Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Syntactic And Semantic Analysis And Visualization Of Unstructured English Texts, Saurav Karmakar Dec 2011

Syntactic And Semantic Analysis And Visualization Of Unstructured English Texts, Saurav Karmakar

Computer Science Dissertations

People have complex thoughts, and they often express their thoughts with complex sentences using natural languages. This complexity may facilitate efficient communications among the audience with the same knowledge base. But on the other hand, for a different or new audience this composition becomes cumbersome to understand and analyze. Analysis of such compositions using syntactic or semantic measures is a challenging job and defines the base step for natural language processing.

In this dissertation I explore and propose a number of new techniques to analyze and visualize the syntactic and semantic patterns of unstructured English texts.

The syntactic analysis is …


A Scalable Architecture For Simplifying Full-Range Scientific Data Analysis, Wesley James Kendall Dec 2011

A Scalable Architecture For Simplifying Full-Range Scientific Data Analysis, Wesley James Kendall

Doctoral Dissertations

According to a recent exascale roadmap report, analysis will be the limiting factor in gaining insight from exascale data. Analysis problems that must operate on the full range of a dataset are among the most difficult. Some of the primary challenges in this regard come from disk access, data managment, and programmability of analysis tasks on exascale architectures. In this dissertation, I have provided an architectural approach that simplifies and scales data analysis on supercomputing architectures while masking parallel intricacies to the user. My architecture has three primary general contributions: 1) a novel design pattern and implmentation for reading multi-file …


Tracking Web Video Topics: Discovery, Visualization, And Monitoring, Juan Cao, Chong-Wah Ngo, Yong-Dong Zhang, Jin-Tao Li Dec 2011

Tracking Web Video Topics: Discovery, Visualization, And Monitoring, Juan Cao, Chong-Wah Ngo, Yong-Dong Zhang, Jin-Tao Li

Research Collection School Of Computing and Information Systems

Despite the massive growth of web-shared videos in Internet, efficient organization and monitoring of videos remains a practical challenge. While nowadays broadcasting channels are keen to monitor online events, identifying topics of interest from huge volume of user uploaded videos and giving recommendation to emerging topics are by no means easy. Specifically, such process involves discovering of new topic, visualization of the topic content, and incremental monitoring of topic evolution. This paper studies the problem from three aspects. First, given a large set of videos collected over months, an efficient algorithm based on salient trajectory extraction on a topic evolution …


Virtualization For Computational Scientists, George K. Thiruvathukal, Konrad Hinsen, Joseph P. Kaylor, Konstantin Läufer Nov 2011

Virtualization For Computational Scientists, George K. Thiruvathukal, Konrad Hinsen, Joseph P. Kaylor, Konstantin Läufer

George K. Thiruvathukal

Virtualization lets you carve your computer into slices, allowing for great experimentation with different operating systems, tools, and techniques.


Animation And Visualization Of 3d Underwater Sensor Networks, Matthew T. Tran May 2011

Animation And Visualization Of 3d Underwater Sensor Networks, Matthew T. Tran

Master's Theses

Simulation and visualization are critical for the development of new systems and protocols in the area of computer networking. As real-world field testing is expensive and time-consuming, simulations are often preferred as they can be performed repeatedly and inexpensively while still reflecting the outcome of field tests to an extent. Visualizations of the simulation and field test results often follow to provide researchers with a vivid animation of the events, allowing for a much more intuitive understanding of the system than tediously reading through trace files. While there are currently a multitude of simulators and animators for land-based networks, few …


Log-Data Visualization Tool For Analyzing And Improving Performance Of Data De-Duplication Tool In Charm-Ii, Daniel Erickson May 2011

Log-Data Visualization Tool For Analyzing And Improving Performance Of Data De-Duplication Tool In Charm-Ii, Daniel Erickson

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

A de-duplication tool used in CHARM-II, called the CHARM Matcher, produces log files that record why it decides two records are or are not a match. This data, if properly analyzed, could help CHARM developers improve the Matcher over time by tuning its configuration. However, the log data is complex and recorded chronologically in the log files instead of in a way that would aid analysis. Further, visually studying the raw log data is a laborious and difficult task. This report describes a tool that parses and organizes the raw log data, and then produces graphical reports that summarize key …


Forensic Investigation Method And Tool Based On The User Behaviour Analysis, Namheun Son, Sangjin Lee Jan 2011

Forensic Investigation Method And Tool Based On The User Behaviour Analysis, Namheun Son, Sangjin Lee

Australian Digital Forensics Conference

Today, people use a variety of digital devices, and events taking place in them are stored in specific forms mostly including data indicating when each event took place. So far, different methods have been constantly researched and developed to analyse various events, most of which analyse event data unnecessary for a forensic investigation. As a result, investigators should carry out additional work to select data needed for an actual investigation, making the process of analysis more difficult and longer. Besides, since the capacity of storage media gets higher and events become more diversified, such a phenomenon seems gradually worsened. Thus, …


A Web Based Fuzzy Data Mining Using Combs Inference Method And Decision Predictor, Shajia Akhter Sharmin Jan 2011

A Web Based Fuzzy Data Mining Using Combs Inference Method And Decision Predictor, Shajia Akhter Sharmin

All Graduate Theses, Dissertations, and Other Capstone Projects

Fuzzy logic has become a very popular method of reasoning a system with approximate input system instead of a precise one. When qualitative variables are used to determine the decisions then we have to create some specific functions where the membership values of the input can be any number between 0 to 1 instead of 1 or 0 which is used in binary logic. When number of input attribute increases it the combinatorial rules increases exponentially, and diminishes performance of the system. The problem is generally known as “combinatorial rule explosion”. The Information Technology Department of Minnesota State University, Mankato …


Zest Based Visualization For Requirements Negotiation, Siti Salwah Salim Dec 2010

Zest Based Visualization For Requirements Negotiation, Siti Salwah Salim

Siti Salwah Salim Prof. Dr.

Win-Win is one of the most common models which help systems stakeholders resolve conflicts during system Requirements Negotiation (RN). Solving conflicts, however, is barely dependent on visualizing the negotiation itself The Zest algorithm was invented to visualize a standard e-mail discussion and demonstrate a concise overview of the discussion to facilitate a more productive one. This research sought to use this algorithm in visualizing the RN process in groupware. We have formulated a conceptual diagram on which to base the design and development process of the groupware for implementing the Zest algorithm. Our implementation of the algorithm has later been …