Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Masters Theses

2014

Institution
Keyword

Articles 1 - 16 of 16

Full-Text Articles in Physical Sciences and Mathematics

Gpu-Accelerated Influenza Simulations For Operational Modeling, Peter Holvenstot Aug 2014

Gpu-Accelerated Influenza Simulations For Operational Modeling, Peter Holvenstot

Masters Theses

Simulations of influenza spread are useful for decision-making during public-health emergencies. Policy-makers use models to predict disease spread and estimate the effects of various intervention strategies. Effective modeling of targeted intervention strategies requires accurate modeling of individual-level behavior and transmission. However, this greatly increases the computational costs of these agent-based models. In addition, if the models are used as an outbreak progresses, some operational decisions must occur rapidly in order to contain the spread of the disease.

Graphics Processing Units (GPUs) are a type of specialized processor used to drive graphical displays. Many recent devices also allow users to write …


Data Analytics Of University Student Records, Mark Blaise Decotes Aug 2014

Data Analytics Of University Student Records, Mark Blaise Decotes

Masters Theses

Understanding the proper navigation of a college curriculum is a daunting task for students, faculty, and staff. Collegiate courses offer enough intellectual challenge without the unnecessary confusion caused by course scheduling issues. Administrative faculty who execute curriculum changes need both quantitative data and empirical evidence to support their notions about which courses are cornerstone. Students require clear understanding of paths through their courses and majors that give them the optimal chance of success. In this work, we re-envision the analysis of student records from several decades by opening up these datasets to new ways of interactivity. We represent curricula through …


Minimal-Density, Raid-6 Codes: An Approach For W = 9, Bryan Andrew Burke May 2014

Minimal-Density, Raid-6 Codes: An Approach For W = 9, Bryan Andrew Burke

Masters Theses

RAID-6 erasure codes provide vital data integrity in modern storage systems. There is a class of RAID-6 codes called “Minimal Density Codes,” which have desirable performance properties. These codes are parameterized by a “word size,” w, and constructions of these codes are known when w and w + 1 are prime numbers. However, there are obvious gaps for which there is no theory. An exhaustive search was used to fill in the important gap when w = 8, which is highly applicable to real-world systems, since it is a power of 2. This paper extends that approach to address the …


Multi-Threaded Automatic Integration Using Openmp And Cuda, Rida Assaf Apr 2014

Multi-Threaded Automatic Integration Using Openmp And Cuda, Rida Assaf

Masters Theses

Problems in many areas give rise to computationally expensive integrals that beg the need of efficient techniques to solve them, e.g., in computational finance for the modeling of cash flows; for the computation of Feynman loop integrals in high energy physics; and in stochastic geometry with applications to computer graphics.

We demonstrate feasible numerical approaches in the framework of the PARINT multivariate integration package. The parallel environment is provided by the cluster of the High Performance Computational Science (HPCS) laboratory, with 22 (16- or 32-core) nodes, NVIDIA GPUs, and Intel Xeon Phi coprocessors.

Monte Carlo integration is implemented in CUDA …


A Cloud Brokerage Architecture For Efficient Cloud Service Selection, Venkata Nagarjuna Dondapati Jan 2014

A Cloud Brokerage Architecture For Efficient Cloud Service Selection, Venkata Nagarjuna Dondapati

Masters Theses

"The expanding cloud computing services offer great opportunities for consumers to find the best service and best pricing, which however raises new challenges on how to select the best service out of a huge pool. It is obvious time-consuming for consumers to collect the necessary information and analyze all service providers to make the decision. It is also a highly demanding task from a computational perspective, because the same computations may be conducted repeatedly by multiple consumers who have similar requirements. In this paper, we propose a novel brokerage-based architecture in the cloud, where the cloud brokers is responsible for …


Access Control Delegation In The Clouds, Pavani Gorantla Jan 2014

Access Control Delegation In The Clouds, Pavani Gorantla

Masters Theses

"Current market trends need solutions/products to be developed at high speed. To meet those requirements sometimes it requires collaboration between the organizations. Modern workforce is increasingly distributed, mobile and virtual which will incur hurdles for communication and effective collaboration within organizations. One of the greatest benefits of cloud computing has to do with improvements to organizations communication and collaboration, both internally and externally. Because of the efficient services that are being offered by the cloud service providers today, many business organizations started taking advantage of cloud services. Specifically, Cloud computing enables a new form of service in that a service …


An Empirical Study On Symptoms Of Heavier Internet Usage Among Young Adults, Saipreethi Vishwanathan Jan 2014

An Empirical Study On Symptoms Of Heavier Internet Usage Among Young Adults, Saipreethi Vishwanathan

Masters Theses

"Understanding negative consequences of heavy Internet use on mental health is a topic that is gaining significant traction recently. A number of studies have investigated heavy Internet usage, especially among young adults in relation to online games, social media and email. While such studies do provide valuable insights, Internet usage so far has been characterized by means of self-reported surveys only that may suffer from errors and biases. In this paper, we report the findings of a two month empirical study on heavy Internet usage among students conducted at a college campus. The novelty of the study is that it …


Evolving Decision Trees For The Categorization Of Software, Jasenko Hosic Jan 2014

Evolving Decision Trees For The Categorization Of Software, Jasenko Hosic

Masters Theses

"Current manual techniques of static reverse engineering are inefficient at providing semantic program understanding. An automated method to categorize applications was developed in order to quickly determine pertinent characteristics. Prior work in this area has had some success, but a major strength of the approach detailed in this thesis is that it produces heuristics that can be reused for quick analysis of new data. The method relies on a genetic programming algorithm to evolve decision trees which can be used to categorize software. The terminals, or leaf nodes, within the trees each contain values based on selected features from one …


Energy Efficient Scheduling And Allocation Of Tasks In Sensor Cloud, Rashmi Dalvi Jan 2014

Energy Efficient Scheduling And Allocation Of Tasks In Sensor Cloud, Rashmi Dalvi

Masters Theses

"Wireless Sensor Network (WSN) is a class of ad hoc networks that has capability of self-organizing, in-network data processing, and unattended environment monitoring. Sensor-cloud is a cloud of heterogeneous WSNs. It is attractive as it can change the computation paradigm of wireless sensor networks. In Sensor-Cloud, to gain profit from underutilized WSNs, multiple WSN owners collaborate to provide a cloud service. Sensor Cloud users can simply rent the sensing services which eliminates the cost of ownership, enabling the usage of large scale sensor networks become affordable. The nature of Sensor-Cloud enables resource sharing and allows virtual sensors to be scaled …


On Temporal And Frequency Responses Of Smartphone Accelerometers For Explosives Detection, Srinivas Chakravarthi Thandu Jan 2014

On Temporal And Frequency Responses Of Smartphone Accelerometers For Explosives Detection, Srinivas Chakravarthi Thandu

Masters Theses

"The increasing frequency of explosive disasters throughout the world in recent years have created a clear need for the systems to monitor for them continuously for better detection and to improve the post disaster rescue operations. Dedicated sensors deployed in the public places and their associated networks to monitor such explosive events are still inadequate and must be complemented for making the detection more pervasive and effective. Modern smart phones are a rich source of sensing because of the fact that they are equipped with wide range of sensors making these devices an appealing platform for pervasive computing applications. The …


M-Grid : A Distributed Framework For Multidimensional Indexing And Querying Of Location Based Big Data, Shashank Kumar Jan 2014

M-Grid : A Distributed Framework For Multidimensional Indexing And Querying Of Location Based Big Data, Shashank Kumar

Masters Theses

"The widespread use of mobile devices and the real time availability of user-location information is facilitating the development of new personalized, location-based applications and services (LBSs). Such applications require multi-attribute query processing, handling of high access scalability, support for millions of users, real time querying capability and analysis of large volumes of data. Cloud computing aided a new generation of distributed databases commonly known as key-value stores. Key-value stores were designed to extract value from very large volumes of data while being highly available, fault-tolerant and scalable, hence providing much needed features to support LBSs. However complex queries on multidimensional …


Cervical Cancer Histology Image Feature Extraction And Classification, Peng Guo Jan 2014

Cervical Cancer Histology Image Feature Extraction And Classification, Peng Guo

Masters Theses

"Cervical cancer, the second most common cancer affecting women worldwide and the most common in developing countries can be cured if detected early and treated. Expert pathologists routinely visually examine histology slides for cervix tissue abnormality assessment. In previous research, an automated, localized, fusion-based approach was investigated for classifying squamous epithelium into Normal, CIN1, CIN2, and CIN3 grades of cervical intraepithelial neoplasia (CIN) based on image analysis of 62 digitized histology images obtained through the National Library of Medicine. In this research, CIN grade assessments from two pathologists are analyzed and are used to facilitate atypical cell concentration feature development …


Crime Pattern Detection Using Online Social Media, Raja Ashok Bolla Jan 2014

Crime Pattern Detection Using Online Social Media, Raja Ashok Bolla

Masters Theses

"In this research, we show online social networks can be used to study crime detection problems. Crime is defined as an act harmful not only to the individual involved, but also to the community as a whole. It is also a forbidden act that is punishable by law. Crimes are social nuisances that place heavy financial burdens on society. Here we look at use of data mining followed by sentiment analysis on online social networks, to help detect the crime patterns. Twitter is an online social networking and microblogging service that enables users to post brief text updates, also referred …


Efficient Data Access In Mobile Cloud Computing, Siva Naga Venkata Chaitanya Vemulapalli Jan 2014

Efficient Data Access In Mobile Cloud Computing, Siva Naga Venkata Chaitanya Vemulapalli

Masters Theses

"This thesis focuses on the development of efficient data transfer mechanism among mobile devices using Mobile cloud computing paradigm. Mobile cloud computing is coupling of mobile computing and cloud computing. In the Mobile cloud computing paradigm, users connect to cloud service providers over the Internet and leverage the cloud resources to perform their processing, storage and communication tasks. In this thesis, the focus is on communication tasks among mobile devices performed using Mobile cloud computing paradigm.

Communication or data sharing among mobile devices is often limited by proximity of the devices. This limitation can be removed by employing Mobile cloud …


Privacy Preservation Using Spherical Chord, Doyal Tapan Mukherjee Jan 2014

Privacy Preservation Using Spherical Chord, Doyal Tapan Mukherjee

Masters Theses

"Structured overlay networks are primarily used in data storage and data lookup, but they are vulnerable against many kinds of attacks. Within the realm of security, overlay networks have demonstrated applicability in providing privacy, availability, integrity, along with scalability. The thesis first analyses the Chord and the SALSA protocols which are organized in structured overlays to provide data with a certain degree of privacy, and then defines a new protocol called Spherical Chord which provides data lookup with privacy, while also being scalable, and addresses critical existing weaknesses in Chord and SALSA protocols. Spherical Chord is a variant of the …


Top-K With Diversity-M Data Retrieval In Wireless Sensor Networks, Kiran Kumar Puram Jan 2014

Top-K With Diversity-M Data Retrieval In Wireless Sensor Networks, Kiran Kumar Puram

Masters Theses

"Wireless Sensor Network is a network of a few to several thousand sensors deployed over an area to sense data and report that data back to the base station. There are many applications of wireless sensor networks including environment monitoring, wildlife tracking, troop tracking etc. The deployed sensors have many constraints like limited battery, limited memory and very little processing capacity. These constraints show direct effect on the network life time.

In many applications of Wireless Sensor Networks, such as monitoring chemical leak, the user is not interested in all the data points from the entire region, but may want …