Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

University of Central Florida

2017

Articles 1 - 22 of 22

Full-Text Articles in Physical Sciences and Mathematics

Weakly Labeled Action Recognition And Detection, Waqas Sultani Jan 2017

Weakly Labeled Action Recognition And Detection, Waqas Sultani

Electronic Theses and Dissertations

Research in human action recognition strives to develop increasingly generalized methods that are robust to intra-class variability and inter-class ambiguity. Recent years have seen tremendous strides in improving recognition accuracy on ever larger and complex benchmark datasets, comprising realistic actions "in the wild" videos. Unfortunately, the all-encompassing, dense, global representations that bring about such improvements often benefit from the inherent characteristics, specific to datasets and classes, that do not necessarily reflect knowledge about the entity to be recognized. This results in specific models that perform well within datasets but generalize poorly. Furthermore, training of supervised action recognition and detection methods …


Designing Light Filters To Detect Skin Using A Low-Powered Sensor, Muhammad Uzair Tariq Jan 2017

Designing Light Filters To Detect Skin Using A Low-Powered Sensor, Muhammad Uzair Tariq

Electronic Theses and Dissertations

Detection of nudity in photos and videos, especially prior to uploading to the internet, is vital to solving many problems related to adolescent sexting, the distribution of child pornography, and cyber-bullying. The problem with using nudity detection algorithms as a means to combat these problems is that: 1) it implies that a digitized nude photo of a minor already exists (i.e., child pornography), and 2) there are real ethical and legal concerns around the distribution and processing of child pornography. Once a camera captures an image, that image is no longer secure. Therefore, we need to develop new privacy-preserving solutions …


Exploring The Multi-Touch Interaction Design Space For 3d Virtual Objects To Support Procedural Training Tasks, Sarah Holderness Jan 2017

Exploring The Multi-Touch Interaction Design Space For 3d Virtual Objects To Support Procedural Training Tasks, Sarah Holderness

Electronic Theses and Dissertations

Multi-touch interaction has the potential to be an important input method for realistic training in 3D environments. However, multi-touch interaction has not been explored much in 3D tasks, especially when trying to leverage realistic, real-world interaction paradigms. A systematic inquiry into what realistic gestures look like for 3D environments is required to understand how users translate real-world motions to multi-touch motions. Once those gestures are defined, it is important to see how we can leverage those gestures to enhance training tasks. In order to explore the interaction design space for 3D virtual objects, we began by conducting our first study …


Pervasive Secure Content Delivery Networks Implementation, Hector Lugo-Cordero Jan 2017

Pervasive Secure Content Delivery Networks Implementation, Hector Lugo-Cordero

Electronic Theses and Dissertations

Over the years, communication networks have been shifting their focus from providing connectivity in a client/server model to providing a service or content. This shift has led to topic areas like Service-Oriented Architecture (SOA), Heterogeneous Wireless Mesh Networks, and Ubiquitous Computing. Furthermore, probably the broadest of these areas which embarks all is the Internet of Things (IoT). The IoT is defined as an Internet where all physical entities (e.g., vehicles, appliances, smart phones, smart homes, computers, etc.), which we interact daily are connected and exchanging data among themselves and users. The IoT has become a global goal for companies, researchers, …


Jml Template Generation, Kushal Raghav Poojari Jan 2017

Jml Template Generation, Kushal Raghav Poojari

Electronic Theses and Dissertations

The Java Modeling Language (JML) is a behavioral interface specific language designed to specify Java modules (which are Java classes and interfaces). Specifications are used to describe the intended functionality without considering the way it is implemented. In JML, if a user wants to write specifications for a Java file, he or she must undertake several steps. To help automate the process of creating annotations for method specifications, a tool Jmlspec was created. Jmlspec generated a file that refines the source file and has empty placeholders in which one can write specifications. Although Jmlspec worked with older versions of Java, …


Resource Allocation And Pricing In Secondary Dynamic Spectrum Access Networks, Enas Khairullah Jan 2017

Resource Allocation And Pricing In Secondary Dynamic Spectrum Access Networks, Enas Khairullah

Electronic Theses and Dissertations

The paradigm shift from static spectrum allocation to a dynamic one has opened many challenges that need to be addressed for the true vision of Dynamic Spectrum Access (DSA) to materialize. This dissertation proposes novel solutions that include: spectrum allocation, routing, and scheduling in DSA networks. First, we propose an auction-based spectrum allocation scheme in a multi-channel environment where secondary users (SUs) bid to buy channels from primary users (PUs) based on the signal to interference and noise ratio (SINR). The channels are allocated such that i) the SUs get their preferred channels, ii) channels are re-used, and iii) there …


Learning Robotic Manipulation From User Demonstrations, Rouhollah Rahmatizadeh Jan 2017

Learning Robotic Manipulation From User Demonstrations, Rouhollah Rahmatizadeh

Electronic Theses and Dissertations

Personal robots that help disabled or elderly people in their activities of daily living need to be able to autonomously perform complex manipulation tasks. Traditional approaches to this problem employ task-specific controllers. However, these must to be designed by expert programmers, are focused on a single task, and will perform the task as programmed, not according to the preferences of the user. In this dissertation, we investigate methods that enable an assistive robot to learn to execute tasks as demonstrated by the user. First, we describe a learning from demonstration (LfD) method that learns assistive tasks that need to be …


Visual Saliency Detection And Semantic Segmentation, Nasim Souly Jan 2017

Visual Saliency Detection And Semantic Segmentation, Nasim Souly

Electronic Theses and Dissertations

Visual saliency is the ability to select the most relevant data in the scene and reduce the amount of data that needs to be processed. We propose a novel unsupervised approach to detect visual saliency in videos. For this, we employ a hierarchical segmentation technique to obtain supervoxels of a video, and simultaneously, we build a dictionary from cuboids of the video. Then we create a feature matrix from coefficients of dictionary elements. Next, we decompose this matrix into sparse and redundant parts and obtain salient regions using group lasso. Our experiments provide promising results in terms of predicting eye …


Online, Supervised And Unsupervised Action Localization In Videos, Khurram Soomro Jan 2017

Online, Supervised And Unsupervised Action Localization In Videos, Khurram Soomro

Electronic Theses and Dissertations

Action recognition classifies a given video among a set of action labels, whereas action localization determines the location of an action in addition to its class. The overall aim of this dissertation is action localization. Many of the existing action localization approaches exhaustively search (spatially and temporally) for an action in a video. However, as the search space increases with high resolution and longer duration videos, it becomes impractical to use such sliding window techniques. The first part of this dissertation presents an efficient approach for localizing actions by learning contextual relations between different video regions in training. In testing, …


Adversarial Attacks On Vision Algorithms Using Deep Learning Features, Andy Michel Jan 2017

Adversarial Attacks On Vision Algorithms Using Deep Learning Features, Andy Michel

Electronic Theses and Dissertations

Computer vision algorithms, such as those implementing object detection, are known to be susceptible to adversarial attacks. Small barely perceptible perturbations to the input can cause vision algorithms to incorrectly classify inputs that they would have otherwise classified correctly. A number of approaches have been recently investigated to generate such adversarial examples for deep neural networks. Many of these approaches either require grey-box access to the deep neural net being attacked or rely on adversarial transfer and grey-box access to a surrogate neural network. In this thesis, we present an approach to the synthesis of adversarial examples for computer vision …


Novel Computational Methods For Integrated Circuit Reverse Engineering, Travis Meade Jan 2017

Novel Computational Methods For Integrated Circuit Reverse Engineering, Travis Meade

Electronic Theses and Dissertations

Production of Integrated Circuits (ICs) has been largely strengthened by globalization. System-on-chip providers are capable of utilizing many different providers which can be responsible for a single task. This horizontal structure drastically improves to time-to-market and reduces manufacturing cost. However, untrust of oversea foundries threatens to dismantle the complex economic model currently in place. Many Intellectual Property (IP) consumers become concerned over what potentially malicious or unspecified logic might reside within their application. This logic which is inserted with the intention of causing harm to a consumer has been referred to as a Hardware Trojan (HT). To help IP consumers, …


Super Resolution Of Wavelet-Encoded Images And Videos, Vildan Atalay Jan 2017

Super Resolution Of Wavelet-Encoded Images And Videos, Vildan Atalay

Electronic Theses and Dissertations

In this dissertation, we address the multiframe super resolution reconstruction problem for wavelet-encoded images and videos. The goal of multiframe super resolution is to obtain one or more high resolution images by fusing a sequence of degraded or aliased low resolution images of the same scene. Since the low resolution images may be unaligned, a registration step is required before super resolution reconstruction. Therefore, we first explore in-band (i.e. in the wavelet-domain) image registration; then, investigate super resolution. Our motivation for analyzing the image registration and super resolution problems in the wavelet domain is the growing trend in wavelet-encoded imaging, …


The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2017, Buenaventura "Ven" Basco Jan 2017

The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2017, Buenaventura "Ven" Basco

Libraries' Newsletters

No abstract provided.


Reasoning About Frame Properties In Object-Oriented Programs, Yuyan Bao Jan 2017

Reasoning About Frame Properties In Object-Oriented Programs, Yuyan Bao

Electronic Theses and Dissertations

Framing is important for specification and verification of object-oriented programs. This dissertation develops the local reasoning approach for framing in the presence of data structures with unrestricted sharing and subtyping. It can verify shared data structures specified in a concise way by unifying fine-grained region logic and separation logic. Then the fine-grained region logic is extended to reason about subtyping. First, fine-grained region logic is adapted from region logic to express regions at the granularity of individual fields. Conditional region expressions are introduced; not only does this allow one to specify more precise frame conditions, it also has the ability …


Learning Dynamic Network Models For Complex Social Systems, Alireza Hajibagheri Jan 2017

Learning Dynamic Network Models For Complex Social Systems, Alireza Hajibagheri

Electronic Theses and Dissertations

Human societies are inherently complex and highly dynamic, resulting in rapidly changing social networks, containing multiple types of dyadic interactions. Analyzing these time-varying multiplex networks with approaches developed for static, single layer networks often produces poor results. To address this problem, our approach is to explicitly learn the dynamics of these complex networks. This dissertation focuses on five problems: 1) learning link formation rates; 2) predicting changes in community membership; 3) using time series to predict changes in network structure; 4) modeling coevolution patterns across network layers and 5) extracting information from negative layers of a multiplex network. To study …


Complex Affect Recognition In The Wild, Behnaz Nojavanasghari Jan 2017

Complex Affect Recognition In The Wild, Behnaz Nojavanasghari

Electronic Theses and Dissertations

Artificial social intelligence is a step towards human-like human-computer interaction. One important milestone towards building socially intelligent systems is enabling computers with the ability to process and interpret the social signals of humans in the real world. Social signals include a wide range of emotional responses from a simple smile to expressions of complex affects. This dissertation revolves around computational models for social signal processing in the wild, using multimodal signals with an emphasis on the visual modality. We primarily focus on complex affect recognition with a strong interest in curiosity. In this dissertation,we ?rst present our collected dataset, EmoReact. …


Implementation Of Refining Statements In Openjml And Verification Of Higher Order Methods With Model Program Specifications, Sai Chandesh Gurramkonda Jan 2017

Implementation Of Refining Statements In Openjml And Verification Of Higher Order Methods With Model Program Specifications, Sai Chandesh Gurramkonda

Electronic Theses and Dissertations

The Java Modeling Language (JML) describes the functional behavior of Java classes and methods using pre- and postconditions. However, standard pre- and postcondition specifications cannot verify calls to higher order methods (HOMs). JML uses model program specifications to reason about HOMs. This thesis describes the implementation of model programs in the OpenJML tool. The implementation includes parsing, type checking, and matching of model program specifications against the code.


Code Park: A New 3d Code Visualization Tool And Ide, Pooya Khaloo Jan 2017

Code Park: A New 3d Code Visualization Tool And Ide, Pooya Khaloo

Electronic Theses and Dissertations

We introduce Code Park, a novel tool for visualizing codebases in a 3D game-like environment. Code Park aims to improve a programmer's understanding of an existing codebase in a manner that is both engaging and fun to be appealing especially for novice users such as students. It achieves these goals by laying out the codebase in a 3D park-like environment. Each class in the codebase is represented as a 3D room-like structure. Constituent parts of the class (variable, member functions, etc.) are laid out on the walls, resembling a syntax-aware "wallpaper". The users can interact with the codebase using an …


Hashing For Multimedia Similarity Modeling And Large-Scale Retrieval, Kai Li Jan 2017

Hashing For Multimedia Similarity Modeling And Large-Scale Retrieval, Kai Li

Electronic Theses and Dissertations

In recent years, the amount of multimedia data such as images, texts, and videos have been growing rapidly on the Internet. Motivated by such trends, this thesis is dedicated to exploiting hashing-based solutions to reveal multimedia data correlations and support intra-media and inter-media similarity search among huge volumes of multimedia data. We start by investigating a hashing-based solution for audio-visual similarity modeling and apply it to the audio-visual sound source localization problem. We show that synchronized signals in audio and visual modalities demonstrate similar temporal changing patterns in certain feature spaces. We propose to use a permutation-based random hashing technique …


Data Representation In Machine Learning Methods With Its Application To Compilation Optimization And Epitope Prediction, Yevgeniy Sher Jan 2017

Data Representation In Machine Learning Methods With Its Application To Compilation Optimization And Epitope Prediction, Yevgeniy Sher

Electronic Theses and Dissertations

In this dissertation we explore the application of machine learning algorithms to compilation phase order optimization, and epitope prediction. The common thread running through these two disparate domains is the type of data being dealt with. In both problem domains we are dealing with categorical data, with its representation playing a significant role in the performance of classification algorithms. We first present a neuroevolutionary approach which orders optimization phases to generate compiled programs with performance superior to those compiled using LLVM's -O3 optimization level. Performance improvements calculated as the speed of the compiled program's execution ranged from 27% for the …


On The Security Of Nosql Cloud Database Services, Mohammad Ahmadian Jan 2017

On The Security Of Nosql Cloud Database Services, Mohammad Ahmadian

Electronic Theses and Dissertations

Processing a vast volume of data generated by web, mobile and Internet-enabled devices, necessitates a scalable and flexible data management system. Database-as-a-Service (DBaaS) is a new cloud computing paradigm, promising a cost-effective and scalable, fully-managed database functionality meeting the requirements of online data processing. Although DBaaS offers many benefits it also introduces new threats and vulnerabilities. While many traditional data processing threats remain, DBaaS introduces new challenges such as confidentiality violation and information leakage in the presence of privileged malicious insiders and adds new dimension to the data security. We address the problem of building a secure DBaaS for a …


Network Partitioning In Distributed Agent-Based Models, Antoniya Petkova Jan 2017

Network Partitioning In Distributed Agent-Based Models, Antoniya Petkova

Electronic Theses and Dissertations

Agent-Based Models (ABMs) are an emerging simulation paradigm for modeling complex systems, comprised of autonomous, possibly heterogeneous, interacting agents. The utility of ABMs lies in their ability to represent such complex systems as self-organizing networks of agents. Modeling and understanding the behavior of complex systems usually occurs at large and representative scales, and often obtaining and visualizing of simulation results in real-time is critical. The real-time requirement necessitates the use of in-memory computing, as it is difficult and challenging to handle the latency and unpredictability of disk accesses. Combining this observation with the scale requirement emphasizes the need to use …