Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- <p>Cervix uteri -- Cancer<br />Cancer -- Histopathology<br />Image processing</p> (1)
- <p>Cloud computing -- Access control<br />Computer networks -- Access control<br />Data encryption (Computer science)</p> (1)
- <p>Cloud computing<br />Mobile computing<br />Information storage and retrieval systems<br />Computer network architectures</p> (1)
- <p>Databases -- Abstracting and indexing<br />Information retrieval -- Computer programs<br />Geographic information systems</p> (1)
- <p>Decision trees<br />Computational intelligence -- Simulation methods<br />Genetic programming (Computer science)</p> (1)
-
- <p>Explosives<br />Smartphones<br />Accelerometers<br />Time-domain analysis<br />Seismometers -- Design</p> (1)
- <p>Internet users -- Case studies<br />College freshmen<br />Internet addiction</p> (1)
- <p>Online social networks -- Political aspects<br />Social media -- Political aspects<br />Crime prevention<br />Criminal investigation</p> (1)
- <p>Peer-to-peer architecture (Computer networks) Computer networks -- Security measures<br />Cyberspace -- Security measures</p> (1)
- <p>Sensor networks<br />Wireless sensor networks -- Design<br />Computer networks -- Energy conservation<br />Energy consumption</p> (1)
- <p>Wireless sensor networks<br />Data mining<br />Information storage and retrieval systems</p> (1)
- Access control (1)
- Anonymity (1)
- Bcloud - Tree (1)
- Big Data (1)
- Cervical cancer (1)
- Chord (1)
- Cloud (1)
- Cloud Brokerage (1)
- Cloud Service Providers (1)
- Cloud computing<br />Service-oriented architecture (Computer science)<br />Information storage and retrieval systems (1)
- Clouds (1)
- Crime (1)
- Data analysis (1)
- Decision Trees (1)
- Delegation (1)
- Epidemiology (1)
- Erasure code (1)
- Evolutionary Computation (1)
- Feature Selection (1)
Articles 1 - 16 of 16
Full-Text Articles in Physical Sciences and Mathematics
Gpu-Accelerated Influenza Simulations For Operational Modeling, Peter Holvenstot
Gpu-Accelerated Influenza Simulations For Operational Modeling, Peter Holvenstot
Masters Theses
Simulations of influenza spread are useful for decision-making during public-health emergencies. Policy-makers use models to predict disease spread and estimate the effects of various intervention strategies. Effective modeling of targeted intervention strategies requires accurate modeling of individual-level behavior and transmission. However, this greatly increases the computational costs of these agent-based models. In addition, if the models are used as an outbreak progresses, some operational decisions must occur rapidly in order to contain the spread of the disease.
Graphics Processing Units (GPUs) are a type of specialized processor used to drive graphical displays. Many recent devices also allow users to write …
Data Analytics Of University Student Records, Mark Blaise Decotes
Data Analytics Of University Student Records, Mark Blaise Decotes
Masters Theses
Understanding the proper navigation of a college curriculum is a daunting task for students, faculty, and staff. Collegiate courses offer enough intellectual challenge without the unnecessary confusion caused by course scheduling issues. Administrative faculty who execute curriculum changes need both quantitative data and empirical evidence to support their notions about which courses are cornerstone. Students require clear understanding of paths through their courses and majors that give them the optimal chance of success. In this work, we re-envision the analysis of student records from several decades by opening up these datasets to new ways of interactivity. We represent curricula through …
Minimal-Density, Raid-6 Codes: An Approach For W = 9, Bryan Andrew Burke
Minimal-Density, Raid-6 Codes: An Approach For W = 9, Bryan Andrew Burke
Masters Theses
RAID-6 erasure codes provide vital data integrity in modern storage systems. There is a class of RAID-6 codes called “Minimal Density Codes,” which have desirable performance properties. These codes are parameterized by a “word size,” w, and constructions of these codes are known when w and w + 1 are prime numbers. However, there are obvious gaps for which there is no theory. An exhaustive search was used to fill in the important gap when w = 8, which is highly applicable to real-world systems, since it is a power of 2. This paper extends that approach to address the …
Multi-Threaded Automatic Integration Using Openmp And Cuda, Rida Assaf
Multi-Threaded Automatic Integration Using Openmp And Cuda, Rida Assaf
Masters Theses
Problems in many areas give rise to computationally expensive integrals that beg the need of efficient techniques to solve them, e.g., in computational finance for the modeling of cash flows; for the computation of Feynman loop integrals in high energy physics; and in stochastic geometry with applications to computer graphics.
We demonstrate feasible numerical approaches in the framework of the PARINT multivariate integration package. The parallel environment is provided by the cluster of the High Performance Computational Science (HPCS) laboratory, with 22 (16- or 32-core) nodes, NVIDIA GPUs, and Intel Xeon Phi coprocessors.
Monte Carlo integration is implemented in CUDA …
A Cloud Brokerage Architecture For Efficient Cloud Service Selection, Venkata Nagarjuna Dondapati
A Cloud Brokerage Architecture For Efficient Cloud Service Selection, Venkata Nagarjuna Dondapati
Masters Theses
"The expanding cloud computing services offer great opportunities for consumers to find the best service and best pricing, which however raises new challenges on how to select the best service out of a huge pool. It is obvious time-consuming for consumers to collect the necessary information and analyze all service providers to make the decision. It is also a highly demanding task from a computational perspective, because the same computations may be conducted repeatedly by multiple consumers who have similar requirements. In this paper, we propose a novel brokerage-based architecture in the cloud, where the cloud brokers is responsible for …
Access Control Delegation In The Clouds, Pavani Gorantla
Access Control Delegation In The Clouds, Pavani Gorantla
Masters Theses
"Current market trends need solutions/products to be developed at high speed. To meet those requirements sometimes it requires collaboration between the organizations. Modern workforce is increasingly distributed, mobile and virtual which will incur hurdles for communication and effective collaboration within organizations. One of the greatest benefits of cloud computing has to do with improvements to organizations communication and collaboration, both internally and externally. Because of the efficient services that are being offered by the cloud service providers today, many business organizations started taking advantage of cloud services. Specifically, Cloud computing enables a new form of service in that a service …
An Empirical Study On Symptoms Of Heavier Internet Usage Among Young Adults, Saipreethi Vishwanathan
An Empirical Study On Symptoms Of Heavier Internet Usage Among Young Adults, Saipreethi Vishwanathan
Masters Theses
"Understanding negative consequences of heavy Internet use on mental health is a topic that is gaining significant traction recently. A number of studies have investigated heavy Internet usage, especially among young adults in relation to online games, social media and email. While such studies do provide valuable insights, Internet usage so far has been characterized by means of self-reported surveys only that may suffer from errors and biases. In this paper, we report the findings of a two month empirical study on heavy Internet usage among students conducted at a college campus. The novelty of the study is that it …
Evolving Decision Trees For The Categorization Of Software, Jasenko Hosic
Evolving Decision Trees For The Categorization Of Software, Jasenko Hosic
Masters Theses
"Current manual techniques of static reverse engineering are inefficient at providing semantic program understanding. An automated method to categorize applications was developed in order to quickly determine pertinent characteristics. Prior work in this area has had some success, but a major strength of the approach detailed in this thesis is that it produces heuristics that can be reused for quick analysis of new data. The method relies on a genetic programming algorithm to evolve decision trees which can be used to categorize software. The terminals, or leaf nodes, within the trees each contain values based on selected features from one …
Energy Efficient Scheduling And Allocation Of Tasks In Sensor Cloud, Rashmi Dalvi
Energy Efficient Scheduling And Allocation Of Tasks In Sensor Cloud, Rashmi Dalvi
Masters Theses
"Wireless Sensor Network (WSN) is a class of ad hoc networks that has capability of self-organizing, in-network data processing, and unattended environment monitoring. Sensor-cloud is a cloud of heterogeneous WSNs. It is attractive as it can change the computation paradigm of wireless sensor networks. In Sensor-Cloud, to gain profit from underutilized WSNs, multiple WSN owners collaborate to provide a cloud service. Sensor Cloud users can simply rent the sensing services which eliminates the cost of ownership, enabling the usage of large scale sensor networks become affordable. The nature of Sensor-Cloud enables resource sharing and allows virtual sensors to be scaled …
On Temporal And Frequency Responses Of Smartphone Accelerometers For Explosives Detection, Srinivas Chakravarthi Thandu
On Temporal And Frequency Responses Of Smartphone Accelerometers For Explosives Detection, Srinivas Chakravarthi Thandu
Masters Theses
"The increasing frequency of explosive disasters throughout the world in recent years have created a clear need for the systems to monitor for them continuously for better detection and to improve the post disaster rescue operations. Dedicated sensors deployed in the public places and their associated networks to monitor such explosive events are still inadequate and must be complemented for making the detection more pervasive and effective. Modern smart phones are a rich source of sensing because of the fact that they are equipped with wide range of sensors making these devices an appealing platform for pervasive computing applications. The …
M-Grid : A Distributed Framework For Multidimensional Indexing And Querying Of Location Based Big Data, Shashank Kumar
M-Grid : A Distributed Framework For Multidimensional Indexing And Querying Of Location Based Big Data, Shashank Kumar
Masters Theses
"The widespread use of mobile devices and the real time availability of user-location information is facilitating the development of new personalized, location-based applications and services (LBSs). Such applications require multi-attribute query processing, handling of high access scalability, support for millions of users, real time querying capability and analysis of large volumes of data. Cloud computing aided a new generation of distributed databases commonly known as key-value stores. Key-value stores were designed to extract value from very large volumes of data while being highly available, fault-tolerant and scalable, hence providing much needed features to support LBSs. However complex queries on multidimensional …
Cervical Cancer Histology Image Feature Extraction And Classification, Peng Guo
Cervical Cancer Histology Image Feature Extraction And Classification, Peng Guo
Masters Theses
"Cervical cancer, the second most common cancer affecting women worldwide and the most common in developing countries can be cured if detected early and treated. Expert pathologists routinely visually examine histology slides for cervix tissue abnormality assessment. In previous research, an automated, localized, fusion-based approach was investigated for classifying squamous epithelium into Normal, CIN1, CIN2, and CIN3 grades of cervical intraepithelial neoplasia (CIN) based on image analysis of 62 digitized histology images obtained through the National Library of Medicine. In this research, CIN grade assessments from two pathologists are analyzed and are used to facilitate atypical cell concentration feature development …
Crime Pattern Detection Using Online Social Media, Raja Ashok Bolla
Crime Pattern Detection Using Online Social Media, Raja Ashok Bolla
Masters Theses
"In this research, we show online social networks can be used to study crime detection problems. Crime is defined as an act harmful not only to the individual involved, but also to the community as a whole. It is also a forbidden act that is punishable by law. Crimes are social nuisances that place heavy financial burdens on society. Here we look at use of data mining followed by sentiment analysis on online social networks, to help detect the crime patterns. Twitter is an online social networking and microblogging service that enables users to post brief text updates, also referred …
Efficient Data Access In Mobile Cloud Computing, Siva Naga Venkata Chaitanya Vemulapalli
Efficient Data Access In Mobile Cloud Computing, Siva Naga Venkata Chaitanya Vemulapalli
Masters Theses
"This thesis focuses on the development of efficient data transfer mechanism among mobile devices using Mobile cloud computing paradigm. Mobile cloud computing is coupling of mobile computing and cloud computing. In the Mobile cloud computing paradigm, users connect to cloud service providers over the Internet and leverage the cloud resources to perform their processing, storage and communication tasks. In this thesis, the focus is on communication tasks among mobile devices performed using Mobile cloud computing paradigm.
Communication or data sharing among mobile devices is often limited by proximity of the devices. This limitation can be removed by employing Mobile cloud …
Privacy Preservation Using Spherical Chord, Doyal Tapan Mukherjee
Privacy Preservation Using Spherical Chord, Doyal Tapan Mukherjee
Masters Theses
"Structured overlay networks are primarily used in data storage and data lookup, but they are vulnerable against many kinds of attacks. Within the realm of security, overlay networks have demonstrated applicability in providing privacy, availability, integrity, along with scalability. The thesis first analyses the Chord and the SALSA protocols which are organized in structured overlays to provide data with a certain degree of privacy, and then defines a new protocol called Spherical Chord which provides data lookup with privacy, while also being scalable, and addresses critical existing weaknesses in Chord and SALSA protocols. Spherical Chord is a variant of the …
Top-K With Diversity-M Data Retrieval In Wireless Sensor Networks, Kiran Kumar Puram
Top-K With Diversity-M Data Retrieval In Wireless Sensor Networks, Kiran Kumar Puram
Masters Theses
"Wireless Sensor Network is a network of a few to several thousand sensors deployed over an area to sense data and report that data back to the base station. There are many applications of wireless sensor networks including environment monitoring, wildlife tracking, troop tracking etc. The deployed sensors have many constraints like limited battery, limited memory and very little processing capacity. These constraints show direct effect on the network life time.
In many applications of Wireless Sensor Networks, such as monitoring chemical leak, the user is not interested in all the data points from the entire region, but may want …