Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Master's Projects

2012

Articles 31 - 58 of 58

Full-Text Articles in Physical Sciences and Mathematics

Link Ide : A Real Time Collaborative Development Environment, Kevin Grant Apr 2012

Link Ide : A Real Time Collaborative Development Environment, Kevin Grant

Master's Projects

While working on large scale development projects all software engineers find themselves, at some point, working with a source control system in order to add or re-vert changes to code. With software projects involving a multitude of programmers this is a crucial part of successful development. When working on a smaller project howev-er, with a tight knit group, setting up and dealing with such a system can become more work than it is worth. To solve this problem a real time collaborative integrated devel-opment environment could be used. The IDE’s focus would be on providing a collabora-tive setting for programming …


Desktop Sharing Portal, Ming-Chen Tsai Apr 2012

Desktop Sharing Portal, Ming-Chen Tsai

Master's Projects

Desktop sharing technologies have existed since the late 80s. It is often used in scenarios where collaborative computing is beneficial to participants in the shared environment by the control of the more knowledgeable party. But the steps required in establishing a session is often cumbersome to many. Selection of a sharing method, obtaining sharing target’s network address, sharing tool’s desired ports, and firewall issues are major hurdles for a typical non-IT user. In this project, I have constructed a web-portal that helps collaborators to easily locate each other and initialize sharing sessions. The portal that I developed enables collaborated sessions …


An Algorithm For Data Reorganization In A Multi-Dimensional Index, Urvashi Samaresh Nair Apr 2012

An Algorithm For Data Reorganization In A Multi-Dimensional Index, Urvashi Samaresh Nair

Master's Projects

In spatial databases, data are associated with spatial coordinates and are retrieved based on spatial proximity. A spatial database uses spatial indexes to optimize spatial queries. An essential ingredient for efficient spatial query processing is spatial clustering of data and reorganization of spatial data. Traditional clustering algorithms and reorganization utilities lack in performance and execution. To solve this problem we have developed an algorithm to convert a two dimensional spatial index into a single dimensional value and then a reorganization is done on the spatial data. This report describes this algorithm as well as various experiments to validate its effectiveness.


Cryptanalysis Of Typex, Kelly Chang Apr 2012

Cryptanalysis Of Typex, Kelly Chang

Master's Projects

Rotor cipher machines played a large role in World War II: Germany used Enigma; America created Sigaba; Britain developed Typex. The breaking of Enigma by Polish and (later) British cryptanalysts had a huge impact on the war. Despite be- ing based on the commercial version of the Enigma, there is no documented successful attack on Typex during its time in service. This project covers the Typex machine. We consider the development of Typex, we discuss how Typex works, and we present and analyze two distinct cryptanalytic attacks on the cipher. The first attack assumes the rotor wirings are known and …


Electrocardiogram (Ecg/Ekg) Using Fpga, Vaibhav Desai Apr 2012

Electrocardiogram (Ecg/Ekg) Using Fpga, Vaibhav Desai

Master's Projects

FPGAs (Field Programmable Gate Arrays) are finding wide acceptance in medical systems for their ability for rapid prototyping of a concept that requires hardware/software co-design, for performing custom processing in parallel at high data rates and be programmed in the field after manufacturing. Based on the market demand, the FPGA design can be changed and no new hardware needs to be purchased as was the case with ASICs (Application Specific Integrated Circuit) and CPLDs (Complex Programmable Logic Device). Medical companies can now move over to FPGAs saving cost and delivering highly-efficient upgradable systems. ECG (Electrocardiogram) is considered to be a …


Online Monitoring Using Kismet, Sumit Kumar Apr 2012

Online Monitoring Using Kismet, Sumit Kumar

Master's Projects

Colleges and universities currently use online exams for student evaluation. Stu- dents can take assigned exams using their laptop computers and email their results to their instructor; this process makes testing more efficient and convenient for both students and faculty. However, taking exams while connected to the Internet opens many opportunities for plagiarism and cheating. In this project, we design, implement, and test a tool that instructors can use to monitor the online activity of students during an in-class online examination. This tool uses a wireless sniffer, Kismet, to capture and classify packets in real time. If a student attempts …


Keyword Search In Social Networks, Vijeth Patil Apr 2012

Keyword Search In Social Networks, Vijeth Patil

Master's Projects

People often tend to ask their friends whenever they want some information related to topics like events, restaurants, or movies as majority of the search engines do not yield the desired results which people are seeking [1]. At present, majority of the current Open Source search engines like those based on Nutch also do not yield desired or expected results. Popular search engine, Google recently incorporated the feature of providing information from your social circle but only limited to Google Plus in your search results. On the other hand, micro blogging site Twitter has emerged as a vital source of …


Virtual Kung Fu Sifu With Kinect, Naveen Kumar Keerthy Apr 2012

Virtual Kung Fu Sifu With Kinect, Naveen Kumar Keerthy

Master's Projects

In this computer world almost everything is made available online. All possible systems are making use of the Internet and so does the learning systems. People willing to learn any kind of arts, but have no time would look for a tutor who would be available at his/her ease. An attempt to satisfy the same is the project that I’ve implemented. My focus is mainly on Kung fu an ancient form of Chinese Martial arts. Learning Kung fu needs a lot of practice and therefore demands having a professional kung fu master monitoring all the time, which is very expensive. …


Blog Information Classification, Nishant Patel Apr 2012

Blog Information Classification, Nishant Patel

Master's Projects

nformation Classification is the categorization of the huge amount of data in an efficient and useful way. In the current scenario data is growing exponentially due to the rise of internet rich applications. One such source of information is the blogs. Blogs are web logs maintained by their authors that contain information related to a certain topic and also contain authors view about that topic. Micro blogs, on the other hands, are variations of blogs that contain smaller data as compared to blogs. Nevertheless, it also contains rich information. In this project, Twitter, a micro blogging website has been targeted …


Face Detection From Images Using Support Vector Machine, Parin M. Shah Apr 2012

Face Detection From Images Using Support Vector Machine, Parin M. Shah

Master's Projects

Detection of patterns in images using classifiers is one of the most promising topics of research in the field of computer vision. A large number of practical applications for face detection exist and contemporary work even suggests that any specialized detectors can be approximated by using fast detection classifiers. In this project, I have developed an algorithm which will detect face from the input image with less false detection rate using combined effects of computer vision concepts. This algorithm utilizes the concept of recognizing skin color, detecting edges and extracting different features from face. The result is supported by the …


Identifying Influential Bloggers, Sivanaga Prasad Shola Apr 2012

Identifying Influential Bloggers, Sivanaga Prasad Shola

Master's Projects

This project addresses the problem of identifying influential bloggers in a web blog community. It investigates the problem of identifying influential bloggers by scoring each blog post, posted by bloggers, based on influential factors and ranking bloggers accordingly. There exists preliminary models that attempted to solve the problem but they lack some of important aspects of the blogosphere. In this project we try to combine and improve the methodologies and ideas present in the previous models. We have introduced a new influence factor, which is a combination of facebook likes and shares, into the literature that can further evaluate blog …


Text Summarization, Youn S. Kim Apr 2012

Text Summarization, Youn S. Kim

Master's Projects

With the overwhelming amount of textual information available in electronic formats on the web, there is a need for an efficient text summarizer capable of condensing large bodies of text into shorter versions while keeping the relevant information intact. Such a technology would allow users to get their information in a shortened form, saving valuable time. Since 1997, Microsoft Word has included a summarizer for documents, and currently there are companies that summarize breaking news and send SMS for mobile phones. I wish to create a text summarizer to provide condensed versions of original documents. My focus is on blogs, …


Visualization Of Online Deals, Praveen Thiruvathilingam Apr 2012

Visualization Of Online Deals, Praveen Thiruvathilingam

Master's Projects

This project identifies the impact of online deals and coupons on the life of people. The basic idea is to find the trend in the sales of these deals and this project would be helpful for companies, restaurants and dealers who are trying to sell coupons to popularize their product. The final output of the project would be a timeline graph with the deals displayed based on the month of their sale. Information like the original price, deal price, discount and number of coupons sold will be displayed in a pop-up window when a deal is selected. Different colors are …


Optimizing A Web Search Engine, Ravi Inder Singh Dhillon Apr 2012

Optimizing A Web Search Engine, Ravi Inder Singh Dhillon

Master's Projects

Search Engine queries often have duplicate words in the search string. For example user searching for "pizza pizza" a popular brand name for Canadian pizzeria chain. An efficient search engine must return the most relevant results for such queries. Search queries also have pair of words which always occur together in the same sequence, for example “honda accord”, “hopton wafers”, “hp newwave” etc. We will hereafter refer to such pair of words as bigrams. A bigram can be treated as a single word to increase the speed and relevance of results returned by a search engine that is based on …


Actor-Based Concurrency In Newspeak 4, Nikolay Botev Apr 2012

Actor-Based Concurrency In Newspeak 4, Nikolay Botev

Master's Projects

Actors are a model of computation invented by Carl Hewitt in the 1970s. It has seen a resurrection of mainstream use recently as a potential solution to the latency and concurrency that are quickly rising as the dominant challenges facing the software industry. In this project I explored the history of the actor model and a practical implementation of actor-based concurrency tightly integrated with non-blocking futures in the E programming language developed by Mark Miller. I implemented an actor-based concurrency framework for Newspeak that closely follows the E implementation and includes E-style futures and deep integration into the programming language …


Hidden Markov Models For Software Piracy Detection, Shabana Kazi Apr 2012

Hidden Markov Models For Software Piracy Detection, Shabana Kazi

Master's Projects

The unauthorized copying of software is often referred to as software piracy. Soft- ware piracy causes billions of dollars of annual losses for companies and governments worldwide. In this project, we analyze a method for detecting software piracy. A meta- morphic generator is used to create morphed copies of a base piece of software. A hidden Markov Model is trained on the opcode sequences extracted from these mor- phed copies. The trained model is then used to score suspect software to determine its similarity to the base software. A high score indicates that the suspect software may be a modified …


Session Based Music Recommendation Using Singular Value Decomposition (Svd), Ruchit V. Mehta Apr 2012

Session Based Music Recommendation Using Singular Value Decomposition (Svd), Ruchit V. Mehta

Master's Projects

Technology in the modern world has over-simplified the access to information. At a click of a button we have volumes of music accessible on the Internet. Paradoxically, the abundance of available options has only made music discovery and recommendations a complex problem to solve. With huge collections of songs in the online digital libraries, finding a song or an artist is not a problem. However, an actual problem is what to look for that will intuitively satisfy a user’s need. There exists multitude of recommendation algorithms, but many of them do not consider the contextual information in which a user …


Defeating Masquerade Detection, Avani Kothari Apr 2012

Defeating Masquerade Detection, Avani Kothari

Master's Projects

A masquerader is an attacker who has obtained access to a legitimate user’s computer and is pretending to be that user. The masquerader’s goal is to conduct an attack while remaining undetected. Hidden Markov models (HMM) are well-known machine learning techniques that have been used successfully in a wide variety of fields, including speech recognition, malware detection, and intrusion detection systems. Previous research has shown that HMM trained on a user’s UNIX commands can provide an effective means of masquerade detection. Na ̈ Bayes is a simple classifier based on Bayes Theorem, ıve which relies on the command frequency. In …


Full-Text Indexing For Heritrix, Darshan Karia Apr 2012

Full-Text Indexing For Heritrix, Darshan Karia

Master's Projects

It is useful to create personalized web crawls, and search through them later on to see the archived content and compare it with current content to see the difference and evolution of that portion of web. It is also useful for searching through the portion of web you are interested in an offline mode without need of going online. To accomplish that, in this project I focus towards indexing of the archive (ARC) files generated by an open source web-crawler named Heritrix. I developed a Java module to perform indexing on these archive files. I used large set of archive …


Online Collaborative Editor, Aditya Rao Apr 2012

Online Collaborative Editor, Aditya Rao

Master's Projects

“Online collaborative editor” is a node.js based browser application that provides real time collaborative editing of files and improves pair programming. Current real time editors fail to provide simultaneous viewing and editing of files within the server and results in a complex version controlling system. Such systems are also vulnerable to deadlocks and race conditions. This project provides a platform for real time collaborative editors, which can support simultaneous editing and viewing of files and handle concurrency problems by using locking mechanism. The experiment results showed that node.js platform provides good performance for collaborative editing.


Java Design Pattern Obfuscation, Praneeth Kumar Gone Apr 2012

Java Design Pattern Obfuscation, Praneeth Kumar Gone

Master's Projects

Software Reverse Engineering (SRE) consists of analyzing the design and imple- mentation of software. Typically, we assume that the executable file is available, but not the source code. SRE has many legitimate uses, including analysis of software when no source code is available, porting old software to a modern programming language, and analyzing code for security vulnerabilities. Attackers also use SRE to probe for weaknesses in closed-source software, to hack software activation mecha- nisms (or otherwise change the intended function of software), to cheat at games, etc. There are many tools available to aid the aspiring reverse engineer. For example, …


Social Networking For Botnet Command And Control, Ashutosh Singh Apr 2012

Social Networking For Botnet Command And Control, Ashutosh Singh

Master's Projects

A botnet is a group of compromised computers which is often a large group under the command and control of a malicious user, known as a botmaster. Botnets are generally recognized as a serious Internet threat. Botnets can be used for a wide variety of malicious attacks including spamming, distributed denial of service, and obtaining sensitive information such as authentication credentials or credit card information. This project involves building a botnet centered on Twitter. Our botnet uses individual bots controlled by commands tweeted by botmaster; the botnet can expand in a viral manner by following affected Twitter user’s friends. This …


Cryptsim: Simulators For Classic Rotor Ciphers, Miao Ai Apr 2012

Cryptsim: Simulators For Classic Rotor Ciphers, Miao Ai

Master's Projects

In this project, web-based visual simulators have been implemented for three classic rotor cipher machines: Enigma, Typex, and Sigaba. Enigma was used by Germany during World War II, while Typex is a British cipher that was based on the commercial version of the Enigma. Sigaba is a relatively complex machine that was used by the Americans during the 1940s and into the 1950s. Sigaba is the most secure of the three ciphers, there was no successful attack on Sigaba during its service lifetime. Our web-based visual simulators are functionally equivalent to the actual electro- mechanical machines. Each simulator allows the …


Cloud Information Summarization With Mobile Interface, Hrishikesh Paranjape Apr 2012

Cloud Information Summarization With Mobile Interface, Hrishikesh Paranjape

Master's Projects

There is a large driver for making existing data accessible everywhere, not just for people who happen to be at connected computers. This project aims to design, develop, and test Information Summarization System with its mobile application, which will allow end user the quick mobile access to underlying data on the web. The mobile application allows users to search for information about topic of their interest. This application will make use of existing established search engines to summarize the information on requested topic. The computation will be done on the cloud and communication between client and server will be done …


Ad-Hoc Stream Adaptive Protocol, Ray Xie Apr 2012

Ad-Hoc Stream Adaptive Protocol, Ray Xie

Master's Projects

With the growing market of smart-phones, sophisticated applications that do extensive computation are common on mobile platform; and with consumers’ high expectation of technologies to stay connected on the go, academic researchers and industries have been making efforts to find ways to stream multimedia contents to mobile devices. However, the restricted wireless channel bandwidth, unstable nature of wireless channels, and unpredictable nature of mobility, has been the major road block for wireless streaming advance forward. In this paper, various recent studies on mobility and P2P system proposal are explained and analyzed, and propose a new design based on existing P2P …


Cross-Lingual Text Classification With Model Translation And Document Translation, Zhang Zhang Apr 2012

Cross-Lingual Text Classification With Model Translation And Document Translation, Zhang Zhang

Master's Projects

Most enterprise search engines employ data mining classifiers to classify documents. Along with the economic globalization, many companies are starting to have overseas branches or divisions. Those branches are using local languages in documents and emails. When a classifier tries to categorize those documents in another language, the trained model in mono-lingual will not work. The most direct solution would be to translate those documents in other languages into one language by the machine translator. But this solution suffers from inaccuracy of the machine translation, and the over-head work is economically inefficient. Another approach is to translate the feature extracted …


Stock Market Analysis, Sachin Kamath Apr 2012

Stock Market Analysis, Sachin Kamath

Master's Projects

Stock market plays a pivotal role in financial aspect of the nation's growth, but stock market is highly volatile and complex in nature. It is affected by significant political issues, analyst calls, news articles , company's future plans of expansions and growth and many more. Hence, any investor would be interested in understanding the stock market overtime and how the factors mentioned above affect the behavior of the stock market.

On Every business day, millions of traders invest in stock market. Most of these investors lose money and others gain. However, considering any trading day, loss or gain is absolutely …


Metamorphic Worm That Carries Its Own Morphing Engine, Sudarshan Madenur Sridhara Apr 2012

Metamorphic Worm That Carries Its Own Morphing Engine, Sudarshan Madenur Sridhara

Master's Projects

Metamorphic malware changes its internal structure across generations, but its functionality remains unchanged. Well-designed metamorphic malware will evade signature detection. Recent research has revealed techniques based on hidden Markov models (HMMs) for detecting many types of metamorphic malware, as well as techniques for evading such detection. A worm is a type of malware that actively spreads across a network to other host systems. In this project we design and implement a prototype metamorphic worm that carries its own morphing engine. This is challenging, since the morphing engine itself must be morphed across replications, which imposes significant restrictions on the structure …