Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Browser Toolbar Traffic Rank (1)
- Code Smell Program Maintability Refactoring (1)
- Computer power consumption (1)
- Content Distribution Bit Torrent Incentives (1)
- Data mining association rules bitmaps (1)
-
- Data mining social networks (1)
- Digital watermarking HMM (1)
- Ebook content management system security (1)
- Executable compression encryption (1)
- Executable hash functions tamper detection (1)
- Facebook google chat interoperability (1)
- Force-Distance curve (1)
- HMM edit distance sequence alignment Metamorphic Virus Detection (1)
- Learning Algorithms Automata (1)
- Medical databases mobile devices (1)
- Meta morphic virus detection code emulation (1)
- Parallel Programming Synchronization (1)
- Pattern recognition (1)
- Penetration Testing Tools (1)
- Protein structure prediction hidden markov model (1)
- Protein unfolding (1)
- RNA Secondary Structure Prediction (1)
- Recurrence Relations Run Times (1)
- Reverse engineering algorithms (1)
- Reverse engineering software security compilers (1)
- Search Engine Clustering Information Retrieval (1)
- Single-molecule force spectroscopy (1)
- Social Network Filtering (1)
- Substitution cipher prefix non-prefix code (1)
- Video chat (1)
- Publication Type
Articles 1 - 30 of 52
Full-Text Articles in Physical Sciences and Mathematics
Generation Of Forests On Terrain With Dynamic Lighting And Shadowing, Jonathan Ben-David
Generation Of Forests On Terrain With Dynamic Lighting And Shadowing, Jonathan Ben-David
Master's Projects
The purpose of this research project is to exhibit an efficient method of creating dynamic lighting and shadowing for the generation of forests on terrain. In this research project, I use textures which contain images of trees from a bird’s eye view in order to create a high scale forest. Furthermore, by manipulating the transparency and color of the textures according to the algorithmic calculations of light and shadow on terrain, I provide the functionality of dynamic lighting and shadowing. Finally, by analyzing the OpenGL pipeline, I design my code in order to allow efficient rendering of the forest.
A Genetic Algorithm Scheduling Approach For Virtual Machine Resources In A Cloud Computing Environment, Shailesh Sawant
A Genetic Algorithm Scheduling Approach For Virtual Machine Resources In A Cloud Computing Environment, Shailesh Sawant
Master's Projects
In the present cloud computing environment, the scheduling approaches for VM (Virtual Machine) resources only focus on the current state of the entire system. Most often they fail to consider the system variation and historical behavioral data which causes system load imbalance. To present a better approach for solving the problem of VM resource scheduling in a cloud computing environment, this project demonstrates a genetic algorithm based VM resource scheduling strategy that focuses on system load balancing. The genetic algorithm approach computes the impact in advance, that it will have on the system after the new VM resource is deployed …
Interface Design For Graphics Editor On Multi- Touch Point Systems, Srujitha Mullapudi
Interface Design For Graphics Editor On Multi- Touch Point Systems, Srujitha Mullapudi
Master's Projects
The main objective of the project is to use the touch sensitive device capability of the iPad to give a better user experience and functionalities for the artists. In this project, I have explored different interactions that can give a better experience for artist when compared to traditional computer-mouse interaction. In the traditional Computer-mouse interaction it is very difficult for the user to draw smooth curves, without having to use built-in functions for drawing curves. In this application the user can use the touch panel to do free drawing, the user can basically feel the device as a object for …
Graph Technique For Metamorphic Virus Detection, Neha Runwal
Graph Technique For Metamorphic Virus Detection, Neha Runwal
Master's Projects
Current anti-virus techniques include signature based detection, anomaly based detection, and machine learning based virus detection. Signature detection is the most widely used approach. Metamorphic malware changes its internal structure with each infection. Metamorphism provides one of the strong known methods for evading malware detection. In this project, we consider metamorphic virus detection based on a directed graph obtained from executable files. We compare our detection results with a previously developed and highly successful technique based on hidden Markov models.
X10 Vs Java: Concurrency Constructs And Performance, Anh Trinh
X10 Vs Java: Concurrency Constructs And Performance, Anh Trinh
Master's Projects
To avoid overheating the chip, chip designers have switched to multi-cores. While multicore CPUs reserve instruction-level parallelism features that help existing applications run as if they were running under single core, applications do not reach speeds two or four times faster. Instead of relying on compiler and hardware to figure out parallelism in source code, software developers now must control parallelism explicitly in their programs. Many programming languages and libraries, such as Java, C# .NET, and OpenMP, are trying to help programmers by providing rich concurrency API. X10 is the new experimental language from IBM Research, which has been under …
Enhancing Productivity Of Recruitment Process Using Data Mining & Text Mining Tools, Charul Saxena
Enhancing Productivity Of Recruitment Process Using Data Mining & Text Mining Tools, Charul Saxena
Master's Projects
Digital communication has significantly reduced the time it takes to send a résumé, but the recruiter’s work has become more complicated because with this technological advancement they get more résumés for each job opening. It becomes almost impossible to physically scan each résumé that meets their organization’s job requirement. The filtering and search techniques provide hundreds of résumés that can fulfill the desired criteria. Most approaches focus on either parsing the résumé to get information or propose some filtering methods. Moreover, résumés vary in format and style, making it difficult to maintain a structural repository which would contain all the …
Data Mining And Data Warehouse ------ Maximal Simplex Method, Madhuri Gollu
Data Mining And Data Warehouse ------ Maximal Simplex Method, Madhuri Gollu
Master's Projects
Association Rule Mining is a widely used method for finding interesting relationships from large data sets. The challenge here is how to swiftly and accurately discover association rules from large data sets. To achieve this, this paper will (1) build a data warehouse system that simulates the secondary storage and represents a database by bit patterns, and (2) implement a new geometric algorithm to find association rules, called Maximal Simplex Algorithm. The data warehouse consists of very long bit columns. Each column is an item or an attribute value pair and a row represents a transaction or a tuple in …
Association Mining In Database Machine, Jindou Jiao
Association Mining In Database Machine, Jindou Jiao
Master's Projects
Association rule is wildly used in most of the data mining technologies. Apriori algorithm is the fundamental association rule mining algorithm. FP-growth tree algorithm improves the performance by reduce the generation of the frequent item sets. Simplex algorithm is a advanced FP-growth algorithm by using bitmap structure with the simplex concept in geometry. The bitmap structure implementation is particular designed for storing the data in database machines to support parallel computing the association rule mining.
Jdpet: Java Dynamic Programming Educational Tool, Aaron Lemoine
Jdpet: Java Dynamic Programming Educational Tool, Aaron Lemoine
Master's Projects
There exist many different algorithm types for solving problems, one of which is dynamic programming. To assist students to learn about dynamic programming algorithms, JDPET was developed. JDPET is an interactive, visual, problem solving tool that allows students to solve several different problems and learn how dynamic programming can be applied to solve these problems. JDPET also provides students with detailed feedback on the problems they attempt to solve.
Efficient Attacks On Homophonic Substitution Ciphers, Amrapali Dhavare
Efficient Attacks On Homophonic Substitution Ciphers, Amrapali Dhavare
Master's Projects
Substitution ciphers are one of the earliest types of ciphers. Examples of classic substitution ciphers include the well-known simple substitution and the less well-known homophonic substitution. Although simple substitution ciphers are indeed simple - both in terms of their use and attacks; the homophonic substitution ciphers are far more challenging to break. Even with modern computing technology, homophonic substitution ciphers remain a significant challenge. This project focuses on designing, implementing, and testing an efficient attack on homophonic substitution ciphers. We use an iterative approach that generalizes the fastest known attack on simple substitution ciphers and also employs a heuristic search …
N-Grams Assisted Long Web Search Query Optimization, Jehann Kersi Irani
N-Grams Assisted Long Web Search Query Optimization, Jehann Kersi Irani
Master's Projects
Commercial search engines do not return optimal search results when the query is a long or multi-topic one [1]. Long queries are used extensively. While the creator of the long query would most likely use natural language to describe the query, it contains extra information. This information dilutes the results of a web search, and hence decreases the performance as well as quality of the results returned. Kumaran et al. [22] showed that shorter queries extracted from longer user generated queries are more effective for ad-hoc retrieval. Hence reducing these queries by removing extra terms, the quality of the search …
Clustering Of Twitter Technology Tweets And The Impact Of Stopwords On Clusters, Surya Bhagvat
Clustering Of Twitter Technology Tweets And The Impact Of Stopwords On Clusters, Surya Bhagvat
Master's Projects
Year of 2010 could be termed as the year in which Twitter became completely mainstream. Twitter, which started as a means of communicating with friends, became much more than its beginning. Now Twitter is used by companies to promote their new products, used by movie industry to promote movies. A lot of advertising and branding is now tied to Twitter and most importantly any breaking news that happens, the first place one goes and tries to find is to search it on Twitter. Be it the Mumbai attacks that happened in 2008, or the minor earthquakes that happened in Bay …
Actibot: A Botnet To Evade Active Detection, Xinjun Zhang
Actibot: A Botnet To Evade Active Detection, Xinjun Zhang
Master's Projects
In recent years, botnets have emerged as a serious threat on the Internet. Botnets are commonly used for exploits such as distributed denial of service (DDoS) attacks, identity theft, spam, and click fraud. The immense size of botnets, some consisting of hundreds of thousands of compromised computers, increases the speed and severity of attacks. Unlike passive behavior anomaly detection techniques, active botnet detection aims to collect evidence actively, in order to reduce detection time and increase accuracy. In this project, we develop and analyze a botnet that we call ActiBot, which can evade some types of active detection mechanisms. Future …
Url Recommender Using Parallel Processing, Ravi Kishore Penta
Url Recommender Using Parallel Processing, Ravi Kishore Penta
Master's Projects
The main purpose of this project is to section similar news and articles from a vast variety of news articles. Let’s say, you want to read about latest news related to particular topic like sports. Usually, user goes to a particular website and goes through some news but he won’t be able to cover all the news coverage in a single website. So, he would be going through some other news website to checking it out and this continues. Also, some news websites might be containing some old news and the user might be going through that. To solve this, …
Augmented-Life Phone Organizer, Chao-Hsin Shih
Augmented-Life Phone Organizer, Chao-Hsin Shih
Master's Projects
Augmented-Life Phone Organizer (ALPO) is a geo-based mobile application for users to search for businesses and make corresponding actions such as calling, navigating, or viewing comments about the business. Users can take image notes and attach them to a virtual wall, so others can view the image at the same GPS coordinates later. Users can also view all business images and augmented notes superimposed on the real world through a mobile device screen and camera. We have measured application usability and feature practicality by conducting function tests on three users, and the results are encouraging.
A Machine Learning And Compiler-Based Approach To Automatically Parallelize Serial Programs Using Openmp, Nam Quang Lam
A Machine Learning And Compiler-Based Approach To Automatically Parallelize Serial Programs Using Openmp, Nam Quang Lam
Master's Projects
Single core designs and architectures have reached their limits due to heat and power walls. In order to continue to increase hardware performance, hardware industries have moved forward to multi-core designs and implementations which introduces a new paradigm in parallel computing. As a result, software programmers must be able to explicitly write or produce parallel programs to fully exploit the potential computing power of parallel processing in the underlying multi-core architectures. Since the hardware solution directly exposes parallelism to software designers, different approaches have been investigated to help the programmers to implement software parallelism at different levels. One of the …
Discovering Knowledge Structure In The Web, Siddharth Ramu
Discovering Knowledge Structure In The Web, Siddharth Ramu
Master's Projects
Association Rule Mining is a widely used method for finding interesting relationships from large data sets. The challenge here is how to swiftly and accurately discover association rules from large data sets. To achieve this, this paper will (1) build a data warehouse system that simulates the secondary storage and represents a database by bit patterns, and (2) implement a new geometric algorithm to find association rules, called Maximal Simplex Algorithm. The data warehouse consists of very long bit columns. Each column is an item or an attribute value pair and a row represents a transaction or a tuple in …
Ec2lab: Saas Using Amazon Elastic Cloud Compute, Manisha Gaikwad
Ec2lab: Saas Using Amazon Elastic Cloud Compute, Manisha Gaikwad
Master's Projects
The cloud computing is gaining popularity as it provides an infinite pool of hardware and software resources on demand. The Infrastructure-as-a-Service (IaaS) layer provides the physical resources, and relieves the users from the tedious as well as time consuming task of procuring and setting the server as well as the storage. This project harnesses the capability of the Amazon IaaS layer. The Software-as-a-Service (SaaS) application which is built on top of Amazon IaaS layer, helps the users to easily handle and connect with Amazon's Elastic Cloud Compute (EC2) instances.
Scanned Wireless Network Setup Fake Access Point & Its Detection, Saurabh Vishal
Scanned Wireless Network Setup Fake Access Point & Its Detection, Saurabh Vishal
Master's Projects
This thesis addresses the topic of development and advancement of the wireless technology. Report described about network monitoring and security issues with advancement in the increase of network bandwidth and user requirements to access the internet. This report mainly focuses on how war driving affects the security of end user. How it can solve problem for infected users who are accessing the internet. The technique is used in wireless environment where all kinds of wireless devices can access internet and can use network resources with high security and better performance. Research on this topic reveals that passive monitoring technique can …
Riverland 2.0: Blending Of Multiple User-Defined Slopes In A Procedurally Modeled Terrain, Jeffrey Jensen
Riverland 2.0: Blending Of Multiple User-Defined Slopes In A Procedurally Modeled Terrain, Jeffrey Jensen
Master's Projects
This writing project attempts to improve on and add features to the current program called RiverLand originally designed and implemented by Dr. Soon Tee Teoh. I discuss the original methods used by RiverLand to create procedurally generated terrain. I then explore the weaknesses of the original RiverLand which include having only linear ridges and undesirable medial axis cells. I then tackle the problem of recurring patterns when texturizing a surface with very few textures. I propose how to solve these problems and explain the methods used to accomplish this. I discuss the user interfaces that were designed to accommodate the …
Algorithms Analysis System: Recurrences, Anchit Sharma
Algorithms Analysis System: Recurrences, Anchit Sharma
Master's Projects
Algorithms which are recursive have running times which can be described by
recurrence equations or recurrences. These equations determine the overall running time complexity of the algorithm. This project intends to create a mechanism for
-
auto generating recurrence equations of the form T(n) = a(T(n)/b) + f(n)
-
creating a computational method for solving them and generating running times
i.e. O (f(n)) or Ω (f(n)).
-
presenting students with a way to verify their manually computed answers with
the solution generation by the project
-
generating grading and feedback for their solution
The exercises will utilize the ‘Substitution Method’ and the ‘Master Method’ …
Learning Author’S Writing Pattern System By Automata, Qun Yu
Learning Author’S Writing Pattern System By Automata, Qun Yu
Master's Projects
The purpose of the report is to document our project’s theory, implementation and test results. The project works on an automata-based learning system which models authors’ writing characters with automatons. Since there were pervious works done by Dr. T.Y. Lin and Ms. S.X. Zhang, we continue on ALERGIA algorithm analysis and initial common pattern study in this project. Although every author has his/her own writing style, such as sentence length and word frequency etc, there are always some similarities in writing style. We hypothesize that common strings fogged the expected test result, just like the noise in radio wave. This …
Improving Performance Of Bittorrent Network Through Incentive Mechanism, Mingzhe Li
Improving Performance Of Bittorrent Network Through Incentive Mechanism, Mingzhe Li
Master's Projects
Content Distribution via Internet has become increasingly popular right now. Compared with centralized file distribution system using FTP and HTTP protocols, P2P (Peer to Peer) is more cost-effective. Furthermore, it could help save on bandwidth costs and to handle pick demands. Among many P2P protocols, BitTorrent is one of the most popular protocols right now. The BitTorrent network uses tit-for-tat as a method of seeking Pareto efficiency. However, seeders who contribute more to BitTorrent network than leechers are not incentivized to stay online and upload to others. This paper discusses an incentive mechanism which rewards seeder, who stays in a …
Social Network Leverage Search, Payal Gupta
Social Network Leverage Search, Payal Gupta
Master's Projects
Social networks are at an all time high, nowadays. They make the world a smaller place to live in. People can stay in touch with friends and can make new friends on these social networks which traditionally were not possible without internet service. The possibilities provided by social networks enable vast and immediate contact. People tend to spend lot of time on the social networks like Facebook, LinkedIn and Twitter peeping into their friend‟s accounts and trying to stay connected with the world.
However, recently people have started closing their accounts on these famous social networks after having been irritated …
Efficient Unfolding Pattern Recognition In Single Molecule Force Spectroscopy Data, Bill Andreopoulos, Dirk Labudde
Efficient Unfolding Pattern Recognition In Single Molecule Force Spectroscopy Data, Bill Andreopoulos, Dirk Labudde
Faculty Publications, Computer Science
BackgroundSingle-molecule force spectroscopy (SMFS) is a technique that measures the force necessary to unfold a protein. SMFS experiments generate Force-Distance (F-D) curves. A statistical analysis of a set of F-D curves reveals different unfolding pathways. Information on protein structure, conformation, functional states, and inter- and intra-molecular interactions can be derived.ResultsIn the present work, we propose a pattern recognition algorithm and apply our algorithm to datasets from SMFS experiments on the membrane protein bacterioRhodopsin (bR). We discuss the unfolding pathways found in bR, which are characterised by main peaks and side peaks. A main peak is the result of the pairwise …
Dynamic Code Checksum Generator, Ashish Sharma
Dynamic Code Checksum Generator, Ashish Sharma
Master's Projects
A checksum (i.e., a cryptographic hash) of a file can be used as an integrity check, if an attacker tries to change the code in an executable file, a checksum can be used to detect the tampering. While it is easy to compute a checksum for any static file, it is possible for an attacker to tamper with an executable file as it is being loaded into memory, or after it has been loaded. Therefore, it would be more useful to checksum an executable file dynamically only after the file has been loaded into memory. However, checksumming dynamic code is …
Substitution Cipher With NonPrefix Codes, Rashmi Bangalore Muralidhar
Substitution Cipher With NonPrefix Codes, Rashmi Bangalore Muralidhar
Master's Projects
Substitution ciphers normally use prefix free codes there is no code word which is the prefix of some other code word. Prefix free codes are used for encryption because it makes the decryption process easier at the receiver's end.
In this project, we study the feasibility of substitution ciphers with nonprefix codes. The advantage of using nonprefix codes is that extracting statistical information is more difficult. However, the ciphertext is nontrivial to decrypt.
We present a dynamic programming technique for decryption and verify that the plaintext can be recovered. This shows that substitution ciphers with nonprefix codes are feasible. …
Video Chat Application For Facebook, Shirali Chokshi
Video Chat Application For Facebook, Shirali Chokshi
Master's Projects
This project is mainly written for the facebook users. In today’s world, there are many social networking sites available. Among those social networking web sites, facebook is widely used web site. Like all other social networking web sites, Facebook also provides many features to attract more and more users. But it lacks in providing the most important feature of social networking, i.e. video chat. I explore the different options and requirements needed to build the video chat application. I have also described the integration of the application with the facebook.
Recipe Suggestion Tool, Sakuntala Padmapriya Gangaraju
Recipe Suggestion Tool, Sakuntala Padmapriya Gangaraju
Master's Projects
ABSTRACT
There is currently a great need for a tool to search cooking recipes based on ingredients. Current search engines do not provide this feature. Most of the recipe search results in current websites are not efficiently clustered based on relevance or categories resulting in a user getting lost in the huge search results presented.
Clustering in information retrieval is used for higher efficiency and better presentation of information to the user. Clustering puts similar documents in the same cluster. If a document is relevant to a query, then the documents in the same cluster are also relevant.
The goal …
Smart Search: A Firefox Add-On To Compute A Web Traffic Ranking, Vijaya Pamidi
Smart Search: A Firefox Add-On To Compute A Web Traffic Ranking, Vijaya Pamidi
Master's Projects
Search engines results are typically ordered according to some notion of importance of a web page as well as relevance of the content of a web page to a query. Web page importance is usually calculated based on some graph theoretic properties of the web. Another common technique to measure page importance is to make use of the traffic that goes to a particular web page as measured by a browser toolbar. Currently, there are some traffic ranking tools available like www.alexa.com, www.ranking.com, www.compete.com that give such analytic as to the number of users who visit a web site. Alexa …