Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2002

Theses/Dissertations

Institution
Keyword
Publication

Articles 1 - 30 of 113

Full-Text Articles in Physical Sciences and Mathematics

Load Balancing And Congestion Avoidance Routing, Konstantinos N. Kokkinos Dec 2002

Load Balancing And Congestion Avoidance Routing, Konstantinos N. Kokkinos

Dissertations

Today’s high speed backbone networks are expected to support a wide range of communication-intensive applications. One of the most important issues in Quality of Service (QoS) is efficient routing. Many QoS routing solutions have been published lately for different criteria of QoS requirements and resource constraints. In this dissertation we focus on the design of regular network topologies and suggest efficient routing schemes to reduce the probability of hot spot creation in the network. Furthermore, we provide a detection of congestion mechanism that reroutes traffic to maintain balancing with small communication cost. Several theoretical results relatively to network traffic balancing …


Detection And Generalization Of Spatio-Temporal Trajectories For Motion Imagery, Panayotis Partsinevelos Dec 2002

Detection And Generalization Of Spatio-Temporal Trajectories For Motion Imagery, Panayotis Partsinevelos

Electronic Theses and Dissertations

In today's world of vast information availability users often confront large unorganized amounts of data with limited tools for managing them. Motion imagery datasets have become increasingly popular means for exposing and disseminating information. Commonly, moving objects are of primary interest in modeling such datasets. Users may require different levels of detail mainly for visualization and further processing purposes according to the application at hand. In this thesis we exploit the geometric attributes of objects for dataset summarization by using a series of image processing and neural network tools. In order to form data summaries we select representative time instances …


Evaluating Conflicts In The Use And Development Of Geographic Information Systems, Amber Bethell Dec 2002

Evaluating Conflicts In The Use And Development Of Geographic Information Systems, Amber Bethell

Electronic Theses and Dissertations

Use of geographic information systems is increasing in governments, commercial companies, and by individual users. With such pervasive use of GIs there has been surprisingly little investigation of the values that various parties would support in the development of geographic technologies. There are many parties involved in the use of GIs each with opinions of what are good goals for developing and using such systems. This research seeks to determine differences and similarities among parties in the importance placed on supporting specific societal goals germane to the use of geographic technologies and databases. Previous research determined six areas where the …


Modeling Boundaries Of Influence Among Positional Uncertainty Fields, Joshua P. King Dec 2002

Modeling Boundaries Of Influence Among Positional Uncertainty Fields, Joshua P. King

Electronic Theses and Dissertations

Within a CIS environment, the proper use of information requires the identification of the uncertainty associated with it. As such, there has been a substantial amount of research dedicated to describing and quantifying spatial data uncertainty. Recent advances in sensor technology and image analysis techniques are making image-derived geospatial data increasingly popular. Along with development in sensor and image analysis technologies have come departures from conventional point-by-point measurements. Current advancements support the transition from traditional point measures to novel techniques that allow the extraction of complex objects as single entities (e.g., road outlines, buildings). As the methods of data extraction …


Sketch-Based Queries In Mobile Gis-Environments, David Caduff Dec 2002

Sketch-Based Queries In Mobile Gis-Environments, David Caduff

Electronic Theses and Dissertations

Recent achievements in the field of mobile computing and wireless communication promise data retrieval anywhere and anytime. This development provided the basis to expand GIs technology to handheld devices, such as personal digital assistants (PDAs). Although traditional GIs technology is well suited for desktop workstations, it needs to be adapted in order to satisfy the requirements of users using handheld computing devices. This adaptation is necessary because the usability of traditional GISs depends on characteristics of desktop computers, such as their relatively large user interfaces (e.g., displays, keyboards, pointing devices), considerable computing resources (i.e., CPU, memory, storage, operating systems), and …


Modeling Multiple Granularities Of Spatial Objects, Chitra Ramalingam Dec 2002

Modeling Multiple Granularities Of Spatial Objects, Chitra Ramalingam

Electronic Theses and Dissertations

People conceptualize objects in an information space over different levels of details or granularities and shift among these granularities as necessary for the task at hand. Shifting among granularities is fundamental for understanding and reasoning about an information space. In general, shifting to a coarser granularity can improve one's understanding of a complex information space, whereas shifting to a more detailed granularity reveals information that is otherwise unknown. To arrive at a coarser granularity. objects must be generalized. There are multiple ways to perform generalization. Several generalization methods have been adopted from the abstraction processes that are intuitively carried out …


Active Processor Scheduling Using Evolution Algorithms, David J. Caswell Dec 2002

Active Processor Scheduling Using Evolution Algorithms, David J. Caswell

Theses and Dissertations

The allocation of processes to processors has long been of interest to engineers. The processor allocation problem considered here assigns multiple applications onto a computing system. With this algorithm researchers could more efficiently examine real-time sensor data like that used by United States Air Force digital signal processing efforts or real-time aerosol hazard detection as examined by the Department of Homeland Security. Different choices for the design of a load balancing algorithm are examined in both the problem and algorithm domains. Evolutionary algorithms are used to find near-optimal solutions. These algorithms incorporate multiobjective coevolutionary and parallel principles to create an …


Data Mining With Newton's Method., James Dale Cloyd Dec 2002

Data Mining With Newton's Method., James Dale Cloyd

Electronic Theses and Dissertations

Capable and well-organized data mining algorithms are essential and fundamental to helpful, useful, and successful knowledge discovery in databases. We discuss several data mining algorithms including genetic algorithms (GAs). In addition, we propose a modified multivariate Newton's method (NM) approach to data mining of technical data. Several strategies are employed to stabilize Newton's method to pathological function behavior. NM is compared to GAs and to the simplex evolutionary operation algorithm (EVOP). We find that GAs, NM, and EVOP all perform efficiently for well-behaved global optimization functions with NM providing an exponential improvement in convergence rate. For local optimization problems, we …


Neural Supernets: Structuring Artificial Neural Networks According To Cluster Analysis, Simon Lucas Winberg Dec 2002

Neural Supernets: Structuring Artificial Neural Networks According To Cluster Analysis, Simon Lucas Winberg

Masters Theses

A typical feed forward neural network relies solely on its training algorithm, such as backprop or quickprop, to determine suitable weight values for an architecture chosen by the human operator. The architecture itself is typically a fully connected structuring of neurons and synapses where each hidden neuron is connected to every neuron in the next layer. Such architecture does not reflect the structure of the data used to train it. Similarly, in the case where random initial weight values are used, these initial weights are also unlikely to relate to the training set. Thus the job of the training algorithm …


A Performance Study Of Lam And Mpich On An Smp Cluster, Brian Patrick Kearns Dec 2002

A Performance Study Of Lam And Mpich On An Smp Cluster, Brian Patrick Kearns

Dissertations and Theses

Many universities and research laboratories have developed low cost clusters, built from Commodity-Off-The-Shelf (COTS) components and running mostly free software. Research has shown that these types of systems are well-equipped to handle many problems requiring parallel processing. The primary components of clusters are hardware, networking, and system software. An important system software consideration for clusters is the choice of the message passing library.

MPI (Message Passing Interface) has arguably become the most widely used message passing library on clusters and other parallel architectures, due in part to its existence as a standard. As a standard, MPI is open for anyone …


Knowledge Discovery And Modeling In Genomic Databases, Michael M. Yin Aug 2002

Knowledge Discovery And Modeling In Genomic Databases, Michael M. Yin

Dissertations

This dissertation research is targeted toward developing effective and accurate methods for identifying gene structures in the genomes of high eukaryotes, such as vertebrate organisms. Several effective hidden Markov models (HMMs) are developed to represent the consensus and degeneracy features of the functional sites including protein-translation start sites, mRNA splicing junction donor and acceptor sites in vertebrate genes. The HMM system based on the developed models is fully trained using an expectation maximization (EM) algorithm and the system performance is evaluated using a 10-way cross-validation method. Experimental results show that the proposed HMM system achieves high sensitivity and specificity in …


Intramural, Collaborative Learning Systems, Robert S. Friedman Aug 2002

Intramural, Collaborative Learning Systems, Robert S. Friedman

Theses

This thesis focuses on three related concepts: problem-based collaborative learning; the use of multimedia tools in learning systems; and participatory design as a software engineering methodology to create multimedia tools to be used in learning systems. A literature review of the three areas is followed by an overview of the pedagogical, technological, and business trends that affect the direction of innovation in education, including problem-based learning. A discussion of a software engineering project to develop a multimedia application that enhances the learning of geography skills and puts the programming, interface design and multimedia systems capabilities of college students into action …


Statistical Image Analysis Of Spotted Arrays, Filippo Posta Aug 2002

Statistical Image Analysis Of Spotted Arrays, Filippo Posta

Theses

There is a lot of systematic and specific variability in microarray experiments, this variability affects measured gene expression levels, leading to unreliable gene profiling or an heavy load of extra experiment to statistically confirm the data observed in one experiment.

The aim of this work is to systematically analyze, using statistics, the image derived from a cDNA microarray experiment to have a better understanding of this variability and thus a better confidence over the data obtained from an experiment.

Using technologies available at the Center for Applied Genomics, Newark, New Jersey. Selected images derived from different type of microarray experiments …


An Algorithm For Estimating The Quality Of Microarrays, Ajeet S. Sodhi Aug 2002

An Algorithm For Estimating The Quality Of Microarrays, Ajeet S. Sodhi

Theses

Microarray technology is currently one of the most valuable gene expression tools in molecular biology allowing the experimenter to simultaneously quantify the expression of thousands of genes. It is also one of the most difficult tools to use accurately as each microarray produces a large amount of information that needs to be inspected and normalized before analysis. As the size of a microarray or number of replicates increase, the use of manual inspection becomes impractical. The aim of this thesis is to introduce an algorithm that evaluates each feature of a microarray from the scanned data file. A quality score …


Analysis For Cooperative Behavior Effectiveness Of Autonomous Wide Area Search Munitions, Sang M. Park Aug 2002

Analysis For Cooperative Behavior Effectiveness Of Autonomous Wide Area Search Munitions, Sang M. Park

Theses and Dissertations

The purpose of this study is to investigate how a simulation model can accurately represent the performance of the autonomous wide area search munitions, and to find the effectiveness of the cooperative behavior on the autonomous munitions. Though it does not provide a practical solution for the development of the autonomous wide area search munitions, this research will show some meaningful allocations of the munitions tasks that are applicable to the development of the autonomous munitions. For the first phase, this thesis presents how accurately a simplified simulation model can represent a proposed weapon system by comparing the simulation results …


Visual Execution Analysis For Multiagent Systems, Chong Kil Aug 2002

Visual Execution Analysis For Multiagent Systems, Chong Kil

Theses and Dissertations

Multiagent systems have become increasingly important in developing complex software systems. Multiagent systems introduce collective intelligence and provide benefits such as flexibility, scalability, decentralization, and increased reliability. A software agent is a high-level software abstraction that is capable of performing given tasks in an environment without human intervention. Although multiagent systems provide a convenient and powerful way to organize complex software systems, developing such system is very complicated. To help manage this complexity this research develops a methodology and technique for analyzing, monitoring and troubleshooting multiagent systems execution. This is accomplished by visualizing a multiagent system at multiple levels of …


Integrated Software System For The Collection And Evaluation Of Wellness Information., Rebecca Elizabeth Sweeney Aug 2002

Integrated Software System For The Collection And Evaluation Of Wellness Information., Rebecca Elizabeth Sweeney

Electronic Theses and Dissertations

There is an absence of a complete, easy to use, software system that can evaluate all areas of wellness. Although there are software programs and equipment available to examine certain aspects of wellness, they are incomplete. The solution to the difficulties of assessing wellness is the design and development of a software system that can be used to collect and evaluate wellness information. The system allows for complete reporting as it entails the six major components to wellness: demographics, body composition, lab work, nutritional intake, physical activity, and body measures. The system allows for ease of use by providing a …


Scalable And Reliable File Transfer For Clusters Using Multicast., Hardik Dikpal Shukla Aug 2002

Scalable And Reliable File Transfer For Clusters Using Multicast., Hardik Dikpal Shukla

Electronic Theses and Dissertations

A cluster is a group of computing resources that are connected by a single computer network and are managed as a single system. Clusters potentially have three key advantages over workstations operated in isolation—fault tolerance, load balancing and support for distributed computing.

Information sharing among the cluster’s resources affects all phases of cluster administration. The thesis describes a new tool for distributing files within clusters. This tool, the Scalable and Reliable File Transfer Tool (SRFTT), uses Forward Error Correction (FEC) and multiple multicast channels to achieve an efficient reliable file transfer, relative to heterogeneous clusters. SRFTT achieves scalability …


A Formal Method To Analyze Framework-Based Software, Trent N. Larson Aug 2002

A Formal Method To Analyze Framework-Based Software, Trent N. Larson

Theses and Dissertations

Software systems are frequently designed using abstractions that make software verification tractable. Specifically, by choosing meaningful, formal abstractions for interfaces and then designing according to those interfaces, one can verify entire systems according to behavioral predicates. While impractical for systems in general, framework-based software architectures are a type of system for which formal analysis can be beneficial and practical over the life of the system. We present a method to formally analyze behavioral properties of framework-based software with higher-order logic and then demonstrate its utility for a significant, modern system.


Design And Implementation Of An Online Database Panel, Frenny Thomas Jul 2002

Design And Implementation Of An Online Database Panel, Frenny Thomas

Theses and Dissertations

There is a growing need for administrative panels such as the one described in this project. More and more website administrators wish to make changes to their online business without having to directly modify the database file. This project provides the perfect solution for this scenario by placing all database access on the World Wide Web. Administrators can now use this software to add, edit, and delete tables, fields, and records. Additionally, users will be able to generate queries without knowledge of Structured Query Language. This project acts as a summary of my computer science education at this university by …


The Future Of Cryptography Under Quantum Computers, Marco A. Barreno Jul 2002

The Future Of Cryptography Under Quantum Computers, Marco A. Barreno

Dartmouth College Undergraduate Theses

Cryptography is an ancient art that has passed through many paradigms, from simple letter substitutions to polyalphabetic substitutions to rotor machines to digital encryption to public-key cryptosystems. With the possible advent of quantum computers and the strange behaviors they exhibit, a new paradigm shift in cryptography may be on the horizon. Quantum computers could hold the potential to render most modern encryption useless against a quantum-enabled adversary. The aim of this thesis is to characterize this convergence of cryptography and quantum computation. We provide definitions for cryptographic primitives that frame them in general terms with respect to complexity. We explore …


Content Aware Request Distribution For High Performance Web Service: A Performance Study, Robert M. Jones Jul 2002

Content Aware Request Distribution For High Performance Web Service: A Performance Study, Robert M. Jones

Dissertations and Theses

The World Wide Web is becoming a basic infrastructure for a variety of services, and the increases in audience size and client network bandwidth create service demands that are outpacing server capacity. Web clusters are one solution to this need for high performance, highly available web server systems. We are interested in load distribution techniques, specifically Layer-7 algorithms that are content-aware. Layer-7 algorithms allow distribution control based on the specific content requested, which is advantageous for a system that offers highly heterogenous services. We examine the performance of the Client Aware Policy (CAP) on a Linux/Apache web cluster consisting of …


Performance And Interoperability In Solar, A Abram White Jun 2002

Performance And Interoperability In Solar, A Abram White

Dartmouth College Undergraduate Theses

Ubiquitous computing promises to integrate computers into our physical environment, surrounding us with applications that are able to adapt to our dynamics. Solar is a software infrastructure designed to deliver contextual information to these applications. To serve the large number and wide variety of context-aware devices envisioned by ubiquitous computing, Solar must exhibit both high performance and the ability to interoperate with many computing platforms. We created a testing framework to measure the performance of distributed systems such as Solar, as well as a pluggable data-transfer mechanism to support the dissemination of information to heterogeneous applications. This paper explores the …


Modular Machine Learning Methods For Computer-Aided Diagnosis Of Breast Cancer, Mia Kathleen Markey '94 Jun 2002

Modular Machine Learning Methods For Computer-Aided Diagnosis Of Breast Cancer, Mia Kathleen Markey '94

Doctoral Dissertations

The purpose of this study was to improve breast cancer diagnosis by reducing the number of benign biopsies performed. To this end, we investigated modular and ensemble systems of machine learning methods for computer-aided diagnosis (CAD) of breast cancer. A modular system partitions the input space into smaller domains, each of which is handled by a local model. An ensemble system uses multiple models for the same cases and combines the models' predictions.

Five supervised machine learning techniques (LDA, SVM, BP-ANN, CBR, CART) were trained to predict the biopsy outcome from mammographic findings (BIRADS™) and patient age based on a …


Dimension And Shape Invariant Programming: The Implementation And Application, Manal Ezzat Helal Jun 2002

Dimension And Shape Invariant Programming: The Implementation And Application, Manal Ezzat Helal

Archived Theses and Dissertations

This thesis implements a model for the shape and dimension invariant programming based on the notation of the Mathematics of Arrays (MOA) algebra. It focuses on dimension and shape invariance implementation, and their effect in parallel computing. A new design for the MOA notation is implemented that eliminates the need for another PSI-compiler, or a language extension to functional programming languages. The MOA notation is designed as a library of Application Programming Interfaces (APIs), contains object oriented classes implemented in C++. The library executes array operations correctly, and is expected to enhance the performance invariant of dimension and shape. To …


Performance Analysis Of A Secure Ieee 802.11b Wireless Network Incorporating Personal Digital Assistants, John L. Camp Jun 2002

Performance Analysis Of A Secure Ieee 802.11b Wireless Network Incorporating Personal Digital Assistants, John L. Camp

Theses and Dissertations

Research results of this thesis indicate very poor performance of a Wireless Local Area Network (WLAN) utilizing PDAs. Network throughput is adversely effected most by VPN implementation and slightly by increased file size. The client distance factor has virtually no effect on the throughput. The impact of each of these factor levels is small when compared to the magnitude of the overall mean throughput (<6%). The average network throughput with the PDA client is much lower than expected (=11,500 bps). This is attributed to several factors with degradation primarily resulting from limitations of the PDA hardware and O/S. Because of the low throughput values achieved (regardless if VPN is on or off), an operational WLAN with PDAs (as tested) is not feasible. Operational use of the network tested would require an in-depth analysis of the type of network traffic and performance required to maintain functionality. To deploy such a system, custom designed Winsock controls would need to be implemented to minimize limitations imposed by the PDA. As PDA technology continues to develop, future hardware and O/S functionality may provide a more robust platform for network communications. The battery life of the PDA and packet battery combination is observed to be about 164 minutes with additional jackets adding about 90 minutes each.


Building Trusted Paths For Web Browsers, Zishuang (Eileen) Ye May 2002

Building Trusted Paths For Web Browsers, Zishuang (Eileen) Ye

Dartmouth College Master’s Theses

The communication between the Web browser and the human user is one component of the server-client channel. It is not the user but the browser that receives all server information and establishes the secure connection. The browser's user interface signals, such as SSL lock, https protocol header et al., indicate whether the browser-server communication at the current moment is secure. Those user interface signals indicating the security status of browser should be clearly and correctly understood by the user.

A survey of modern Web browsers shows the information provided by current browsers is insufficient for users to make trust judgment. …


Role Definition Language (Rdl): A Language To Describe Context-Aware Roles, Christopher P. Masone May 2002

Role Definition Language (Rdl): A Language To Describe Context-Aware Roles, Christopher P. Masone

Dartmouth College Undergraduate Theses

As wireless networks become more prevalent, a widening array of computational resources becomes available to the mobile user. Since not all users should have unrestricted access to these resources, a method of access control must be devised. In a context-aware environment, context information can be used to supplement more conventional password-based access control systems. We believe the best way to achieve this is through the use of Context-Aware Role-Based Access Control, a model in which permissions are assigned to entities called roles, each principal is a member of one or more roles, and a role's membership is determined using context …


Development And Characterization Of Methodology And Technology For The Alignment Of Fmri Time Series, Carlo Ciulla May 2002

Development And Characterization Of Methodology And Technology For The Alignment Of Fmri Time Series, Carlo Ciulla

Dissertations

This dissertation has developed, implemented and tested a novel computer based system (AUTOALIGN) that incorporates an algorithm for the alignment of functional Magnetic Resonance Image (fMRI) time series. The algorithm assumes the human brain to be a rigid body and computes a head coordinate system on the basis of three reference points that lie on the directions correspondent to two of the eigenvectors of inertia of the volume, at the intersections with the head boundary. The eigenvectors are found weighting the inertia components with the voxel's intensity values assumed as mass. The three reference points are found in the same …


Collaborative Problem Solving And Program Development Model, Joanna Defranco-Tommarello May 2002

Collaborative Problem Solving And Program Development Model, Joanna Defranco-Tommarello

Dissertations

A model to enhance collaborative problem solving and program development is presented. The collaborative model is a detailed cognitive model that takes into consideration the cognitive and social activities that occur during collaborative problem solving and program development. The cognitive activities required for collaborative problem solving and program development are identified and integrated into a six-stage model. An extensive literature review in the associated fields is presented to show the need for the model described in this dissertation. In addition, a comprehensive study of tools to support collaboration during problem solving and program development was also performed as well as …