Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Air Force Institute of Technology (20)
- New Jersey Institute of Technology (11)
- Old Dominion University (9)
- Dartmouth College (7)
- Louisiana State University (7)
-
- Nova Southeastern University (7)
- William & Mary (6)
- California State University, San Bernardino (5)
- The University of Maine (5)
- East Tennessee State University (4)
- University of Tennessee, Knoxville (4)
- Munster Technological University (3)
- Portland State University (3)
- Colby College (2)
- Edith Cowan University (2)
- Florida Institute of Technology (2)
- Louisiana Tech University (2)
- University of North Florida (2)
- Western Michigan University (2)
- American University in Cairo (1)
- Brigham Young University (1)
- Columbus State University (1)
- Eastern Illinois University (1)
- Georgia Southern University (1)
- Illinois Math and Science Academy (1)
- Missouri University of Science and Technology (1)
- University of North Dakota (1)
- University of Richmond (1)
- World Maritime University (1)
- Keyword
-
- Geographic information systems (4)
- Data mining (3)
- Information retrieval (3)
- Information storage and retrieval systems (3)
- Information visualization (3)
-
- Software engineering (3)
- Algorithms (2)
- Applied sciences (2)
- Computer networks (2)
- Computer networks--Security measures (2)
- Computer simulation (2)
- Computer viruses (2)
- Computer vision (2)
- Electronic data processing -- Distributed processing (2)
- Genetic algorithms (2)
- Information technology (2)
- Intelligent agents (Computer software) (2)
- Neural networks (2)
- Parallel processing (Electronic computers) (2)
- Scalable (2)
- Scheduling (2)
- <p>Manipulators (Mechanism) -- Computer programs<br />Nonlinear programming<br />Graphical user interfaces (Computer systems)</p> (1)
- Academic -- UNF – Computer Science; Department of Computer and Information Sciences (1)
- Academic – UNF – Computer Science; College of Computer and Information Sciences (1)
- Algorithm (1)
- Alignment (1)
- Application service provider (1)
- Artificial intelligence (1)
- Artificial neural network (1)
- Assessment (1)
- Publication
-
- Theses and Dissertations (25)
- Theses (11)
- Electronic Theses and Dissertations (9)
- CCE Theses and Dissertations (7)
- Dissertations, Theses, and Masters Projects (6)
-
- Masters Theses (6)
- Computer Science Theses & Dissertations (5)
- Dartmouth College Undergraduate Theses (5)
- LSU Doctoral Dissertations (5)
- Theses Digitization Project (5)
- Dissertations (4)
- Honors Theses (4)
- Dissertations and Theses (3)
- Doctoral Dissertations (3)
- Electrical & Computer Engineering Theses & Dissertations (2)
- LSU Master's Theses (2)
- UNF Graduate Theses and Dissertations (2)
- Archived Theses and Dissertations (1)
- Computational Modeling & Simulation Engineering Theses & Dissertations (1)
- Dartmouth College Master’s Theses (1)
- Dartmouth College Ph.D Dissertations (1)
- Engineering Management & Systems Engineering Theses & Dissertations (1)
- Legacy ETDs (1)
- Theses : Honours (1)
- Theses: Doctorates and Masters (1)
- World Maritime University Dissertations (1)
Articles 1 - 30 of 113
Full-Text Articles in Physical Sciences and Mathematics
Load Balancing And Congestion Avoidance Routing, Konstantinos N. Kokkinos
Load Balancing And Congestion Avoidance Routing, Konstantinos N. Kokkinos
Dissertations
Today’s high speed backbone networks are expected to support a wide range of communication-intensive applications. One of the most important issues in Quality of Service (QoS) is efficient routing. Many QoS routing solutions have been published lately for different criteria of QoS requirements and resource constraints. In this dissertation we focus on the design of regular network topologies and suggest efficient routing schemes to reduce the probability of hot spot creation in the network. Furthermore, we provide a detection of congestion mechanism that reroutes traffic to maintain balancing with small communication cost. Several theoretical results relatively to network traffic balancing …
Detection And Generalization Of Spatio-Temporal Trajectories For Motion Imagery, Panayotis Partsinevelos
Detection And Generalization Of Spatio-Temporal Trajectories For Motion Imagery, Panayotis Partsinevelos
Electronic Theses and Dissertations
In today's world of vast information availability users often confront large unorganized amounts of data with limited tools for managing them. Motion imagery datasets have become increasingly popular means for exposing and disseminating information. Commonly, moving objects are of primary interest in modeling such datasets. Users may require different levels of detail mainly for visualization and further processing purposes according to the application at hand. In this thesis we exploit the geometric attributes of objects for dataset summarization by using a series of image processing and neural network tools. In order to form data summaries we select representative time instances …
Evaluating Conflicts In The Use And Development Of Geographic Information Systems, Amber Bethell
Evaluating Conflicts In The Use And Development Of Geographic Information Systems, Amber Bethell
Electronic Theses and Dissertations
Use of geographic information systems is increasing in governments, commercial companies, and by individual users. With such pervasive use of GIs there has been surprisingly little investigation of the values that various parties would support in the development of geographic technologies. There are many parties involved in the use of GIs each with opinions of what are good goals for developing and using such systems. This research seeks to determine differences and similarities among parties in the importance placed on supporting specific societal goals germane to the use of geographic technologies and databases. Previous research determined six areas where the …
Modeling Boundaries Of Influence Among Positional Uncertainty Fields, Joshua P. King
Modeling Boundaries Of Influence Among Positional Uncertainty Fields, Joshua P. King
Electronic Theses and Dissertations
Within a CIS environment, the proper use of information requires the identification of the uncertainty associated with it. As such, there has been a substantial amount of research dedicated to describing and quantifying spatial data uncertainty. Recent advances in sensor technology and image analysis techniques are making image-derived geospatial data increasingly popular. Along with development in sensor and image analysis technologies have come departures from conventional point-by-point measurements. Current advancements support the transition from traditional point measures to novel techniques that allow the extraction of complex objects as single entities (e.g., road outlines, buildings). As the methods of data extraction …
Sketch-Based Queries In Mobile Gis-Environments, David Caduff
Sketch-Based Queries In Mobile Gis-Environments, David Caduff
Electronic Theses and Dissertations
Recent achievements in the field of mobile computing and wireless communication promise data retrieval anywhere and anytime. This development provided the basis to expand GIs technology to handheld devices, such as personal digital assistants (PDAs). Although traditional GIs technology is well suited for desktop workstations, it needs to be adapted in order to satisfy the requirements of users using handheld computing devices. This adaptation is necessary because the usability of traditional GISs depends on characteristics of desktop computers, such as their relatively large user interfaces (e.g., displays, keyboards, pointing devices), considerable computing resources (i.e., CPU, memory, storage, operating systems), and …
Modeling Multiple Granularities Of Spatial Objects, Chitra Ramalingam
Modeling Multiple Granularities Of Spatial Objects, Chitra Ramalingam
Electronic Theses and Dissertations
People conceptualize objects in an information space over different levels of details or granularities and shift among these granularities as necessary for the task at hand. Shifting among granularities is fundamental for understanding and reasoning about an information space. In general, shifting to a coarser granularity can improve one's understanding of a complex information space, whereas shifting to a more detailed granularity reveals information that is otherwise unknown. To arrive at a coarser granularity. objects must be generalized. There are multiple ways to perform generalization. Several generalization methods have been adopted from the abstraction processes that are intuitively carried out …
Active Processor Scheduling Using Evolution Algorithms, David J. Caswell
Active Processor Scheduling Using Evolution Algorithms, David J. Caswell
Theses and Dissertations
The allocation of processes to processors has long been of interest to engineers. The processor allocation problem considered here assigns multiple applications onto a computing system. With this algorithm researchers could more efficiently examine real-time sensor data like that used by United States Air Force digital signal processing efforts or real-time aerosol hazard detection as examined by the Department of Homeland Security. Different choices for the design of a load balancing algorithm are examined in both the problem and algorithm domains. Evolutionary algorithms are used to find near-optimal solutions. These algorithms incorporate multiobjective coevolutionary and parallel principles to create an …
Data Mining With Newton's Method., James Dale Cloyd
Data Mining With Newton's Method., James Dale Cloyd
Electronic Theses and Dissertations
Capable and well-organized data mining algorithms are essential and fundamental to helpful, useful, and successful knowledge discovery in databases. We discuss several data mining algorithms including genetic algorithms (GAs). In addition, we propose a modified multivariate Newton's method (NM) approach to data mining of technical data. Several strategies are employed to stabilize Newton's method to pathological function behavior. NM is compared to GAs and to the simplex evolutionary operation algorithm (EVOP). We find that GAs, NM, and EVOP all perform efficiently for well-behaved global optimization functions with NM providing an exponential improvement in convergence rate. For local optimization problems, we …
Neural Supernets: Structuring Artificial Neural Networks According To Cluster Analysis, Simon Lucas Winberg
Neural Supernets: Structuring Artificial Neural Networks According To Cluster Analysis, Simon Lucas Winberg
Masters Theses
A typical feed forward neural network relies solely on its training algorithm, such as backprop or quickprop, to determine suitable weight values for an architecture chosen by the human operator. The architecture itself is typically a fully connected structuring of neurons and synapses where each hidden neuron is connected to every neuron in the next layer. Such architecture does not reflect the structure of the data used to train it. Similarly, in the case where random initial weight values are used, these initial weights are also unlikely to relate to the training set. Thus the job of the training algorithm …
A Performance Study Of Lam And Mpich On An Smp Cluster, Brian Patrick Kearns
A Performance Study Of Lam And Mpich On An Smp Cluster, Brian Patrick Kearns
Dissertations and Theses
Many universities and research laboratories have developed low cost clusters, built from Commodity-Off-The-Shelf (COTS) components and running mostly free software. Research has shown that these types of systems are well-equipped to handle many problems requiring parallel processing. The primary components of clusters are hardware, networking, and system software. An important system software consideration for clusters is the choice of the message passing library.
MPI (Message Passing Interface) has arguably become the most widely used message passing library on clusters and other parallel architectures, due in part to its existence as a standard. As a standard, MPI is open for anyone …
Knowledge Discovery And Modeling In Genomic Databases, Michael M. Yin
Knowledge Discovery And Modeling In Genomic Databases, Michael M. Yin
Dissertations
This dissertation research is targeted toward developing effective and accurate methods for identifying gene structures in the genomes of high eukaryotes, such as vertebrate organisms. Several effective hidden Markov models (HMMs) are developed to represent the consensus and degeneracy features of the functional sites including protein-translation start sites, mRNA splicing junction donor and acceptor sites in vertebrate genes. The HMM system based on the developed models is fully trained using an expectation maximization (EM) algorithm and the system performance is evaluated using a 10-way cross-validation method. Experimental results show that the proposed HMM system achieves high sensitivity and specificity in …
Intramural, Collaborative Learning Systems, Robert S. Friedman
Intramural, Collaborative Learning Systems, Robert S. Friedman
Theses
This thesis focuses on three related concepts: problem-based collaborative learning; the use of multimedia tools in learning systems; and participatory design as a software engineering methodology to create multimedia tools to be used in learning systems. A literature review of the three areas is followed by an overview of the pedagogical, technological, and business trends that affect the direction of innovation in education, including problem-based learning. A discussion of a software engineering project to develop a multimedia application that enhances the learning of geography skills and puts the programming, interface design and multimedia systems capabilities of college students into action …
Statistical Image Analysis Of Spotted Arrays, Filippo Posta
Statistical Image Analysis Of Spotted Arrays, Filippo Posta
Theses
There is a lot of systematic and specific variability in microarray experiments, this variability affects measured gene expression levels, leading to unreliable gene profiling or an heavy load of extra experiment to statistically confirm the data observed in one experiment.
The aim of this work is to systematically analyze, using statistics, the image derived from a cDNA microarray experiment to have a better understanding of this variability and thus a better confidence over the data obtained from an experiment.
Using technologies available at the Center for Applied Genomics, Newark, New Jersey. Selected images derived from different type of microarray experiments …
An Algorithm For Estimating The Quality Of Microarrays, Ajeet S. Sodhi
An Algorithm For Estimating The Quality Of Microarrays, Ajeet S. Sodhi
Theses
Microarray technology is currently one of the most valuable gene expression tools in molecular biology allowing the experimenter to simultaneously quantify the expression of thousands of genes. It is also one of the most difficult tools to use accurately as each microarray produces a large amount of information that needs to be inspected and normalized before analysis. As the size of a microarray or number of replicates increase, the use of manual inspection becomes impractical. The aim of this thesis is to introduce an algorithm that evaluates each feature of a microarray from the scanned data file. A quality score …
Analysis For Cooperative Behavior Effectiveness Of Autonomous Wide Area Search Munitions, Sang M. Park
Analysis For Cooperative Behavior Effectiveness Of Autonomous Wide Area Search Munitions, Sang M. Park
Theses and Dissertations
The purpose of this study is to investigate how a simulation model can accurately represent the performance of the autonomous wide area search munitions, and to find the effectiveness of the cooperative behavior on the autonomous munitions. Though it does not provide a practical solution for the development of the autonomous wide area search munitions, this research will show some meaningful allocations of the munitions tasks that are applicable to the development of the autonomous munitions. For the first phase, this thesis presents how accurately a simplified simulation model can represent a proposed weapon system by comparing the simulation results …
Visual Execution Analysis For Multiagent Systems, Chong Kil
Visual Execution Analysis For Multiagent Systems, Chong Kil
Theses and Dissertations
Multiagent systems have become increasingly important in developing complex software systems. Multiagent systems introduce collective intelligence and provide benefits such as flexibility, scalability, decentralization, and increased reliability. A software agent is a high-level software abstraction that is capable of performing given tasks in an environment without human intervention. Although multiagent systems provide a convenient and powerful way to organize complex software systems, developing such system is very complicated. To help manage this complexity this research develops a methodology and technique for analyzing, monitoring and troubleshooting multiagent systems execution. This is accomplished by visualizing a multiagent system at multiple levels of …
Integrated Software System For The Collection And Evaluation Of Wellness Information., Rebecca Elizabeth Sweeney
Integrated Software System For The Collection And Evaluation Of Wellness Information., Rebecca Elizabeth Sweeney
Electronic Theses and Dissertations
There is an absence of a complete, easy to use, software system that can evaluate all areas of wellness. Although there are software programs and equipment available to examine certain aspects of wellness, they are incomplete. The solution to the difficulties of assessing wellness is the design and development of a software system that can be used to collect and evaluate wellness information. The system allows for complete reporting as it entails the six major components to wellness: demographics, body composition, lab work, nutritional intake, physical activity, and body measures. The system allows for ease of use by providing a …
Scalable And Reliable File Transfer For Clusters Using Multicast., Hardik Dikpal Shukla
Scalable And Reliable File Transfer For Clusters Using Multicast., Hardik Dikpal Shukla
Electronic Theses and Dissertations
A cluster is a group of computing resources that are connected by a single computer network and are managed as a single system. Clusters potentially have three key advantages over workstations operated in isolation—fault tolerance, load balancing and support for distributed computing.
Information sharing among the cluster’s resources affects all phases of cluster administration. The thesis describes a new tool for distributing files within clusters. This tool, the Scalable and Reliable File Transfer Tool (SRFTT), uses Forward Error Correction (FEC) and multiple multicast channels to achieve an efficient reliable file transfer, relative to heterogeneous clusters. SRFTT achieves scalability …
A Formal Method To Analyze Framework-Based Software, Trent N. Larson
A Formal Method To Analyze Framework-Based Software, Trent N. Larson
Theses and Dissertations
Software systems are frequently designed using abstractions that make software verification tractable. Specifically, by choosing meaningful, formal abstractions for interfaces and then designing according to those interfaces, one can verify entire systems according to behavioral predicates. While impractical for systems in general, framework-based software architectures are a type of system for which formal analysis can be beneficial and practical over the life of the system. We present a method to formally analyze behavioral properties of framework-based software with higher-order logic and then demonstrate its utility for a significant, modern system.
Design And Implementation Of An Online Database Panel, Frenny Thomas
Design And Implementation Of An Online Database Panel, Frenny Thomas
Theses and Dissertations
There is a growing need for administrative panels such as the one described in this project. More and more website administrators wish to make changes to their online business without having to directly modify the database file. This project provides the perfect solution for this scenario by placing all database access on the World Wide Web. Administrators can now use this software to add, edit, and delete tables, fields, and records. Additionally, users will be able to generate queries without knowledge of Structured Query Language. This project acts as a summary of my computer science education at this university by …
The Future Of Cryptography Under Quantum Computers, Marco A. Barreno
The Future Of Cryptography Under Quantum Computers, Marco A. Barreno
Dartmouth College Undergraduate Theses
Cryptography is an ancient art that has passed through many paradigms, from simple letter substitutions to polyalphabetic substitutions to rotor machines to digital encryption to public-key cryptosystems. With the possible advent of quantum computers and the strange behaviors they exhibit, a new paradigm shift in cryptography may be on the horizon. Quantum computers could hold the potential to render most modern encryption useless against a quantum-enabled adversary. The aim of this thesis is to characterize this convergence of cryptography and quantum computation. We provide definitions for cryptographic primitives that frame them in general terms with respect to complexity. We explore …
Content Aware Request Distribution For High Performance Web Service: A Performance Study, Robert M. Jones
Content Aware Request Distribution For High Performance Web Service: A Performance Study, Robert M. Jones
Dissertations and Theses
The World Wide Web is becoming a basic infrastructure for a variety of services, and the increases in audience size and client network bandwidth create service demands that are outpacing server capacity. Web clusters are one solution to this need for high performance, highly available web server systems. We are interested in load distribution techniques, specifically Layer-7 algorithms that are content-aware. Layer-7 algorithms allow distribution control based on the specific content requested, which is advantageous for a system that offers highly heterogenous services. We examine the performance of the Client Aware Policy (CAP) on a Linux/Apache web cluster consisting of …
Performance And Interoperability In Solar, A Abram White
Performance And Interoperability In Solar, A Abram White
Dartmouth College Undergraduate Theses
Ubiquitous computing promises to integrate computers into our physical environment, surrounding us with applications that are able to adapt to our dynamics. Solar is a software infrastructure designed to deliver contextual information to these applications. To serve the large number and wide variety of context-aware devices envisioned by ubiquitous computing, Solar must exhibit both high performance and the ability to interoperate with many computing platforms. We created a testing framework to measure the performance of distributed systems such as Solar, as well as a pluggable data-transfer mechanism to support the dissemination of information to heterogeneous applications. This paper explores the …
Modular Machine Learning Methods For Computer-Aided Diagnosis Of Breast Cancer, Mia Kathleen Markey '94
Modular Machine Learning Methods For Computer-Aided Diagnosis Of Breast Cancer, Mia Kathleen Markey '94
Doctoral Dissertations
The purpose of this study was to improve breast cancer diagnosis by reducing the number of benign biopsies performed. To this end, we investigated modular and ensemble systems of machine learning methods for computer-aided diagnosis (CAD) of breast cancer. A modular system partitions the input space into smaller domains, each of which is handled by a local model. An ensemble system uses multiple models for the same cases and combines the models' predictions.
Five supervised machine learning techniques (LDA, SVM, BP-ANN, CBR, CART) were trained to predict the biopsy outcome from mammographic findings (BIRADS™) and patient age based on a …
Dimension And Shape Invariant Programming: The Implementation And Application, Manal Ezzat Helal
Dimension And Shape Invariant Programming: The Implementation And Application, Manal Ezzat Helal
Archived Theses and Dissertations
This thesis implements a model for the shape and dimension invariant programming based on the notation of the Mathematics of Arrays (MOA) algebra. It focuses on dimension and shape invariance implementation, and their effect in parallel computing. A new design for the MOA notation is implemented that eliminates the need for another PSI-compiler, or a language extension to functional programming languages. The MOA notation is designed as a library of Application Programming Interfaces (APIs), contains object oriented classes implemented in C++. The library executes array operations correctly, and is expected to enhance the performance invariant of dimension and shape. To …
Performance Analysis Of A Secure Ieee 802.11b Wireless Network Incorporating Personal Digital Assistants, John L. Camp
Performance Analysis Of A Secure Ieee 802.11b Wireless Network Incorporating Personal Digital Assistants, John L. Camp
Theses and Dissertations
Research results of this thesis indicate very poor performance of a Wireless Local Area Network (WLAN) utilizing PDAs. Network throughput is adversely effected most by VPN implementation and slightly by increased file size. The client distance factor has virtually no effect on the throughput. The impact of each of these factor levels is small when compared to the magnitude of the overall mean throughput (<6%). The average network throughput with the PDA client is much lower than expected (=11,500 bps). This is attributed to several factors with degradation primarily resulting from limitations of the PDA hardware and O/S. Because of the low throughput values achieved (regardless if VPN is on or off), an operational WLAN with PDAs (as tested) is not feasible. Operational use of the network tested would require an in-depth analysis of the type of network traffic and performance required to maintain functionality. To deploy such a system, custom designed Winsock controls would need to be implemented to minimize limitations imposed by the PDA. As PDA technology continues to develop, future hardware and O/S functionality may provide a more robust platform for network communications. The battery life of the PDA and packet battery combination is observed to be about 164 minutes with additional jackets adding about 90 minutes each.
Building Trusted Paths For Web Browsers, Zishuang (Eileen) Ye
Building Trusted Paths For Web Browsers, Zishuang (Eileen) Ye
Dartmouth College Master’s Theses
The communication between the Web browser and the human user is one component of the server-client channel. It is not the user but the browser that receives all server information and establishes the secure connection. The browser's user interface signals, such as SSL lock, https protocol header et al., indicate whether the browser-server communication at the current moment is secure. Those user interface signals indicating the security status of browser should be clearly and correctly understood by the user.
A survey of modern Web browsers shows the information provided by current browsers is insufficient for users to make trust judgment. …
Role Definition Language (Rdl): A Language To Describe Context-Aware Roles, Christopher P. Masone
Role Definition Language (Rdl): A Language To Describe Context-Aware Roles, Christopher P. Masone
Dartmouth College Undergraduate Theses
As wireless networks become more prevalent, a widening array of computational resources becomes available to the mobile user. Since not all users should have unrestricted access to these resources, a method of access control must be devised. In a context-aware environment, context information can be used to supplement more conventional password-based access control systems. We believe the best way to achieve this is through the use of Context-Aware Role-Based Access Control, a model in which permissions are assigned to entities called roles, each principal is a member of one or more roles, and a role's membership is determined using context …
Development And Characterization Of Methodology And Technology For The Alignment Of Fmri Time Series, Carlo Ciulla
Development And Characterization Of Methodology And Technology For The Alignment Of Fmri Time Series, Carlo Ciulla
Dissertations
This dissertation has developed, implemented and tested a novel computer based system (AUTOALIGN) that incorporates an algorithm for the alignment of functional Magnetic Resonance Image (fMRI) time series. The algorithm assumes the human brain to be a rigid body and computes a head coordinate system on the basis of three reference points that lie on the directions correspondent to two of the eigenvectors of inertia of the volume, at the intersections with the head boundary. The eigenvectors are found weighting the inertia components with the voxel's intensity values assumed as mass. The three reference points are found in the same …
Collaborative Problem Solving And Program Development Model, Joanna Defranco-Tommarello
Collaborative Problem Solving And Program Development Model, Joanna Defranco-Tommarello
Dissertations
A model to enhance collaborative problem solving and program development is presented. The collaborative model is a detailed cognitive model that takes into consideration the cognitive and social activities that occur during collaborative problem solving and program development. The cognitive activities required for collaborative problem solving and program development are identified and integrated into a six-stage model. An extensive literature review in the associated fields is presented to show the need for the model described in this dissertation. In addition, a comprehensive study of tools to support collaboration during problem solving and program development was also performed as well as …