Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Physical Sciences and Mathematics

Lightcraft Previzion In Distance Education, Perry L. Cox Dec 2016

Lightcraft Previzion In Distance Education, Perry L. Cox

Open Access Theses

Visual Effects has continued to progress at an astonishing rate and green screen technology can be seen in all aspects of the video industry from Hollywood blockbusters down to training videos and distance education.

As video technology has increased, so has the quality and capability of distance education. Purdue University has set itself to be at the forefront of distance education. This study looked to evaluate Purdue's investment in the Lightcraft Technology's Previzion system and its impact on distance education at Purdue. There were 65 initial participants and this study compared the impact of two separate videos on their learning. …


Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti Dec 2016

Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti

Open Access Theses

This study introduced an interaction technique that used tangible interaction for 3D modeling. A hybrid interaction technique using a Kinect camera and a smartphone with a gyroscope was developed for the navigating objects in a 3D modeling software. It was then tested on 20 participants categorized as amateurs who had basic 3D/ CAD modeling experience and 20 participants categorized as the experts who had extensive experience working with the modeling software. This research study presents the need for existence of such interaction technique, gaps from the related previous studies, statistical findings from the current study and possible reasons for the …


Improving A Mesh Segmentation Algorithm Based On Non-Negative Matrix Factorization, Jisun Kang Dec 2016

Improving A Mesh Segmentation Algorithm Based On Non-Negative Matrix Factorization, Jisun Kang

Open Access Theses

3D Mesh segmentation is used in various applications such as object recognition, reconstruction, and analyzing structure of meshes. The method for 3D mesh segmentation based on sparse non-negative matrix factorization (NMF) was previously proposed. It represents a novel, and conceptually simpler, method than other comparable algorithms. However, this method still has potential to improve performance, results could have better consistency and uniqueness with faster computation time than the prior proposed algorithm. This study introduced several approaches to enhance the performance of the algorithm comprehensively: applying dierent update rule and initialization of factor matrices, and imposing sparseness to the factor matrices …


A Mixed Methods Study: Evaluating The Relationship Of Project Manager Competencies And It Project Management Methodologies, Keith A. Mcdermott Dec 2016

A Mixed Methods Study: Evaluating The Relationship Of Project Manager Competencies And It Project Management Methodologies, Keith A. Mcdermott

Open Access Theses

Determining skillsets that are particularly important to the development of an effective project manager can be useful for a variety of applications. These applications range from the hiring of a new project manager for an organization to continued training for current employees. Past research has called upon current project managers to rate what skillsets they see as important to the cultivation of an optimal or effective project manager. Additional research has expanded this idea to determine how skillsets vary between project managers and functional managers (El-Sabaa, 2001). While this research is certainly important, skillset grouping can be further explored. This …


A Small-Scale Testbed For Large-Scale Reliable Computing, Jason R. St. John Dec 2016

A Small-Scale Testbed For Large-Scale Reliable Computing, Jason R. St. John

Open Access Theses

High performance computing (HPC) systems frequently suffer errors and failures from hardware components that negatively impact the performance of jobs run on these systems. We analyzed system logs from two HPC systems at Purdue University and created statistical models for memory and hard disk errors. We created a small-scale error injection testbed—using a customized QEMU build, libvirt, and Python—for HPC application programmers to test and debug their programs in a faulty environment so that programmers can write more robust and resilient programs before deploying them on an actual HPC system. The deliverables for this project are the fault injection program, …


Inter-Color Npr Lines: A Comparison Of Rendering Techniques, Donald G. Herring Dec 2016

Inter-Color Npr Lines: A Comparison Of Rendering Techniques, Donald G. Herring

Open Access Theses

Renders of 3D scenes can feature lines drawn automatically along sharp edges between colored areas on object textures, in order to imitate certain conventional styles of hand-drawn line art. However, such "inter-color lines" have been studied very little. Two algorithms for rendering these lines were compared in this study - a faster one utilizing lines baked into the textures themselves and a more complex one that dynamically generated the lines in image space on each frame - for the purpose of determining which of the two better imitated traditional, hand-drawn art styles and which was more visually appealing. Test subjects …


Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat Dec 2016

Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat

Open Access Theses

Advancements in computer vision are still not reliable enough for detecting video content including humans and their actions. Microtask crowdsourcing on task markets such as Amazon Mechnical Turk and Upwork can bring humans into the loop. However, engaging crowd workers to annotate non-public video footage risks revealing the identities of people in the video who may have a right to anonymity.

This thesis demonstrates how we can engage untrusted crowd workers to detect behaviors and objects, while robustly concealing the identities of all faces. We developed a web-based system that presents obfuscated videos to crowd workers, and provides them with …


Deep Collective Inference, John A. Moore Dec 2016

Deep Collective Inference, John A. Moore

Open Access Theses

Collective inference is widely used to improve classification in network datasets. However, despite recent advances in deep learning and the successes of recurrent neural networks (RNNs), researchers have only just recently begun to study how to apply RNNs to heterogeneous graph and network datasets. There has been recent work on using RNNs for unsupervised learning in networks (e.g., graph clustering, node embedding) and for prediction (e.g., link prediction, graph classification), but there has been little work on using RNNs for node-based relational classification tasks. In this paper, we provide an end-to-end learning framework using RNNs for collective inference. Our main …


An Anomaly-Based Intrusion Detection System Based On Artificial Immune System (Ais) Techniques, Harish Valayapalayam Kumaravel Aug 2016

An Anomaly-Based Intrusion Detection System Based On Artificial Immune System (Ais) Techniques, Harish Valayapalayam Kumaravel

Open Access Theses

Two of the major approaches to intrusion detection are anomaly-based detection and signature-based detection. Anomaly-based approaches have the potential for detecting zero-day and other new forms of attacks. Despite this capability, anomaly-based approaches are comparatively less widely used when compared to signature-based detection approaches. Higher computational overhead, higher false positive rates, and lower detection rates are the major reasons for the same. This research has tried to mitigate this problem by using techniques from an area called the Artificial Immune Systems (AIS). AIS is a collusion of immunology, computer science and engineering and tries to apply a number of techniques …


Tool Comparison Of Semantic Parsers, Robert Hinh Aug 2016

Tool Comparison Of Semantic Parsers, Robert Hinh

Open Access Theses

Natural Language Processing (NLP) is a vital aspect for artificial intelligence systems to achieve integration into human lives, which has been a goal for researchers in this industry. While NLP focuses on an array of problems, semantic parsing will be specifically focused on throughout this paper. These parsers have been considerably targeted for improvement through the scientific community and demand for semantic parsers that achieve high accuracy has increased. There have been many approaches developed for this specific purpose and in this paper, a deep analysis was performed to compare the performance of semantic parsing systems. The implications of this …


Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song Aug 2016

Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song

Open Access Theses

Nowadays, more and more data is being generated by various software applications, services and smart devices every second. The data contains abundant information about people’s daily lives. This research explored the possibility of improving smartwatches’ context awareness by using common ubiquitous data. The researcher developed a prototype system consisting of an Android application and a web application, and conducted an experiment where 10 participants performed several tasks with the help of a smartwatch. The result showed a significant improvement of the smartwatch’s context awareness running the prototype application, which used ubiquitous data to automatically execute proper actions according to contexts. …


Hardware Accelerated Authentication System For Dynamic Time-Critical Networks, Ankush Singla Aug 2016

Hardware Accelerated Authentication System For Dynamic Time-Critical Networks, Ankush Singla

Open Access Theses

The secure and efficient operation of time-critical networks, such as vehicular networks, smart-grid and other smart-infrastructures, is of primary importance in today’s society. It is crucial to minimize the impact of security mechanisms over such networks so that the safe and reliable operations of time-critical systems are not being interfered.

Even though there are several security mechanisms, their application to smart-infrastructure and Internet of Things (IoT) deployments may not meet the ubiquitous and time-sensitive needs of these systems. That is, existing security mechanisms either introduce a significant computation and communication overhead, or they are not scalable for a large number …


Detection Of Communication Over Dnssec Covert Channels, Nicole M. Hands Aug 2016

Detection Of Communication Over Dnssec Covert Channels, Nicole M. Hands

Open Access Theses

Unauthorized data removal and modification from information systems represents a major and formidable threat in modern computing. Security researchers are engaged in a constant and escalating battle with the writers of malware and other methods of network intrusion to detect and mitigate this threat. Advanced malware behaviors include encryption of communications between the server and infected client machines as well as various strategies for resilience and obfuscation of infrastructure. These techniques evolve to use any and all available mechanisms. As the Internet has grown, DNS has been expanded and has been given security updates. This study analyzed the potential uses …


Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde Aug 2016

Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde

Open Access Theses

The objective of the research presented in this thesis is to evaluate the importance of query selectivity for monitoring DBMS activity and detect insider threat. We propose query selectivity as an additional component to an existing anomaly detection system (ADS). We first look at the advantages of working with this particular ADS. This is followed by a discussion about some existing limitations in the anomaly detection system (ADS) and how it affects its overall performance. We look at what query selectivity is and how it can help improve upon the existing limitations of the ADS. The system is then implemented …


A Usability Assessment For A Career Planning Educational Video Game, Jiaqi Wang Aug 2016

A Usability Assessment For A Career Planning Educational Video Game, Jiaqi Wang

Open Access Theses

This study focused on the design, implementation and usability assessment of an educational 2D iPad job matching game The Place You’ll Go (TPYG), which meant for matching student skill sets with career profiles. The development of the game is conducted in collaboration with Purdue University’s Krannert School of Management and Polytech Institute. A total of 7 subjects, as high school teachers, participated in the usability study. TPYG as one possible solution for job matching data visualization, did not provide players with a good experience. However, conclusions and findings can be used in similar education game development. Based on survey and …


Zephyr: A Social Psychology-Based Mobile Application For Long-Distance Romantic Partners, Dhiraj Bodicherla May 2016

Zephyr: A Social Psychology-Based Mobile Application For Long-Distance Romantic Partners, Dhiraj Bodicherla

Open Access Theses

Long-distance romantic relationships have become quite common nowadays. With CMC tools advancing day-by-day, their usage among LDRs is proliferating rapidly. Attachment-related anxiety and avoidance can block the ability to enjoy happy relationships. During such situations, remembering happy past moments can be comforting. In this study a mobile chat application that enables LDR couples to reminisce about happy moments was developed. This study primarily focuses on evaluating the usability of this mobile application using survey-based methods. System Usability Scale was considered to discuss the outcome of the study. The overall results provide useful recommendations for further improvements in the design of …


Social Customer Relationship Management In Higher Education, Victorian A. Farnsworth Apr 2016

Social Customer Relationship Management In Higher Education, Victorian A. Farnsworth

Open Access Theses

Customer Relationship Management is a concept that has become a requirement for any successful entity to attract and retain desired constituents. It is a set of processes and tools that help track, analyze, and act upon customer related data. Over the last decade, the toolsets have evolved to include social media as another source of information and connection. Nowhere is this information and connection more important than in higher education where globalization and tighter budgets have created a competitive market. This research evaluated the use of this most recent social toolset and its effectiveness in a higher education institution, all …


Hardware Accelerated Redundancy Elimination In Network System, Kelu Diao Apr 2016

Hardware Accelerated Redundancy Elimination In Network System, Kelu Diao

Open Access Theses

With the tremendous growth in the amount of information stored on remote locations and cloud systems, many service providers are seeking ways to reduce the amount of redundant information sent across networks by using data de-duplication techniques. Data de-duplication can reduce network traffic without the loss of information, and consequently increase available network bandwidth by reducing redundant traffic. However, due to the heavy computation required for detecting and reducing redundant data transmission, de-duplication itself can become a bottleneck in high capacity links. We completed two parts of work in this research study, Hardware Accelerated Redundancy Elimination in Network Systems (HARENS) …


Extracting Cng Tls/Ssl Artifacts From Lsass Memory, Jacob M. Kambic Apr 2016

Extracting Cng Tls/Ssl Artifacts From Lsass Memory, Jacob M. Kambic

Open Access Theses

Currently, there is no publicly accessible, reliable, automated way to forensically decrypt Secure Socket Layer (SSL)/Transport Layer Security (TLS) connections that leverage ephemeral key negotiations as implemented by the modern Windows operating system. This thesis explores the Local Security Authority Sub-System (LSASS) process used for Key Isolation within the Windows 10 operating system in pursuit of identifying artifacts that would allow a solution to that problem, along with any other connection artifacts that could provide forensic value. The end result was the identication of TLS/SSL secrets from the key exchange and contextual artifacts that provide identication of the other party …


User-Centric Workload Analytics: Towards Better Cluster Management, Suhas Raveesh Javagal Apr 2016

User-Centric Workload Analytics: Towards Better Cluster Management, Suhas Raveesh Javagal

Open Access Theses

Effective management of computing clusters and providing a high quality customer support is not a trivial task. Due to rise of community clusters there is an increase in the diversity of workloads and the user demographic. Owing to this and privacy concerns of the user, it is difficult to identify performance issues, reduce resource wastage and understand implicit user demands. In this thesis, we perform in-depth analysis of user behavior, performance issues, resource usage patterns and failures in the workloads collected from a university-wide community cluster and two clusters maintained by a government lab. We also introduce a set of …


Bridging Statistical Learning And Formal Reasoning For Cyber Attack Detection, Kexin Pei Apr 2016

Bridging Statistical Learning And Formal Reasoning For Cyber Attack Detection, Kexin Pei

Open Access Theses

Current cyber-infrastructures are facing increasingly stealthy attacks that implant malicious payloads under the cover of benign programs. Current attack detection approaches based on statistical learning methods may generate misleading decision boundaries when processing noisy data with such a mixture of benign and malicious behaviors. On the other hand, attack detection based on formal program analysis may lack completeness or adaptivity when modeling attack behaviors. In light of these limitations, we have developed LEAPS, an attack detection system based on supervised statistical learning to classify benign and malicious system events. Furthermore, we leverage control flow graphs inferred from the system event …


Implementation And Validation Of A Probabilistic Open Source Baseball Engine (Posbe): Modeling Hitters And Pitchers, Rhett Tracy Schaefer Apr 2016

Implementation And Validation Of A Probabilistic Open Source Baseball Engine (Posbe): Modeling Hitters And Pitchers, Rhett Tracy Schaefer

Open Access Theses

This manuscript details the implementation and validation of an open source probabilistic baseball engine (POSBE) that focuses on the hitter and pitcher model of the simulation. The simulation produced outcomes that parallel those observed in actual professional Major League Baseball games. The observed data were taken from the nineteen games played between the New York Yankees (NYY) and Boston Red Sox (BOS) during the 2015 season. The potential hitter/pitcher outcomes of interest were singles, doubles, triples, homeruns, walks, hit-by-pitch, and strikeouts. The nineteen game series was simulated 1000 times, resulting in a total of 19,000 simulations. The eighteen hitters and …


Unsupervised Learning Framework For Large-Scale Flight Data Analysis Of Cockpit Human Machine Interaction Issues, Abhishek B. Vaidya Apr 2016

Unsupervised Learning Framework For Large-Scale Flight Data Analysis Of Cockpit Human Machine Interaction Issues, Abhishek B. Vaidya

Open Access Theses

As the level of automation within an aircraft increases, the interactions between the pilot and autopilot play a crucial role in its proper operation. Issues with human machine interactions (HMI) have been cited as one of the main causes behind many aviation accidents. Due to the complexity of such interactions, it is challenging to identify all possible situations and develop the necessary contingencies. In this thesis, we propose a data-driven analysis tool to identify potential HMI issues in large-scale Flight Operational Quality Assurance (FOQA) dataset. The proposed tool is developed using a multi-level clustering framework, where a set of basic …


Enhancing The Campus Experience: Helping International Students To Adapt To North American Campus Life, Qiaoying Wang Apr 2016

Enhancing The Campus Experience: Helping International Students To Adapt To North American Campus Life, Qiaoying Wang

Open Access Theses

This thesis investigates how culture adaption topic can be applied to a design solution by enhancing international students experience on North American campus. Each year more than half a million international students enroll in American colleges and universities. Many will spend several years on a campus working toward their degree. Most of them arrive with clear academic goals, but they may have no clue what their social lives will be like. In that case, a common phenomenon that most of the international students need to get along with is called “Culture Shock”, which involves culture and academic adapting difficulties, limited …


A Study Of How Chinese Ink Painting Features Can Be Applied To 3d Scenes And Models In Real-Time Rendering, Muning Cao Apr 2016

A Study Of How Chinese Ink Painting Features Can Be Applied To 3d Scenes And Models In Real-Time Rendering, Muning Cao

Open Access Theses

Past research findings addressed mature techniques for non-photorealistic rendering. However, research findings indicate that there is little information dealing with efficient methods to simulate Chinese ink painting features in rendering 3D scenes. Considering that Chinese ink painting has achieved many worldwide awards, the potential to effectively and automatically develop 3D animations and games in this style indicates a need for the development of appropriate technology for the future market.

The goal of this research is about rendering 3D meshes in a Chinese ink painting style which is both appealing and realistic. Specifically, how can the output image appear similar to …


Gesture Based Non-Obstacle Interaction On Mobile Computing Devices For Dirty Working Environment, William B. Huynh Apr 2016

Gesture Based Non-Obstacle Interaction On Mobile Computing Devices For Dirty Working Environment, William B. Huynh

Open Access Theses

The dominant way of interacting with tablets, smartphones, or wearable devices are through touchscreen or touchpad, which requires the user to physically touch the device’s screen. However, in certain situation, for example, a dirty working environment, touching is not ideal or feasible. This study examined a new method that allows for a non-touch interaction by using the devices’ back camera along with simple gesture to simulate mouse clicking. Cameras are used to capture motion-based gestures coupled with object detection, achieving a non-touch interaction. With human subject evaluation, the researcher found that using the back camera on mobile devices for gesture …


A Faster Version Of Louvain Method For Community Detection For Efficient Modeling And Analytics Of Cyber Systems, Sunanda Vivek Shanbhaq Apr 2016

A Faster Version Of Louvain Method For Community Detection For Efficient Modeling And Analytics Of Cyber Systems, Sunanda Vivek Shanbhaq

Open Access Theses

Cyber networks are complex networks with various hosts forming the entities of the network and the communication between them forming the edges of the network. Most cyber networks exhibit a community structure. A community is a group of nodes that are densely connected with each other as compared to other nodes in the network. Representing an IP network in the form of communities helps in viewing the network from different levels of granularity and makes the visualization of the network cleaner and more pleasing to the eye. This will help significantly in cyber attack detection in large scale cyber networks. …