Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Optimizing Vehicle Usage Using Csp, Sat And Max-Sat, Raheem T. Al Rammahi Jan 2016

Optimizing Vehicle Usage Using Csp, Sat And Max-Sat, Raheem T. Al Rammahi

Electronic Theses and Dissertations

Most of the companies in Iraq spend significant amounts of time and money when transferring employees between home and work. In this thesis, we model the problem of the Dhi Qar Oil company (DQOC) transportations using three modeling languages from AI: Constraint Programing (CP), Boolean Satisfiability (SAT), and Maximum Satisfiability (MAX-SAT). We then use solvers to find optimal solutions to this problem.

We show which of these solvers is more efficient when finding optimal solutions. For this purpose, we create a test suite of 360 problems to test these solvers. All solvers are applied to these problems and the final …


Greenc5: An Adaptive, Energy-Aware Collection For Green Software Development, Junya Michanan Jan 2016

Greenc5: An Adaptive, Energy-Aware Collection For Green Software Development, Junya Michanan

Electronic Theses and Dissertations

Dynamic data structures in software applications have been shown to have a large impact on system performance. In this paper, we explore energy saving opportunities of interface-based dynamic data structures. Our results suggest that savings opportunities exist in the C5 Collection between 16.95% and 97.50%. We propose a prototype and architecture for creating adaptive green data structures by applying machine learning tools to build a model for predicting energy efficient data structures based on the dynamic workload. Our neural network model can classify energy efficient data structures based on features such as the number of elements, frequency of operations, interface …


Implementing Agile Development At Scale: An Industry Case Study, Nikita Kataria Jan 2016

Implementing Agile Development At Scale: An Industry Case Study, Nikita Kataria

Electronic Theses and Dissertations

Agile software development methodologies are extremely popular. Their dynamic restructuring of the development process has been seen as the silver bullet for increasing the productivity of software development. A significant number of studies have analyzed the impact of implementing agile techniques. However these are mostly evaluated only in smaller team settings. There is very little reporting done on how agile development methods can be implemented at the team level and scaled up at the program/portfolio level in large software organizations.

We present the results of an empirical study conducted at Pearson Education. The study focuses on the penetration of agile …


A Near-To-Far Learning Framework For Terrain Characterization Using An Aerial/Ground-Vehicle Team, Ashkan Hajjam Jan 2016

A Near-To-Far Learning Framework For Terrain Characterization Using An Aerial/Ground-Vehicle Team, Ashkan Hajjam

Electronic Theses and Dissertations

In this thesis, a novel framework for adaptive terrain characterization of untraversed far terrain in a natural outdoor setting is presented. The system learns the association between visual appearance of different terrain and the proprioceptive characteristics of that terrain in a self-supervised framework. The proprioceptive characteristics of the terrain are acquired by inertial sensors recording measurements of one second traversals that are mapped into the frequency domain and later through a clustering technique classified into discrete proprioceptive classes. Later, these labels are used as training inputs to the adaptive visual classifier. The visual classifier uses images captured by an aerial …


Model Based Security Testing For Autonomous Vehicles, Seana Lisa Hagerman Jan 2016

Model Based Security Testing For Autonomous Vehicles, Seana Lisa Hagerman

Electronic Theses and Dissertations

The purpose of this dissertation is to introduce a novel approach to generate a security test suite to mitigate malicious attacks on an autonomous system. Our method uses model based testing (MBT) methods to model system behavior, attacks and mitigations as independent threads in an execution stream. The threads intersect at a rendezvous or attack point. We build a security test suite from a behavioral model, an attack type and a mitigation model using communicating extended finite state machine (CEFSM) models. We also define an applicability matrix to determine which attacks are possible with which states. Our method then builds …


Leveraging Client Processing For Location Privacy In Mobile Local Search, Wisam Mohamed Eltarjaman Jan 2016

Leveraging Client Processing For Location Privacy In Mobile Local Search, Wisam Mohamed Eltarjaman

Electronic Theses and Dissertations

Usage of mobile services is growing rapidly. Most Internet-based services targeted for PC based browsers now have mobile counterparts. These mobile counterparts often are enhanced when they use user's location as one of the inputs. Even some PC-based services such as point of interest Search, Mapping, Airline tickets, and software download mirrors now use user's location in order to enhance their services. Location-based services are exactly these, that take the user's location as an input and enhance the experience based on that. With increased use of these services comes the increased risk to location privacy. The location is considered an …


Peccit: An Omniscient Debugger For Web Development, Zachary Ryan Azar Jan 2016

Peccit: An Omniscient Debugger For Web Development, Zachary Ryan Azar

Electronic Theses and Dissertations

Debugging can be an extremely expensive and time-consuming task for a software developer. To find a bug, the developer typically needs to navigate backwards through infected states and symptoms of the bug to find the initial defect. Modern debugging tools are not designed for navigating back-in-time and typically require the user to jump through hoops by setting breakpoints, re-executing, and guessing where errors occur. Omniscient debuggers offer back-in-time debugging capabilities to make this task easier. These debuggers trace the program allowing the user to navigate forwards and backwards through the execution, examine variable histories, and visualize program data and control …


Enhancements To Hierarchical Pathfinding Algorithms, Xin Li Jan 2016

Enhancements To Hierarchical Pathfinding Algorithms, Xin Li

Electronic Theses and Dissertations

In this thesis we study the problem of pathfinding in static grid-based maps. We apply the approach of abstraction and refinement. We abstract the grid map into a graph representation, and use the classic A* algorithm to search for a path in the abstract space, and then refine it into low-level path.

We started with a 2013 entry program to the Grid-based Path Planning Competition, and implemented several enhancements to experiment with the tradeoff between memory usage and search speed. Our program returns the refined low-level path incrementally, therefore reduces the first-move lag in large maps. We cache the low-level …


Implementation Of An Air Supply Unit Control Scheme For The Uc2av (Unmanned Circulation Control Aerial Vehicle), Cameron Rosen Jan 2016

Implementation Of An Air Supply Unit Control Scheme For The Uc2av (Unmanned Circulation Control Aerial Vehicle), Cameron Rosen

Electronic Theses and Dissertations

The expanded prevalence of Unmanned Aerial Vehicles (UAVs) in recent years has created many opportunities to research novel applications for their use, enabled by the reduced cost, mission flexibility, and reduced risk that small-scale unmanned platforms provide in comparison to larger aircraft. Despite the versatility of unmanned aviation, limitations on payload size and weight, fuel and power capacity, and takeoff and landing infrastructure can restrict UAV applications, and have created a need for lift augmenting technologies that can reduce the impact of these limitations. Circulation Control (CC) is an active flow technique that has been proven as a method for …