Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (280)
- Singapore Management University (226)
- Wright State University (206)
- Edith Cowan University (98)
- TÜBİTAK (74)
-
- University of Nebraska - Lincoln (63)
- Embry-Riddle Aeronautical University (60)
- San Jose State University (52)
- SelectedWorks (45)
- Dartmouth College (40)
- Old Dominion University (40)
- University of Nebraska at Omaha (35)
- California Polytechnic State University, San Luis Obispo (34)
- Regis University (33)
- University of Massachusetts Amherst (33)
- Missouri University of Science and Technology (29)
- Brigham Young University (27)
- University of Nevada, Las Vegas (27)
- Taylor University (26)
- Air Force Institute of Technology (25)
- Institute of Business Administration (24)
- Western University (23)
- Technological University Dublin (21)
- Utah State University (21)
- University of South Florida (20)
- Marquette University (19)
- Smith College (19)
- Washington University in St. Louis (19)
- City University of New York (CUNY) (16)
- Portland State University (16)
- Keyword
-
- Computer science (41)
- College for Professional Studies (33)
- School of Computer & Information Science (32)
- Security (23)
- Parallel and Distributed Systems (22)
-
- Computing in Science and Engineering (21)
- Privacy (21)
- Algorithms (19)
- Machine learning (17)
- Applied sciences (16)
- Management (14)
- Semantic Web (12)
- Cloud computing (11)
- Data mining (11)
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (10)
- Collaboration (10)
- Digital forensics (10)
- Education (10)
- Software engineering (10)
- Bayesian Networks (9)
- Classification (9)
- Course Materials (9)
- MS Information Technology Management (9)
- Optimization (9)
- Scientific computing (9)
- Visualization (9)
- Design (8)
- Information security (8)
- Information technology (8)
- Library science (8)
- Publication
-
- Research Collection School Of Computing and Information Systems (217)
- Computer Science & Engineering Syllabi (154)
- Turkish Journal of Electrical Engineering and Computer Sciences (74)
- George K. Thiruvathukal (57)
- David LO (54)
-
- Master's Projects (51)
- Theses and Dissertations (51)
- Journal of Digital Forensics, Security and Law (40)
- CSE Conference and Workshop Papers (36)
- Computer Science Faculty Publications (34)
- Regis University Student Publications (comprehensive collection) (33)
- Australian Information Security Management Conference (32)
- Kno.e.sis Publications (28)
- ACMS Conference Proceedings 2011 (26)
- Arcot Desai NARASIMHALU (26)
- International Conference on Information and Communication Technologies (23)
- Masters Theses (22)
- USF Tampa Graduate Theses and Dissertations (20)
- All Computer Science and Engineering Research (19)
- Computer Science: Faculty Publications (19)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (19)
- Open Access Dissertations (19)
- Computer Science Technical Reports (18)
- Electronic Theses and Dissertations (18)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (18)
- Computer Science Faculty Publications and Presentations (17)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (17)
- Research outputs 2011 (17)
- Annual ADFSL Conference on Digital Forensics, Security and Law (16)
- Australian Digital Forensics Conference (16)
- Publication Type
Articles 31 - 60 of 2076
Full-Text Articles in Physical Sciences and Mathematics
Automated Detection Of Likely Design Flaws In Layered Architectures, Aditya Budi, - Lucia, David Lo, Lingxiao Jiang, Shaowei Wang
Automated Detection Of Likely Design Flaws In Layered Architectures, Aditya Budi, - Lucia, David Lo, Lingxiao Jiang, Shaowei Wang
David LO
Layered architecture prescribes a good principle for separating concerns to make systems more maintainable. One example of such layered architectures is the separation of classes into three groups: Boundary, Control, and Entity, which are referred to as the three analysis class stereotypes in UML. Classes of different stereotypes are interacting with one another, when properly designed, the overall interaction would be maintainable, flexible, and robust. On the other hand, poor design would result in less maintainable system that is prone to errors. In many software projects, the stereotypes of classes are often missing, thus detection of design flaws becomes non-trivial. …
A Speculative Approach To Parallelization In Particle Swarm Optimization, Matthew Gardner, Andrew Mcnabb, Kevin Seppi
A Speculative Approach To Parallelization In Particle Swarm Optimization, Matthew Gardner, Andrew Mcnabb, Kevin Seppi
Faculty Publications
Particle swarm optimization (PSO) has previously been parallelized primarily by distributing the computation corresponding to particles across multiple processors. In these approaches, the only benefit of additional processors is an increased swarm size. However, in many cases this is not efficient when scaled to very large swarm sizes (on very large clusters). Current methods cannot answer well the question: “How can 1000 processors be fully utilized when 50 or 100 particles is the most efficient swarm size?” In this paper we attempt to answer that question with a speculative approach to the parallelization of PSO that we refer to as …
Drift Detection Using Uncertainty Distribution Divergence, Patrick Lindstrom, Brian Mac Namee, Sarah Jane Delany
Drift Detection Using Uncertainty Distribution Divergence, Patrick Lindstrom, Brian Mac Namee, Sarah Jane Delany
Conference papers
Concept drift is believed to be prevalent inmost data gathered from naturally occurring processes andthus warrants research by the machine learning community.There are a myriad of approaches to concept drift handlingwhich have been shown to handle concept drift with varyingdegrees of success.
However, most approaches make the keyassumption that the labelled data will be available at nolabelling cost shortly after classification, an assumption whichis often violated. The high labelling cost in many domainsprovides a strong motivation to reduce the number of labelledinstances required to handle concept drift. Explicit detectionapproaches that do not require labelled instances to detectconcept drift show great …
Effective Security By Obscurity, John Christian Smith
Effective Security By Obscurity, John Christian Smith
John Christian Smith
"Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security. This usage initially stemmed from applications and experience in the areas of cryptographic theory, and the open vs. closed source debate. Through the perceived absence of true security, the field of security by obscurity has not coalesced into a viable or recognizable approach for security practitioners. Consequently, this has resulted in these techniques going under-used and under-appreciated by defenders, while they continue to provide value to attackers, which creates an unfortunate information asymmetry. Exploring effective methods for …
A Hierarchical Image Processing Approach For Diagnostic Analysis Of Microcirculation Videos, Nazanin Mirshahi
A Hierarchical Image Processing Approach For Diagnostic Analysis Of Microcirculation Videos, Nazanin Mirshahi
Theses and Dissertations
Knowledge of the microcirculatory system has added significant value to the analysis of tissue oxygenation and perfusion. While developments in videomicroscopy technology have enabled medical researchers and physicians to observe the microvascular system, the available software tools are limited in their capabilities to determine quantitative features of microcirculation, either automatically or accurately. In particular, microvessel density has been a critical diagnostic measure in evaluating disease progression and a prognostic indicator in various clinical conditions. As a result, automated analysis of the microcirculatory system can be substantially beneficial in various real-time and off-line therapeutic medical applications, such as optimization of resuscitation. …
Quality Selection For Dynamic Adaptive Streaming Over Http With Scalable Video Coding, Travis L. Andelin
Quality Selection For Dynamic Adaptive Streaming Over Http With Scalable Video Coding, Travis L. Andelin
Theses and Dissertations
Video streaming on the Internet is increasingly using Dynamic Adaptive Streaming over HTTP (DASH), in which the video is converted into various quality levels and divided into two-second segments. A client can then adjust its video quality over time by choosing to download the appropriate quality level for a given segment using standard HTTP. Scalable Video Coding (SVC) is a promising enhancement to the DASH protocol. With SVC, segments are divided into subset bitstream blocks. At playback, blocks received for a given segment are combined to additively increase the current quality. Unlike traditional DASH, which downloads segments serially, this encoding …
User Choice Between Traditional And Computerized Methods: An Activity Perspective, Jun Sun
User Choice Between Traditional And Computerized Methods: An Activity Perspective, Jun Sun
Information Systems Faculty Publications and Presentations
Numerous computerized methods emerge to replace traditional methods in people’s personal, work and social lives, but many are hesitant to make the transition. This study examines the factors that influence human choice between different methods. According to Activity Theory, traditional and computerized methods are both tools that a person uses for a certain task. The situated experiences with various methods shape people’s attitude toward using them later in terms of tool readiness. The understanding leads to hypothesized relationships between user-, method- and task-specific factors and the dependent variable. The results from an empirical study support that method experiences have strong …
The Design And Evolution Of Zipcode, Anthony Skjellum, Steven G. Smith, Nathan E. Doss, Alvin Leung
The Design And Evolution Of Zipcode, Anthony Skjellum, Steven G. Smith, Nathan E. Doss, Alvin Leung
Steven D. Smith
Zipcode is a message-passing and process-management system that was designed for multicomputers and homogeneous networks of computers in order to support libraries and large-scale multicomputer software. The system has evolved significantly over the last five years, based on our experiences and identified needs. Features of Zipcode that were originally unique to it, were its simultaneous support of static process groups, communication contexts, and virtual topologies, forming the "mailer" data structure. Point-to-point and collective operations reference the underlying group, and use contexts to avoid mixing up messages. Recently, we have added "gather-send" and "receive-scatter" semantics, based on persistent Zipcode "invoices," both …
A Study Of Correlations Between The Definition And Application Of The Gene Ontology, Yuji Mo
A Study Of Correlations Between The Definition And Application Of The Gene Ontology, Yuji Mo
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
When using the Gene Ontology (GO), nucleotide and amino acid sequences are annotated by terms in a structured and controlled vocabulary organized into relational graphs. The usage of the vocabulary (GO terms) in the annotation of these sequences may diverge from the relations defined in the ontology. We measure the consistency of the use of GO terms by comparing GO's defined structure to the terms' application. To do this, we first use synthetic data with different characteristics to understand how these characteristics influence the correlation values determined by various similarity measures. Using these results as a baseline, we found that …
Alignment-Free Methods And Its Applications, Ramez Mina
Alignment-Free Methods And Its Applications, Ramez Mina
Student Work
Comparing biological sequences remains one of the most vital activities in Bioinformatics. Comparing biological sequences would address the relatedness between species, and find similar structures that might lead to similar functions.
Sequence alignment is the default method, and has been used in the domain for over four decades. It gained a lot of trust, but limitations and even failure has been reported, especially with the new generated genomes. These new generated genomes have bigger size, and to some extent suffer errors. Such errors come mainly as a result from the sequencing machine. These sequencing errors should be considered when submitting …
Application Oriented Analysis Of Large Scale Datasets, Prashant Shivaji Paymal
Application Oriented Analysis Of Large Scale Datasets, Prashant Shivaji Paymal
Student Work
Diverse application areas, such as social network, epidemiology, and software engineering consist of systems of objects and their relationships. Such systems are generally modeled as graphs. Graphs consist of vertices that represent the objects, and edges that represent the relationships between them. These systems are data intensive and it is important to correctly analyze the data to obtain meaningful information. Combinatorial metrics can provide useful insights for analyzing these systems. In this thesis, we use the graph based metrics such as betweenness centrality, clustering coefficient, articulation points, etc. for analyzing instances of large change in evolving networks (Software Engineering), and …
A Scalable Architecture For Simplifying Full-Range Scientific Data Analysis, Wesley James Kendall
A Scalable Architecture For Simplifying Full-Range Scientific Data Analysis, Wesley James Kendall
Doctoral Dissertations
According to a recent exascale roadmap report, analysis will be the limiting factor in gaining insight from exascale data. Analysis problems that must operate on the full range of a dataset are among the most difficult. Some of the primary challenges in this regard come from disk access, data managment, and programmability of analysis tasks on exascale architectures. In this dissertation, I have provided an architectural approach that simplifies and scales data analysis on supercomputing architectures while masking parallel intricacies to the user. My architecture has three primary general contributions: 1) a novel design pattern and implmentation for reading multi-file …
Energy Functional For Nuclear Masses, Michael Giovanni Bertolli
Energy Functional For Nuclear Masses, Michael Giovanni Bertolli
Doctoral Dissertations
An energy functional is formulated for mass calculations of nuclei across the nuclear chart with major-shell occupations as the relevant degrees of freedom. The functional is based on Hohenberg-Kohn theory. Motivation for its form comes from both phenomenology and relevant microscopic systems, such as the three-level Lipkin Model. A global fit of the 17-parameter functional to nuclear masses yields a root- mean-square deviation of χ[chi] = 1.31 MeV, on the order of other mass models. The construction of the energy functional includes the development of a systematic method for selecting and testing possible functional terms. Nuclear radii are computed within …
Personality Dimensions And Temperaments Of Engineering Professors And Students – A Survey, Arif Raza, Zaka Ulmustafa, Luiz Fernando Capretz
Personality Dimensions And Temperaments Of Engineering Professors And Students – A Survey, Arif Raza, Zaka Ulmustafa, Luiz Fernando Capretz
Electrical and Computer Engineering Publications
This research work aims to study personality profiles and temperaments of Pakistani software engineering professors and students. In this survey we have collected personality profiles of 18 professors and 92 software engineering students. According to the Myers-Briggs Type Indicator (MBTI) instrument, the most prominent personality type among professors as well as among students is a combination of Introversion, Sensing, Thinking, and Judging (ISTJ). The study shows ITs (Introverts and Thinking) and IJs (Introverts and Judging) are the leading temperaments among the professors. About the students’ data, the results of the study indicate SJs (Sensing and Judging) and ISs (Introverts and …
Overview Of Contrast Data Mining As A Field And Preview Of An Upcoming Book, Guozhu Dong, James Bailey
Overview Of Contrast Data Mining As A Field And Preview Of An Upcoming Book, Guozhu Dong, James Bailey
Kno.e.sis Publications
This report provides an overview of the field of contrast data mining and its applications, and offers a preview of an upcoming book on the topic. The importance of contrasting is discussed and a brief survey is given covering the following topics: general definitions and terminology for contrast patterns, representative contrast pattern mining algorithms, applications of contrast mining for fundamental data mining tasks such as classification and clustering, applications of contrast mining in bioinformatics, medicine, blog analysis, image analysis and subgroup mining, results on contrast based dataset similarity measure, and on analyzing item interaction in contrast patterns, and open research …
The Mechanics Of Implementing Rss - Really Simple Syndication, Umakant Mishra
The Mechanics Of Implementing Rss - Really Simple Syndication, Umakant Mishra
Umakant Mishra
RSS is a format to update the frequently updated content in the Internet such as blog entries, news headlines etc. An RSS document contains full or summarized texts plus metadata such as publishing dates and authorship. RSS stands for Really simple Syndication. RSS feeds benefits publishers by letting them syndicate content automatically. A standardized XML file format is used to publish once and viewed by many different programs.
Dirty Tricks Played By The Domain Registrars, Umakant Mishra
Dirty Tricks Played By The Domain Registrars, Umakant Mishra
Umakant Mishra
With the popularity of Internet the number of websites are increasing in exponential rate. Everybody needs a website and every website needs a domain name and a hosting server. Domain names often represent a business organization or a commercial brand. Hence, changing domain names may affect business strategy and result in serious business loss. The domain registrars often take advantage of customers’ ignorance and weakness and trouble them to unduly extract more and more money.
The Dirty Tricks Played By Web Hosting Agencies, Umakant Mishra
The Dirty Tricks Played By Web Hosting Agencies, Umakant Mishra
Umakant Mishra
The number of websites are increasing in exponential rate. There are almost 50,000 websites being launched in every week and a similar number of web hosting companies are thriving to grab that opportunity. This has led to a cutthroat competition between the web hosting companies. The competition has gone beyond the ethical boundaries and many of them follow various unfair practices to attract and retain customers.
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei
Dr. Mutaz M. Al-Debei
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …
Mobile Phone Graph Evolution: Findings, Model And Interpretation, Siyuan Liu, Lei Li, Christos Faloutsos, Lionel M. Ni
Mobile Phone Graph Evolution: Findings, Model And Interpretation, Siyuan Liu, Lei Li, Christos Faloutsos, Lionel M. Ni
LARC Research Publications
What are the features of mobile phone graph along the time? How to model these features? What are the interpretation for the evolutional graph generation process? To answer the above challenging problems, we analyze a massive who-call-whom networks as long as a year, gathered from records of two large mobile phone communication networks both with 2 million users and 2 billion of calls. We examine the calling behavior distribution at multiple time scales (e.g. day, week, month and quarter), and find that the distribution is not only skewed with a heavy tail, but also changing at different time scales. How …
Stability And Classification Performance Of Feature Selection Techniques, Huanjing Wang, Taghi Khoshgoftaar, Qianhui Liang
Stability And Classification Performance Of Feature Selection Techniques, Huanjing Wang, Taghi Khoshgoftaar, Qianhui Liang
Computer Science Faculty Publications
Feature selection techniques can be evaluated based on either model performance or the stability (robustness) of the technique. The ideal situation is to choose a feature selec- tion technique that is robust to change, while also ensuring that models built with the selected features perform well. One domain where feature selection is especially important is software defect prediction, where large numbers of met- rics collected from previous software projects are used to help engineers focus their efforts on the most faulty mod- ules. This study presents a comprehensive empirical ex- amination of seven filter-based feature ranking techniques (rankers) applied to …
Outlier Detection Using Modified-Ranks And Other Variants, Huaming Huang, Kishan Mehrotra, Chilukuri K. Mohan
Outlier Detection Using Modified-Ranks And Other Variants, Huaming Huang, Kishan Mehrotra, Chilukuri K. Mohan
Electrical Engineering and Computer Science - Technical Reports
Rank based algorithms provide a promising approach for outlier detection, but currently used rank-based measures of outlier detection suffer from two deficiencies: first they take a large value from an object whose density is high even though the object may not be an outlier and second the distance between the object and its nearest cluster plays a mild role though its rank with respect to its neighbor. To correct for these deficiencies we introduce the concept of modified-rank and propose new algorithms for outlier detection based on this concept.
A Distributed Approach For Fault Mitigation In Large Scale Distributed Systems, Mina Jung
A Distributed Approach For Fault Mitigation In Large Scale Distributed Systems, Mina Jung
Electrical Engineering and Computer Science - Dissertations
In a large scale real-time distributed system, a large number of components and the time criticality of tasks can contribute to complex situations. Providing predictable and reliable service is a paramount interest in such a system. For example, a single point failure in an electric grid system may lead to a widespread power outage like the Northeast Blackout of 2003. System design and implementation address fault avoidance and mitigation. However, not all faults and failures can be removed during these phases, and therefore run-time fault avoidance and mitigation are needed during the operation. Timing constraints and predictability of the system …
Computing Inconsistency Measure Based On Paraconsistent Semantics, Pascal Hitzler, Yue Ma, Guilin Qi
Computing Inconsistency Measure Based On Paraconsistent Semantics, Pascal Hitzler, Yue Ma, Guilin Qi
Computer Science and Engineering Faculty Publications
Measuring inconsistency in knowledge bases has been recognized as an important problem in several research areas. Many methods have been proposed to solve this problem and a main class of them is based on some kind of paraconsistent semantics. However, existing methods suffer from two limitations: (i) they are mostly restricted to propositional knowledge bases; (ii) very few of them discuss computational aspects of computing inconsistency measures. In this article, we try to solve these two limitations by exploring algorithms for computing an inconsistency measure of first-order knowledge bases. After introducing a four-valued semantics for first-order logic, we define an …
Report On Advances In The Field Of Artificial Intelligence Attributed To Captcha, Craig M. Schow
Report On Advances In The Field Of Artificial Intelligence Attributed To Captcha, Craig M. Schow
All Graduate Plan B and other Reports, Spring 1920 to Spring 2023
A CAPTCHA is a specialized human interaction proof that exploits gaps between human and computer recognition abilities. By design, the hardness of a CAPTCHA is based on the difficulty of advancing the underlying artificial intelligence [AI] technology to a level that eliminates any exploitable gap. Due to this fact computer scientists have concluded that the widespread use of CAPTCHA would accelerate research in the underlying fields of AI eventually leading to near-‐human capabilities in certain AI systems. Despite these predictions no attempt has been made to identify advances in AI which can be attributed to the use of CAPTCHA.
The …
Design And Implementation Of An Open Framework For Ubiquitous Carbon Footprint Calculator Applications, Farzana Rahman, Casey O'Brien, Sheikh Iqbal Ahamed, He Zhang, Lin Liu
Design And Implementation Of An Open Framework For Ubiquitous Carbon Footprint Calculator Applications, Farzana Rahman, Casey O'Brien, Sheikh Iqbal Ahamed, He Zhang, Lin Liu
Mathematics, Statistics and Computer Science Faculty Research and Publications
As climate change is becoming an important global issue, more and more people are beginning to pay attention to reducing greenhouse gas emissions. To measure personal or household carbon dioxide emission, there are already plenty of carbon footprint calculators available on the web. Most of these calculators use quantitative models to estimate carbon emission caused by a user's activities. Although these calculators can promote public awareness regarding carbon emission due to an individual's behavior, there are concerns about the consistency and transparency of these existing CO2 calculators. Apart from a small group of smart phone based carbon footprint calculator …
Sensitivity Of The Frozen/Melted Basal Boundary To Perturbations Of Basal Traction And Geothermal Heat Flux : Isunnguata Sermia, Western Greenland, Douglas John Brinkerhoff, Toby Warren Meierbachtol, Jesse Johnson, Joel T. Harper
Sensitivity Of The Frozen/Melted Basal Boundary To Perturbations Of Basal Traction And Geothermal Heat Flux : Isunnguata Sermia, Western Greenland, Douglas John Brinkerhoff, Toby Warren Meierbachtol, Jesse Johnson, Joel T. Harper
Computer Science Faculty Publications
A full-stress, thermomechanically coupled, numerical model is used to explore the interaction between basal thermal conditions and motion of a terrestrially terminating section of the west Greenland ice sheet. The model domain is a two-dimensional flowline profile extending from the ice divide to the margin. We use data-assimilation techniques based on the adjoint model in order to optimize the basal traction field, minimizing the difference between modeled and observed surface velocities. We monitor the sensitivity of the frozen/melted boundary (FMB) to changes in prescribed geothermal heat flux and sliding speed by applying perturbations to each of these parameters. The FMB …
Modeling 5 Years Of Subglacial Lake Activity In The Macayeal Ice Stream (Antarctica) Catchment Through Assimilation Of Icesat Laser Altimetry, Sasha P. Carter, Helen A. Fricker, Donald D. Blankenship, Jesse V. Johnson, William Lipscomb, Stephen F. Price, Duncan A. Young
Modeling 5 Years Of Subglacial Lake Activity In The Macayeal Ice Stream (Antarctica) Catchment Through Assimilation Of Icesat Laser Altimetry, Sasha P. Carter, Helen A. Fricker, Donald D. Blankenship, Jesse V. Johnson, William Lipscomb, Stephen F. Price, Duncan A. Young
Computer Science Faculty Publications
Subglacial lakes beneath Antarctica’s fast-moving ice streams are known to undergo ~1km3 volume changes on annual timescales. Focusing on the MacAyeal Ice Stream (MacIS) lake system, we create a simple model for the response of subglacial water distribution to lake discharge events through assimilation of lake volume changes estimated from Ice, Cloud and land Elevation Satellite (ICESat) laser altimetry. We construct a steady-state water transport model in which known subglacial lakes are treated as either sinks or sources depending on the ICESat-derived filling or drainingrates. The modeled volume change rates of five large subglacial lakes in the downstream portion …
Powersearch: Augmenting Mobile Phone Search Through Personalization, Xiangyu Liu
Powersearch: Augmenting Mobile Phone Search Through Personalization, Xiangyu Liu
Computer Science and Computer Engineering Undergraduate Honors Theses
Cell phone has become a fundamental element of people's life. People use it to call each other, browse websites, send text messages, etc. Among all the functionalities, the most important and frequently used is the search functionality. Based on ComScore, in July 2008, Google was estimated to host 235 millions searches per day. However, unlike the search on desktop, the search on cell phone has one critical constrain: battery. Cell phone performing a normal Google search, the battery drains very fast. The reason is that when sending a query to and fetching the results from Google, cell phone keeps communicating …
Automated Pollen Image Classification, Nicholas Quentin Haas
Automated Pollen Image Classification, Nicholas Quentin Haas
Masters Theses
This Master of Science thesis reviews previous research, proposes a method anddemonstrates proof-of-concept software for the automated matching of pollen grainimages to satisfy degree requirements at the University of Tennessee. An ideal imagesegmentation algorithm and shape representation data structure is selected, alongwith a multi-phase shape matching system. The system is shown to be invariantto synthetic image translation, rotation, and to a lesser extent global contrast andintensity changes. The proof-of-concept software is used to demonstrate how pollengrains can be matched to images of other pollen grains, stored in a database, thatshare similar features with up to a 75% accuracy rate.