Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Machine learning (2)
- Nominal sets (2)
- Small Spacecraft (2)
- Small spacecraft (2)
- AI Decision Making (1)
-
- AI testing (1)
- Academic -- UNF -- Computing; Message Oriented Middleware (1)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (1)
- Algebraic models (1)
- Android (1)
- Application Security (1)
- Applied sciences (1)
- Artificial Intelligence & Robotic Control (1)
- Autonomic Management (1)
- Autonomous system verification (1)
- Cloud Computing (1)
- Clustering (1)
- Coalgebra (1)
- Coinduction (1)
- Collaborative Management (1)
- Commutative quantale (1)
- Computer Science (1)
- Conjunctive rule (1)
- Convert (1)
- Corecursion (1)
- Counter-examples to Dempster rule (1)
- Counterexamples to Conjunctive rule (1)
- Cover modality (1)
- CubeSat (1)
- Cyber security (1)
- Publication
- Publication Type
Articles 1 - 21 of 21
Full-Text Articles in Physical Sciences and Mathematics
Is Real-Time Mobile Content-Based Image Retrieval Feasible?, Colin G. Graber, Anup Mohan, Yung-Hsiang Lu
Is Real-Time Mobile Content-Based Image Retrieval Feasible?, Colin G. Graber, Anup Mohan, Yung-Hsiang Lu
The Summer Undergraduate Research Fellowship (SURF) Symposium
Content-based image retrieval (CBIR) is a method of searching through a database of images by using another image as a query instead of text. Recent advances in the processing power of smart phones and tablets, collectively known as mobile devices, have prompted researchers to attempt to construct mobile CBIR systems. Most of the research that has been conducted on mobile CBIR has focused on improving either its accuracy or its run-time, but not both simultaneously. We set out to answer the question: is real-time CBIR with manageable accuracy possible on current mobile devices? To find the answer to this question, …
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Electronic Thesis and Dissertation Repository
With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …
Examples Where The Conjunctive And Dempster’S Rules Are Insensitive, Florentin Smarandache, Jean Dezert, Valeri Kroumov
Examples Where The Conjunctive And Dempster’S Rules Are Insensitive, Florentin Smarandache, Jean Dezert, Valeri Kroumov
Branch Mathematics and Statistics Faculty and Staff Publications
In this paper we present several counter-examples to the Conjunctive rule and to Dempster rule of combinations in information fusion.
Reliability Models Applied To Smartphone Applications, Sonia Meskini
Reliability Models Applied To Smartphone Applications, Sonia Meskini
Electronic Thesis and Dissertation Repository
Smartphones have become the most used electronic devices. They carry out most of the functionalities of desktops, offering various useful applications that suit the user’s needs. Therefore, instead of the operator, the user has been the main controller of the device and its applications, therefore its reliability has become an emergent requirement. As a first step, based on collected smartphone applications failure data, we investigated and evaluated the efficacy of Software Reliability Growth Models (SRGMs) when applied to these smartphone data in order to check whether they achieve the same accuracy as in the desktop/laptop area. None of the selected …
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
University of New Orleans Theses and Dissertations
Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …
Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose
Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose
Doctoral Dissertations
Multi-stage visual architectures have recently found success in achieving high classification accuracies over image datasets with large variations in pose, lighting, and scale. Inspired by techniques currently at the forefront of deep learning, such architectures are typically composed of one or more layers of preprocessing, feature encoding, and pooling to extract features from raw images. Training these components traditionally relies on large sets of patches that are extracted from a potentially large image dataset. In this context, high-dimensional feature space representations are often helpful for obtaining the best classification performances and providing a higher degree of invariance to object transformations. …
Segmentation And Model Generation For Large-Scale Cyber Attacks, Steven E. Strapp
Segmentation And Model Generation For Large-Scale Cyber Attacks, Steven E. Strapp
Theses
Raw Cyber attack traffic can present more questions than answers to security analysts. Especially with large-scale observables it is difficult to identify which packets are relevant and what attack behaviors are present. Many existing works in Host or Flow Clustering attempt to group similar behaviors to expedite analysis; these works often phrase the problem directly as offline unsupervised machine learning. This work proposes online processing to simultaneously model coordinating actors and segment traffic that is relevant to a target of interest, all while it is being received. The goal is not just to aggregate similar attack behaviors, but to provide …
Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise
Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise
Masters Theses
An enumeration hybrid automaton has been shown in principle to be ready for automated transformation into a Simulink implementation. This paper describes a strategy for and a demonstration of automated construction. This is accomplished by designing a data model which represents EHA data and providing a mapping from EHA data points to Simulink blocks.
Applied Hypergame Theory For Network Defense, Alan S. Gibson
Applied Hypergame Theory For Network Defense, Alan S. Gibson
Theses and Dissertations
Cyber operations are the most important aspect of military conflicts in the 21st century, but unfortunately they are also among the least understood. The continual battle for network dominance between attackers and defenders is considered to be a complex game. Hypergame theory is an extension of game theory that addresses the kind of games where misperception exists, as is often the case in military engagements. Hypergame theory, like game theory, uses a game model to determine strategy selection, but goes beyond game theory by examining subgames that exist within the full game. The inclusion of misperception and misinformation in the …
Nbconvert Refactor, Jonathan Frederic
Nbconvert Refactor, Jonathan Frederic
Physics
IPython is an interactive Python computing environment. It provides an enhanced interactive Python shell. The IPython Notebook is a browser based interface distributed with IPython. It enables the creation of richly formatted notebooks that contain embedded IPython code. With nbconvert, notebooks can be exported to various formats including, but not limited to, LaTeX, reveal.js, RST, and HTML. This is important for users that want to be able to share their work outside of IPython. This senior project is the addition of a Sphinx LaTeX output format and the refactor of nbconvert.
Gesture Based Home Automation For The Physically Disabled, Alexander Hugh Nelson
Gesture Based Home Automation For The Physically Disabled, Alexander Hugh Nelson
Graduate Theses and Dissertations
Paralysis and motor-impairments can greatly reduce the autonomy and quality of life of a patient while presenting a major recurring cost in home-healthcare. Augmented with a non-invasive wearable sensor system and home-automation equipment, the patient can regain a level of autonomy at a fraction of the cost of home nurses. A system which utilizes sensor fusion, low-power digital components, and smartphone cellular capabilities can extend the usefulness of such a system to allow greater adaptivity for patients with various needs. This thesis develops such a system as a Bluetooth enabled glove device which communicates with a remote web server to …
A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub
A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub
Jeremy Straub
A Human Proximity Operations System (HPOS) poses numerous risks in a real world environment. These risks range from mundane tasks such as avoiding walls and fixed obstacles to the critical need to keep people and processes safe in the context of the HPOS’s situation-specific decision making. Validating the performance of an HPOS, which must operate in a real-world environment, is an ill posed problem due to the complexity that is introduced by erratic (non-computer) actors. In order to prove the HPOS’s usefulness, test cases must be generated to simulate possible actions of these actors, so the HPOS can be shown …
Exposing Multiple User-Specific Data Denominated Products From A Single Small Satellite Data Stream, Atif F. Mohammad,, Emanuel Grant, Jeremy Straub, Ronald Marsh, Scott Kerlin
Exposing Multiple User-Specific Data Denominated Products From A Single Small Satellite Data Stream, Atif F. Mohammad,, Emanuel Grant, Jeremy Straub, Ronald Marsh, Scott Kerlin
Jeremy Straub
This paper presents a research work on small satellite data stream and related distribution to associated stakeholders, which is a field that needs to get explored in more detail. The algorithm that is presented to extract USDDP (User-Specific Data Denominated Products) is a self managing body, which will be within as Open Space Box environment or OSBE as a novel idea. It contains an individual stream transmitted by the small satellite, which later is to be converted into USDDP. The context defined here deals with area in detail. Contexts are vitally important because they control, influence and affect everything within …
Open Space Box Model: Service Oriented Architecture Framework For Small Spacecraft Collaboration And Control, Atif F. Mohammad, Jeremy Straub
Open Space Box Model: Service Oriented Architecture Framework For Small Spacecraft Collaboration And Control, Atif F. Mohammad, Jeremy Straub
Jeremy Straub
A Cubesat is a small satellite with very less competence to compute, it requires software engineering techniques, which can enhance the computational power for this small box. A model-driven approach of software engineering, which is called OSBM or Open Space Box Modeling technique, is an excellent solution to this re-source maximization challenge. OSBM facilitates apparition of the key solution pro-cesses computation and satellite related data elements using Service Oriented Ar-chitecture 3.0 (SOA 3.0) as base to work on to design services. The key challenges that can be handled by utilizing OSBM include concurrent operation and tasking of few as five …
Nominal Regular Expressions For Languages Over Infinite Alphabets, Alexander Kurz, Tomoyuki Suzuki, Emilio Tuosto
Nominal Regular Expressions For Languages Over Infinite Alphabets, Alexander Kurz, Tomoyuki Suzuki, Emilio Tuosto
Engineering Faculty Articles and Research
We propose regular expressions to abstractly model and study properties of resource-aware computations. Inspired by nominal techniques – as those popular in process calculi – we extend classical regular expressions with names (to model computational resources) and suitable operators (for allocation, deallocation, scoping of, and freshness conditions on resources). We discuss classes of such nominal regular expressions, show how such expressions have natural interpretations in terms of languages over infinite alphabets, and give Kleene theorems to characterise their formal languages in terms of nominal automata.
Performance Evaluation And Comparison Of Distributed Messaging Using Message Oriented Middleware, Naveen Mupparaju
Performance Evaluation And Comparison Of Distributed Messaging Using Message Oriented Middleware, Naveen Mupparaju
UNF Graduate Theses and Dissertations
Message Oriented Middleware (MOM) is an enabling technology for modern event- driven applications that are typically based on publish/subscribe communication [Eugster03]. Enterprises typically contain hundreds of applications operating in environments with diverse databases and operating systems. Integration of these applications is required to coordinate the business process. Unfortunately, this is no easy task. Enterprise Integration, according to Brosey et al. (2001), "aims to connect and combines people, processes, systems, and technologies to ensure that the right people and the right processes have the right information and the right resources at the right time"[Brosey01]. Communication between different applications can be achieved …
Relation Lifting, With An Application To The Many-Valued Cover Modality, Marta Bílková, Alexander Kurz, Daniela Petrişan, Jirí Velebil
Relation Lifting, With An Application To The Many-Valued Cover Modality, Marta Bílková, Alexander Kurz, Daniela Petrişan, Jirí Velebil
Engineering Faculty Articles and Research
We introduce basic notions and results about relation liftings on categories enriched in a commutative quantale. We derive two necessary and sufficient conditions for a 2-functor T to admit a functorial relation lifting: one is the existence of a distributive law of T over the “powerset monad” on categories, one is the preservation by T of “exactness” of certain squares. Both characterisations are generalisations of the “classical” results known for set functors: the first characterisation generalises the existence of a distributive law over the genuine powerset monad, the second generalises preservation of weak pullbacks.
The results presented in this paper …
Epistemic Updates On Algebras, Alexander Kurz, Alessandra Palmigiano
Epistemic Updates On Algebras, Alexander Kurz, Alessandra Palmigiano
Engineering Faculty Articles and Research
We develop the mathematical theory of epistemic updates with the tools of duality theory. We focus on the Logic of Epistemic Actions and Knowledge (EAK), introduced by Baltag-Moss-Solecki, without the common knowledge operator. We dually characterize the product update construction of EAK as a certain construction transforming the complex algebras associated with the given model into the complex algebra associated with the updated model. This dual characterization naturally generalizes to much wider classes of algebras, which include, but are not limited to, arbitrary BAOs and arbitrary modal expansions of Heyting algebras (HAOs). As an application of this dual characterization, we …
Dynamic Sequent Calculus For The Logic Of Epistemic Actions And Knowledge, Giuseppe Greco, Alexander Kurz, Alessandra Palmigiano
Dynamic Sequent Calculus For The Logic Of Epistemic Actions And Knowledge, Giuseppe Greco, Alexander Kurz, Alessandra Palmigiano
Engineering Faculty Articles and Research
"Dynamic Logics (DLs) form a large family of nonclassical logics, and perhaps the one enjoying the widest range of applications. Indeed, they are designed to formalize change caused by actions of diverse nature: updates on the memory state of a computer, displacements of moving robots in an environment, measurements in models of quantum physics, belief revisions, knowledge updates, etc. In each of these areas, DL-formulas express properties of the model encoding the present state of affairs, as well as the pre- and post-conditions of a given action. Actions are semantically represented as transformations of one model into another, encoding the …
Nominal Computation Theory (Dagstuhl Seminar 13422), Mikołaj Bojanczyk, Bartek Klin, Alexander Kurz, Andrew M. Pitts
Nominal Computation Theory (Dagstuhl Seminar 13422), Mikołaj Bojanczyk, Bartek Klin, Alexander Kurz, Andrew M. Pitts
Engineering Faculty Articles and Research
This report documents the program and the outcomes of Dagstuhl Seminar 13422 “Nominal Computation Theory”. The underlying theme of the seminar was nominal sets (also known as sets with atoms or Fraenkel-Mostowski sets) and they role and applications in three distinct research areas: automata over infinite alphabets, program semantics using nominal sets and nominal calculi of concurrent processes.
Nominal Coalgebraic Data Types With Applications To Lambda Calculus, Alexander Kurz, Daniela Petrişan, Paula Severi, Fer-Jan De Vries
Nominal Coalgebraic Data Types With Applications To Lambda Calculus, Alexander Kurz, Daniela Petrişan, Paula Severi, Fer-Jan De Vries
Engineering Faculty Articles and Research
We investigate final coalgebras in nominal sets. This allows us to define types of infinite data with binding for which all constructions automatically respect alpha equivalence. We give applications to the infinitary lambda calculus.