Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 51

Full-Text Articles in Physical Sciences and Mathematics

A General Model For Continuous Noninvasive Pulmonary Artery Pressure Estimation, Robert Anthony Smith Dec 2011

A General Model For Continuous Noninvasive Pulmonary Artery Pressure Estimation, Robert Anthony Smith

Theses and Dissertations

Elevated pulmonary artery pressure (PAP) is a significant healthcare risk. Continuous monitoring for patients with elevated PAP is crucial for effective treatment, yet the most accurate method is invasive and expensive, and cannot be performed repeatedly. Noninvasive methods exist but are inaccurate, expensive, and cannot be used for continuous monitoring. We present a machine learning model based on heart sounds that estimates pulmonary artery pressure with enough accuracy to exclude an invasive diagnostic operation, allowing for consistent monitoring of heart condition in suspect patients without the cost and risk of invasive monitoring. We conduct a greedy search through 38 possible …


Framework To Secure Cloud-Based Medical Image Storage And Management System Communications, Timothy James Rostrom Dec 2011

Framework To Secure Cloud-Based Medical Image Storage And Management System Communications, Timothy James Rostrom

Theses and Dissertations

Picture Archiving and Communication Systems (PACS) have been traditionally constrained to the premises of the healthcare provider. This has limited the availability of these systems in many parts of the world and mandated major costs in infrastructure for those who employ them. Public cloud services could be a solution that eases the cost of ownership and provides greater flexibility for PACS implementations. This could make it possible to bring medical imaging services to places where it was previously unavailable and reduce the costs associated with these services for those who utilize them. Moving these systems to public cloud infrastructure requires …


A Hierarchical Image Processing Approach For Diagnostic Analysis Of Microcirculation Videos, Nazanin Mirshahi Dec 2011

A Hierarchical Image Processing Approach For Diagnostic Analysis Of Microcirculation Videos, Nazanin Mirshahi

Theses and Dissertations

Knowledge of the microcirculatory system has added significant value to the analysis of tissue oxygenation and perfusion. While developments in videomicroscopy technology have enabled medical researchers and physicians to observe the microvascular system, the available software tools are limited in their capabilities to determine quantitative features of microcirculation, either automatically or accurately. In particular, microvessel density has been a critical diagnostic measure in evaluating disease progression and a prognostic indicator in various clinical conditions. As a result, automated analysis of the microcirculatory system can be substantially beneficial in various real-time and off-line therapeutic medical applications, such as optimization of resuscitation. …


Quality Selection For Dynamic Adaptive Streaming Over Http With Scalable Video Coding, Travis L. Andelin Dec 2011

Quality Selection For Dynamic Adaptive Streaming Over Http With Scalable Video Coding, Travis L. Andelin

Theses and Dissertations

Video streaming on the Internet is increasingly using Dynamic Adaptive Streaming over HTTP (DASH), in which the video is converted into various quality levels and divided into two-second segments. A client can then adjust its video quality over time by choosing to download the appropriate quality level for a given segment using standard HTTP. Scalable Video Coding (SVC) is a promising enhancement to the DASH protocol. With SVC, segments are divided into subset bitstream blocks. At playback, blocks received for a given segment are combined to additively increase the current quality. Unlike traditional DASH, which downloads segments serially, this encoding …


Fast Spheroidal Weathering With Colluvium Deposition, Mckay T. Farley Nov 2011

Fast Spheroidal Weathering With Colluvium Deposition, Mckay T. Farley

Theses and Dissertations

It can be difficult to quickly and easily create realistic sandstone terrain. Film makers often need to generate realistic terrain for establishing the setting of their film. Many methods have been created which address terrain generation. One such method is using heightmaps which encode height as a gray-value in a 2d image. Most terrain generation techniques don't admit concavities such as overhangs and arches. We present an algorithm that operates on a voxel grid for creating 3d terrain. Our algorithm uses curvature estimation to weather away the terrain. We speed up our method using a caching mechanism that stores the …


Fast Parallel Machine Learning Algorithms For Large Datasets Using Graphic Processing Unit, Qi Li Nov 2011

Fast Parallel Machine Learning Algorithms For Large Datasets Using Graphic Processing Unit, Qi Li

Theses and Dissertations

This dissertation deals with developing parallel processing algorithms for Graphic Processing Unit (GPU) in order to solve machine learning problems for large datasets. In particular, it contributes to the development of fast GPU based algorithms for calculating distance (i.e. similarity, affinity, closeness) matrix. It also presents the algorithm and implementation of a fast parallel Support Vector Machine (SVM) using GPU. These application tools are developed using Compute Unified Device Architecture (CUDA), which is a popular software framework for General Purpose Computing using GPU (GPGPU). Distance calculation is the core part of all machine learning algorithms because the closer the query …


Carry And Expand: A New Nomadic Interaction Paradigm, Richard B. Arthur Nov 2011

Carry And Expand: A New Nomadic Interaction Paradigm, Richard B. Arthur

Theses and Dissertations

People are nomadic; traveling from place to place. As a user travels, he may need access to his digital information, including his data, applications, and settings. A convenient way to supply this access is to have the user carry that digital information in a portable computer such as a laptop or smart phone. As Moore's Law continues to operate, devices such as smart phones can easily perform the computing necessary for a user's work. Unfortunately, the amount of data a human can receive and convey through such devices is limited. To receive more information humans require more screen real estate. …


A Foveated System For Wilderness Search And Rescue In Manned Aircraft, Carson D. Fenimore Nov 2011

A Foveated System For Wilderness Search And Rescue In Manned Aircraft, Carson D. Fenimore

Theses and Dissertations

Wilderness search and rescue can be assisted by video searchers in manned aircraft. The video searcher's primary task is to find clues on the ground. Due to altitude, it may be difficult to resolve details on the ground with a standard video camera. As the video streams at a constant frame rate, the searcher may become distracted by other tasks. While handling these tasks the searcher may miss important clues or spend extra time flying over the search area; either outcome decreases both the effectiveness of the video searcher and the chances of successfully finding missing persons. We develop an …


Modeling And Designing Fair Rate Control For Wireless Mesh Networks With Partial Interference, Lei Wang Nov 2011

Modeling And Designing Fair Rate Control For Wireless Mesh Networks With Partial Interference, Lei Wang

Theses and Dissertations

Internet rate control protocols, such as TCP, encounter severe performance problems in wireless mesh networks. Because wireless networks use shared communication channels, contention and interference can significantly degrade flow throughput and fairness. Existing research takes either an engineering-based or optimization-based approach to solve the performance problems. The engineering-based approach usually solves a specific observed problem, but does not necessarily optimize the overall performance. The optimization-based approach mathematically models the network to find the optimal resource allocation among competing flows. The model can lead to a distributed rate control algorithm with performance guarantees, but relatively little work has been done to …


Improving Multi-Label Classification By Avoiding Implicit Negativity With Incomplete Data, Derrall L. Heath Oct 2011

Improving Multi-Label Classification By Avoiding Implicit Negativity With Incomplete Data, Derrall L. Heath

Theses and Dissertations

Many real world problems require multi-label classification, in which each training instance is associated with a set of labels. There are many existing learning algorithms for multi-label classification; however, these algorithms assume implicit negativity, where missing labels in the training data are automatically assumed to be negative. Additionally, many of the existing algorithms do not handle incremental learning in which new labels could be encountered later in the learning process. A novel multi-label adaptation of the backpropagation algorithm is proposed that does not assume implicit negativity. In addition, this algorithm can, using a naive Bayesian approach, infer missing labels in …


Detecting Man-In-The-Middle Attacks Against Transport Layer Security Connections With Timing Analysis, Lauren M. Wagoner Sep 2011

Detecting Man-In-The-Middle Attacks Against Transport Layer Security Connections With Timing Analysis, Lauren M. Wagoner

Theses and Dissertations

The Transport Layer Security (TLS) protocol is a vital component to the protection of data as it traverses across networks. From e-commerce websites to Virtual Private Networks (VPNs), TLS protects massive amounts of private information, and protecting this data from Man-in-the-Middle (MitM) attacks is imperative to keeping the information secure. This thesis illustrates how an attacker can successfully perform a MitM attack against a TLS connection without alerting the user to his activities. By deceiving the client machine into using a false certificate, an attacker takes away the only active defense mechanism a user has against a MitM. The goal …


A Novel Malware Target Recognition Architecture For Enhanced Cyberspace Situation Awareness, Thomas E. Dube Sep 2011

A Novel Malware Target Recognition Architecture For Enhanced Cyberspace Situation Awareness, Thomas E. Dube

Theses and Dissertations

The rapid transition of critical business processes to computer networks potentially exposes organizations to digital theft or corruption by advanced competitors. One tool used for these tasks is malware, because it circumvents legitimate authentication mechanisms. Malware is an epidemic problem for organizations of all types. This research proposes and evaluates a novel Malware Target Recognition (MaTR) architecture for malware detection and identification of propagation methods and payloads to enhance situation awareness in tactical scenarios using non-instruction-based, static heuristic features. MaTR achieves a 99.92% detection accuracy on known malware with false positive and false negative rates of 8.73e-4 and 8.03e-4 respectively. …


An Empirical Analysis Of The Cascade Secret Key Reconciliation Protocol For Quantum Key Distribution, Timothy I. Calver Sep 2011

An Empirical Analysis Of The Cascade Secret Key Reconciliation Protocol For Quantum Key Distribution, Timothy I. Calver

Theses and Dissertations

The need to share key material with authorized entities in a secure, efficient and timely manner has driven efforts to develop new key distribution methods. The most promising method is Quantum Key Distribution (QKD) and is considered to be “unconditionally secure” because it relies upon the immutable laws of quantum physics rather than computational complexity. Unfortunately, the nonidealities present in actual implementations of QKD systems also result in errors manifested in the quantum data channel. As a consequence, an important component of any QKD system is the error reconciliation protocol which is used to identify and correct inconsistencies in the …


Security In Intranet And Vpn, Sami Kryeziu Sep 2011

Security In Intranet And Vpn, Sami Kryeziu

Theses and Dissertations

Që nga vitet `70 kur edhe janë vitet e para të internetit që është zbuluar nga ARPANET ku në rrjet numronin katër kompjuter deri në ditët e sotëshme ku numërohen me miliarda përdorues qështja më e ndjeshme ka qenë siguria e këtij rrjeti. Në vitet e fundit ndërthuarja në mes të teknologjis informative dhe bizneseve si dhe mënyra se si të ulen kostot buxhetore duke ju mënjanuar teknologjive të kushtueshme bëri që VPN të jet njëra ndër teknologjit e qëlluara. Virtual Private Network është një teknologji që lindi duke e pasur parasysh nevojën e një komunikimi që ofron siguri të …


Hykss: Hybrid Keyword And Semantic Search, Andrew J. Zitzelberger Aug 2011

Hykss: Hybrid Keyword And Semantic Search, Andrew J. Zitzelberger

Theses and Dissertations

The rapid production of digital information makes the task of locating relevant information increasingly difficult. Keyword search alleviates this difficulty by retrieving documents containing keywords of interest. However, keyword search suffers from a number of issues such ambiguity, synonymy, and the inability to handle semantic constraints. Semantic search helps resolve these issues but is limited by the quality of annotations which are likely to be incomplete or imprecise. Hybrid search, a search technique that combines the merits of both keyword and semantic search, appears to be a promising solution. In this work we introduce HyKSS, a hybrid search system driven …


Modelimi I Kërcënimeve Sipas Teknikës Microsoft Threat Modeling, Naim Preniqi Aug 2011

Modelimi I Kërcënimeve Sipas Teknikës Microsoft Threat Modeling, Naim Preniqi

Theses and Dissertations

Modelimi i kërcënimeve është qasje e strukturuar që ka të bëjë me analizimin, identifikimin, përmbledhjen dhe adresimin e çështjeve të sigurisë, të cilat janë të ndërlidhura ngushtë me aplikacionin. Modelimi i kërcënimeve nuk shqyrton vetëm kodimin, por më tepër merret me vlerësimin dhe shqyrtimin e procesit të kodimit. Adresimi i kërcënimeve mund të bëhet me kundërmasat adekuate në mënyrë logjike, duke u nisur nga kërcënimet që paraqesin më së shumti rrezik. Një gjë e tillë bëhet duke identifikuar dhe vlerësuar kërcënimet e bazuara kushtimisht, dhe duke e kuptuar sistemin arkitektural dhe implementimin e aplikacionit. Modelimi i kërcënimeve ka një qasje …


Fast Relabeling Of Deformable Delaunay Tetrahedral Meshes Using A Compact Uniform Grid, David C. Frogley Jul 2011

Fast Relabeling Of Deformable Delaunay Tetrahedral Meshes Using A Compact Uniform Grid, David C. Frogley

Theses and Dissertations

We address the problem of fast relabeling of deformable Delaunay tetrahedral meshes using a compact uniform grid, with CPU parallelization through OpenMP. This problem is important in visualizing the simulation of deformable objects and arises in scientific visualization, games, computer vision, and motion picture production. Many existing software tools and APIs have the ability to manipulate 3D virtual objects. Prior mesh-based representations either allow topology changes or are fast. We aim for both. Specifically, we improve the efficiency of the relabeling step in the Delaunay deformable mesh invented by Pons and Boissonnat and improved by Tychonievich and Jones. The relabeling …


Modeling Wireless Networks For Rate Control, David C. Ripplinger Jul 2011

Modeling Wireless Networks For Rate Control, David C. Ripplinger

Theses and Dissertations

Congestion control algorithms for wireless networks are often designed based on a model of the wireless network and its corresponding network utility maximization (NUM) problem. The NUM problem is important to researchers and industry because the wireless medium is a scarce resource, and currently operating protocols such as 802.11 often result in extremely unfair allocation of data rates. The NUM approach offers a systematic framework to build rate control protocols that guarantee fair, optimal rates. However, classical models used with the NUM approach do not incorporate partial carrier sensing and interference, which can lead to significantly suboptimal performance when actually …


Naive Bayesian Spam Filters For Log File Analysis, Russel William Havens Jul 2011

Naive Bayesian Spam Filters For Log File Analysis, Russel William Havens

Theses and Dissertations

As computer system usage grows in our world, system administrators need better visibility into the workings of computer systems, especially when those systems have problems or go down. Most system components, from hardware, through OS, to application server and application, write log files of some sort, be it system-standardized logs such syslog or application specific logs. These logs very often contain valuable clues to the nature of system problems and outages, but their verbosity can make them difficult to utilize. Statistical data mining methods could help in filtering and classifying log entries, but these tools are often out of the …


Experimental Performance Evaluation Of Atp (Ad-Hoc Transport Protocol) In A Wireless Mesh Network, Xingang Zhang Jun 2011

Experimental Performance Evaluation Of Atp (Ad-Hoc Transport Protocol) In A Wireless Mesh Network, Xingang Zhang

Theses and Dissertations

It is well known that TCP performs poorly in wireless mesh networks. There has been intensive research in this area, but most work uses simulation as the only evaluation method; however, it is not clear whether the performance gains seen with simulation will translate into benefits on real networks. To explore this issue, we have implemented ATP (Ad-hoc Transport Protocol), a transport protocol designed specifically for wireless ad hoc networks. We have chosen ATP because it uses a radically different design from TCP and because reported results claim significant improvement over TCP. We show how ATP must be modified in …


Rendering Realistic Cloud Effects For Computer Generated Films, Cory A. Reimschussel Jun 2011

Rendering Realistic Cloud Effects For Computer Generated Films, Cory A. Reimschussel

Theses and Dissertations

This work addresses the problem of rendering clouds. The task of rendering clouds is important to film and video game directors who want to use clouds to further the story or create a specific atmosphere for the audience. While there has been significant progress in this area, other solutions to this problem are inadequate because they focus on speed instead of accuracy, or focus only on a few specific properties of rendered clouds while ignoring others. Another common shortcoming with other methods is that they are not integrated into existing rendering pipelines. We propose a solution to this problem based …


A Study Analyzing Five Instructional Methods For Teaching Software To Junior High Students, Scott Ronald Bartholomew Jun 2011

A Study Analyzing Five Instructional Methods For Teaching Software To Junior High Students, Scott Ronald Bartholomew

Theses and Dissertations

If you ask 5 different teachers what the best way to teach a new technology to a student is you will get 5 different answers. (Bork, 2001; Cheong, 2008; Egal, 2009; Howell, 2001) What is the best way to teach a new computer software application to a student? In the technological world we live in today the effective transfer of technological knowledge is paramount. With varying opinions even among the leaders of national technology teacher associations (Haynie, 2005) there is a large level of ambiguity in relation to best practices in technology teaching. This study evaluates five commonly used methods …


Combinational Circuit Obfuscation Through Power Signature Manipulation, Hyunchul Ko Jun 2011

Combinational Circuit Obfuscation Through Power Signature Manipulation, Hyunchul Ko

Theses and Dissertations

Today's military systems are composed of hardware and software systems, many of which are critical technologies, and must be protected to ensure our adversaries cannot gain any information from a various analysis attacks. Side Channel Analysis (SCA) attacks allow an attacker to gain the significant information from the measured signatures leaked by side-channels such as power consumption, and electro-magnetic emission. In this research the focus on detecting, characterizing, and manipulating the power signature by designing a power signature estimation and manipulation method. This research has determined that the proposed method capable of characterizing and altering the type of power signature …


Estimating Anthropometric Marker Locations From 3-D Ladar Point Clouds, Matthew J. Maier Jun 2011

Estimating Anthropometric Marker Locations From 3-D Ladar Point Clouds, Matthew J. Maier

Theses and Dissertations

An area of interest for improving the identification portion of the system is in extracting anthropometric markers from a Laser Detection and Ranging (LADAR) point cloud. Analyzing anthropometrics markers is a common means of studying how a human moves and has been shown to provide good results in determining certain demographic information about the subject. This research examines a marker extraction method utilizing principal component analysis (PCA), self-organizing maps (SOM), alpha hulls, and basic anthropometric knowledge. The performance of the extraction algorithm is tested by performing gender classification with the calculated markers.


Flexible Storylines, Ivan Dmitrievich Romashka May 2011

Flexible Storylines, Ivan Dmitrievich Romashka

Theses and Dissertations

A long-standing goal of computer-based entertainment is the creation of a story where a user is in control of portions of the storyline. These non-linear stories give a user an opportunity to adapt the story to his or her interests, schedule and needs. The Internet has made non-linear video a reality. Different approaches have been taken to create and play non-linear video stories. They suffer from lack of simplicity, smoothness, and television-like experience in story creation and presentation. Flexible Storylines provide a way to easily create and present non-linear video stories. The creation of these stories is done using a …


Proofs Of Correctness For Three Decentralized Authentication Protocols Using Strand Spaces, Pavan Kumar Vankamamidi May 2011

Proofs Of Correctness For Three Decentralized Authentication Protocols Using Strand Spaces, Pavan Kumar Vankamamidi

Theses and Dissertations

Security is a major concern is today's online world. As online activities become increasingly sensitive, service providers rely on security protocols to ensure confidentiality, integrity and authentication of their users and data. Greater assurance is provided when these protocols are verified to be correct. Strand Spaces is a method to formally analyze security protocols. The arguments are based on the messages being transmitted and received while assuming that the underlying cryptographic primitives are secure. This thesis demonstrates that the protocols Luau, pwdArmor and Kiwi are secure using Strand Spaces methodology.


Social Capital In Online Communities, Matthew Scott Smith May 2011

Social Capital In Online Communities, Matthew Scott Smith

Theses and Dissertations

Social capital is the value of the relationships we create and maintain within our social networks to gain access to and mobilize needed resources (e.g., jobs, moral support). Quantifying, and subsequently leveraging, social capital are challenging problems in the social sciences. Most work so far has focused on analyses from static surveys of limited numbers of participants. The explosion of online social media means that it is now possible to collect rich data about people's connections and interactions, in a completely ubiquitous, non-intrusive manner. Such dynamic social data opens the door to the more accurate measuring and tracking of social …


Accelerated Large-Scale Multiple Sequence Alignment With Reconfigurable Computing, G Scott Lloyd May 2011

Accelerated Large-Scale Multiple Sequence Alignment With Reconfigurable Computing, G Scott Lloyd

Theses and Dissertations

Multiple Sequence Alignment (MSA) is a fundamental analysis method used in bioinformatics and many comparative genomic applications. The time to compute an optimal MSA grows exponentially with respect to the number of sequences. Consequently, producing timely results on large problems requires more efficient algorithms and the use of parallel computing resources. Reconfigurable computing hardware provides one approach to the acceleration of biological sequence alignment. Other acceleration methods typically encounter scaling problems that arise from the overhead of inter-process communication and from the lack of parallelism. Reconfigurable computing allows a greater scale of parallelism with many custom processing elements that have …


Computational Modeling Of Mulitsensory Processing Using Network Of Spiking Neurons, Hun Ki Lim May 2011

Computational Modeling Of Mulitsensory Processing Using Network Of Spiking Neurons, Hun Ki Lim

Theses and Dissertations

Multisensory processing in the brain underlies a wide variety of perceptual phenomena, but little is known about the underlying mechanisms of how multisensory neurons are generated and how the neurons integrate sensory information from environmental events. This lack of knowledge is due to the difficulty of biological experiments to manipulate and test the characteristics of multisensory processing. By using a computational model of multisensory processing this research seeks to provide insight into the mechanisms of multisensory processing. From a computational perspective, modeling of brain functions involves not only the computational model itself but also the conceptual definition of the brain …


Coherent Turbulence: Synthesizing Tree Motion In The Wind Using Cfd And Noise, Anthony Frank Selino May 2011

Coherent Turbulence: Synthesizing Tree Motion In The Wind Using Cfd And Noise, Anthony Frank Selino

Theses and Dissertations

Animating trees in wind has long been a problem in computer graphics. Progress on this problem is important for both visual effects and biomechanics and may inform future work on two-way coupling between turbulent flows and deformable objects. Synthetic turbulence added to a coarse fluid simulation has been used to produce convincing animations of turbulent flows, but only considers one-way coupling between fluid and solid. We produce accurate animations of tree motion by creating a two-way coupling between synthetic turbulence and semipermeable proxy geometry. The resulting animations exhibit global wind sheltering effects and branch tips have motion paths which match …