Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 61 - 74 of 74

Full-Text Articles in Physical Sciences and Mathematics

Increasing Dogma Scaling Through Clustering, Nathan Hyrum Ekstrom Apr 2008

Increasing Dogma Scaling Through Clustering, Nathan Hyrum Ekstrom

Theses and Dissertations

DOGMA is a distributed computing architecture developed at Brigham Young University. It makes use of idle computers to provide additional computing resources to applications, similar to Seti@home. DOGMA's ability to scale to large numbers of computers is hindered by its strict client-server architecture. Recent research with DOGMA has shown that introducing localized peer-to-peer downloading abilities enhances DOGMA's performance while reducing the amount of network and server usage. This thesis proposes to further extend the peer-to-peer abilities of DOGMA to include peering client server communication by creating dynamic clusters of clients. The client clusters aggregate their communication with only one client …


A Tool To Support Ontology Creation Based On Incremental Mini-Ontology Merging, Zonghui Lian Mar 2008

A Tool To Support Ontology Creation Based On Incremental Mini-Ontology Merging, Zonghui Lian

Theses and Dissertations

This thesis addresses the problem of tool support for semi-automatic ontology mapping and merging. Solving this problem contributes to ontology creation and evolution by relieving users from tedious and time-consuming work. This thesis shows that a tool can be built that will take a “mini-ontology” and a “growing ontology” as input and make it possible to produce manually, semi-automatically, or automatically an extended growing ontology as output. Characteristics of this tool include: (1) a graphical, interactive user interface with features that will allow users to map and merge ontologies, and (2) a framework supporting pluggable, semi-automatic, and automatic mapping and …


Improving Liquid State Machines Through Iterative Refinement Of The Reservoir, R David Norton Mar 2008

Improving Liquid State Machines Through Iterative Refinement Of The Reservoir, R David Norton

Theses and Dissertations

Liquid State Machines (LSMs) exploit the power of recurrent spiking neural networks (SNNs) without training the SNN. Instead, a reservoir, or liquid, is randomly created which acts as a filter for a readout function. We develop three methods for iteratively refining a randomly generated liquid to create a more effective one. First, we apply Hebbian learning to LSMs by building the liquid with spike-time dependant plasticity (STDP) synapses. Second, we create an eligibility based reinforcement learning algorithm for synaptic development. Third, we apply principles of Hebbian learning and reinforcement learning to create a new algorithm called separation driven synaptic modification …


Approximations With Improving Error Bounds For Makespan Minimization In Batch Manufacturing, Whitney Samuel Weyerman Mar 2008

Approximations With Improving Error Bounds For Makespan Minimization In Batch Manufacturing, Whitney Samuel Weyerman

Theses and Dissertations

Multipurpose batch manufacturing systems allow a suite of job types to be processed with a fixed set of machines. These types of systems are commonly found in chemical processing, as well as in computer systems and the service industry. In this thesis we consider the problem of sequencing jobs entering the manufacturing system in order to minimize makespan, or total time to complete processing of the jobs. We formulate this problem as a dynamic programming problem and illustrate the computational difficulty of solving this problem. We give a method for simulation of the system by representing each machine in the …


Error Sensor Strategies For Active Noise Control And Active Acoustic Equalization In A Free Field, Ryan T. Chester Mar 2008

Error Sensor Strategies For Active Noise Control And Active Acoustic Equalization In A Free Field, Ryan T. Chester

Theses and Dissertations

Several measurements may be used as error signals to determine how to appropriately control a sound field. These include pressure, particle velocity, energy density and intensity. In this thesis, numerical models are used to show which signals perform best in is free-field active noise control (ANC) using error sensors located in the near field of the sound sources. The second is equalization in a free field and a semi-free field. Minimized energy density total power output (MEDToPO) plots are developed; these indicate the maximum achievable attenuation for a chosen error sensor as a function of location. A global listening area …


Cpg: Closed Pseudonymous Groups, Reed S. Abbott Mar 2008

Cpg: Closed Pseudonymous Groups, Reed S. Abbott

Theses and Dissertations

Internet users generally feel their actions are anonymous, but this is often not the case. Users can be tracked and their actions logged for future analysis, which is not the desire of most users. Software and services exist which offer anonymity on the Internet when used correctly. Anonymity on the Internet is useful for many people including whistleblowers, dissidents, law enforcement, and the security conscious, but it can be abused. A user can act maliciously under the guise of anonymity without the fear of retribution. Thus, a level of administrative control over users is desirable, even in an anonymous system. …


Extending Web Application Development To The User-Editable Space, Brian S. Goodrich Mar 2008

Extending Web Application Development To The User-Editable Space, Brian S. Goodrich

Theses and Dissertations

The growth of the web increased dramatically when users were provided with applications that let them use just their browser to post and edit content on the World Wide Web. Offering users the ability to use their browser to create their own web applications, instead of just posting text and images, would cause another Internet evolution. This thesis describes the EXPPO system (Extensible Page Productions and Operations), a web application development environment for both end-users and technical-users. EXPPO leverages the end-user's previous experience with internet browsers by using a page based development experience or a Page Oriented Architecture. Because applications …


Improving Performance Of The Filtered-X Least Mean Square Algorithm For Active Control Of Noise Contatining Multiple Quasi-Stationary Tones, Stephan P. Lovstedt Mar 2008

Improving Performance Of The Filtered-X Least Mean Square Algorithm For Active Control Of Noise Contatining Multiple Quasi-Stationary Tones, Stephan P. Lovstedt

Theses and Dissertations

The Filtered-X Least-Mean-Square (FXLMS) algorithm is widely used in active noise control due to its robustness, simplicity, and ability to be implemented in real time. In a feedforward implementation of the FXLMS algorithm, a reference signal that is highly correlated with the noise to be controlled is filtered with an estimate of the transfer function of the secondary path. The convergence characteristics of the FXLMS algorithm have been well studied. A convergence parameter is used to optimize the convergence of the algorithm. However, the optimal value for the convergence parameter is frequency dependent. Thus for noise containing multiple tones at …


Putting The Web Services Specifications To Rest, Dan R. Olsen Mar 2008

Putting The Web Services Specifications To Rest, Dan R. Olsen

Theses and Dissertations

Web services have become a useful and effective way of sharing information over the World Wide Web. SOAP has become a popular way of providing Web services and has been the focus of the Web Services specifications. The Web Services specifications provide additional capabilities to Web Services such as security and policy exchange. Another popular form of Web services includes light-weight Web or RESTful Web services over HTTP. These light-weight Web services are currently not addressed by the Web Services specifications. In order to provide the same capabilities to RESTful Web services, the Web Services specifications will be used to …


Skill Evaluation In Women's Volleyball, Lindsay Walker Florence Mar 2008

Skill Evaluation In Women's Volleyball, Lindsay Walker Florence

Theses and Dissertations

The Brigham Young University Women's Volleyball Team recorded and rated all skills (pass, set, attack, etc.) and recorded rally outcomes (point for BYU, rally continues, point for opponent) for the entire 2006 home volleyball season. Only sequences of events occurring on BYU's side of the net were considered. Events followed one of these general patterns: serve-outcome, pass-set-attack-outcome, or block-dig-set-attack-outcome. These sequences of events were assumed to be first-order Markov chains where the quality of each contact depended only explicitly on the quality of the previous contact but not on contacts further removed in the sequence. We represented these sequences in …


A Bittorrent Proxy, Robert Brent Larsen Mar 2008

A Bittorrent Proxy, Robert Brent Larsen

Theses and Dissertations

BitTorrent is a peer-to-peer protocol useful for distributing large files over the Internet. Many organizations use BitTorrent to distribute their software in order to reduce client download time and reduce the load on their servers. While there is a lot of legitimate content available via BitTorrent, some organizations ban BitTorrent usage due to concerns over copyright infringement and the amount of bandwidth that peers can consume. A BitTorrent proxy will allow organizations to control those risks and allow its members to use the BitTorrent protocol for approved uses. It will allow the organization to control the files that are downloaded …


A Conceptual Model Of Groundwater Flow In Spring Valley, Nv, And Snake Valley, Nv-Ut, Jeremy Micheal Gillespie Feb 2008

A Conceptual Model Of Groundwater Flow In Spring Valley, Nv, And Snake Valley, Nv-Ut, Jeremy Micheal Gillespie

Theses and Dissertations

A geochemical study of major springs and wells in Spring Valley, Nevada, and Snake Valley, Utah-Nevada was initiated in response to the Clark, Lincoln and White Pine Counties Groundwater Development Project proposed by the South Nevada Water Authority (SNWA). Water budget estimates suggest that interbasin flow accounts for a significant portion (~25%) of the water budgets in Spring and Snake Valleys. Although interbasin flow is possible in some areas, alternative plausible explanations place significant uncertainty on water budget allocations. To examine the plausibility of local and interbasin flow paths the groundwater flow in Spring and Snake Valleys was evaluated using …


Simulation And Visualization Of Environments With Multidimensional Time, Luther A. Tychonievich Jan 2008

Simulation And Visualization Of Environments With Multidimensional Time, Luther A. Tychonievich

Theses and Dissertations

This work introduces the notion of computational hypertime, or the simulation and visualization of hypothetical environments possessing multidimensional time. An overview of hypertime is provided,including an intuitive visualization paradigm and a discussion of the failure of common simulation techniques when extended to include multidimensional time. A condition for differential equations describing hypertime motion to be amenable to standard time-iterative simulation techniques is provided,but is not satisfied by any known model of physics. An alternate simulation algorithm involving iterative refinement of entire equations of motion is presented,with an example implementation to solve elastic collisions in hypertime. An artificial intelligence algorithm for …


Wireless Authentication Using Remote Passwords, Andrew S. Harding Jan 2008

Wireless Authentication Using Remote Passwords, Andrew S. Harding

Theses and Dissertations

Current authentication methods for wireless networks are difficult to maintain. They often rely on globally shared secrets or heavyweight public-key infrastructure. Wireless Authentication using Remote Passwords (WARP) mitigates authentication woes by providing usable mechanisms for both administrators and end-users. Administrators grant access by simply adding users' personal messaging identifiers (e.g., email addresses, IM handles, cell phone numbers) to an access control list. There is no need to store passwords or other account information. Users simply prove ownership of their authorized identifier to obtain wireless access.