Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

2005

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 325

Full-Text Articles in Physical Sciences and Mathematics

Learning Successful Strategies In Repeated General-Sum Games, Jacob W. Crandall Dec 2005

Learning Successful Strategies In Repeated General-Sum Games, Jacob W. Crandall

Theses and Dissertations

Many environments in which an agent can use reinforcement learning techniques to learn profitable strategies are affected by other learning agents. These situations can be modeled as general-sum games. When playing repeated general-sum games with other learning agents, the goal of a self-interested learning agent is to maximize its own payoffs over time. Traditional reinforcement learning algorithms learn myopic strategies in these games. As a result, they learn strategies that produce undesirable results in many games. In this dissertation, we develop and analyze algorithms that learn non-myopic strategies when playing many important infinitely repeated general-sum games. We show that, in …


Monitoring Pc Hardware Sounds In Linux Systems Using The Daubechies D4 Wavelet., Robert Karns Henry Dec 2005

Monitoring Pc Hardware Sounds In Linux Systems Using The Daubechies D4 Wavelet., Robert Karns Henry

Electronic Theses and Dissertations

Users of high availability (HA) computing require systems that run continuously, with little or no downtime. Modern PCs address HA needs by monitoring operating system parameters such as voltage, temperature, and hard drive status in order to anticipate possible system failure. However, one modality for PC monitoring that has been underutilized is sound. The application described here uses wavelet theory to analyze sounds produced by PC hard drives during standard operation. When twenty-nine hard drives were tested with the application and the results compared with the drives' Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.) data, the binomial distribution's low p-value of …


Using Prospect Theory To Investigate Decision-Making Bias Within An Information Security Context, Neil J. Schroeder Dec 2005

Using Prospect Theory To Investigate Decision-Making Bias Within An Information Security Context, Neil J. Schroeder

Theses and Dissertations

Information security is an issue that has increased in importance over the past decade. In this time both practitioner and academic circles have researched and developed practices and process to more effectively handle information security. Even with growth in these areas there has been little research conducted into how decision makers actually behave. This is problematic because decision makers in the Department of Defense have been observed exhibiting risk seeking behavior when making information security decisions that seemingly violate accepted norms. There are presently no models in the literature that provide sufficient insight into this phenomenon. This study used Prospect …


Conference Web Site Redesign, Steven M. Pisarski Dec 2005

Conference Web Site Redesign, Steven M. Pisarski

Regis University Student Publications (comprehensive collection)

Sustainable Resources was a non-profit organization based out of Boulder, CO that, at the time of this project hosted yearly conferences to help find solutions to world poverty. Although, the previous web site had a professional appearance, it was not meeting their needs with regards to usability, extensibility, and maintainability, as they had been forced to rely heavily on a transient volunteer IT labor base. The aim of this project was to address their functional and maintenance problems. The application's front-end was built in adherence to the Model -view-Controller (MVC) design pattern and implemented using the Jakarta Struts framework and …


Trust Broker: A Defense Against Identity Theft From Online Transactions, Michael George Edvalson Dec 2005

Trust Broker: A Defense Against Identity Theft From Online Transactions, Michael George Edvalson

Theses and Dissertations

The proliferation of online services over the years has encouraged more and more people to participate in Internet activities. Many web sites request personal and sensitive information needed to deliver the desired service. Unfortunately, it is difficult to distinguish the sites that can be trusted to protect such information from those that cannot. Many attempts to make the Internet easier to use introduce new security and privacy problems. On the other hand, most attempts at creating a safe online environment produce systems that are cryptic and hard to use. The TrustBroker system is based on a specialized online repository that …


Industrial Technology Education Teachers Perceptions Of National Standards For Technological Literacy In The State Of Arizona, Allan R. Mcrae Dec 2005

Industrial Technology Education Teachers Perceptions Of National Standards For Technological Literacy In The State Of Arizona, Allan R. Mcrae

Theses and Dissertations

Today, it is becoming increasingly clear that there is a growing interest, concern, and need for technological literacy. To this end, the International Technology Education Association (ITEA) through the Technology for All Americans Project, has developed and promulgated the Standards for Technological Literacy: Content for the Study of Technology. This effort is part of the ongoing initiative to develop technology standards on a national level, and to focus on what every student in grades K-12 should know and be able to do in order to achieve technological literacy (ITEA, 2000). The purpose of this study was to investigate the perceived …


The Cherry Creek Sneak A Database Solution, Analissa Hilt Dec 2005

The Cherry Creek Sneak A Database Solution, Analissa Hilt

Regis University Student Publications (comprehensive collection)

The purpose of the database was to provide a repository of information about the race, the racers, the sponsors and other miscellaneous information that may in the future prove to provide a better understanding of the customers of The Sneak. This project was completed with the long-term goals that the information contained in the database will be utilized to reduce registration time, recruit prior year participants to participate in future events and provide a tool to intimately understand the customers of the race.


High Performance Parallel Approximate Eigensolver For Real Symmetric Matrices, Yihua Bai Dec 2005

High Performance Parallel Approximate Eigensolver For Real Symmetric Matrices, Yihua Bai

Doctoral Dissertations

In the first-principles calculation of electronic structures, one of the most timeconsuming tasks is that of computing the eigensystem of a large symmetric nonlinear eigenvalue problem. The standard approach is to use an iterative scheme involving the solution to a large symmetric linear eigenvalue problem in each iteration. In the early and intermediate iterations, significant gains in efficiency may result from solving the eigensystem to reduced accuracy. As the iteration nears convergence, the eigensystem can be computed to the required accuracy.
Traditional real symmetric eigensolvers compute the eigensystem in three steps: 1) reduce a dense matrix to a symmetric tridiagonal …


A Combined Routing Method For Ad Hoc Wireless Networks, Zhenhui Jiang Dec 2005

A Combined Routing Method For Ad Hoc Wireless Networks, Zhenhui Jiang

Dartmouth College Master’s Theses

To make ad hoc wireless networks adaptive to different mobility and traffic patterns, we studied in this thesis an approach to swap from one protocol to another protocol dynamically, while routing continues. By the insertion of a new layer, we were able to make each node in the ad hoc wireless network notify each other about the protocol swap. To ensure that routing works efficiently after the protocol swap, we initialized the destination routing protocol's data structures and reused the previous routing information to build the new routing table. We also tested our approach under different network topologies and traffic …


Evolving Modular Programs By Extracting Reusable Functions Using Significance Testing, Anthony Loeppert Dec 2005

Evolving Modular Programs By Extracting Reusable Functions Using Significance Testing, Anthony Loeppert

Computer Science and Engineering Theses

Genetic programming is an automatic programming method that uses biologically inspired methods to evolve programs. Genetic programming, and evolutionary methods in general, are useful for problem domains in which a method for \emph{constructing} solutions is either not known or infeasible, but a method for \emph{rating} solutions exists. In order to address more complex problem domains, techniques exist to extract functions (modules) automatically during a GP search. This work describes a method to identify useful automatically extracted functions from a GP search to assist subsequent GP searches within the same problem domain, using significance testing. Functions classified as beneficial augment the …


Testing Java Monitors By State Space Exploration, Monica Maria Hernandez Dec 2005

Testing Java Monitors By State Space Exploration, Monica Maria Hernandez

Computer Science and Engineering Theses

Java monitors are classes that are intended to be accessed by multiple threads at the same time. Detecting synchronization faults in Java Monitors is considerably more challenging than testing regular classes, due to the inherent non-determinism of concurrent programs. This thesis proposes a state based exploration approach to testing Java monitors. This approach consists of exploring the state space of a Java monitor in a depth-first manner, dynamically building test sequences, which are comprised by the states explored along each path. Moreover, threads are introduced on the fly during the exploration of each path, based on several rules for simulating …


Customization Of A Generic Search Engine By Adding User Categories, Ajay Mohandas Madkaiker Dec 2005

Customization Of A Generic Search Engine By Adding User Categories, Ajay Mohandas Madkaiker

Computer Science and Engineering Theses

The current search engines available on the Net are generic in nature. They do not consider user preferences and treat all users information needs in the same way. As a result they frequently return a large number of links, that do not meet the user's information need. This requires more searching to find what the user is looking for. For example if a user is interested in a particular game, e.g. cricket, and enters the query world cup, a generic search engine would return links of all the sports that hold a world cup. The user has to browse through …


Interactive Animated Concept Map Generation - Using Dynamic Animations, Suneel Vana Dec 2005

Interactive Animated Concept Map Generation - Using Dynamic Animations, Suneel Vana

Computer Science and Engineering Theses

We present a visualization tool, which is useful for the illustration of educational concepts using interactive animated concept maps. This system serves as a presentation tool which provides a collection of multimedia elements (images, animations, audios clips and video clips), a collection of animated presentation templates and an interface by using which users can retrieve the multimedia elements from the multimedia database and generate the dynamic animations by placing the selected elements into the placeholders of the templates. The system generates the animated presentation by replacing embedded multimedia objects and their properties as desired by its users. A multimedia information …


Graph-Based Learning Using A Naive Bayesian Classifier, Robert Hawes Dec 2005

Graph-Based Learning Using A Naive Bayesian Classifier, Robert Hawes

Computer Science and Engineering Theses

Graph-based data representation is becoming increasingly more commonplace, as graphs can represent some kinds of data more efficiently than relational tables. As such, interesting patterns in the form of subgraphs can be discovered by mining these graph-based datasets. Because the learned patterns can be used to predict future occurrences, it is necessary to learn graphical concepts that can optimally classify the data in the presence of uncertainty. This work explores the construction and learning of optimal naïve Bayesian graph classifiers to distinguish between positive and negative graphs given a set of graphs as examples. Whereas most previous work in graph-based …


Estream: An Integration Of Event And Stream Processing, Vihang Garg Dec 2005

Estream: An Integration Of Event And Stream Processing, Vihang Garg

Computer Science and Engineering Theses

Event and stream data processing models have been researched extensively and are utilized in diverse application domains. Advanced applications require both event and stream processing, which is currently not supported. Although there are number of similarities and differences between them, a synergistic integration of their strengths will be better than the sum of their parts. In this thesis, we present EStream, an integrated event and stream processing system for monitoring changes on stream computations and for expressing and processing complex events on continuous queries (CQs). We introduce attribute-based constraints for reducing uninteresting events that are generated from CQs. We discuss …


Monitoring Health By Detecting Drifts And Outliers In Patterns Of An Inhabitant In A Smart Home, Gaurav Jain Dec 2005

Monitoring Health By Detecting Drifts And Outliers In Patterns Of An Inhabitant In A Smart Home, Gaurav Jain

Computer Science and Engineering Theses

The elderly, along with people with disabilities or chronic illness, are most often dependent on some kind of formal or informal care. They are forced to move to a place where they can be cared for. Automatic health monitoring allows them to maintain their independence and continue living at home longer by continuously providing key health and activity information to caregivers. In this thesis, we present a novel technique, called the Health Monitoring System (HMS), which is a data-driven automated monitoring system for detecting changes in the patterns of activities/inactivity, health data and the living environment. HMS classifies these changes …


Csegrid Portal: A Secure Web-Based Solution For Providing Ubiquitious Access To Grid Services (Design, Development And Implementation Of A Prototype), Srikant D. Rao Dec 2005

Csegrid Portal: A Secure Web-Based Solution For Providing Ubiquitious Access To Grid Services (Design, Development And Implementation Of A Prototype), Srikant D. Rao

Computer Science and Engineering Theses

Grid computing is emerging as a revolutionary concept for performing high performance computations on the grid. The grid infrastructure comprises of a large set of distributed computing resources that are shared across geographical and organizational boundaries. There is a need within the scientific community for friendly interfaces that can be used to obtain ubiquitous access to the grid resources. In this work, we address these needs by designing and implementing a web-based grid portal system (CSEGrid) that provides the user with transparent access to grid services like job submission, job status and resource monitoring, data transfer between grid resources, etc. …


Infosearch: A System For Searching And Retrieving Documents Using Complex Queries, Nikhil Deshpande Dec 2005

Infosearch: A System For Searching And Retrieving Documents Using Complex Queries, Nikhil Deshpande

Computer Science and Engineering Theses

The colossal amount of information available online has resulted in overloading users who need to navigate this information for their routine requirements. Although search engines have been effective in reducing this information overload, they support only queries involving keywords and Boolean operators. There are certain application domains where more expressive ways of searching are necessary. Consider searching a full-text patent database for documents containing more than n occurrences of a pattern, or for documents that have a particular pattern followed by another pattern within a specified interval. Such complex patterns involving pattern frequency and sequence, as well as patterns involving …


Hdb-Subdue, A Relational Database Approach To Graph Mining And Hierarchical Reduction, Srihari Padmanabhan Dec 2005

Hdb-Subdue, A Relational Database Approach To Graph Mining And Hierarchical Reduction, Srihari Padmanabhan

Computer Science and Engineering Theses

Data mining aims at discovering interesting and previously unknown patterns from data sets. Transactional mining (association rules, decision trees etc.) can be effectively used to find non-trivial patterns in categorical and unstructured data. For applications that have an inherent structure (e.g., chemical compounds, proteins) graph mining is appropriate, because mapping the structured data into other representations would lead to loss of structure. The need for mining structured data has increased in the past few years. Graph mining uses graph theory principles to perform mining. Database mining of graphs aims at mining structured graph data stored in relational database tables using …


Approaches For Validating Frequent Episodes Based On Periodicity In Time-Series Data, Dhawal Y. Bhatia Dec 2005

Approaches For Validating Frequent Episodes Based On Periodicity In Time-Series Data, Dhawal Y. Bhatia

Computer Science and Engineering Theses

There is ongoing research on sequence mining of time-series data. We study Hybrid Apriori, an interval-based approach to episode discovery that deals with different periodicities in time-series data. Our study identifies the anomaly in the Hybrid Apriori by confirming the false positives in the frequent episodes discovered. The anomaly is due to the folding phase of the algorithm, which combines periods in order to compress data. We propose a main memory based solution to distinguish the false positives from the true frequent episodes. Our algorithm to validate the frequent episodes has several alternatives such as the naïve approach, the partitioned …


Solving The Rubik's Cube With Parallel Processing, Aslesha Pramod Nargolkar Dec 2005

Solving The Rubik's Cube With Parallel Processing, Aslesha Pramod Nargolkar

Computer Science and Engineering Theses

This thesis investigates parallel processing techniques for solving the 3 x 3 x 3 Rubik's Cube. We explore various state-space search based algorithmic approaches to optimally solve the Cube. The parallel processing approach is based on IDA* using a pattern database as the underlying heuristic because of its well established effectiveness. The parallel algorithm is an extension of the Michael Reid algorithm which is sequential. The parallel algorithm exhibits good speedup and scalability. Nearly 150 random as well as symmetrical cube configurations were tested for the experiments on sequential and parallel implementations. The proposed parallel algorithm using master-slave type of …


Developing A Strategic Is Plan For The Cherry Creek Sneak, Stephanie Bass Dec 2005

Developing A Strategic Is Plan For The Cherry Creek Sneak, Stephanie Bass

Regis University Student Publications (comprehensive collection)

The Cherry Creek Sneak is the 3rd largest 5-mile race in the United States.Currently, 10% of the proceeds from the race are donated to the ColoradoGovernor's Council to fight childhood obesity. The co-owners of the race, Pat Downing and Paula Tiernen, live in different states, and because of this, are unable to manage The Cherry Creak Sneak, or any business regarding the race efficiently. In order to continue the race in the future, they have requested that the Cherry Creek Sneak website be the place where their business is conducted. The goal of this project, therefore, is to create a …


Correlogram Method For Comparing Bio-Sequences, Gandhali P. Samant Dec 2005

Correlogram Method For Comparing Bio-Sequences, Gandhali P. Samant

Theses and Dissertations

Sequence comparison is one of the most primitive operations used in bio-informatics. It is used as a basis for many other complex manipulations in the field of Computational Molecular Biology. Many methods and algorithms were developed to compare and align sequences effectively. Most of these methods use linear comparison and some standard scoring schemes to calculate the similarity between sequences. We described an alternative approach to compare sequences based on the correlogram method. This method has already been used in the past for comparing images. By using the correlogram method, a sequence is projected on a 3-D space and the …


An Improvement And A Generalization Of Zippel's Sparse Multivariate Polynomial Interpolation Algorithm, Michael D. Brazier Dec 2005

An Improvement And A Generalization Of Zippel's Sparse Multivariate Polynomial Interpolation Algorithm, Michael D. Brazier

Theses and Dissertations - UTB/UTPA

The algorithm most often used for the problem of interpolating sparse multivariate polynomials from their values is Zippel's probabilistic algorithm (1988). The algorithm evaluates the function to be interpolated at a significant number of points, and for many problems of interest processing evaluations dominates the running time. This thesis presents an improvement of Zippel's algorithm, which decreases the number of evaluations needed for an interpolation by using transposed Vandermonde systems for the univariate interpolation step of Zippel's algorithm. The technique also allows a more general form of the algorithm: it becomes possible to interpolate more than one variable within a …


Improving The Performance Of Nested Loop Algorithm Using Separators, Nachiappan N. Nachiappan Dec 2005

Improving The Performance Of Nested Loop Algorithm Using Separators, Nachiappan N. Nachiappan

Theses and Dissertations - UTB/UTPA

This thesis studies the properties of distance-based outliers and a better detection method for large multi-dimensional datasets. Outlier detection is an important task to find out the objects that deviate in a high ratio from the rest of the objects. The proposed algorithm breaks the data set into divisions and sets the area of access for each division, thus reducing the unnecessary access for a major set of elements. This algorithm reduces the run time of the existing algorithm by using separators. Datasets of varying sizes have been tested to analyze the empirical values of these procedures. Effective data structures …


Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi Dec 2005

Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi

Computer Science Theses & Dissertations

Low Earth Orbit (LEO) satellite networks are deployed as an enhancement to terrestrial wireless networks in order to provide broadband services to users regardless of their location. In addition to global coverage, these satellite systems support communications with hand-held devices and offer low cost-per-minute access cost, making them promising platforms for Personal Communication Services (PCS). LEO satellites are expected to support multimedia traffic and to provide their users with some form of Quality of Service (QoS) guarantees. However, the limited bandwidth of the satellite channel, satellite rotation around the Earth and mobility of end-users makes QoS provisioning and mobility management …


Obtaining High Precision Results From Low Precision Hardware, Adam Donald Graham Dec 2005

Obtaining High Precision Results From Low Precision Hardware, Adam Donald Graham

Masters Theses

This document describes an attempt at acheiving high precision matrix multiplication results from the Lenslet EnLight256 Optical Signal Processor (OSP), which on its own can only produce results which are hardware limited to 8-bit signed integers. Due to it’s low precision, it’s has only limited applicability to real world problems, and if higher precision results were possible from the machine it could be used for more applications. A C library is developed for this thesis to allow high-precision results from the EnLight256. The library is described and results are given. Finally an implementation of the Jacobi Method on the EnLight256 …


Online Support For Multivariate Integration, Shujun Li Dec 2005

Online Support For Multivariate Integration, Shujun Li

Dissertations

In this dissertation, we present an online problem solving environment for multivariate numerical integration. To build an environment for users with various backgrounds, we address issues of Web interface support for end-users, remote application programming interfaces for distributed system programmers, visualization of multivariate integrand functions for problem analysis, and highly efficient integration methods. Compared to previous implementations, our new load balancing schemes increase the scalability of parallel integration and hence are suitable for large scale computations. A parallel integration service, called PI service, was implemented based on Web services technologies to support both remote integration and remote visualization. The multivariate …


Implementation Of Coeus Grant Management Software At The Desert Research Institute, Patricia Kingsmill Dec 2005

Implementation Of Coeus Grant Management Software At The Desert Research Institute, Patricia Kingsmill

Regis University Student Publications (comprehensive collection)

The Internet and electronic commerce have opened up new opportunities for efficiency in research administration. Public Law 106-107 or the Federal Financial Assistance Improvement Act signed on November 20, 1999 and the President's Management Agenda have formally charged federal grant-making agencies with creating a single electronic system to find and apply for federal grant opportunities. In response to this directive, recipient organizations will need the ability to electronically prepare and submit proposal information and receive funding data from the sponsoring agency. This project reviews the implementation of a software package, MIT's Coeus Grant Management System, as a solution to the …


Design Of North Texas Pc Users Group Ecommerce Interface And Online Membership System, Jeir J. Steele Dec 2005

Design Of North Texas Pc Users Group Ecommerce Interface And Online Membership System, Jeir J. Steele

Regis University Student Publications (comprehensive collection)

The North Texas PC Users Group is a non-profit that is struggling with their existing membership process. This thesis explores the analysis of a new membership process and discusses the resulting new architecture and system design to implement it. The implementation of this new business process will reduce the time to produce the standard monthly reports and foster future membership retention efforts. The new design supports Ecommerce instant transactions, online availability of reports for the Board of Directors, and the access control of a member-only online site. The research for this project included an analysis of the cost, benefits, and …