Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 46171 - 46200 of 55205

Full-Text Articles in Physical Sciences and Mathematics

A Dynamic Weight Assignment Approach For Ir Systems, M. Shoaib, Prof Dr. Abad Ali Shah, A. Vashishta Aug 2005

A Dynamic Weight Assignment Approach For Ir Systems, M. Shoaib, Prof Dr. Abad Ali Shah, A. Vashishta

International Conference on Information and Communication Technologies

Weights are assigned to the extracted keywords for partial matching and computing ranking in an IR system. Weight assignment technique is suggested by the IR model that is used for an IR system. Currently suggested weight assignment techniques are static which means that once weight is assigned a keyword it remains unchanged during life-span of an IR system. In this paper, we suggest a dynamic weight assignment technique. This technique can be used by any IR model that supports partial matching.


Using Agents For Unification Of Information Extraction And Data Mining, Sharjeel Imtiaz, Azmat Hussain, Dr. Sikandar Hiyat Aug 2005

Using Agents For Unification Of Information Extraction And Data Mining, Sharjeel Imtiaz, Azmat Hussain, Dr. Sikandar Hiyat

International Conference on Information and Communication Technologies

Early work for unification of information extraction and data mining is motivational and problem stated work. This paper proposes a solution framework for unification using intelligent agents. A Relation manager agent extracted feature with cross feedback approach and also provide a Unified Undirected graphical handle. An RPM agent an approach to minimize loop back proposes pooling and model utilization with common parameter for both text and entity level abstractions.


Design Phase Analysis Of Software Reliability Using Aspect-Oriented Programming, Farhan Rafique, Khalid Mahmood, Tauseef-U- Rehman, Khalid Rashid Aug 2005

Design Phase Analysis Of Software Reliability Using Aspect-Oriented Programming, Farhan Rafique, Khalid Mahmood, Tauseef-U- Rehman, Khalid Rashid

International Conference on Information and Communication Technologies

Software system may have various nonfunctional requirements such as reliability, security, performance and schedulability. If we can predict how well the system will meet such requirements at an early phase of software development, we can significantly save the total development cost and time. Among non-functional requirements, reliability is commonly required as the essential property of the system being developed. Therefore, many analysis methods have been proposed but methods that can be practically performed in the design phase are rare. In this paper we show how design-level aspects can be used to separate reliability concerns from essential functional concerns during software …


Study Of Data Provenance And Annotation Model For Information Reliability Suggested For Pathological Laboratory Environment In Pakistan, Naila Aamir, Aslam Pervez Aug 2005

Study Of Data Provenance And Annotation Model For Information Reliability Suggested For Pathological Laboratory Environment In Pakistan, Naila Aamir, Aslam Pervez

International Conference on Information and Communication Technologies

Trust and reliability of information is a very critical issue of today's information age. Keeping provenance of data not only ensures us about its origination but it also keeps track of all the changes that happen to the data through out its life cycle. In this paper we have discussed the importance of data provenance, difference between Where & Why Provenance and different models for keeping such information. The objective of this study is to select a provenance model which can be implemented in scientific environment of our country. For this purpose we have taken the annotation model and have …


Ergonomics: Implications On Computer End-Users, Maheen Ghauri, Dr. Arshad Siddiqi Aug 2005

Ergonomics: Implications On Computer End-Users, Maheen Ghauri, Dr. Arshad Siddiqi

International Conference on Information and Communication Technologies

Ergonomics is the application of scientific information related to humans to the design of objects, systems and environment for human use. The objective is to apply human characteristics to the design of computer-based work environments to reduce problems of people at work. Lack of ergonomics has serious repercussions on end-users, including physical and mental illnesses. Using ergonomics to design computer-intensive environments would maximize efficiency, productivity and job satisfaction of employees. Unfortunately, in the Government Sector in Pakistan, there is no application of ergonomics in computer-based environments, and this leads to inefficiencies, errors, and safety and health issues. The purpose of …


Visualization Of Retrieved Positive Data Using Blending Function, Muhammad Shoaib, Habib -Ur- Rehman, Dr. Abad Ali Shah Aug 2005

Visualization Of Retrieved Positive Data Using Blending Function, Muhammad Shoaib, Habib -Ur- Rehman, Dr. Abad Ali Shah

International Conference on Information and Communication Technologies

Data visualization is an important technique used in data mining. We present the retrieved data into visual format to discover features and trends inherent to the data. Some features of the data to be retrieved are already known to us. Visualization should preserve these known features inherent to the data. Positivity is one such known feature that is inherent to most of the scientific and business data sets. For example, mass, volume and percentage concentration are meaningful only when they are positive values. However certain visualization techniques do not guarantee to preserve this feature while constructing visualization of retrieved data …


Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad Aug 2005

Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad

International Conference on Information and Communication Technologies

It is no longer unusual to see, in a remote town in northern area in Pakistan, a practically non-literate wagon driver calling from his Nokia cell phone his uncle in Dubai or in Karachi. He enjoys sharing with him about his success in business and the settlement of family disputes. While he is driving on dangerous curvy roads and having this conversation, in the back seat of the wagon a comparatively young person is playing games on his cell phone. All this was unimaginable a quarter of a century ago.


Keynote: Hexagonal Structure For Intelligent Vision, Xiangjian He, Wenjing Jia Aug 2005

Keynote: Hexagonal Structure For Intelligent Vision, Xiangjian He, Wenjing Jia

International Conference on Information and Communication Technologies

Using hexagonal grids to represent digital images have been studied for more than 40 years. Increased processing capabilities of graphic devices and recent improvements in CCD technology have made hexagonal sampling attractive for practical applications and brought new interests on this topic. The hexagonal structure is considered to be preferable to the rectangular structure due to its higher sampling efficiency, consistent connectivity and higher angular resolution and is even proved to be superior to square structure in many applications. Since there is no mature hardware for hexagonal-based image capture and display, square to hexagonal image conversion has to be done …


Cut-And-Solve: A Linear Search Strategy For Combinatorial Optimization Problems, Sharlee Climer, Weixiong Zhang Aug 2005

Cut-And-Solve: A Linear Search Strategy For Combinatorial Optimization Problems, Sharlee Climer, Weixiong Zhang

All Computer Science and Engineering Research

Branch-and-bound and branch-and-cut use search trees to identify optimal solutions. In this paper, we introduce a linear search strategy which we refer to as cut-and-solve and prove optimality and completeness for this method. This search is different from traditional tree searching as there is no branching. At each node in the search path, a relaxed problem and a sparse problem are solved and a constraint is added to the relaxed problem. The sparse problems provide incumbent solutions. When the constraining of the relaxed problem becomes tight enough, its solution value becomes no better than the incumbent solution value. At this …


The Role Of White Hat Hackers In Information Security, Amit Anand Jagnarine Aug 2005

The Role Of White Hat Hackers In Information Security, Amit Anand Jagnarine

Honors College Theses

No abstract is available.


Opnet, Arne, And The Classroom, Philip Doane Aug 2005

Opnet, Arne, And The Classroom, Philip Doane

Regis University Student Publications (comprehensive collection)

This paper examines OPNET Technology, Inc's management programs, and Regis University's Academic Research Network (ARNe) needs to find out which OPNET programs can meet the needs of ARNe. The method used was to examine ARNe's needs, and research Microsoft's SMF/MOF management framework, research OPNET's program and module offerings, research OPNET's University Program, and research how OPNET's programs are used at some other universities. The research was used to create a match up between Microsoft's Service Management Functions and OPNET's programs and modules. And it was used to create a list of textbooks, labs, and lab manuals that would work with …


Achieving Minimum Coverage Breach Under Bandwidth Constraints In Wireless Sensor Networks, Maggie Xiaoyan Cheng, Lu Ruan, Weili Wu Aug 2005

Achieving Minimum Coverage Breach Under Bandwidth Constraints In Wireless Sensor Networks, Maggie Xiaoyan Cheng, Lu Ruan, Weili Wu

Computer Science Faculty Research & Creative Works

This paper addresses the coverage breach problem in wireless sensor networks with limited bandwidths. In wireless sensor networks, sensor nodes are powered by batteries. To make efficient use of battery energy is critical to sensor network lifetimes. When targets are redundantly covered by multiple sensors, especially in stochastically deployed sensor networks, it is possible to save battery energy by organizing sensors into mutually exclusive subsets and alternatively activating only one subset at any time. Active nodes are responsible for sensing, computing and communicating. While the coverage of each subset is an important metric for sensor organization, the size of each …


Efficient Wait-Free Algorithms For Implementing Ll/Sc Objects, Srdjan Petrovic Aug 2005

Efficient Wait-Free Algorithms For Implementing Ll/Sc Objects, Srdjan Petrovic

Dartmouth College Ph.D Dissertations

Over the past decade, a pair of instructions called load-linked (LL) and store-conditional (SC) have emerged as the most suitable synchronization instructions for the design of lock-free algorithms. However, current architectures do not support these instructions; instead, they support either CAS (e.g., UltraSPARC, Itanium, Pentium) or restricted versions of LL/SC (e.g., POWER4, MIPS, Alpha). Thus, there is a gap between what algorithm designers want (namely, LL/SC) and what multiprocessors actually support (namely, CAS or restricted LL/SC). To bridge this gap, this thesis presents a series of efficient, wait-free algorithms that implement LL/SC from CAS or restricted LL/SC.


Dynamic Dead Variable Analysis, Micah S. Lewis Aug 2005

Dynamic Dead Variable Analysis, Micah S. Lewis

Theses and Dissertations

Dynamic dead variable analysis (DDVA) extends traditional static dead variable analysis (SDVA) in the context of model checking through the use of run-time information. The analysis is run multiple times during the course of model checking to create a more precise set of dead variables. The DDVA is evaluated based on the amount of memory used to complete model checking relative to SDVA while considering the extra overhead required to implement DDVA. On several models with a complex control flow graph, DDVA reduces the amount of memory needed by 38-88MB compared to SDVA with a cost of 36 bytes of …


Self-Adjusting Finite State Machines: An Approach To Real-Time Autonomous Behavior In Robots, Scott Schwartz Aug 2005

Self-Adjusting Finite State Machines: An Approach To Real-Time Autonomous Behavior In Robots, Scott Schwartz

Computer Science Honors Theses

In the Robotics industry, it is a frequent requirement that robots operate in real-time. The usual approach to this issue involves creating robots driven entirely by direct environmental input rather than complicated planning and decision-making AI. This approach means that the current state of the robot in relation to its environment exclusively determines the actions of the robot. In the simplest terms, this approach creates a Finite State Machine (FSM). Clearly, a standard FSM is completely pre-deterministic upon its creation. This is a drawback which immediately disallows the robot to cope with dynamic environments in an autonomous manner. This research …


The Theory Of Trackability With Applications To Sensor Networks, Valentino Crespi, George Cybenko, Guofei Jiang Aug 2005

The Theory Of Trackability With Applications To Sensor Networks, Valentino Crespi, George Cybenko, Guofei Jiang

Computer Science Technical Reports

In this paper, we formalize the concept of tracking in a sensor network and develop a rigorous theory of {\em trackability} that investigates the rate of growth of the number of consistent tracks given a sequence of observations made by the sensor network. The phenomenon being tracked is modelled by a nondeterministic finite automaton and the sensor network is modelled by an observer capable of detecting events related, typically ambiguously, to the states of the underlying automaton. More formally, an input string, $Z^t$, of $t+1$ symbols (the sensor network observations) that is presented to a nondeterministic finite automaton, $M$, (the …


Exploring Discrete Cosine Transform For Multi-Resolution Analysis, Safdar Ali Syed Abedi Aug 2005

Exploring Discrete Cosine Transform For Multi-Resolution Analysis, Safdar Ali Syed Abedi

Computer Science Theses

Multi-resolution analysis has been a very popular technique in the recent years. Wavelets have been used extensively to perform multi resolution image expansion and analysis. DCT, however, has been used to compress image but not for multi resolution image analysis. This thesis is an attempt to explore the possibilities of using DCT for multi-resolution image analysis. Naive implementation of block DCT for multi-resolution expansion has many difficulties that lead to signal distortion. One of the main causes of distortion is the blocking artifacts that appear when reconstructing images transformed by DCT. The new algorithm is based on line DCT which …


Specific Ige Response To Purified And Recombinant Allergens In Latex Allergy, Viswanath P. Kurup, Gordon L. Sussman, Hoong Y. Yeang, Nancy Elms, Heimo Breiteneder, Siti Am Arif, Kevin J. Kelly, Naveen K. Bansal, Jordan N. Fink Aug 2005

Specific Ige Response To Purified And Recombinant Allergens In Latex Allergy, Viswanath P. Kurup, Gordon L. Sussman, Hoong Y. Yeang, Nancy Elms, Heimo Breiteneder, Siti Am Arif, Kevin J. Kelly, Naveen K. Bansal, Jordan N. Fink

Mathematics, Statistics and Computer Science Faculty Research and Publications

Background

In recent years, allergy to natural rubber latex has emerged as a major allergy among certain occupational groups and patients with underlying diseases. The sensitization and development of latex allergy has been attributed to exposure to products containing residual latex proteins. Although improved manufacturing procedures resulted in a considerable reduction of new cases, the potential risk for some patient groups is still great. In addition the prevalent cross-reactivity of latex proteins with other food allergens poses a major concern. A number of purified allergens and a few commercial kits are currently available, but no concerted effort was undertaken to …


Global Semantic Integrity Constraint Checking For A System Of Databases, Praveen Madiraju Aug 2005

Global Semantic Integrity Constraint Checking For A System Of Databases, Praveen Madiraju

Computer Science Dissertations

In today’s emerging information systems, it is natural to have data distributed across multiple sites. We define a System of Databases (SyDb) as a collection of autonomous and heterogeneous databases. R-SyDb (System of Relational Databases) is a restricted form of SyDb, referring to a collection of relational databases, which are independent. Similarly, X-SyDb (System of XML Databases) refers to a collection of XML databases. Global integrity constraints ensure integrity and consistency of data spanning multiple databases. In this dissertation, we present (i) Constraint Checker, a general framework of a mobile agent based approach for checking global constraints on R-SyDb, and …


Efficient And Effective Schemes For Streaming Media Delivery, Cheng Huang Aug 2005

Efficient And Effective Schemes For Streaming Media Delivery, Cheng Huang

All Computer Science and Engineering Research

The rapid expansion of the Internet and the increasingly wide deployment of wireless networks provide opportunities to deliver streaming media content to users at anywhere, anytime. To ensure good user experience, it is important to battle adversary effects, such as delay, loss and jitter. In this thesis, we first study efficient loss recovery schemes, which require pure XOR operations. In particular, we propose a novel scheme capable of recovering up to 3 packet losses, and it has the lowest complexity among all known schemes. We also propose an efficient algorithm for array codes decoding, which achieves significant throughput gain and …


Scoresvg: A New Software Framework For Capturing The Semantic Meaning And Graphical Representation Of Musical Scores Using Java2d, Xml, And Svg, Geoffrey Alan Bays Aug 2005

Scoresvg: A New Software Framework For Capturing The Semantic Meaning And Graphical Representation Of Musical Scores Using Java2d, Xml, And Svg, Geoffrey Alan Bays

Computer Science Theses

ScoreSVG implements a three-tiered software architecture that generates musical scores in scalable vector graphics (SVG), something no other known music editor has done. SVG is non-proprietary XML-based format that renders graphical content into a web browser equipped with a SVG plugin. Scores in SVG can be scripted to produce interactive music theory examples, or make other graphical score changes impossible in any other format. Large music score editors such as Finale and Sibelius output to proprietary file formats, or Postscript (.ps) files that are not interchangeable or modifiable once created. Open source efforts such as LilyPond or Guido require the …


Task Similarity Measures For Transfer In Reinforcement Learning Task Libraries, James Carroll, Kevin Seppi Aug 2005

Task Similarity Measures For Transfer In Reinforcement Learning Task Libraries, James Carroll, Kevin Seppi

Faculty Publications

Recent research in task transfer and task clustering has necessitated the need for task similarity measures in reinforcement learning. Determining task similarity is necessary for selective transfer where only information from relevant tasks and portions of a task are transferred. Which task similarity measure to use is not immediately obvious. It can be shown that no single task similarity measure is uniformly superior. The optimal task similarity measure is dependent upon the task transfer method being employed. We define similarity in terms of tasks, and propose several possible task similarity measures, dT, dp, dQ, and dR which are based on …


Spawn: Service Provision In Ad-Hoc Wireless Networks, Radu Handorean, Gruia-Catalin Roman, Rohan Sen, Gregory Hackmann, Christopher Gill Aug 2005

Spawn: Service Provision In Ad-Hoc Wireless Networks, Radu Handorean, Gruia-Catalin Roman, Rohan Sen, Gregory Hackmann, Christopher Gill

All Computer Science and Engineering Research

The increasing ubiquity of wireless mobile computing platforms has opened up the potential for unprecedented levels of communication, coordination and collaboration among mobile computing devices, most of which will occur in an ad hoc, on-demand manner. This paper describes SPAWN, a middleware supporting service provision in ad-hoc wireless networks. The aim of SPAWN is to provide the software resources on mobile devices that facilitate electronic collaboration. This is achieved by applying the principles of service oriented computing (SOC), an emerging paradigm that has seen success in wired settings. SPAWN is an adaptation and extension of the Jini model of SOC …


How Does Information Technology Effect Development? Integrating Theory And Practice Into A Process Model, Sajda Qureshi Aug 2005

How Does Information Technology Effect Development? Integrating Theory And Practice Into A Process Model, Sajda Qureshi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

The concept of development suggests that countries and regions grow to become self-sustaining partners in what is being called the global economy. In more recent years this concept has been synonymous with the emergence of an “information society” whose wheels are oiled by information sharing and the application of knowledge. Some international agencies even propose that information and communications technologies enable development to be achieved more effectively and efficiently. While success stories abound, there is a recognition that not all investments in information technology bring about growth or economic development. So the question remains: how does information technology effect development? …


Automatic Source Attribution Of Text: A Neural Networks Approach, Foaad Khosmood, Franz J. Kurfess Aug 2005

Automatic Source Attribution Of Text: A Neural Networks Approach, Foaad Khosmood, Franz J. Kurfess

Computer Science and Software Engineering

Recent advances in automatic authorship attribution have been promising. Relatively new techniques such as N-gram analysis have shown important improvements in accuracy [2]. Much of the work in this area does remain in the realm of statistics best suited for human assistance rather than autonomous attribution [6]. While there have been attempts at using neural networks in the area in the past, they have been extremely limited and problem-specific [7]. This paper addresses the latter points by demonstrating a practical and truly autonomous attribution process using neural networks. Furthermore, we use a word-frequency classification technique to demonstrate the feasibility of …


Searching Multi-Hierarchical Xml Documents: The Case Of Fragmentation, Alex Dekhtyar, Ionut E. Iacob, Srikanth Methuku Aug 2005

Searching Multi-Hierarchical Xml Documents: The Case Of Fragmentation, Alex Dekhtyar, Ionut E. Iacob, Srikanth Methuku

Computer Science and Software Engineering

To properly encode properties of textual documents using XML, multiple markup hierarchies must be used, often leading to conflicting markup in encodings. Text Encoding Initiative (TEI) Guidelines [1] recognize this problem and suggest a number of ways to incorporate multiple hierarchies in a single well-formed XML document. In this paper, we present a framework for processing XPath queries over multi-hierarchical XML documents represented using fragmentation, one of the TEI-suggested techniques. We define the semantics of XPath over DOM trees of fragmented XML, extend the path expression language to cover overlap in markup, and describe FragXPath, our implementation of the proposed …


Goods Movement Security: An Information Technology Problem, Jens G. Pohl Aug 2005

Goods Movement Security: An Information Technology Problem, Jens G. Pohl

Collaborative Agent Design (CAD) Research Center

This paper discusses the security problems associated with the movement of goods across international in-land borders and at ocean ports. The author proposes an information technology solution approach that is based on the profiling of international shipments. The collection of data describing the end-to-end movement of a shipment from the initial acquisition transactions, throughout the various transshipment stages, to the final delivery, allows intelligent software to assist customs and homeland security officials to determine the risks associated with the shipment long before it reaches the inspection point. The technical basis and architecture of the SecureOrigins™ software system is described. Designed …


Boosted Decision Trees For Word Recognition In Handwritten Document Retrieval, Nicholas Howe, Toni M. Rath, R. Manmatha Aug 2005

Boosted Decision Trees For Word Recognition In Handwritten Document Retrieval, Nicholas Howe, Toni M. Rath, R. Manmatha

Computer Science: Faculty Publications

Recognition and retrieval of historical handwritten material is an unsolved problem. We propose a novel approach to recognizing and retrieving handwritten manuscripts, based upon word image classification as a key step. Decision trees with normalized pixels as features form the basis of a highly accurate AdaBoost classifier, trained on a corpus of word images that have been resized and sampled at a pyramid of resolutions. To stem problems from the highly skewed distribution of class frequencies, word classes with very few training samples are augmented with stochastically altered versions of the originals. This increases recognition performance substantially. On a standard …


Natural Image Statistics For Digital Image Forensics, Siwei Lyu Aug 2005

Natural Image Statistics For Digital Image Forensics, Siwei Lyu

Dartmouth College Ph.D Dissertations

We describe a set of natural image statistics that are built upon two multi-scale image decompositions, the quadrature mirror filter pyramid decomposition and the local angular harmonic decomposition. These image statistics consist of first- and higher-order statistics that capture certain statistical regularities of natural images. We propose to apply these image statistics, together with classification techniques, to three problems in digital image forensics: (1) differentiating photographic images from computer-generated photorealistic images, (2) generic steganalysis; (3) rebroadcast image detection. We also apply these image statistics to the traditional art authentication for forgery detection and identification of artists in an art work. …


Extracting Reduced Logic Programs From Artificial Neural Networks, Jens Lehmann, Sebastian Bader, Pascal Hitzler Aug 2005

Extracting Reduced Logic Programs From Artificial Neural Networks, Jens Lehmann, Sebastian Bader, Pascal Hitzler

Computer Science and Engineering Faculty Publications

Artificial neural networks can be trained to perform excellently in many application areas. While they can learn from raw data to solve sophisticated recognition and analysis problems, the acquired knowledge remains hidden within the network architecture and is not readily accessible for analysis or further use: Trained networks are black boxes. Recent research efforts therefore investigate the possibility to extract symbolic knowledge from trained networks, in order to analyze, validate, and reuse the structural insights gained implicitly during the training process. In this paper, we will study how knowledge in form of propositional logic programs can be obtained in such …