Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

2012

Institution
Keyword
Publication
File Type

Articles 571 - 600 of 612

Full-Text Articles in Physical Sciences and Mathematics

Developing A Semantic Web Crawler To Locate Owl Documents, Ronald Dean Koron Jan 2012

Developing A Semantic Web Crawler To Locate Owl Documents, Ronald Dean Koron

Browse all Theses and Dissertations

The terms Semantic Web and OWL are relatively new and growing concepts in the World Wide Web. Because these concepts are so new there are relatively few applications and/or tools for utilizing the potential power of this new concept. Although there are many components to the Semantic Web, this thesis will focus on the research question, "How do we go about developing a web crawler for the Semantic Web that locates and retrieves OWL documents." Specifically for this thesis, we hypothesize that by giving URIs to OWL documents, including all URIs from within these OWL documents, priority over other types …


Winding Resistance And Winding Power Loss Of High-Frequency Power Inductors, Rafal P. Wojda Jan 2012

Winding Resistance And Winding Power Loss Of High-Frequency Power Inductors, Rafal P. Wojda

Browse all Theses and Dissertations

The scope of this research is concentrated on analytical winding size optimization (thickness or diameter) of high-frequency power inductors wound with foil, solid-round wire, multi-strand wire, and litz-wire conductors.

The first part of this research concerns analytical optimization of the winding size (thickness or diameter) for the inductors conducting a sinusoidal current. Estimation of winding resistance in individual inductor layers made of foil, taking into account the skin and proximity effects is performed. Approximated equations for the winding power loss in each layer are given and the optimal values of foil thickness for each layer are derived.

A low- and …


Knn-R: Building Secure And Efficient Outsourced Knn Query Service With The Rasp Encryption, Huiqi Xu Jan 2012

Knn-R: Building Secure And Efficient Outsourced Knn Query Service With The Rasp Encryption, Huiqi Xu

Browse all Theses and Dissertations

With the wide deployment of public cloud computing infrastructures, outsourcing database services to the cloud has become an appealing solution to save operating expense. However, some databases might be so sensitive or precious that the data owner does not want to move to the cloud unless the security is guaranteed. On the other hand, a secure outsourced service should still provide efficient query processing and significantly reduce the inhouse workload to fully realize the benefits of outsourcing. We summarize these key features for an outsourced service as the CPEL criteria: data Confidentiality, query Privacy, Efficient query processing, and Low inhouse …


Direct Optimization Of Ranking Measures For Learning To Rank Models, Li Li Guo Jan 2012

Direct Optimization Of Ranking Measures For Learning To Rank Models, Li Li Guo

Browse all Theses and Dissertations

The main challenge in learning-to-rank for information retrieval is the difficulty to di- rectly optimize ranking measures to automatically construct a ranking model from training data. It is mainly due to the fact that the ranking measures are determined by the order of ranked documents rather than the specific values of ranking model scores, thus they are non-convex, nondifferentiable and discontinuous. To address this issue, listwise approaches have been proposed where loss functions are defined either by exploiting a probabilistic model or by optimizing upper bounds or smoothed approximations of ranking measures. Even though very promising results have been achieved, …


Linked Open Data Alignment & Querying, Prateek Jain Jan 2012

Linked Open Data Alignment & Querying, Prateek Jain

Browse all Theses and Dissertations

The recent emergence of the "Linked Data" approach for publishing data represents a major step forward in realizing the original vision of a web that can "understand and satisfy the requests of people and machines to use the web content" i.e. the Semantic Web. This new approach has resulted in the Linked Open Data (LOD) Cloud, which includes more than 295 large datasets contributed by experts belonging to diverse communities such as geography, entertainment, and life sciences. However, the current interlinks between datasets in the LOD Cloud, as we will illustrate,are too shallow to realize much of the benefits promised. …


Enhancing Description Logics For Rules Coverage, David Carral Martinez Jan 2012

Enhancing Description Logics For Rules Coverage, David Carral Martinez

Browse all Theses and Dissertations

This thesis is a formal study on how to extend the set of logic constructors of description logics languages, used for knowledge representation in the Semantic Web field to capture some of the previously exclusive rules expressivity. Description Logics, the logics underpinning the Web Ontology Language OWL, and rules are currently the most prominent paradigms used for modeling knowledge for the Semantic Web. While both of these approaches are based on classical logic, the paradigms also differ significantly, so that naive combinations result in undesirable properties such as undecidability. Recent work has shown that many rules can in fact be …


Evolutionary Computing Driven Search Based Software Testing And Correction, Joshua Lee Wilkerson Jan 2012

Evolutionary Computing Driven Search Based Software Testing And Correction, Joshua Lee Wilkerson

Doctoral Dissertations

"For a given program, testing, locating the errors identified, and correcting those errors is a critical, yet expensive process. The field of Search Based Software Engineering (SBSE) addresses these phases by formulating them as search problems. This dissertation addresses these challenging problems through the use of two complimentary evolutionary computing based systems. The first one is the Fitness Guided Fault Localization (FGFL) system, which novelly uses a specification based fitness function to perform fault localization. The second is the Coevolutionary Automated Software Correction (CASC) system, which employs a variety of evolutionary computing techniques to perform testing, correction, and verification of …


Methods And Algorithms For Scalable Verification Of Asynchronous Designs, Haiqiong Yao Jan 2012

Methods And Algorithms For Scalable Verification Of Asynchronous Designs, Haiqiong Yao

USF Tampa Graduate Theses and Dissertations

Concurrent systems are getting more complex with the advent of multi-core processors and the support of concurrent programs. However, errors of concurrent systems are too subtle to detect with the traditional testing and simulation. Model checking is an effective method to verify concurrent systems by exhaustively searching the complete state space exhibited by a system. However, the main challenge for model checking is state explosion, that is the state space of a concurrent system grows exponentially in the number of components of the system. The state space explosion problem prevents model checking from being applied to systems in realistic size. …


Economic Culture And Trading Behaviors In Information Markets, Khalid Nasser Alhayyan Jan 2012

Economic Culture And Trading Behaviors In Information Markets, Khalid Nasser Alhayyan

USF Tampa Graduate Theses and Dissertations

There are four main components for influencing traders' behaviors in an information market context: trader characteristics, organizational characteristics, market design, and external information. This dissertation focuses on investigating the impact of individual trader characteristics on trading behaviors. Two newly-developed constructs, highly relevant to information market contexts, were identified to increase our understanding about trading behaviors: trader's economic culture and trader independence. The theory of planned behavior is used as the theoretical basis to postulate hypotheses for empirical testing. Data collected from subjects through a series of web-based experiments shows that trader participation can be fostered through recruiting individuals who are …


Basal Graph Structures For Geometry Based Organization Of Wide-Baseline Image Collections, Aveek Shankar Brahmachari Jan 2012

Basal Graph Structures For Geometry Based Organization Of Wide-Baseline Image Collections, Aveek Shankar Brahmachari

USF Tampa Graduate Theses and Dissertations

We propose algorithms for organization of images in wide-area sparse-view datasets. In such datasets, if the images overlap in scene content, they are related by wide-baseline geometric transformations. The challenge is to identify these relations even if the images sparingly overlap in their content. The images in a dataset are then grouped into sets of related images with the relations captured in each set as a basal (minimal and foundational) graph structures. Images form the vertices in the graph structure and the edges define the geometric relations between the images. We use these basal graphs for geometric walkthroughs and detection …


Tagline: Information Extraction For Semi-Structured Text Elements In Medical Progress Notes, Dezon K. Finch Jan 2012

Tagline: Information Extraction For Semi-Structured Text Elements In Medical Progress Notes, Dezon K. Finch

USF Tampa Graduate Theses and Dissertations

Text analysis has become an important research activity in the Department of Veterans Affairs (VA). Statistical text mining and natural language processing have been shown to be very effective for extracting useful information from medical documents. However, neither of these techniques is effective at extracting the information stored in semi-structure text elements. A prototype system (TagLine) was developed as a method for extracting information from the semi-structured portions of text using machine learning. Features for the learning machine were suggested by prior work, as well as by examining the text, and selecting those attributes that help distinguish the various classes …


The Application Of Fuzzy Granular Computing For The Analysis Of Human Dynamic Behavior In 3d Space, Murad Mohammad Alaqtash Jan 2012

The Application Of Fuzzy Granular Computing For The Analysis Of Human Dynamic Behavior In 3d Space, Murad Mohammad Alaqtash

Open Access Theses & Dissertations

Human dynamic behavior in space is very complex in that it involves many physical, perceptual and motor aspects. It is tied together at a sensory level by linkages between vestibular, visual and somatosensory information that develop through experience of inertial and gravitational reaction forces. Coordinated movement emerges from the interplay among descending output from the central nervous system, sensory input from the body and environment, muscle dynamics, and the emergent dynamics of the whole neuromusculoskeletal system.

There have been many attempts to directly capture the activities of the neuronal system in human locomotion without the ability to clarify how the …


Distributed And Collaborative Watermarking In Relational Data, Prakash Kumar Jan 2012

Distributed And Collaborative Watermarking In Relational Data, Prakash Kumar

Masters Theses

"Watermarking relational data is an important topic in the field of copyright protection, given the increasing prevalence of piracy and illegal duplication of databases. While there exists solutions for watermarking relational data, the problems that arise due to multiple ownership (two or more) of databases have not been acknowledged. This research focuses on developing a novel watermarking scheme to counter the problems. The watermarking scheme proposed necessitates the owners of the database in consideration to come together to perform the watermarking process. The scheme can be applied to insert watermarks in both numerical and categorical data. The watermarking scheme is …


Vehicle Path Verification Using Wireless Sensor Networks, Gerry W. Howser Jan 2012

Vehicle Path Verification Using Wireless Sensor Networks, Gerry W. Howser

Masters Theses

"Path Verification is a problem where a verifier would like to determine how closely a vehicle actually traversed a path that it claims to have traversed. This problem has critical significances in terms of vehicle mobility. Mobile nodes can be patrols officers or cab drivers, while respective verifiers can be police dispatchers or cab operators. In this paper, we design a sensor network assisted technique for vehicle path verification. In our design, a number of static wireless sensors placed in road segments will serve as witnesses and certify vehicles as they move. Post movement, these witness certificates will be utilized …


How Should Plastic-Packaging Companies Apply Artificial Proofs And Topics Of Invention To Communicate Sustainability? : A Heuristic Developed On The Basis Of Rhetorical Analysis, Shristy Bashyal Jan 2012

How Should Plastic-Packaging Companies Apply Artificial Proofs And Topics Of Invention To Communicate Sustainability? : A Heuristic Developed On The Basis Of Rhetorical Analysis, Shristy Bashyal

Masters Theses

"This study examines how the ten plastic-packaging companies use artificial proofs and topics of invention to communicate sustainability-related information. The objective of this study was to answer the following research questions:

(i) Do plastic-packaging companies define sustainability on their website?

(ii) What are the strengths and weaknesses of the arguments in these companies' sustainability-related communications?

(iii) What invention strategies should technical marketing communicators use to communicate company's sustainable practices?

To answer these questions, I analyzed the sustainability-related documents available on the websites of the ten companies. On the basis of this analysis, I developed an invention heuristic that can be …


Under Pressure: A Psychophysiological Analysis Of The Effect Of Temporal Constraints On Information Processing And Decision Making, Nagaratna Krishna Sneha Pochinapeddi Jan 2012

Under Pressure: A Psychophysiological Analysis Of The Effect Of Temporal Constraints On Information Processing And Decision Making, Nagaratna Krishna Sneha Pochinapeddi

Masters Theses

"In recent times, decision making under time pressure has become more common than ever and hence, it has become a hot topic for behavioral researchers. This research studies the effects of temporal constraints on users' decision quality and decision strategy. The paper primarily addresses two research questions: (i) Does time pressure affect decision quality? (ii) Does time pressure affect decision strategy? The decision accuracy and decision strategy of the participants were measured for three time-pressure conditions namely, No time pressure, Reasonable time pressure and Extreme time pressure. Research results from the past revealed that, Cognitive style is also observed to …


Robust Evolutionary Algorithms, Brian Wesley Goldman Jan 2012

Robust Evolutionary Algorithms, Brian Wesley Goldman

Masters Theses

"Evolutionary Algorithms (EAs) have shown great potential to solve complex real world problems, but their dependence on problem specific configuration in order to obtain high quality performance prevents EAs from achieving widespread use. While it is widely accepted that statically configuring an EA is already a complex problem, dynamic configuration of an EA is a combinatorially harder problem. Evidence provided here supports the claim that EAs achieve the best results when using dynamic configurations. By designing methods that automatically configure parts of an EA or by changing how EAs work to avoid configurable aspects, EAs can be made more robust, …


A Method For Securing Online Community Service: A Study Of Selected Western Australian Councils, Sunsern Limwiriyakul Jan 2012

A Method For Securing Online Community Service: A Study Of Selected Western Australian Councils, Sunsern Limwiriyakul

Theses: Doctorates and Masters

Since the Internet was made publicly accessible, it has become increasingly popular and its deployment has been broad and global thereby facilitating a range of available online services such as Electronic Mail (email), news or bulletins, Internet Relay Chat (IRC) and World Wide Web (WWW). Progressively, other online services such as telephony, video conference, video on demand, Interactive Television (ITV) and Geographic Information System (GIS) have been integrated with the Internet and become publicly available. Presently, Internet broadband communication services incorporating both wired and wireless network technologies has seen the emergence of the concept of a digital community which has …


Coevolutionary Algorithms For The Optimization Of Strategies For Red Teaming Applications, Tirtha Ranjeet Jan 2012

Coevolutionary Algorithms For The Optimization Of Strategies For Red Teaming Applications, Tirtha Ranjeet

Theses: Doctorates and Masters

Red teaming (RT) is a process that assists an organization in finding vulnerabilities in a system whereby the organization itself takes on the role of an “attacker” to test the system. It is used in various domains including military operations. Traditionally, it is a manual process with some obvious weaknesses: it is expensive, time-consuming, and limited from the perspective of humans “thinking inside the box”. Automated RT is an approach that has the potential to overcome these weaknesses. In this approach both the red team (enemy forces) and blue team (friendly forces) are modelled as intelligent agents in a multi-agent …


A Learning-Based Approach To Exploiting Sensing Diversity In Performance Critical Sensor Networks, Matthew Alexander Keally Jan 2012

A Learning-Based Approach To Exploiting Sensing Diversity In Performance Critical Sensor Networks, Matthew Alexander Keally

Dissertations, Theses, and Masters Projects

Wireless sensor networks for human health monitoring, military surveillance, and disaster warning all have stringent accuracy requirements for detecting and classifying events while maximizing system lifetime. to meet high accuracy requirements and maximize system lifetime, we must address sensing diversity: sensing capability differences among both heterogeneous and homogeneous sensors in a specific deployment. Existing approaches either ignore sensing diversity entirely and assume all sensors have similar capabilities or attempt to overcome sensing diversity through calibration. Instead, we use machine learning to take advantage of sensing differences among heterogeneous sensors to provide high accuracy and energy savings for performance critical applications.;In …


Deductive Formal Verification Of Embedded Systems, Zheng Lu Jan 2012

Deductive Formal Verification Of Embedded Systems, Zheng Lu

LSU Doctoral Dissertations

We combine static analysis techniques with model-based deductive verification using SMT solvers to provide a framework that, given an analysis aspect of the source code, automatically generates an analyzer capable of inferring information about that aspect.

The analyzer is generated by translating the collecting semantics of a program to a formula in first order logic over multiple underlying theories. We import the semantics of the API invocations as first order logic assertions. These assertions constitute the models used by the analyzer. Logical specification of the desired program behavior is incorporated as a first order logic formula. An SMT-LIB solver treats …


A New Model For Coalition Formation Games, Alfred Samman Jan 2012

A New Model For Coalition Formation Games, Alfred Samman

LSU Doctoral Dissertations

We present two broad categories of games, namely, group matching games and bottleneck routing games on grids. Borrowing ideas from coalition formation games, we introduce a new category of games which we call group matching games. We investigate how these games perform when agents are allowed to make selfish decisions that increase their individual payoffs versus when agents act towards the social benefit of the game as a whole. The Price of Anarchy (PoA) and Price of Stability (PoS) metrics are used to quantify these comparisons. We show that the PoA for a group matching game is at most kα …


Ensemble Methods For Malware Diagnosis Based On One-Class Svms, Xing An Jan 2012

Ensemble Methods For Malware Diagnosis Based On One-Class Svms, Xing An

LSU Master's Theses

Malware diagnosis is one of today’s most popular topics of machine learning. Instead of simply applying all the classical classification algorithms to the problem and claim the highest accuracy as the result of prediction, which is the typical approach adopted by studies of this kind, we stick to the Support Vector Machine (SVM) classifier and based on our observation of some principles of learning, characteristics of statistics and the behavior of SVM, we employed a number of the potential preprocessing or ensemble methods including rescaling, bagging and clustering that may enhance the performance to the classical algorithm. We implemented the …


Opportunistic Lookahead Routing Procedure For Delay Tolerant Networks, Priyanka Rotti Jan 2012

Opportunistic Lookahead Routing Procedure For Delay Tolerant Networks, Priyanka Rotti

LSU Master's Theses

Delay Tolerant Networks are wireless networks that have sporadic network connectivity, thus rendering the existence of instantaneous end-to-end paths from a source to a destination difficult or impossible. Hence, in such networks, message delivery relies heavily on the store-and-forward paradigm to route messages. However, limited knowledge of the contact times between the nodes poses a big challenge to effective forwarding of messages. In this thesis, we discuss several aspects of routing in DTNs and present one algorithm and three variants for addressing the routing problem in DTNs: (i) the Look-ahead Protocol, in which the forwarding decision at each node to …


Conformance Testing Of Peer-To-Peer Systems Using Message Traffic Analysis, John Wesley Burris Jan 2012

Conformance Testing Of Peer-To-Peer Systems Using Message Traffic Analysis, John Wesley Burris

LSU Doctoral Dissertations

Peer-to-Peer architectures are used by a large number of distributed systems; however, the challenges such as maintaining a reliable and stable peer-to-peer network can make such networks undesirable for distributed systems. Peer-to-peer architectures are designed to be executed on systems with diverse hardware configurations, distant geographic locations, and varied, unpredictable Internet connectivity that make the software testing process difficult. This research defines a method for conformance testing peer-to-peer content distribution systems called “Method for Conformance Testing by Analyzing Message Activity” (MCTAMA). MCTAMA uses a common representation for describing the behavior of nodes during both design and deployment. ATAMA generates, evaluates …


Software Architectural Support For Tangible User Interfaces In Distributed, Heterogeneous Computing Environments, Cornelius Toole Jan 2012

Software Architectural Support For Tangible User Interfaces In Distributed, Heterogeneous Computing Environments, Cornelius Toole

LSU Doctoral Dissertations

This research focuses on tools that support the development of tangible interaction-based applications for distributed computing environments. Applications built with these tools are capable of utilizing heterogeneous resources for tangible interaction and can be reconfigured for different contexts with minimal code changes. Current trends in computing, especially in areas such as computational science, scientific visualization and computer supported collaborative work, foreshadow increasing complexity, distribution and remoteness of computation and data. These trends imply that tangible interface developers must address concerns of both tangible interaction design and networked distributed computing. In this dissertation, we present a software architecture that supports separation …


Cluster Based Jamming And Countermeasures For Wireless Sensor Network Mac Protocols, David Trammell Jan 2012

Cluster Based Jamming And Countermeasures For Wireless Sensor Network Mac Protocols, David Trammell

LSU Doctoral Dissertations

A wireless sensor network (WSN) is a collection of wireless nodes, usually with limited computing resources and available energy. The medium access control layer (MAC layer) directly guides the radio hardware and manages access to the radio spectrum in controlled way. A top priority for a WSN MAC protocol is to conserve energy, however tailoring the algorithm for this purpose can create or expose a number of security vulnerabilities. In particular, a regular duty cycle makes a node vulnerable to periodic jamming attacks. This vulnerability limits the use of use of a WSN in applications requiring high levels of security. …


Visualization Of Time-Varying Data From Atomistic Simulations And Computational Fluid Dynamics, Bidur Bohara Jan 2012

Visualization Of Time-Varying Data From Atomistic Simulations And Computational Fluid Dynamics, Bidur Bohara

LSU Doctoral Dissertations

Time-varying data from simulations of dynamical systems are rich in spatio-temporal information. A key challenge is how to analyze such data for extracting useful information from the data and displaying spatially evolving features in the space-time domain of interest. We develop/implement multiple approaches toward visualization-based analysis of time-varying data obtained from two common types of dynamical simulations: molecular dynamics (MD) and computational fluid dynamics (CFD). We also make application case studies. Parallel first-principles molecular dynamics simulations produce massive amounts of time-varying three-dimensional scattered data representing atomic (molecular) configurations for material system being simulated. Rendering the atomic position-time series along with …


Semantically-Aware Data Discovery And Placement In Collaborative Computing Environments, Xinqi Wang Jan 2012

Semantically-Aware Data Discovery And Placement In Collaborative Computing Environments, Xinqi Wang

LSU Doctoral Dissertations

As the size of scientific datasets and the demand for interdisciplinary collaboration grow in modern science, it becomes imperative that better ways of discovering and placing datasets generated across multiple disciplines be developed to facilitate interdisciplinary scientific research.

For discovering relevant data out of large-scale interdisciplinary datasets. The development and integration of cross-domain metadata is critical as metadata serves as the key guideline for organizing data. To develop and integrate cross-domain metadata management systems in interdisciplinary collaborative computing environment, three key issues need to be addressed: the development of a cross-domain metadata schema; the implementation of a metadata management system …


Decision Rule Induction For Service Sector Using Data Mining- A Rough Set Theory Approach, Zhonghua Hu Jan 2012

Decision Rule Induction For Service Sector Using Data Mining- A Rough Set Theory Approach, Zhonghua Hu

Open Access Theses & Dissertations

Nowadays, data mining is more widely used than ever before; not only by the academic area, but also in the industry and business area. Apart from execution of business processes, the creation of knowledge base and its utilization for the benefit of the organization is becoming a strategy tool to compete. Despite of having ever growing data bases, the problem is that the finance company fails to fully capitalize the true benefits which can be gained from this great wealth of information. The data mining technology instead of classic statistical analysis is developed to help the people to discover the …