Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 52

Full-Text Articles in Physical Sciences and Mathematics

Generation Of Forests On Terrain With Dynamic Lighting And Shadowing, Jonathan Ben-David Oct 2011

Generation Of Forests On Terrain With Dynamic Lighting And Shadowing, Jonathan Ben-David

Master's Projects

The purpose of this research project is to exhibit an efficient method of creating dynamic lighting and shadowing for the generation of forests on terrain. In this research project, I use textures which contain images of trees from a bird’s eye view in order to create a high scale forest. Furthermore, by manipulating the transparency and color of the textures according to the algorithmic calculations of light and shadow on terrain, I provide the functionality of dynamic lighting and shadowing. Finally, by analyzing the OpenGL pipeline, I design my code in order to allow efficient rendering of the forest.


A Genetic Algorithm Scheduling Approach For Virtual Machine Resources In A Cloud Computing Environment, Shailesh Sawant Oct 2011

A Genetic Algorithm Scheduling Approach For Virtual Machine Resources In A Cloud Computing Environment, Shailesh Sawant

Master's Projects

In the present cloud computing environment, the scheduling approaches for VM (Virtual Machine) resources only focus on the current state of the entire system. Most often they fail to consider the system variation and historical behavioral data which causes system load imbalance. To present a better approach for solving the problem of VM resource scheduling in a cloud computing environment, this project demonstrates a genetic algorithm based VM resource scheduling strategy that focuses on system load balancing. The genetic algorithm approach computes the impact in advance, that it will have on the system after the new VM resource is deployed …


Interface Design For Graphics Editor On Multi- Touch Point Systems, Srujitha Mullapudi Oct 2011

Interface Design For Graphics Editor On Multi- Touch Point Systems, Srujitha Mullapudi

Master's Projects

The main objective of the project is to use the touch sensitive device capability of the iPad to give a better user experience and functionalities for the artists. In this project, I have explored different interactions that can give a better experience for artist when compared to traditional computer-mouse interaction. In the traditional Computer-mouse interaction it is very difficult for the user to draw smooth curves, without having to use built-in functions for drawing curves. In this application the user can use the touch panel to do free drawing, the user can basically feel the device as a object for …


Graph Technique For Metamorphic Virus Detection, Neha Runwal Oct 2011

Graph Technique For Metamorphic Virus Detection, Neha Runwal

Master's Projects

Current anti-virus techniques include signature based detection, anomaly based detection, and machine learning based virus detection. Signature detection is the most widely used approach. Metamorphic malware changes its internal structure with each infection. Metamorphism provides one of the strong known methods for evading malware detection. In this project, we consider metamorphic virus detection based on a directed graph obtained from executable files. We compare our detection results with a previously developed and highly successful technique based on hidden Markov models.


X10 Vs Java: Concurrency Constructs And Performance, Anh Trinh Oct 2011

X10 Vs Java: Concurrency Constructs And Performance, Anh Trinh

Master's Projects

To avoid overheating the chip, chip designers have switched to multi-cores. While multicore CPUs reserve instruction-level parallelism features that help existing applications run as if they were running under single core, applications do not reach speeds two or four times faster. Instead of relying on compiler and hardware to figure out parallelism in source code, software developers now must control parallelism explicitly in their programs. Many programming languages and libraries, such as Java, C# .NET, and OpenMP, are trying to help programmers by providing rich concurrency API. X10 is the new experimental language from IBM Research, which has been under …


Enhancing Productivity Of Recruitment Process Using Data Mining & Text Mining Tools, Charul Saxena Oct 2011

Enhancing Productivity Of Recruitment Process Using Data Mining & Text Mining Tools, Charul Saxena

Master's Projects

Digital communication has significantly reduced the time it takes to send a résumé, but the recruiter’s work has become more complicated because with this technological advancement they get more résumés for each job opening. It becomes almost impossible to physically scan each résumé that meets their organization’s job requirement. The filtering and search techniques provide hundreds of résumés that can fulfill the desired criteria. Most approaches focus on either parsing the résumé to get information or propose some filtering methods. Moreover, résumés vary in format and style, making it difficult to maintain a structural repository which would contain all the …


Data Mining And Data Warehouse ------ Maximal Simplex Method, Madhuri Gollu Oct 2011

Data Mining And Data Warehouse ------ Maximal Simplex Method, Madhuri Gollu

Master's Projects

Association Rule Mining is a widely used method for finding interesting relationships from large data sets. The challenge here is how to swiftly and accurately discover association rules from large data sets. To achieve this, this paper will (1) build a data warehouse system that simulates the secondary storage and represents a database by bit patterns, and (2) implement a new geometric algorithm to find association rules, called Maximal Simplex Algorithm. The data warehouse consists of very long bit columns. Each column is an item or an attribute value pair and a row represents a transaction or a tuple in …


Association Mining In Database Machine, Jindou Jiao Oct 2011

Association Mining In Database Machine, Jindou Jiao

Master's Projects

Association rule is wildly used in most of the data mining technologies. Apriori algorithm is the fundamental association rule mining algorithm. FP-growth tree algorithm improves the performance by reduce the generation of the frequent item sets. Simplex algorithm is a advanced FP-growth algorithm by using bitmap structure with the simplex concept in geometry. The bitmap structure implementation is particular designed for storing the data in database machines to support parallel computing the association rule mining.


Jdpet: Java Dynamic Programming Educational Tool, Aaron Lemoine Oct 2011

Jdpet: Java Dynamic Programming Educational Tool, Aaron Lemoine

Master's Projects

There exist many different algorithm types for solving problems, one of which is dynamic programming. To assist students to learn about dynamic programming algorithms, JDPET was developed. JDPET is an interactive, visual, problem solving tool that allows students to solve several different problems and learn how dynamic programming can be applied to solve these problems. JDPET also provides students with detailed feedback on the problems they attempt to solve.


Efficient Attacks On Homophonic Substitution Ciphers, Amrapali Dhavare Oct 2011

Efficient Attacks On Homophonic Substitution Ciphers, Amrapali Dhavare

Master's Projects

Substitution ciphers are one of the earliest types of ciphers. Examples of classic substitution ciphers include the well-known simple substitution and the less well-known homophonic substitution. Although simple substitution ciphers are indeed simple - both in terms of their use and attacks; the homophonic substitution ciphers are far more challenging to break. Even with modern computing technology, homophonic substitution ciphers remain a significant challenge. This project focuses on designing, implementing, and testing an efficient attack on homophonic substitution ciphers. We use an iterative approach that generalizes the fastest known attack on simple substitution ciphers and also employs a heuristic search …


N-Grams Assisted Long Web Search Query Optimization, Jehann Kersi Irani Oct 2011

N-Grams Assisted Long Web Search Query Optimization, Jehann Kersi Irani

Master's Projects

Commercial search engines do not return optimal search results when the query is a long or multi-topic one [1]. Long queries are used extensively. While the creator of the long query would most likely use natural language to describe the query, it contains extra information. This information dilutes the results of a web search, and hence decreases the performance as well as quality of the results returned. Kumaran et al. [22] showed that shorter queries extracted from longer user generated queries are more effective for ad-hoc retrieval. Hence reducing these queries by removing extra terms, the quality of the search …


Clustering Of Twitter Technology Tweets And The Impact Of Stopwords On Clusters, Surya Bhagvat Oct 2011

Clustering Of Twitter Technology Tweets And The Impact Of Stopwords On Clusters, Surya Bhagvat

Master's Projects

Year of 2010 could be termed as the year in which Twitter became completely mainstream. Twitter, which started as a means of communicating with friends, became much more than its beginning. Now Twitter is used by companies to promote their new products, used by movie industry to promote movies. A lot of advertising and branding is now tied to Twitter and most importantly any breaking news that happens, the first place one goes and tries to find is to search it on Twitter. Be it the Mumbai attacks that happened in 2008, or the minor earthquakes that happened in Bay …


Actibot: A Botnet To Evade Active Detection, Xinjun Zhang Oct 2011

Actibot: A Botnet To Evade Active Detection, Xinjun Zhang

Master's Projects

In recent years, botnets have emerged as a serious threat on the Internet. Botnets are commonly used for exploits such as distributed denial of service (DDoS) attacks, identity theft, spam, and click fraud. The immense size of botnets, some consisting of hundreds of thousands of compromised computers, increases the speed and severity of attacks. Unlike passive behavior anomaly detection techniques, active botnet detection aims to collect evidence actively, in order to reduce detection time and increase accuracy. In this project, we develop and analyze a botnet that we call ActiBot, which can evade some types of active detection mechanisms. Future …


Url Recommender Using Parallel Processing, Ravi Kishore Penta Oct 2011

Url Recommender Using Parallel Processing, Ravi Kishore Penta

Master's Projects

The main purpose of this project is to section similar news and articles from a vast variety of news articles. Let’s say, you want to read about latest news related to particular topic like sports. Usually, user goes to a particular website and goes through some news but he won’t be able to cover all the news coverage in a single website. So, he would be going through some other news website to checking it out and this continues. Also, some news websites might be containing some old news and the user might be going through that. To solve this, …


Augmented-Life Phone Organizer, Chao-Hsin Shih Oct 2011

Augmented-Life Phone Organizer, Chao-Hsin Shih

Master's Projects

Augmented-Life Phone Organizer (ALPO) is a geo-based mobile application for users to search for businesses and make corresponding actions such as calling, navigating, or viewing comments about the business. Users can take image notes and attach them to a virtual wall, so others can view the image at the same GPS coordinates later. Users can also view all business images and augmented notes superimposed on the real world through a mobile device screen and camera. We have measured application usability and feature practicality by conducting function tests on three users, and the results are encouraging.


A Machine Learning And Compiler-Based Approach To Automatically Parallelize Serial Programs Using Openmp, Nam Quang Lam Oct 2011

A Machine Learning And Compiler-Based Approach To Automatically Parallelize Serial Programs Using Openmp, Nam Quang Lam

Master's Projects

Single core designs and architectures have reached their limits due to heat and power walls. In order to continue to increase hardware performance, hardware industries have moved forward to multi-core designs and implementations which introduces a new paradigm in parallel computing. As a result, software programmers must be able to explicitly write or produce parallel programs to fully exploit the potential computing power of parallel processing in the underlying multi-core architectures. Since the hardware solution directly exposes parallelism to software designers, different approaches have been investigated to help the programmers to implement software parallelism at different levels. One of the …


Discovering Knowledge Structure In The Web, Siddharth Ramu Oct 2011

Discovering Knowledge Structure In The Web, Siddharth Ramu

Master's Projects

Association Rule Mining is a widely used method for finding interesting relationships from large data sets. The challenge here is how to swiftly and accurately discover association rules from large data sets. To achieve this, this paper will (1) build a data warehouse system that simulates the secondary storage and represents a database by bit patterns, and (2) implement a new geometric algorithm to find association rules, called Maximal Simplex Algorithm. The data warehouse consists of very long bit columns. Each column is an item or an attribute value pair and a row represents a transaction or a tuple in …


Ec2lab: Saas Using Amazon Elastic Cloud Compute, Manisha Gaikwad Oct 2011

Ec2lab: Saas Using Amazon Elastic Cloud Compute, Manisha Gaikwad

Master's Projects

The cloud computing is gaining popularity as it provides an infinite pool of hardware and software resources on demand. The Infrastructure-as-a-Service (IaaS) layer provides the physical resources, and relieves the users from the tedious as well as time consuming task of procuring and setting the server as well as the storage. This project harnesses the capability of the Amazon IaaS layer. The Software-as-a-Service (SaaS) application which is built on top of Amazon IaaS layer, helps the users to easily handle and connect with Amazon's Elastic Cloud Compute (EC2) instances.


Scanned Wireless Network Setup Fake Access Point & Its Detection, Saurabh Vishal Sep 2011

Scanned Wireless Network Setup Fake Access Point & Its Detection, Saurabh Vishal

Master's Projects

This thesis addresses the topic of development and advancement of the wireless technology. Report described about network monitoring and security issues with advancement in the increase of network bandwidth and user requirements to access the internet. This report mainly focuses on how war driving affects the security of end user. How it can solve problem for infected users who are accessing the internet. The technique is used in wireless environment where all kinds of wireless devices can access internet and can use network resources with high security and better performance. Research on this topic reveals that passive monitoring technique can …


Riverland 2.0: Blending Of Multiple User-Defined Slopes In A Procedurally Modeled Terrain, Jeffrey Jensen Sep 2011

Riverland 2.0: Blending Of Multiple User-Defined Slopes In A Procedurally Modeled Terrain, Jeffrey Jensen

Master's Projects

This writing project attempts to improve on and add features to the current program called RiverLand originally designed and implemented by Dr. Soon Tee Teoh. I discuss the original methods used by RiverLand to create procedurally generated terrain. I then explore the weaknesses of the original RiverLand which include having only linear ridges and undesirable medial axis cells. I then tackle the problem of recurring patterns when texturizing a surface with very few textures. I propose how to solve these problems and explain the methods used to accomplish this. I discuss the user interfaces that were designed to accommodate the …


Algorithms Analysis System: Recurrences, Anchit Sharma Jul 2011

Algorithms Analysis System: Recurrences, Anchit Sharma

Master's Projects

Algorithms which are recursive have running times which can be described by

recurrence equations or recurrences. These equations determine the overall running time complexity of the algorithm. This project intends to create a mechanism for

  • auto generating recurrence equations of the form T(n) = a(T(n)/b) + f(n)

  • creating a computational method for solving them and generating running times

    i.e. O (f(n)) or Ω (f(n)).

  • presenting students with a way to verify their manually computed answers with

    the solution generation by the project

  • generating grading and feedback for their solution

    The exercises will utilize the ‘Substitution Method’ and the ‘Master Method’ …


Learning Author’S Writing Pattern System By Automata, Qun Yu Jul 2011

Learning Author’S Writing Pattern System By Automata, Qun Yu

Master's Projects

The purpose of the report is to document our project’s theory, implementation and test results. The project works on an automata-based learning system which models authors’ writing characters with automatons. Since there were pervious works done by Dr. T.Y. Lin and Ms. S.X. Zhang, we continue on ALERGIA algorithm analysis and initial common pattern study in this project. Although every author has his/her own writing style, such as sentence length and word frequency etc, there are always some similarities in writing style. We hypothesize that common strings fogged the expected test result, just like the noise in radio wave. This …


Improving Performance Of Bittorrent Network Through Incentive Mechanism, Mingzhe Li Jul 2011

Improving Performance Of Bittorrent Network Through Incentive Mechanism, Mingzhe Li

Master's Projects

Content Distribution via Internet has become increasingly popular right now. Compared with centralized file distribution system using FTP and HTTP protocols, P2P (Peer to Peer) is more cost-effective. Furthermore, it could help save on bandwidth costs and to handle pick demands. Among many P2P protocols, BitTorrent is one of the most popular protocols right now. The BitTorrent network uses tit-for-tat as a method of seeking Pareto efficiency. However, seeders who contribute more to BitTorrent network than leechers are not incentivized to stay online and upload to others. This paper discusses an incentive mechanism which rewards seeder, who stays in a …


Social Network Leverage Search, Payal Gupta Jul 2011

Social Network Leverage Search, Payal Gupta

Master's Projects

Social networks are at an all time high, nowadays. They make the world a smaller place to live in. People can stay in touch with friends and can make new friends on these social networks which traditionally were not possible without internet service. The possibilities provided by social networks enable vast and immediate contact. People tend to spend lot of time on the social networks like Facebook, LinkedIn and Twitter peeping into their friend‟s accounts and trying to stay connected with the world.
However, recently people have started closing their accounts on these famous social networks after having been irritated …


Efficient Unfolding Pattern Recognition In Single Molecule Force Spectroscopy Data, Bill Andreopoulos, Dirk Labudde Jun 2011

Efficient Unfolding Pattern Recognition In Single Molecule Force Spectroscopy Data, Bill Andreopoulos, Dirk Labudde

Faculty Publications, Computer Science

BackgroundSingle-molecule force spectroscopy (SMFS) is a technique that measures the force necessary to unfold a protein. SMFS experiments generate Force-Distance (F-D) curves. A statistical analysis of a set of F-D curves reveals different unfolding pathways. Information on protein structure, conformation, functional states, and inter- and intra-molecular interactions can be derived.ResultsIn the present work, we propose a pattern recognition algorithm and apply our algorithm to datasets from SMFS experiments on the membrane protein bacterioRhodopsin (bR). We discuss the unfolding pathways found in bR, which are characterised by main peaks and side peaks. A main peak is the result of the pairwise …


Dynamic Code Checksum Generator, Ashish Sharma Apr 2011

Dynamic Code Checksum Generator, Ashish Sharma

Master's Projects

A checksum (i.e., a cryptographic hash) of a file can be used as an integrity check, if an attacker tries to change the code in an executable file, a checksum can be used to detect the tampering. While it is easy to compute a checksum for any static file, it is possible for an attacker to tamper with an executable file as it is being loaded into memory, or after it has been loaded. Therefore, it would be more useful to checksum an executable file dynamically only after the file has been loaded into memory. However, checksumming dynamic code is …


Substitution Cipher With Non­Prefix Codes, Rashmi Bangalore Muralidhar Apr 2011

Substitution Cipher With Non­Prefix Codes, Rashmi Bangalore Muralidhar

Master's Projects

Substitution ciphers normally use prefix free codes ­ there is no code word which is the prefix of some other code word. Prefix free codes are used for encryption because it makes the decryption process easier at the receiver's end.
In this project, we study the feasibility of substitution ciphers with non­prefix codes. The advantage of using non­prefix codes is that extracting statistical information is more difficult. However, the ciphertext is nontrivial to decrypt.
We present a dynamic programming technique for decryption and verify that the plaintext can be recovered. This shows that substitution ciphers with non­prefix codes are feasible. …


Video Chat Application For Facebook, Shirali Chokshi Apr 2011

Video Chat Application For Facebook, Shirali Chokshi

Master's Projects

This project is mainly written for the facebook users. In today’s world, there are many social networking sites available. Among those social networking web sites, facebook is widely used web site. Like all other social networking web sites, Facebook also provides many features to attract more and more users. But it lacks in providing the most important feature of social networking, i.e. video chat. I explore the different options and requirements needed to build the video chat application. I have also described the integration of the application with the facebook.


Recipe Suggestion Tool, Sakuntala Padmapriya Gangaraju Apr 2011

Recipe Suggestion Tool, Sakuntala Padmapriya Gangaraju

Master's Projects

ABSTRACT
There is currently a great need for a tool to search cooking recipes based on ingredients. Current search engines do not provide this feature. Most of the recipe search results in current websites are not efficiently clustered based on relevance or categories resulting in a user getting lost in the huge search results presented.
Clustering in information retrieval is used for higher efficiency and better presentation of information to the user. Clustering puts similar documents in the same cluster. If a document is relevant to a query, then the documents in the same cluster are also relevant.
The goal …


Smart Search: A Firefox Add-On To Compute A Web Traffic Ranking, Vijaya Pamidi Apr 2011

Smart Search: A Firefox Add-On To Compute A Web Traffic Ranking, Vijaya Pamidi

Master's Projects

Search engines results are typically ordered according to some notion of importance of a web page as well as relevance of the content of a web page to a query. Web page importance is usually calculated based on some graph theoretic properties of the web. Another common technique to measure page importance is to make use of the traffic that goes to a particular web page as measured by a browser toolbar. Currently, there are some traffic ranking tools available like www.alexa.com, www.ranking.com, www.compete.com that give such analytic as to the number of users who visit a web site. Alexa …