Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Physical Sciences and Mathematics

Vascular Tree Structure: Fast Curvature Regularization And Validation, Egor Chesakov Dec 2015

Vascular Tree Structure: Fast Curvature Regularization And Validation, Egor Chesakov

Electronic Thesis and Dissertation Repository

This work addresses the challenging problem of accurate vessel structure analysis in high resolution 3D biomedical images. Typical segmentation methods fail on recent micro-CT data sets resolving near-capillary vessels due to limitations of standard first-order regularization models. While regularization is needed to address noise and partial volume issues in the data, we argue that extraction of thin tubular structures requires higher-order curvature-based regularization. There are no standard segmentation methods regularizing surface curvature in 3D that could be applied to large 3D volumes. However, we observe that standard measures for vessels structure are more concerned with topology, bifurcation angles, and other …


Bm3d Image Denoising Using Learning-Based Adaptive Hard Thresholding, Farhan Bashar Dec 2015

Bm3d Image Denoising Using Learning-Based Adaptive Hard Thresholding, Farhan Bashar

Electronic Thesis and Dissertation Repository

Image denoising is an important pre-processing step in most imaging applications. Block Matching and 3D Filtering (BM3D) is considered to be the current state-of-art algorithm for additive image denoising. But this algorithm uses a fixed hard thresholding scheme to attenuate noise from a 3D block. Experiments show that this fixed hard thresholding deteriorates the performance of BM3D because it does not consider the context of corresponding blocks. In this thesis, we propose a learning based adaptive hard thresholding method to solve this issue. Also, BM3D algorithm requires as an input the value of the noise level in the input image. …


Adaptive Non-Local Means Using Weight Thresholding, Asif Khan Dec 2015

Adaptive Non-Local Means Using Weight Thresholding, Asif Khan

Electronic Thesis and Dissertation Repository

Non-local means (NLM) is a popular image denoising scheme for reducing additive Gaussian noise. It uses a patch-based approach to find similar regions within a search neighborhood and estimate the denoised pixel based on the weighted average of all the pixels in the neighborhood. All the pixels are considered for averaging, irrespective of the value of their weights. This thesis proposes an improved variant of the original NLM scheme, called Weight Thresholded Non-Local Means (WTNLM), by thresholding the weights of the pixels within the search neighborhood, where the thresholded weights are used in the averaging step. The key parameters of …


Optical Flow At Occlusion Boundaries And In Occlusion Regions, Hua Meng Dec 2015

Optical Flow At Occlusion Boundaries And In Occlusion Regions, Hua Meng

Electronic Thesis and Dissertation Repository

Optical flow is an important research area in the Computer Vision field, with the estimation of optical flow at occlusion still an open problem. Traditional approaches to this problem have either used additional terms in a regularization calculation (the flow still tends to “bleed” across occlusion boundaries) or a local least squares calculation that attempted to minimize the influence of two adjacent differently moving regions on the optical flow at points close to both regions (the flow still tends to be “corrupted” by the two regions). Ideally, optical flow for two adjacent differently moving regions should be distinct right up …


Surface Reconstruction From Noisy And Sparse Data, Mark A. Brophy Dec 2015

Surface Reconstruction From Noisy And Sparse Data, Mark A. Brophy

Electronic Thesis and Dissertation Repository

We introduce a set of algorithms for registering, filtering and measuring the similarity of unorganized 3d point clouds, usually obtained from multiple views.

We contribute a method for computing the similarity between point clouds that represent closed surfaces, specifically segmented tumors from CT scans. We obtain watertight surfaces and utilize volumetric overlap to determine similarity in a volumetric way. This similarity measure is used to quantify treatment variability based on target volume segmentation both prior to and following radiotherapy planning stages.

We also contribute an algorithm for the drift-free registration of thin, non- rigid scans, where drift is the build-up …


Formal Models Of The Extension Activity Of Dna Polymerase Enzymes, Srujan Kumar Enaganti Oct 2015

Formal Models Of The Extension Activity Of Dna Polymerase Enzymes, Srujan Kumar Enaganti

Electronic Thesis and Dissertation Repository

The study of formal language operations inspired by enzymatic actions on DNA is part of ongoing efforts to provide a formal framework and rigorous treatment of DNA-based information and DNA-based computation. Other studies along these lines include theoretical explorations of splicing systems, insertion-deletion systems, substitution, hairpin extension, hairpin reduction, superposition, overlapping concatenation, conditional concatenation, contextual intra- and intermolecular recombinations, as well as template-guided recombination.

First, a formal language operation is proposed and investigated, inspired by the naturally occurring phenomenon of DNA primer extension by a DNA-template-directed DNA polymerase enzyme. Given two DNA strings u and v, where the shorter …


Computing In Algebraic Closures Of Finite Fields, Javad Doliskani Sep 2015

Computing In Algebraic Closures Of Finite Fields, Javad Doliskani

Electronic Thesis and Dissertation Repository

We present algorithms to construct and perform computations in algebraic closures of finite fields. Inspired by algorithms for constructing irreducible polynomials, our approach for constructing closures consists of two phases; First, extension towers of prime power degree are built, and then they are glued together using composita techniques. To be able to move elements around in the closure we give efficient algorithms for computing isomorphisms and embeddings. In most cases, our algorithms which are based on polynomial arithmetic, rather than linear algebra, have quasi-linear complexity.


Implementation Techniques For The Truncated Fourier Transform, Li Zhang Sep 2015

Implementation Techniques For The Truncated Fourier Transform, Li Zhang

Electronic Thesis and Dissertation Repository

We study various algorithms for the Truncated Fourier Transform (TFT) which is a variation of the Discrete Fourier Transform (DFT) that allows one to work with an input vector of arbitrary size without zero padding. After a review of the original algorithms for the forward and inverse TFT introduced by J. van der Hoeven, we consider the variation of D. Harvey as well as that of J. Johnson and L.C. Meng. Both variations are based on Cooley-Tukey like formulas. The former is called strict general radix as it strictly follows the specifications proposed by J. van der Hoeven, while the …


Clustering-Based Personalization, Seyed Nima Mirbakhsh Sep 2015

Clustering-Based Personalization, Seyed Nima Mirbakhsh

Electronic Thesis and Dissertation Repository

Recommendation systems have been the most emerging technology in the last decade as one of the key parts in e-commerce ecosystem. Businesses offer a wide variety of items and contents through different channels such as Internet, Smart TVs, Digital Screens, etc. The number of these items sometimes goes over millions for some businesses. Therefore, users can have trouble finding the products that they are looking for. Recommendation systems address this problem by providing powerful methods which enable users to filter through large information and product space based on their preferences. Moreover, users have different preferences. Thus, businesses can employ recommendation …


A Study Of Pseudo-Periodic And Pseudo-Bordered Words For Functions Beyond Identity And Involution, Manasi Kulkarni Aug 2015

A Study Of Pseudo-Periodic And Pseudo-Bordered Words For Functions Beyond Identity And Involution, Manasi Kulkarni

Electronic Thesis and Dissertation Repository

Periodicity, primitivity and borderedness are some of the fundamental notions in combinatorics on words. Motivated by the Watson-Crick complementarity of DNA strands wherein a word (strand) over the DNA alphabet \{A, G, C, T\} and its Watson-Crick complement are informationally ``identical", these notions have been extended to consider pseudo-periodicity and pseudo-borderedness obtained by replacing the ``identity" function with ``pseudo-identity" functions (antimorphic involution in case of Watson-Crick complementarity). For a given alphabet $\Sigma$, an antimorphic involution $\theta$ is an antimorphism, i.e., $\theta(uv)=\theta(v) \theta(u)$ for all $u,v \in \Sigma^{*}$ and an involution, i.e., $\theta(\theta(u))=u$ for all $u \in \Sigma^{*}$. In this thesis, …


Generalized Inclusion-Exclusion, Mike W. Ghesquiere Aug 2015

Generalized Inclusion-Exclusion, Mike W. Ghesquiere

Electronic Thesis and Dissertation Repository

Sets are a foundational structure within mathematics and are commonly used as a building block for more complex structures. Just above this we have functions and sequences before an explosion of increasingly specialized structures. We propose a re-hanging of the tree with hybrid sets (that is, signed multi-sets), as well hybrid functions (functions with hybrid set domains) joining the ranks of sequences and functions. More than just an aesthetic change, this allows symbolic manipulation of structures in ways that might otherwise be cumbersome or inefficient. In particular, we will consider simplifying the product and sum of two piecewise functions or …


Algorithms For Peptide Identification From Mixture Tandem Mass Spectra, Yi Liu Aug 2015

Algorithms For Peptide Identification From Mixture Tandem Mass Spectra, Yi Liu

Electronic Thesis and Dissertation Repository

The large amount of data collected in an mass spectrometry experiment requires effective computational approaches for the automated analysis of those data. Though extensive research has been conducted for such purpose by the proteomics community, there are still remaining challenges, among which, one particular challenge is that the identification rate of the MS/MS spectra collected is rather low. One significant reason that contributes to this situation is the frequently observed mixture spectra, which result from the concurrent fragmentation of multiple precursors in a single MS/MS spectrum. However, nearly all the mainstream computational methods still take the assumption that the acquired …


Tropical Cyclone Wind Hazard Assessment For Southeast Part Of Coastal Region Of China, Sihan Li Aug 2015

Tropical Cyclone Wind Hazard Assessment For Southeast Part Of Coastal Region Of China, Sihan Li

Electronic Thesis and Dissertation Repository

Tropical cyclone (TC) or typhoon wind hazard and risk are significant for China. The return period value of the maximum typhoon wind speed is used to characterize the typhoon wind hazard and assign wind load in building design code. Since the historical surface observations of typhoon wind speed are often scarce and of short period, the typhoon wind hazard assessment is often carried out using the wind field model and TC track model. For a few major cities in the coastal region of mainland China, simple or approximated wind field models and a circular subregion method (CSM) have been used …


Generating Invalid Input Strings For Software Testing, Benjamin D. Revington Aug 2015

Generating Invalid Input Strings For Software Testing, Benjamin D. Revington

Electronic Thesis and Dissertation Repository

Grammar-based testing has interested the academic community for decades, but little work has been done with regards to testing with invalid input strings. For our research, we generated LR parse tables from grammars. We then generated valid and invalid strings based on coverage of these tables. We evaluated the effectiveness of these strings in terms of code coverage and fault detection by inputting them to subject programs which accept input based on the grammars. For a baseline, we then compared the effectiveness of these strings to a more general approach where the tokens making up each string are chosen randomly. …


Algorithms To Compute Characteristic Classes, Martin Helmer Jun 2015

Algorithms To Compute Characteristic Classes, Martin Helmer

Electronic Thesis and Dissertation Repository

In this thesis we develop several new algorithms to compute characteristics classes in a variety of settings. In addition to algorithms for the computation of the Euler characteristic, a classical topological invariant, we also give algorithms to compute the Segre class and Chern-Schwartz-MacPherson (CSM) class. These invariants can in turn be used to compute other common invariants such as the Chern-Fulton class (or the Chern class in smooth cases).

We begin with subschemes of a projective space over an algebraically closed field of characteristic zero. In this setting we give effective algorithms to compute the CSM class, Segre class and …


Using Cellular Automata And Lattice Boltzmann Methods To Model Cancer Growth: Analysis Of Combination Treatment Outcomes, Jenna L. Butler May 2015

Using Cellular Automata And Lattice Boltzmann Methods To Model Cancer Growth: Analysis Of Combination Treatment Outcomes, Jenna L. Butler

Electronic Thesis and Dissertation Repository

In Canada it is estimated that 76,600 people will die of cancer in 2014. Cancer, a collection of over 200 diseases, has differences existing between globally, between individuals and overtime in one individual. Treatment options are similarly varied. These differences make selecting the best possible treatment for every type of cancer very challenging. In addition, with no single cure for cancer, treatments are often combined in different ways to form the best overall option. In an attempt to synthesize the properties of these diseases into a collection of common cellular changes, Hanahan and Weinberg proposed ``the hallmarks of cancer" -- …


An Approach To Artificial Society Generation For Video Games, Bryan Sarlo Apr 2015

An Approach To Artificial Society Generation For Video Games, Bryan Sarlo

Electronic Thesis and Dissertation Repository

Since their inception in the 1940s, video games have always had a need for non-player characters (NPCs) driven by some form of artificial intelligence (AI). More recently, researchers and developers have attempted to create believable, or human-like, agents by modeling them after humans by borrowing concepts from the social sciences. This thesis explores an approach to generating a society of such believable agents with human-like attributes and social connections. This approach allows agents to form various kinds of relationships with other agents in the society, and even provides an introductory form of shared or influenced attributes based on their spouse …


Interactive Visualization For Deep Organizational Data, Arash Khosravi Apr 2015

Interactive Visualization For Deep Organizational Data, Arash Khosravi

Electronic Thesis and Dissertation Repository

During the last decade, there has been a growing interest in investigating how and why people use organizational data to solve problems, make decisions, and perform other cognitive activities, especially in the social network, healthcare, and education domains. Working with organizational data is challenging because of the complex and multi-structured nature of it. One way to support cognitive activities with organizational data is through the use of interactive visualization tools that provide different representations and mechanisms for interacting with deep layers of the data. In this research, we have deep organizational data which is mainly about collaborations inside universities. The …


Geological Object Recognition In Extraterrestrial Environments, Gregory M. Elfers Apr 2015

Geological Object Recognition In Extraterrestrial Environments, Gregory M. Elfers

Electronic Thesis and Dissertation Repository

On July 4 1997, the landing of NASA’s Pathnder probe and its rover Sojourner marked the beginning of a new era in space exploration; robots with the ability to move have made up the vanguard of human extraterrestrial exploration ever since. With Sojourners landing, for the rst time, a ground traversing robot was at a distance too far from earth to make direct human control practical. This has given rise to the development of autonomous systems to improve the e?ciency of these robots,in both their ability to move,and their ability to make decisions regarding their environment. Computer Vision comprises a …


Trust Based Privacy Policy Enforcement In Cloud Computing, Karthick Ramachandran Mar 2015

Trust Based Privacy Policy Enforcement In Cloud Computing, Karthick Ramachandran

Electronic Thesis and Dissertation Repository

Cloud computing offers opportunities for organizations to reduce IT costs by using the computation and storage of a remote provider. Despite the benefits offered by cloud computing paradigm, organizations are still wary of delegating their computation and storage to a cloud service provider due to trust concerns. The trust issues with the cloud can be addressed by a combination of regulatory frameworks and supporting technologies. Privacy Enhancing Technologies (PET) and remote attestation provide the technologies for addressing the trust concerns. PET provides proactive measures through cryptography and selective dissemination of data to the client. Remote attestation mechanisms provides reactive measures …


Metagenome Assembly, Wenjing Wan Feb 2015

Metagenome Assembly, Wenjing Wan

Electronic Thesis and Dissertation Repository

The advent of the next generation sequencing technology (NGS) makes it possible to study metagenomics data which is directly extracted and cloned from assemblage of micro-organisms. Metagenomics data are diverse in species and abundance. Because most genome assemblers are designed for single genome assembly, they could not perform well on metagenomics data. To deal with the mixed and not uniformly distributed metagenomics reads, we developed a novel metagenomic assembler named MetaSAGE, on the platform of the existing SAGE assembler. MetaSAGE finds contigs from the overlap graph based on the minimum cost flow theory and uses mate-pair information to extract scaffolds …


An Investigation Of Cognitive Implications In The Design Of Computer Games, Robert Haworth Feb 2015

An Investigation Of Cognitive Implications In The Design Of Computer Games, Robert Haworth

Electronic Thesis and Dissertation Repository

Computer games have been touted for their ability to engage players in cognitive activities (e.g., decision making, learning, planning, problem solving). By ‘computer game’ we mean any game that uses computational technology as its platform, regardless of the actual hardware or software; games on personal computers, tablets, game consoles, cellphones, or specialized equipment can all be called computer games. However, there remains much uncertainty regarding how to design computer games so that they support, facilitate, and promote the reflective, effortful, and conscious performance of cognitive activities. The goal of this dissertation is to relieve some of this uncertainty, so that …


Geography Aware Virtual Machine Migrations And Replications For Distributed Cloud Data Centers, Sakif Shahriar Pritom Jan 2015

Geography Aware Virtual Machine Migrations And Replications For Distributed Cloud Data Centers, Sakif Shahriar Pritom

Electronic Thesis and Dissertation Repository

Cloud computing provides access to computing resources for a fee. Client applications and services can be hosted in clouds. Cloud computing typically uses a network of data centers that are geographically dispersed. The distance between clients and applications is impacted by geographical distance. The geographical distribution of client requests can be random and difficult to predict. This suggests a need to reconsider the placement of services at run-time through migration. This thesis describes a framework based on software-defined networking (SDN) principles. It demonstrates algorithms that are periodically executed and determine candidate services to migrate and replicate as well as target …


A Real-Time N-Gram Approach To Choosing Synonyms Based On Context, Brian J. Moore Jan 2015

A Real-Time N-Gram Approach To Choosing Synonyms Based On Context, Brian J. Moore

Electronic Thesis and Dissertation Repository

Synonymy is an important part of all natural language but not all synonyms are created equal. Just because two words are synonymous, it usually doesn’t mean they can always be interchanged. The problem that we attempt to address is that of near-synonymy and choosing the right word based purely on its surrounding words. This new computational method, unlike previous methods used on this problem, is capable of making multiple word suggestions which more accurately models human choice. It contains a large number of words, does not require training, and is able to be run in real-time. On previous testing data, …