Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Physical Sciences and Mathematics

The Bioluminescence Heterozygous Genome Assembler, Jared Calvin Price Dec 2014

The Bioluminescence Heterozygous Genome Assembler, Jared Calvin Price

Theses and Dissertations

High-throughput DNA sequencing technologies are currently revolutionizing the fields of biology and medicine by elucidating the structure and function of the components of life. Modern DNA sequencing machines typically produce relatively short reads of DNA which are then assembled by software in an attempt to produce a representation of the entire genome. Due to the complex structure of all but the smallest genomes, especially the abundant presence of exact or almost exact repeats, all genome assemblers introduce errors into the final sequence and output a relatively large set of contigs instead of full-length chromosomes (a contig is a DNA sequence …


Replication And Knowledge Production In Empirical Software Engineering Research, Jonathan L. Krein Dec 2014

Replication And Knowledge Production In Empirical Software Engineering Research, Jonathan L. Krein

Theses and Dissertations

Although replication is considered an indispensable part of the scientific method in software engineering, few replication studies are published each year. The rate of replication, however, is not surprising given that replication theory in software engineering is immature. Not only are replication taxonomies varied and difficult to reconcile, but opinions on the role of replication contradict. In general, we have no clear sense of how to build knowledge via replication, particularly given the practical realities of our research field. Consequently, most replications in software engineering yield little useful information. In particular, the vast majority of external replications (i.e., replications performed …


Framework To Implement Authentication, Authorization And Secure Communications In A Multiuser Collaborative Cax Environment, Francis Mensah Dec 2014

Framework To Implement Authentication, Authorization And Secure Communications In A Multiuser Collaborative Cax Environment, Francis Mensah

Theses and Dissertations

Computer Aided Design (CAD) applications have historically been based on a single user per application architecture. Although this architecture is still popular to date, it does have several drawbacks. First of all the single user CAD architecture inhibits a concurrent engineering design process where several designers can work on the same model simultaneously. This limitation introduces time inefficiency especially when a project involves geographically dispersed designers. A solution to these drawbacks could be a transition from the traditional single user CAD architecture to a multiuser collaborative architecture. Advances in computer networking technologies, especially relating to the Internet, have provided the …


Classifying And Cataloging Cyber-Security Incidents Within Cyber-Physical Systems, William B. Miller Dec 2014

Classifying And Cataloging Cyber-Security Incidents Within Cyber-Physical Systems, William B. Miller

Theses and Dissertations

In the past, there were perceived delineations between the cyber world and the physical world. We are becoming increasingly aware of the overlap between these two worlds, and the overlap itself is increasing. The overlap between these two worlds is known as cyber-physical systems. There have been several incidents involving cyber-physical systems and the number of these incidents is increasing dramatically. In the past there has been no effort to identify methods for describing these incidents in the unique context of cyber-physical systems. This research provides a taxonomy for classifying these incidents that focuses on cross domain, impact oriented analysis. …


A Privacy Risk Scoring Framework For Mobile, Jedidiah Spencer Montgomery Nov 2014

A Privacy Risk Scoring Framework For Mobile, Jedidiah Spencer Montgomery

Theses and Dissertations

Protecting personal privacy has become an increasingly important issue as computers become a more integral part of everyday life. As people begin to trust more personal information to be contained in computers they will question if that information is safe from unwanted intrusion and access. With the rise of mobile devices (e.g., smartphones, tablets, wearable technology) users have enjoyed the convenience and availability of stored personal information in mobile devices, both in the operating system and within applications.For a mobile application to function correctly it needs permission or privileges to access and control various resources and controls on the mobile …


Scalable Detection And Extraction Of Data In Lists In Ocred Text For Ontology Population Using Semi-Supervised And Unsupervised Active Wrapper Induction, Thomas L. Packer Oct 2014

Scalable Detection And Extraction Of Data In Lists In Ocred Text For Ontology Population Using Semi-Supervised And Unsupervised Active Wrapper Induction, Thomas L. Packer

Theses and Dissertations

Lists of records in machine-printed documents contain much useful information. As one example, the thousands of family history books scanned, OCRed, and placed on-line by FamilySearch.org probably contain hundreds of millions of fact assertions about people, places, family relationships, and life events. Data like this cannot be fully utilized until a person or process locates the data in the document text, extracts it, and structures it with respect to an ontology or database schema. Yet, in the family history industry and other industries, data in lists goes largely unused because no known approach adequately addresses all of the costs, challenges, …


Intelligent Indexing: A Semi-Automated, Trainable System For Field Labeling, Robert T. Clawson Sep 2014

Intelligent Indexing: A Semi-Automated, Trainable System For Field Labeling, Robert T. Clawson

Theses and Dissertations

We present Intelligent Indexing: a general, scalable, collaborative approach to indexing and transcription of non-machine-readable documents that exploits visual consensus and group labeling while harnessing human recognition and domain expertise. In our system, indexers work directly on the page, and with minimal context switching can navigate the page, enter labels, and interact with the recognition engine. Interaction with the recognition engine occurs through preview windows that allow the indexer to quickly verify and correct recommendations. This interaction is far superior to conventional, tedious, inefficient post-correction and editing. Intelligent Indexing is a trainable system that improves over time and can provide …


Measuring Human Workload In Unmanned Aerial Vehicles, Timothy J. Gledhill Sep 2014

Measuring Human Workload In Unmanned Aerial Vehicles, Timothy J. Gledhill

Theses and Dissertations

Unmanned aerial systems (UASs) often require multiple human operators fulfilling diverse roles for safe and correct operation. Reliably designing the human interaction, autonomy, and decision making aspects of these systems requires the use of modeling. We propose a conceptual model that models human machine interaction systems as a group of actors connected by a network of communication channels. We present a simulation framework implemented in Java, with an optional XML model parser that can be analyzed using the Java Pathfinder (JPF) model checker. We propose two human workload metrics based on a taxonomy extracted from the relevant literature. Using the …


Browser-Based Manual Encryption, Yuanzheng Song Aug 2014

Browser-Based Manual Encryption, Yuanzheng Song

Theses and Dissertations

Billions of web-based email and chat messages are sent over the Internet every day. However, very few service providers support end-to-end privacy protection. While providing security for these messages is technically feasible, usability remains a challenge in this field. Recent research attempts to hide security details like key management and encryption in order to make the system more usable. However usability studies demonstrated that hiding these details may confuse the user and contribute to mistakes (e.g., sending out an email in plaintext when the user thought it would be encrypted). In an effort to increase trust and eliminate mistakes, this …


Communicating Affective Meaning From Software To Wetware Through The Medium Of Digital Art, R David Norton Aug 2014

Communicating Affective Meaning From Software To Wetware Through The Medium Of Digital Art, R David Norton

Theses and Dissertations

Computational creativity is a new and developing field of artificial intelligence concerned with computational systems that either autonomously produce original and functional products, or that augment the ability of humans to do so. As the role of computers in our daily lives is continuing to expand, the need for such systems is becoming increasingly important. We introduce and document the development of a new “creative” system, called DARCI (Digital ARtist Communicating Intention), that is designed to autonomously create novel artistic images that convey linguistic concepts to the viewer. Within the scope of this work, the system becomes capable of creating …


Using A Model Of Temporal Latency To Improve Supervisory Control Of Human-Robot Teams, Kyle Lee Blatter Jul 2014

Using A Model Of Temporal Latency To Improve Supervisory Control Of Human-Robot Teams, Kyle Lee Blatter

Theses and Dissertations

When humans and remote robots work together on a team, the robots always interact with a human supervisor, even if the interaction is limited to occasional reports. Distracting a human with robotic interactions doesn't pose a problem so long as the inclusion of robots increases the team's overall effectiveness. Unfortunately, increasing the supervisor's cognitive load may decrease the team's sustainable performance to the point where robotic agents are more a liability than an asset. Present approaches resolve this problem with adaptive autonomy, where a robot changes its level of autonomy based on the supervisor's cognitive load. This thesis proposes to …


Slice—N—Dice Algorithm Implementation In Jpf, Eric S. Noonan Jul 2014

Slice—N—Dice Algorithm Implementation In Jpf, Eric S. Noonan

Theses and Dissertations

This work deals with evaluating the effectiveness of a new verification algorithm called slice--n--dice. In order to evaluate the effectiveness of slice--n--dice, a vector clock POR was implemented to compare it against. The first paper contained in this work was published in ACM SIGSOFT Software Engineering Notes and discusses the implementation of the vector clock POR. The results of this paper show the vector clock POR performing better than the POR in Java Pathfinder by at least a factor of two. The second paper discusses the implementation of slice--n--dice and compares it against other verification techniques. The results show that …


Improved Computer-Generated Simulation Using Motion Capture Data, Seth A. Brunner Jun 2014

Improved Computer-Generated Simulation Using Motion Capture Data, Seth A. Brunner

Theses and Dissertations

Ever since the first use of crowds in films and videogames there has been an interest in larger, more efficient and more realistic simulations of crowds. Most crowd simulation algorithms are able to satisfy the viewer from a distance but when inspected from close up the flaws in the individual agent's movements become noticeable. One of the bigger challenges faced in crowd simulation is finding a solution that models the actual movement of an individual in a crowd. This paper simulates a more realistic crowd by using individual motion capture data as well as traditional crowd control techniques to reach …


Autocompletion Without Static Typing, Nicholas Mckay Shelley Jun 2014

Autocompletion Without Static Typing, Nicholas Mckay Shelley

Theses and Dissertations

Code completion systems act both as a way to decrease typing and as a way to easily access documentation, both implicit and explicit. The former is typically done by completing known variable or function names, while the latter is done by providing a list of possible completions or by providing convenient views of or access to documentation. Because static type information makes these goals possible and feasible for qualifying languages, many improvements to completion systems are focused on improving the order of results or trimming less-valuable results. It follows that almost all validation techniques for this work have focused on …


Necessary And Sufficient Conditions For State-Space Network Realization, Philip E. Paré Jr. Jun 2014

Necessary And Sufficient Conditions For State-Space Network Realization, Philip E. Paré Jr.

Theses and Dissertations

This thesis presents the formulation and solution of a new problem in systems and control theory, called the Network Realization Problem. Its relationship to other problems, such as State Realization and Structural Identifiability, is shown. The motivation for this work is the desire to completely quantify the conditions for transitioning between different mathematical representations of linear time-invariant systems. The solution to this problem is useful for theorists because it lays a foundation for quantifying the information cost of identifying a system's complete network structure from the transfer function.


Trustworthy, Useful Languages For Probabilistic Modeling And Inference, Neil B. Toronto Jun 2014

Trustworthy, Useful Languages For Probabilistic Modeling And Inference, Neil B. Toronto

Theses and Dissertations

The ideals of exact modeling, and of putting off approximations as long as possible, make Bayesian practice both successful and difficult. Languages for modeling probabilistic processes, whose implementations answer questions about them under asserted conditions, promise to ease much of the difficulty. Unfortunately, very few of these languages have mathematical specifications. This makes them difficult to trust: there is no way to distinguish between an implementation error and a feature, and there is no standard by which to prove optimizations correct. Further, because the languages are based on the incomplete theories of probability typically used in Bayesian practice, they place …


Application Sharing From Mobile Devices With A Collaborative Shared Display, Richard S. Shurtz Jun 2014

Application Sharing From Mobile Devices With A Collaborative Shared Display, Richard S. Shurtz

Theses and Dissertations

With the increasing ubiquity of smartphones, tablets, and large pixel-rich displays, there are many exciting new possibilities for using these devices for collaborative work. While there already exist hardware and software that support communication and interaction between mobile devices and shared displays, application sharing in these scenarios is still limited and inflexible. We present a new method of application sharing which allows collaborators to download clips or snapshots of each other's applications. These snapshots can be used to re-launch and resume the shared application back to the state it was in when it was shared. We have built a system …


Musical Motif Discovery In Non-Musical Media, Daniel S. Johnson Jun 2014

Musical Motif Discovery In Non-Musical Media, Daniel S. Johnson

Theses and Dissertations

Many music composition algorithms attempt to compose music in a particular style. The resulting music is often impressive and indistinguishable from the style of the training data, but it tends to lack significant innovation. In an effort to increase innovation in the selection of pitches and rhythms, we present a system that discovers musical motifs by coupling machine learning techniques with an inspirational component. The inspirational component allows for the discovery of musical motifs that are unlikely to be produced by a generative model, while the machine learning component harnesses innovation. Candidate motifs are extracted from non-musical media such as …


Elucidation And Improvement Of Algorithms For Mass Spectrometry Isotope Trace Detection, Robert Anthony Smith May 2014

Elucidation And Improvement Of Algorithms For Mass Spectrometry Isotope Trace Detection, Robert Anthony Smith

Theses and Dissertations

Mass spectrometry facilitates cutting edge advancements in many fields. Although instrumentation has advanced dramatically in the last 100 years, data processing algorithms have not kept pace. Without sensitive and accurate signal segmentation algorithms, the utility of mass spectrometry is limited. In this dissertation, we provide an overview and analysis of mass spectrometry data processing. A tutorial to ease the learning curve for those outside the field is provided. We draw attention to the lack of critical evaluation in the field and describe the resulting effects, including a glut of algorithm contributions of questionable novel contribution. To facilitate increased critical evaluation, …


Ensemble Methods For Historical Machine-Printed Document Recognition, William B. Lund Apr 2014

Ensemble Methods For Historical Machine-Printed Document Recognition, William B. Lund

Theses and Dissertations

The usefulness of digitized documents is directly related to the quality of the extracted text. Optical Character Recognition (OCR) has reached a point where well-formatted and clean machine- printed documents are easily recognizable by current commercial OCR products; however, older or degraded machine-printed documents present problems to OCR engines resulting in word error rates (WER) that severely limit either automated or manual use of the extracted text. Major archives of historical machine-printed documents are being assembled around the globe, requiring an accurate transcription of the text for the automated creation of descriptive metadata, full-text searching, and information extraction. Given document …


Pwm: A Secure Webmail System Designed For Easy Adoption, Benjamin W. Burgon Mar 2014

Pwm: A Secure Webmail System Designed For Easy Adoption, Benjamin W. Burgon

Theses and Dissertations

None of the three largest webmail service providers (serving over 1 billion users) support end-to-end message encryption. Encrypted email has never seen mass adoption because it is prohibitive for non-experts to use. Private WebMail (Pwm) is our extension to popular webmail systems that lets users easily encrypt sensitive messages without having to first contact the recipient and share information. It is designed to spread quickly in a grassroots fashion so that a user receiving their first encrypted message can quickly and easily start using the system. This thesis describes the design and implementation of Pwm, then measures its usability through …


Managing Autonomy By Hierarchically Managing Information: Autonomy And Information At The Right Time And The Right Place, Rongbin Lin Mar 2014

Managing Autonomy By Hierarchically Managing Information: Autonomy And Information At The Right Time And The Right Place, Rongbin Lin

Theses and Dissertations

When working with a complex AI or robotics system in a specific application, users often need to incorporate their special domain knowledge into the autonomous system. Such needs call for the ability to manage autonomy. However, managing autonomy can be a difficult task because the internal mechanisms and algorithms of the autonomous components may be beyond the users' understanding. We propose an approach where users manage autonomy indirectly by managing information provided to the intelligent system hierarchically at three different temporal scales: strategic, between-episodes, and within-episode. Information management tools at multiple temporal scales allow users to influence the autonomous behaviors …


Using Online Data Sources To Make Recommendations On Reading Material For K-12 And Advanced Readers, Maria Soledad Pera Feb 2014

Using Online Data Sources To Make Recommendations On Reading Material For K-12 And Advanced Readers, Maria Soledad Pera

Theses and Dissertations

Reading is a fundamental skill that each person needs to develop during early childhood and continue to enhance into adulthood. While children/teenagers depend on this skill to advance academically and become educated individuals, adults are expected to acquire a certain level of proficiency in reading so that they can engage in social/civic activities and successfully participate in the workforce. A step towards assisting individuals to become lifelong readers is to provide them adequate reading selections which can cultivate their intellectual and emotional growth. Turning to (web) search engines for such reading choices can be overwhelming, given the huge volume of …


How Well Does Multiple Ocr Error Correction Generalize?, William B. Lund, Eric K. Ringger, Daniel D. Walker Jan 2014

How Well Does Multiple Ocr Error Correction Generalize?, William B. Lund, Eric K. Ringger, Daniel D. Walker

Faculty Publications

As the digitization of historical documents, such as newspapers, becomes more common, the need of the archive patron for accurate digital text from those documents increases. Building on our earlier work, the contributions of this paper are: 1. in demonstrating the applicability of novel methods for correcting optical character recognition (OCR) on disparate data sets, including a new synthetic training set, 2. enhancing the correction algorithm with novel features, and 3. assessing the data requirements of the correction learning method. First, we correct errors using conditional random fields (CRF) trained on synthetic training data sets in order to demonstrate the …