Measuring The Counter/Assumption Model's Effect On Argumentation Quality, 2013 California Polytechnic State University, San Luis Obispo
Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia
Master's Theses
This thesis presents a new platform called See the Reason, built upon a tree- structured argumentation model called the Counter/Assumption model. In the Counter/Assumption model, a topic is posted first, then under that topic, reasons for and against, and for each reason, counterarguments, and for any counterargu- ment, more counterarguments. The model enables us to systematically determine whether a claim is “tentatively true” or “tentatively false,” in an effort to motivate people to make their side’s claims tentatively true and the opposing side’s claims tentatively false, thus encouraging conflict. Research suggests that debates with more conflict are better, so this …
A Software Development Kit For Camera-Based Gesture Interaction, 2013 California Polytechnic State University, San Luis Obispo
A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin
Master's Theses
Human-Computer Interaction is a rapidly expanding field, in which new implementations of ideas are consistently being released. In recent years, much of the concentration in this field has been on gesture-based control, either touch-based or camera-based. Even though camera-based gesture recognition was previously seen more in science fiction than in reality, this method of interaction is rising in popularity. There are a number of devices readily available to the average consumer that are designed to support this type of input, including the popular Microsoft Kinect and Leap Motion devices.
Despite this rise in availability and popularity, development for these devices …
Artist-Driven Fracturing Of Polyhedral Surface Meshes, 2013 California Polytechnic State University, San Luis Obispo
Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella
Master's Theses
This paper presents a robust and artist driven method for fracturing a surface polyhedral mesh via fracture maps. A fracture map is an undirected simple graph with nodes representing positions in UV-space and fracture lines along the surface of a mesh. Fracture maps allow artists to concisely and rapidly define, edit, and apply fracture patterns onto the surface of their mesh.
The method projects a fracture map onto a polyhedral surface and splits its triangles accordingly. The polyhedral mesh is then segmented based on fracture lines to produce a set of independent surfaces called fracture components, containing the visible surface …
Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, 2013 Liberty University
Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson
Senior Honors Theses
Vehicular safety has become a serious concern in recent years. Many drivers have difficulty backing out of parking spaces, especially when large trucks and sport utility vehicles block the peripheral view from smaller vehicles. This can lead to accidents and pedestrian injuries when drivers are unable to see or do not pay careful attention to their surroundings.
Vehicular motion sensor systems can alert drivers of approaching obstacles when attempting to back out of parking spaces with limited visibility. This thesis aims to explain the limitations of current systems and the research conducted by the author to develop a prototype for …
Improving Deaf Accessibility To Web-Based Multimedia, 2013 DePaul University
Improving Deaf Accessibility To Web-Based Multimedia, Brent N. Shiver
College of Computing and Digital Media Dissertations
Internet technologies have expanded rapidly over the past two decades, making information of all sorts more readily available. Not only are they more cost-effective than traditional media, these new media have contributed to quality and convenience. However, proliferation of video and audio media on the internet creates an inadvertent disadvantage for deaf Internet users. Despite technological and legislative milestones in recent decades in making television and movies more accessible, there has been little progress with online access. A major obstacle to providing captions for internet media is the high cost of captioning and transcribing services.
To respond to this problem, …
Cis Map Drawer Visualization System, 2013 Purdue University
Cis Map Drawer Visualization System, Hanye Xu, David Ebert
The Summer Undergraduate Research Fellowship (SURF) Symposium
U.S. Citizenship and Immigration Services (USCIS) is the government agency that manages immigration to the United States. They are not only working on filing documents, but also analyzing those data they have. They require help from a visualization system to know the trend of immigration among offices across the country over time. We developed a project called CIS Map Drawer that is used to help build a visualization system for USCIS in order to analyze immigration data easily. This system makes use of a map view, a calendar visual representation, line charts, pixel drawing and other analysis tools to improve …
Is Real-Time Mobile Content-Based Image Retrieval Feasible?, 2013 Purdue University
Is Real-Time Mobile Content-Based Image Retrieval Feasible?, Colin G. Graber, Anup Mohan, Yung-Hsiang Lu
The Summer Undergraduate Research Fellowship (SURF) Symposium
Content-based image retrieval (CBIR) is a method of searching through a database of images by using another image as a query instead of text. Recent advances in the processing power of smart phones and tablets, collectively known as mobile devices, have prompted researchers to attempt to construct mobile CBIR systems. Most of the research that has been conducted on mobile CBIR has focused on improving either its accuracy or its run-time, but not both simultaneously. We set out to answer the question: is real-time CBIR with manageable accuracy possible on current mobile devices? To find the answer to this question, …
Absorption Simulation ( Absim ) Software Development, 2013 Purdue University
Absorption Simulation ( Absim ) Software Development, Vipul Vishnu Bhat, Ming Qu
The Summer Undergraduate Research Fellowship (SURF) Symposium
Researchers working on air conditioning systems currently use a software called ABSIM ( Absorption Simulation ) to evaluate current absorption systems or simulate new system designs. ABSIM was developed at Oak Ridge National Labs in the 1980s and the latest platform it is compatible with is Windows XP. ABSIM is not compatible on newer platforms and is not very user friendly. A lot of the actions involved in using ABSIM aren’t very intuitive. The goal is to develop a more user friendly simulation program that is based off of ABSIM and see to it that the program can be deployed …
Dust To Digital: Electronic Document & Record Management For The Broome County Department Of Public Works- Engineering Divison, 2013 Binghamton University--SUNY
Dust To Digital: Electronic Document & Record Management For The Broome County Department Of Public Works- Engineering Divison, Scott R. Mastin
MPA Capstone Projects 2006 - 2015
The Broome County Department of Public Works- Engineering Division is currently preparing to implement an Electronic Document and Records Management System (EDRMS) to store their increasing number of digital records and to manage existing paper records as they are digitized. This study examines Division integrate electronic document and record management into their organization.
Service Oriented Solution Modeling And Variation Propagation Analysis Based On Architectural Building Blocks, 2013 Carnegie Mellon University, Silicon Valley
Service Oriented Solution Modeling And Variation Propagation Analysis Based On Architectural Building Blocks, Liang-Jie Zhang, Jia Zhang
Jia Zhang
In spite of the widely recognized benefits of applying Service Oriented Architecture (SOA) to design enterprise-scale software systems, its actual application practice is not always a success. One major reason is the lack of a systematic engineering process and tool supported by reusable architectural artifacts. Toward this ultimate goal, this paper proposes a new method of architectural building blocks (ABB)-based SOA solution design and it is applicable to any layered or tiered infrastructure. We present the modeling of solution-level architectural artifacts and their relationships, whose formalization enables event-based variation notification and propagation analysis. The goal is to provide architecture-level support …
Collaborative Policy-Based Autonomic Management In Iaas Clouds, 2013 The University of Western Ontario
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Electronic Thesis and Dissertation Repository
With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …
Judging Emotion From Low-Pass Filtered Naturalistic Emotional Speech, 2013 Technological University Dublin
Judging Emotion From Low-Pass Filtered Naturalistic Emotional Speech, John Snel, Charlie Cullen
Conference papers
In speech, low frequency regions play a significant role in paralinguistic communication such as the conveyance of emotion or mood. The extent to which lower frequencies signify or contribute to affective speech is still an area for investigation. To investigate paralinguistic cues, and remove interference from linguistic cues, researchers can low-pass filter the speech signal on the assumption that certain acoustic cues characterizing affect are still discernible. Low-pass filtering is a practical technique to investigate paralinguistic phenomena, and is used here to investigate the inference of naturalistic emotional speech. This paper investigates how listeners perceive the level of Activation, and …
The Mayaarch3d Project: A 3d Webgis For Analyzing Ancient Architecture And Landscapes, 2013 German Archaeological Institute
The Mayaarch3d Project: A 3d Webgis For Analyzing Ancient Architecture And Landscapes, Jennifer Von Schwerin, Heather Richards-Rissetto, Fabio Remondino, Giorgio Agugario, Gabrio Girardi
Department of Anthropology: Faculty Publications
There is a need in the humanities for a 3D WebGIS with analytical tools that allow researchers to analyze 3D models linked to spatially referenced data. Geographic Information Systems (GIS) allow for complex spatial analysis of 2.5D data. For example, they offer bird’s eye views of landscapes with extruded building footprints, but one cannot ‘get on the ground’ and interact with true 3D models from a pedestrian perspective. Meanwhile, 3D models and virtual environments visualize data in 3D space, but analytical tools are simple rotation or lighting effects. The MayaArch3D Project is developing a 3D WebGIS—called QueryArch3D—to allow these two …
Enhancing Electromagnetic Side-Channel Analysis In An Operational Environment, 2013 Air Force Institute of Technology
Enhancing Electromagnetic Side-Channel Analysis In An Operational Environment, David P. Montminy
Theses and Dissertations
Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template …
Radio Frequency Based Programmable Logic Controller Anomaly Detection, 2013 Air Force Institute of Technology
Radio Frequency Based Programmable Logic Controller Anomaly Detection, Samuel J. Stone
Theses and Dissertations
The research goal involved developing improved methods for securing Programmable Logic Controller (PLC) devices against unauthorized entry and mitigating the risk of Supervisory Control and Data Acquisition (SCADA) attack by detecting malicious software and/or trojan hardware. A Correlation Based Anomaly Detection (CBAD) process was developed to enable 1) software anomaly detection discriminating between various operating conditions to detect malfunctioning or malicious software, firmware, etc., and 2) hardware component discrimination discriminating between various hardware components to detect malfunctioning or counterfeit, trojan, etc., components.
Examples Where The Conjunctive And Dempster’S Rules Are Insensitive, 2013 University of New Mexico
Examples Where The Conjunctive And Dempster’S Rules Are Insensitive, Florentin Smarandache, Jean Dezert, Valeri Kroumov
Branch Mathematics and Statistics Faculty and Staff Publications
In this paper we present several counter-examples to the Conjunctive rule and to Dempster rule of combinations in information fusion.
Reliability Models Applied To Smartphone Applications, 2013 The University of Western Ontario
Reliability Models Applied To Smartphone Applications, Sonia Meskini
Electronic Thesis and Dissertation Repository
Smartphones have become the most used electronic devices. They carry out most of the functionalities of desktops, offering various useful applications that suit the user’s needs. Therefore, instead of the operator, the user has been the main controller of the device and its applications, therefore its reliability has become an emergent requirement. As a first step, based on collected smartphone applications failure data, we investigated and evaluated the efficacy of Software Reliability Growth Models (SRGMs) when applied to these smartphone data in order to check whether they achieve the same accuracy as in the desktop/laptop area. None of the selected …
Forensic Analysis Of Whatsapp On Android Smartphones, 2013 University Of New Orleans
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
University of New Orleans Theses and Dissertations
Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …
Adaptive Co-Scheduler For Highly Dynamic Resources, 2013 University of Nebraska-Lincoln
Adaptive Co-Scheduler For Highly Dynamic Resources, Kartik Vedalaveni
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
There are many kinds of scientific applications that run on high throughput computational (HTC) grids. HTC may utilize clusters opportunistically, only running on a given cluster when it is otherwise idle. These widely dispersed HTC clusters are heterogeneous in terms of capability and availability, but can provide significant computing power in aggregate. The scientific algorithms run on them also vary greatly. Some scientific algorithms might use high rates of disk I/O and some might need large amounts of RAM. Most schedulers only consider cpu availability, but unchecked demand on these associated resources that aren’t managed by resource managers may give …
Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, 2013 University of Tennessee, Knoxville
Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose
Doctoral Dissertations
Multi-stage visual architectures have recently found success in achieving high classification accuracies over image datasets with large variations in pose, lighting, and scale. Inspired by techniques currently at the forefront of deep learning, such architectures are typically composed of one or more layers of preprocessing, feature encoding, and pooling to extract features from raw images. Training these components traditionally relies on large sets of patches that are extracted from a potentially large image dataset. In this context, high-dimensional feature space representations are often helpful for obtaining the best classification performances and providing a higher degree of invariance to object transformations. …