Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (33)
- Earth Sciences (10)
- Geology (10)
- Biochemistry (8)
- Biochemistry, Biophysics, and Structural Biology (8)
-
- Chemistry (8)
- Life Sciences (8)
- Mathematics (8)
- Statistics and Probability (8)
- Astrophysics and Astronomy (7)
- Physics (7)
- Communication (1)
- Communication Technology and New Media (1)
- Databases and Information Systems (1)
- Engineering (1)
- Manufacturing (1)
- Mechanical Engineering (1)
- Social and Behavioral Sciences (1)
- Keyword
-
- Computer (3)
- Information retrieval (3)
- Internet (3)
- Peer-to-peer (3)
- Algorithm (2)
-
- Artificial intelligence (2)
- Authentication (2)
- BYU (2)
- Basin and Range (2)
- BitTorrent (2)
- Conceptual model (2)
- Energy density (2)
- Groundwater (2)
- Machine learning (2)
- Model checking (2)
- Ontology (2)
- Tropical (2)
- 3d models (1)
- ADtree (1)
- AI (1)
- ANC (1)
- APV (1)
- Ab initio (1)
- Absorption (1)
- Acoustic (1)
- Acoustics (1)
- Active Noise Control (1)
- Active learning (1)
- Active noise control (1)
- Active sound control (1)
Articles 61 - 74 of 74
Full-Text Articles in Physical Sciences and Mathematics
Increasing Dogma Scaling Through Clustering, Nathan Hyrum Ekstrom
Increasing Dogma Scaling Through Clustering, Nathan Hyrum Ekstrom
Theses and Dissertations
DOGMA is a distributed computing architecture developed at Brigham Young University. It makes use of idle computers to provide additional computing resources to applications, similar to Seti@home. DOGMA's ability to scale to large numbers of computers is hindered by its strict client-server architecture. Recent research with DOGMA has shown that introducing localized peer-to-peer downloading abilities enhances DOGMA's performance while reducing the amount of network and server usage. This thesis proposes to further extend the peer-to-peer abilities of DOGMA to include peering client server communication by creating dynamic clusters of clients. The client clusters aggregate their communication with only one client …
A Tool To Support Ontology Creation Based On Incremental Mini-Ontology Merging, Zonghui Lian
A Tool To Support Ontology Creation Based On Incremental Mini-Ontology Merging, Zonghui Lian
Theses and Dissertations
This thesis addresses the problem of tool support for semi-automatic ontology mapping and merging. Solving this problem contributes to ontology creation and evolution by relieving users from tedious and time-consuming work. This thesis shows that a tool can be built that will take a “mini-ontology” and a “growing ontology” as input and make it possible to produce manually, semi-automatically, or automatically an extended growing ontology as output. Characteristics of this tool include: (1) a graphical, interactive user interface with features that will allow users to map and merge ontologies, and (2) a framework supporting pluggable, semi-automatic, and automatic mapping and …
Improving Liquid State Machines Through Iterative Refinement Of The Reservoir, R David Norton
Improving Liquid State Machines Through Iterative Refinement Of The Reservoir, R David Norton
Theses and Dissertations
Liquid State Machines (LSMs) exploit the power of recurrent spiking neural networks (SNNs) without training the SNN. Instead, a reservoir, or liquid, is randomly created which acts as a filter for a readout function. We develop three methods for iteratively refining a randomly generated liquid to create a more effective one. First, we apply Hebbian learning to LSMs by building the liquid with spike-time dependant plasticity (STDP) synapses. Second, we create an eligibility based reinforcement learning algorithm for synaptic development. Third, we apply principles of Hebbian learning and reinforcement learning to create a new algorithm called separation driven synaptic modification …
Approximations With Improving Error Bounds For Makespan Minimization In Batch Manufacturing, Whitney Samuel Weyerman
Approximations With Improving Error Bounds For Makespan Minimization In Batch Manufacturing, Whitney Samuel Weyerman
Theses and Dissertations
Multipurpose batch manufacturing systems allow a suite of job types to be processed with a fixed set of machines. These types of systems are commonly found in chemical processing, as well as in computer systems and the service industry. In this thesis we consider the problem of sequencing jobs entering the manufacturing system in order to minimize makespan, or total time to complete processing of the jobs. We formulate this problem as a dynamic programming problem and illustrate the computational difficulty of solving this problem. We give a method for simulation of the system by representing each machine in the …
Error Sensor Strategies For Active Noise Control And Active Acoustic Equalization In A Free Field, Ryan T. Chester
Error Sensor Strategies For Active Noise Control And Active Acoustic Equalization In A Free Field, Ryan T. Chester
Theses and Dissertations
Several measurements may be used as error signals to determine how to appropriately control a sound field. These include pressure, particle velocity, energy density and intensity. In this thesis, numerical models are used to show which signals perform best in is free-field active noise control (ANC) using error sensors located in the near field of the sound sources. The second is equalization in a free field and a semi-free field. Minimized energy density total power output (MEDToPO) plots are developed; these indicate the maximum achievable attenuation for a chosen error sensor as a function of location. A global listening area …
Cpg: Closed Pseudonymous Groups, Reed S. Abbott
Cpg: Closed Pseudonymous Groups, Reed S. Abbott
Theses and Dissertations
Internet users generally feel their actions are anonymous, but this is often not the case. Users can be tracked and their actions logged for future analysis, which is not the desire of most users. Software and services exist which offer anonymity on the Internet when used correctly. Anonymity on the Internet is useful for many people including whistleblowers, dissidents, law enforcement, and the security conscious, but it can be abused. A user can act maliciously under the guise of anonymity without the fear of retribution. Thus, a level of administrative control over users is desirable, even in an anonymous system. …
Extending Web Application Development To The User-Editable Space, Brian S. Goodrich
Extending Web Application Development To The User-Editable Space, Brian S. Goodrich
Theses and Dissertations
The growth of the web increased dramatically when users were provided with applications that let them use just their browser to post and edit content on the World Wide Web. Offering users the ability to use their browser to create their own web applications, instead of just posting text and images, would cause another Internet evolution. This thesis describes the EXPPO system (Extensible Page Productions and Operations), a web application development environment for both end-users and technical-users. EXPPO leverages the end-user's previous experience with internet browsers by using a page based development experience or a Page Oriented Architecture. Because applications …
Improving Performance Of The Filtered-X Least Mean Square Algorithm For Active Control Of Noise Contatining Multiple Quasi-Stationary Tones, Stephan P. Lovstedt
Improving Performance Of The Filtered-X Least Mean Square Algorithm For Active Control Of Noise Contatining Multiple Quasi-Stationary Tones, Stephan P. Lovstedt
Theses and Dissertations
The Filtered-X Least-Mean-Square (FXLMS) algorithm is widely used in active noise control due to its robustness, simplicity, and ability to be implemented in real time. In a feedforward implementation of the FXLMS algorithm, a reference signal that is highly correlated with the noise to be controlled is filtered with an estimate of the transfer function of the secondary path. The convergence characteristics of the FXLMS algorithm have been well studied. A convergence parameter is used to optimize the convergence of the algorithm. However, the optimal value for the convergence parameter is frequency dependent. Thus for noise containing multiple tones at …
Putting The Web Services Specifications To Rest, Dan R. Olsen
Putting The Web Services Specifications To Rest, Dan R. Olsen
Theses and Dissertations
Web services have become a useful and effective way of sharing information over the World Wide Web. SOAP has become a popular way of providing Web services and has been the focus of the Web Services specifications. The Web Services specifications provide additional capabilities to Web Services such as security and policy exchange. Another popular form of Web services includes light-weight Web or RESTful Web services over HTTP. These light-weight Web services are currently not addressed by the Web Services specifications. In order to provide the same capabilities to RESTful Web services, the Web Services specifications will be used to …
Skill Evaluation In Women's Volleyball, Lindsay Walker Florence
Skill Evaluation In Women's Volleyball, Lindsay Walker Florence
Theses and Dissertations
The Brigham Young University Women's Volleyball Team recorded and rated all skills (pass, set, attack, etc.) and recorded rally outcomes (point for BYU, rally continues, point for opponent) for the entire 2006 home volleyball season. Only sequences of events occurring on BYU's side of the net were considered. Events followed one of these general patterns: serve-outcome, pass-set-attack-outcome, or block-dig-set-attack-outcome. These sequences of events were assumed to be first-order Markov chains where the quality of each contact depended only explicitly on the quality of the previous contact but not on contacts further removed in the sequence. We represented these sequences in …
A Bittorrent Proxy, Robert Brent Larsen
A Bittorrent Proxy, Robert Brent Larsen
Theses and Dissertations
BitTorrent is a peer-to-peer protocol useful for distributing large files over the Internet. Many organizations use BitTorrent to distribute their software in order to reduce client download time and reduce the load on their servers. While there is a lot of legitimate content available via BitTorrent, some organizations ban BitTorrent usage due to concerns over copyright infringement and the amount of bandwidth that peers can consume. A BitTorrent proxy will allow organizations to control those risks and allow its members to use the BitTorrent protocol for approved uses. It will allow the organization to control the files that are downloaded …
A Conceptual Model Of Groundwater Flow In Spring Valley, Nv, And Snake Valley, Nv-Ut, Jeremy Micheal Gillespie
A Conceptual Model Of Groundwater Flow In Spring Valley, Nv, And Snake Valley, Nv-Ut, Jeremy Micheal Gillespie
Theses and Dissertations
A geochemical study of major springs and wells in Spring Valley, Nevada, and Snake Valley, Utah-Nevada was initiated in response to the Clark, Lincoln and White Pine Counties Groundwater Development Project proposed by the South Nevada Water Authority (SNWA). Water budget estimates suggest that interbasin flow accounts for a significant portion (~25%) of the water budgets in Spring and Snake Valleys. Although interbasin flow is possible in some areas, alternative plausible explanations place significant uncertainty on water budget allocations. To examine the plausibility of local and interbasin flow paths the groundwater flow in Spring and Snake Valleys was evaluated using …
Simulation And Visualization Of Environments With Multidimensional Time, Luther A. Tychonievich
Simulation And Visualization Of Environments With Multidimensional Time, Luther A. Tychonievich
Theses and Dissertations
This work introduces the notion of computational hypertime, or the simulation and visualization of hypothetical environments possessing multidimensional time. An overview of hypertime is provided,including an intuitive visualization paradigm and a discussion of the failure of common simulation techniques when extended to include multidimensional time. A condition for differential equations describing hypertime motion to be amenable to standard time-iterative simulation techniques is provided,but is not satisfied by any known model of physics. An alternate simulation algorithm involving iterative refinement of entire equations of motion is presented,with an example implementation to solve elastic collisions in hypertime. An artificial intelligence algorithm for …
Wireless Authentication Using Remote Passwords, Andrew S. Harding
Wireless Authentication Using Remote Passwords, Andrew S. Harding
Theses and Dissertations
Current authentication methods for wireless networks are difficult to maintain. They often rely on globally shared secrets or heavyweight public-key infrastructure. Wireless Authentication using Remote Passwords (WARP) mitigates authentication woes by providing usable mechanisms for both administrators and end-users. Administrators grant access by simply adding users' personal messaging identifiers (e.g., email addresses, IM handles, cell phone numbers) to an access control list. There is no need to store passwords or other account information. Users simply prove ownership of their authorized identifier to obtain wireless access.