tennessee, Knoxville
Achieving High Reliability And Efficiency In Maintaining Large-Scale Storage Systems Through Optimal Resource Provisioning And Data Placement, Lipeng Wan
With the explosive increase in the amount of data being generated by various applications, large-scale distributed and parallel storage systems have become common data storage solutions and been widely deployed and utilized in both industry and academia. While these high performance storage systems significantly accelerate the data storage and retrieval, they also bring some critical issues in system maintenance and management. In this dissertation, I propose three methodologies to address three of these critical issues.
First, I develop an optimal resource management and spare provisioning model to minimize the impact brought by component failures and ensure a highly operational experience ...
A Feasible No-Root Approach On Android, 2016 Singapore Management University
A Feasible No-Root Approach On Android, Yao Cheng, Yingjiu Li, Deng, Robert H.
Research Collection School Of Information Systems
Root is the administrative privilege on Android, which is however inaccessible on stock Android devices. Due to the desire for privileged functionalities and the reluctance of rooting their devices, Android users seek for no-root approaches, which provide users with part of root privileges without rooting their devices. In this paper, we newly discover a feasible no-root approach based on the ADB loopback. To ensure such no-root approach is not misused proactively, we examine its dark side, including privacy leakage via logs and user input inference. Finally, we discuss the solutions and suggestions from different perspectives.
Optimizing Main Memory Usage In Modern Computing Systems To Improve Overall System Performance, 2016 Florida International University
Optimizing Main Memory Usage In Modern Computing Systems To Improve Overall System Performance, Daniel Jose Campello
FIU Electronic Theses and Dissertations
Operating Systems use fast, CPU-addressable main memory to maintain an application’s temporary data as anonymous data and to cache copies of persistent data stored in slower block-based storage devices. However, the use of this faster memory comes at a high cost. Therefore, several techniques have been implemented to use main memory more efficiently in the literature. In this dissertation we introduce three distinct approaches to improve overall system performance by optimizing main memory usage.
First, DRAM and host-side caching of file system data are used for speeding up virtual machine performance in today’s virtualized data centers. The clustering ...
Prosense, 2016 California Polytechnic State University, San Luis Obispo
Prosense, Johnny Favazza Ii, Casey Glasgow, Matt Epperson
This project aims to gather advanced data sets from MEMS sensors and GPS and deliver it to the user, who can capitalize on the data. The once negligible half-degree difference of your board barreling down a wave can be recorded from a gyro and exploited for the perfect turn. The exact speed dreaded by longboarders where speed wobbles turn into a road rash can be analysed and consequently avoided. Ascertaining the summit of your flight using combined GPS sensors from the ski ramp allows for the correct timing of tricks. When it comes to pursuing excellence in professional sports, amateur ...
Packet Filter Approach To Detect Denial Of Service Attacks, 2016 California State University, San Bernardino
Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish
Electronic Theses, Projects, and Dissertations
Denial of service attacks (DoS) are a common threat to many online services. These attacks aim to overcome the availability of an online service with massive traffic from multiple sources. By spoofing legitimate users, an attacker floods a target system with a high quantity of packets or connections to crash its network resources, bandwidth, equipment, or servers. Packet filtering methods are the most known way to prevent these attacks via identifying and blocking the spoofed attack from reaching its target. In this project, the extent of the DoS attacks problem and attempts to prevent it are explored. The attacks categories ...
The Contributions Of Anatol Rapoport To Game Theory, 2016 Western University
The Contributions Of Anatol Rapoport To Game Theory, Erika Simpson
Political Science Publications
Game theory is used to rationally and dispassionately examine the strategic behaviour of nations, especially superpower behaviour. This article explains how basic game theory - at its simplest level - was used by Anatol Rapoport to generate ideas about how to enhance world peace. Rapoport was at the forefront of the game theoreticians who sought to conceptualize strategies that could promote international cooperation. Accordingly, the basic logic of game theory is explained using the game models of ‘Chicken’ and ‘Prisoner’s Dilemma’. These models were used by Rapoport in his books and lectures in simple and complex ways. Then Rapoport’s revolutionary ...
Internet Of Things-Based Smart Classroom Environment, 2016 Kennesaw State University
Internet Of Things-Based Smart Classroom Environment, Amir R. Atabekov
Master of Science in Computer Science Theses
Internet of Things (IoT) is a novel paradigm that is gaining ground in the Computer Science field. There’s no doubt that IoT will make our lives easier with the advent of smart thermostats, medical wearable devices, connected vending machines and others. One important research direction in IoT is Resource Management Systems (RMS). In the current state of RMS research, very few studies were able to take advantage of indoor localization which can be very valuable, especially in the context of smart classrooms. For example, indoor localization can be used to dynamically generate seat map of students in a classroom ...
Social-Context Middleware For At-Risk Veterans, 2016 Marquette University
Social-Context Middleware For At-Risk Veterans, Nadiyah Frances Johnson
Master's Theses (2009 -)
Many veterans undergo challenges when reintegrating into civilian society. These challenges include readapting to their communities and families. During the reintegration process veterans have difficulties finding employment, education or resources that aid veteran health. Research suggests that these challenges often result in veterans encountering serious mental illness. Post-Traumatic Stress Disorder (PTSD) is a common mental disease that veterans often develop. This disease impacts between 15-20% of veterans. PTSD increases the likelihood of veterans engaging in high risk behaviors which may consist of impulsivity, substance abuse, and angry outbursts. These behaviors raise the veterans’ risk of becoming violent and lashing out ...
Hpc Made Easy: Using Docker To Distribute And Test Trilinos, 2016 College of Saint Benedict/Saint John's University
Hpc Made Easy: Using Docker To Distribute And Test Trilinos, Sean J. Deal
All College Thesis Program
Virtualization is an enticing option for computer science research given its ability to provide repeatable, standardized environments, but traditional virtual machines have too much overhead cost to be practical. Docker, a Linux-based tool for operating-system level virtualization, has been quickly gaining popularity throughout the computer science field by touting a virtualization solution that is easily distributable and more lightweight than virtual machines. This thesis aims to explore if Docker is a viable option for conducting virtualized research by evaluating the results of parallel performance tests using the Trilinos project.
Securing The Integrity Of The Power Distribution System For Smart Grid Applications, 2016 United Arab Emirates University
Securing The Integrity Of The Power Distribution System For Smart Grid Applications, Hosam Yousef Hittini
The distribution system is one of the main components in a smart grid, readings are transferred from the distribution substations to the control center. Compromising transferred system data will result in drawing wrong conclusions about current operation status at the control center. Which leads to sending wrong operational commands that may result in very serious consequences.
Firstly, we propose a scalable communications architecture for future smart grid distribution systems (i.e. Security Aware Distribution System Architecture - SADSA). The architecture is adaptable to use Wi-Fi or other technologies to transfer smart grid information. The architecture is studied from various angles. Both ...
The Future Of Patient Engagement In The Governance Of Shared Data, 2016 Mayo Clinic
The Future Of Patient Engagement In The Governance Of Shared Data, Carolyn Petersen
eGEMs (Generating Evidence & Methods to improve patient outcomes)
Background: The emerging health care system increasingly values patient engagement and shared decision-making between patients and their providers. The practice of these values is gaining importance as the patient-centered medical home model and personalized medicine come into greater use.
Opportunity for Improvement: Exploration of patient preferences about personal health data use for research and quality improvement is a fundamental element of the provider-patient relationship. Giving patients an explicit opportunity to discuss their options about use of their data and implementing a process that allows patients to receive desired communications about how their information is used can help build patient trust ...
Histogram Of Oriented Phase And Gradient (Hopg) Descriptor For Improved Pedestrian Detection, 2016 University of Dayton
Histogram Of Oriented Phase And Gradient (Hopg) Descriptor For Improved Pedestrian Detection, Hussin Ragb, Vijayan K. Asari
Electrical and Computer Engineering Faculty Publications
This paper presents a new pedestrian detection descriptor named Histogram of Oriented Phase and Gradient (HOPG) based on a combination of the Histogram of Oriented Phase (HOP) features and the Histogram of Oriented Gradient features (HOG).
The proposed descriptor extracts the image information using both the gradient and phase congruency concepts. Although the HOG based method has been widely used in the human detection systems, it lacks to deal effectively with the images impacted by the illumination variations and cluttered background. By fusing HOP and HOG features, more structural information can be identified and localized in order to obtain more ...
Movement Path Tortuosity In Free Ambulation: Relationships To Age And Brain Disease, 2016 University of South Florida
Movement Path Tortuosity In Free Ambulation: Relationships To Age And Brain Disease, William Kearns, James Fozard, Vilis Nams
William D. Kearns, PhD
Archive - A Data Management Program, 2016 James Madison University
Archive - A Data Management Program, James Devilbiss, C. Steven Whisnant, Yasmeen Shorish
To meet funding agency requirements, a portable data management solution is presented for small research groups. The database created is simple, searchable, robust, and can reside across multiple hard drives. Employing a standard metadata schema for all data, the database ensures a high level of standardization, findability, and organization. The software is written in Perl, runs on UNIX, and presents a web-based user interface. It uses a fast, portable log-in scheme, making it easy to export to other locations. As research continues to move towards more open data sharing and reproducibility, this database solution is agile enough to accommodate external ...
An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, 2016 University of Dayton
An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang
We present a tele-immersive system that enables people to interact with each other in a virtual world using body gestures in addition to verbal communication. Beyond the obvious applications, including general online conversations and gaming, we hypothesize that our proposed system would be particularly beneficial to education by offering rich visual contents and interactivity. One distinct feature is the integration of egocentric pose recognition that allows participants to use their gestures to demonstrate and manipulate virtual objects simultaneously. This functionality enables the instructor to effectively and efficiently explain and illustrate complex concepts or sophisticated problems in an intuitive manner. The ...
The Online Minimum Matching Problem On The Line, 2016 Connecticut College
The Online Minimum Matching Problem On The Line, Maximilan Bender
Computer Science Honors Papers
No abstract provided.
An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, 2016 Nova Southeastern University
An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly
CEC Theses and Dissertations
Since September 11, 2001, the United States Government (USG) has possessed unparalleled capability in terms of dedicated intelligence and information collection assets supporting the analysts of the Intelligence Community (IC). The USG IC has sponsored, developed, and borne witness to extraordinary advances in technology, techniques, and procedures focused on knowledge harvesting, knowledge sharing, and collaboration. Knowledge, within successful (effective & productive) organizations, exists as a commodity; a commodity that can be created, captured, imparted, shared, and leveraged. The research problem that this study addressed is the challenge of maintaining strong organizational effectiveness and productivity through the use of an information technology-based knowledge management system (KMS). The main ...