Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 97

Full-Text Articles in Physical Sciences and Mathematics

Hybrid Solvers For The Boolean Satisfiability Problem: An Exploration, Nicole Nelson Dec 2012

Hybrid Solvers For The Boolean Satisfiability Problem: An Exploration, Nicole Nelson

Theses and Dissertations

The Boolean Satisfiability problem (SAT) is one of the most extensively researched NP-complete problems in Computer Science. This thesis focuses on the design of feasible solvers for this problem. A SAT problem instance is a formula in propositional logic. A SAT solver attempts to find a solution for the formula. Our research focuses on a newer solver paradigm, hybrid solvers, where two solvers are combined in order to gain the benefits from both solvers in the search for a solution. Our hybrid solver, AmbSAT, combines two well-known solvers: the systematic Davis-Putnam-Logemann-Loveland solver (DPLL) and the stochastic WalkSAT solver. AmbSAT's design …


Website Adaptive Navigation Effects On User Experiences, James C. Speirs Dec 2012

Website Adaptive Navigation Effects On User Experiences, James C. Speirs

Theses and Dissertations

The information search process within a website can often be frustrating and confusing for website visitors. Navigational structures are often complex and multitiered, hiding links with several layers of navigation that user's might be interested in. Poor navigation causes user frustration. Adaptive navigation can be used to improve the user's navigational experience by flattening the navigational structure and reducing the number of accessible links to only those that the user would be interested in. This examines the effects on a user's navigational experience, of using adaptive navigation as the main navigational structure on a website. This study measured these effects …


Necessary And Sufficient Informativity Conditions For Robust Network Reconstruction Using Dynamical Structure Functions, Vasu Nephi Chetty Dec 2012

Necessary And Sufficient Informativity Conditions For Robust Network Reconstruction Using Dynamical Structure Functions, Vasu Nephi Chetty

Theses and Dissertations

Dynamical structure functions were developed as a partial structure representation of linear time-invariant systems to be used in the reconstruction of biological networks. Dynamical structure functions contain more information about structure than a system's transfer function, while requiring less a priori information for reconstruction than the complete computational structure associated with the state space realization. Early sufficient conditions for network reconstruction with dynamical structure functions severely restricted the possible applications of the reconstruction process to networks where each input independently controls a measured state. The first contribution of this thesis is to extend the previously established sufficient conditions to incorporate …


Health Care Informatics Support Of A Simulated Study, Zeinab Salari Far Dec 2012

Health Care Informatics Support Of A Simulated Study, Zeinab Salari Far

Theses and Dissertations

The objective of this project is to assess the value of REDCap (Harris, 2009) by conducting a simulated breast cancer clinical trial and demonstration. REDCap is a free, secure, web-based application designed to support data capture for research studies. To assess REDCap's value, we conducted a simulation of a clinical trial study designed to compare the use of two new technologies for breast cancer diagnosis and treatment with current best practice breast cancer diagnosis and treatment. We call the trial, "Real-Time Operating Room BC Diagnostic Treatment (RORBCDT)". The RORBCDT clinical trial is designed to assess the value of a new …


Data Acquisition From Cemetery Headstones, Cameron Smith Christiansen Nov 2012

Data Acquisition From Cemetery Headstones, Cameron Smith Christiansen

Theses and Dissertations

Data extraction from engraved text is discussed rarely, and nothing in the open literature discusses data extraction from cemetery headstones. Headstone images present unique challenges such as engraved or embossed characters (causing inner-character shadows), low contrast with the background, and significant noise due to inconsistent stone texture and weathering. Current systems for extracting text from outdoor environments (billboards, signs, etc.) make assumptions (i.e. clean and/or consistently-textured background and text) that fail when applied to the domain of engraved text. Additionally, the ability to extract the data found on headstones is of great historical value. This thesis describes a novel and …


Algorithmically Flexible Style Composition Through Multi-Objective Fitness Functions, Skyler James Murray Nov 2012

Algorithmically Flexible Style Composition Through Multi-Objective Fitness Functions, Skyler James Murray

Theses and Dissertations

Creating a fitness function for music is largely subjective and dependent on a programmer's personal tastes or goals. Previous attempts to create musical fitness functions for use in genetic algorithms lack scope or are prejudiced to a certain genre of music. They also suffer the limitation of producing music only in the strict style determined by the programmer. We show in this paper that musical feature extractors that avoid the challenges of qualitative judgment enable creation of a multi-objective function for direct music production. Multi-objective fitness functions enable creation of music with varying identifiable styles. With this system we produced …


A Cps-Like Transformation Of Continuation Marks, Kimball Richard Germane Nov 2012

A Cps-Like Transformation Of Continuation Marks, Kimball Richard Germane

Theses and Dissertations

Continuation marks are a programming language feature which generalize stack inspection. Despite its usefulness, this feature has not been adopted by languages which rely on stack inspection, e.g., for dynamic security checks. One reason for this neglect may be that continuation marks do not yet enjoy a transformation to the plain λ-calculus which would allow higher-order languages to provide continuation marks at little cost. We present a CPS-like transformation from the call-by-value λ-calculus augmented with continuation marks to the pure call-by-value λ-calculus. We discuss how this transformation simplifies the construction of compilers which treat continuation marks correctly. We document an …


Bayesian Test Analytics For Document Collections, Daniel David Walker Nov 2012

Bayesian Test Analytics For Document Collections, Daniel David Walker

Theses and Dissertations

Modern document collections are too large to annotate and curate manually. As increasingly large amounts of data become available, historians, librarians and other scholars increasingly need to rely on automated systems to efficiently and accurately analyze the contents of their collections and to find new and interesting patterns therein. Modern techniques in Bayesian text analytics are becoming wide spread and have the potential to revolutionize the way that research is conducted. Much work has been done in the document modeling community towards this end,though most of it is focused on modern, relatively clean text data. We present research for improved …


Javalite - An Operational Semantics For Modeling Java Programs, Saint Oming'o Wesonga Nov 2012

Javalite - An Operational Semantics For Modeling Java Programs, Saint Oming'o Wesonga

Theses and Dissertations

Java is currently a widely used programming language. However, there is no formal definition of Java's semantics. Consequently, Java code does not have a universal meaning. This work discusses recent attempts to formalize Java and presents a new formalism of Java called Javalite. In contrast to common approaches to formalization, Javalite is purely syntactic in its definition. Syntactic operational semantics use the structure of the language to define its behavior. Javalite models most Java features with notable exceptions being threads, reflection, and interfaces. This work presents an executable semi-formal model of Javalite in PLT Redex. Being executable means that Javalite …


Qos Në Infrastrukturën E Kgjk-Së, Gëzim Kurshumliu Nov 2012

Qos Në Infrastrukturën E Kgjk-Së, Gëzim Kurshumliu

Theses and Dissertations

Cilësia e shërbimeve të ofruara nga një rrjete varet nga shumë faktorë. Megjithëse prodhuesit e pajisjeve të TI-së vazhdimisht ofrojnë zgjidhje të ndryshme për të rritur cilësinë e ofrimit të shërbimeve përmes TI-së. Është e pamundshme që me hovin që ka teknologjia informative ditëve të sotme, një organizatë të furnizohet në vazhdimësi me çdo pajisje të re që ofrojnë prodhuesit e tyre. Ajo që është në fokus edhe në këtë punim është pikërisht adresimi i mundësive që ofrojnë prodhuesit e njohur botërorë të TI-së për trajtimin e informatave që rrjedhin në rrjetë, gjithnjë duke i bërë ato të sillen në …


Iptv Implementation In Kosovo Infrastructure, Burim Krasniqi Nov 2012

Iptv Implementation In Kosovo Infrastructure, Burim Krasniqi

Theses and Dissertations

Process of Routing information is one of the essential processes ranging from smaller networks communication. With the growth and development of computer networks in the size and complexity also the issue of IPTV as a network configuration which enables transport of voice and data through DSL (Digital Subscriber Line) technology to the customer premises, today is largely deployed. These services now days are provided also in Kosovo’s network through xDSL technologies, supported by IP/Ethernet optical core network and IP based switching/routing infrastructure. The readiness of already implemented NGN platform in Kosovo’s telecommunication network and steps, which should be taken related …


Motion Capture Of Character Interactions With A Rope, Bryce Zachary Porter Oct 2012

Motion Capture Of Character Interactions With A Rope, Bryce Zachary Porter

Theses and Dissertations

We present a solution to animating interactions between characters and thin, non-rigid bodies using a passive optical motion capture system. Prior work in human body motion capture can accurately recreate human motion but this work is not adequate because it does not allow for interactions with a non-rigid body. Prior work in face and cloth motion capture handles non-rigid planes but rope is better handled with a curved spline rather than a curved plane. The segmented motion is in the form of un-indexed motion capture data. After segmenting the motion of the thin, non-rigid body and the human character the …


3g 3rd Generation Of Mobile Telecommunications Technology, Arben Pllana Oct 2012

3g 3rd Generation Of Mobile Telecommunications Technology, Arben Pllana

Theses and Dissertations

Qe ditët ose jeta, të jetë më e rehatshme, më e lehtë, fleksibile dhe kompakte me sistemet elektronike apo kompjuterëve hulumtimet e vazhdueshme po ndodhin. Si rezultat i kësaj teknologjia e re në mënyre te shpejtë është duke u futur në përdorim dhe teknologjia e mëparshme po bëhet gjithnjë me e vjetërsuar.

Për të mbijetuar në botë ne jemi të detyruar për të përshtatur këto teknologji të reja, përndryshe ne do të jemi shumë me prapa se konkurrentët tanë. 3rd-generation mobile technology (3G) është gjenerata e tretë e standardeve të telefonave mobil dhe të teknologjisë. Second and a half generation …


Implementimi I Standardeve Të Sql-It Nga Oracle Dhe Ms Sql Server, Besart Pllana Oct 2012

Implementimi I Standardeve Të Sql-It Nga Oracle Dhe Ms Sql Server, Besart Pllana

Theses and Dissertations

Duke qenë dëshmitarë të zhvillimeve të shpejta në lëmin e Teknologjisë Informative dhe duke ditur se sa esenciale janë Sistemet e Bazës së të Dhënave ne këto zhvillime, kompani të ndryshme softuerike në vazhdimësi janë marrë me zhvillime të produkteve softuerike konkurruese të kësaj natyre. Në këtë frymë, që nga dalja në përdorim për herë të parë në vitet e 1970-ta, SQL (ang. Strunctured Query Language) ka ecur në hapë me vazhdën e zhvillimeve në lëmin e Teknologjisë Informative. Kompani të ndryshme në mënyra të ndryshme janë marrë me zhvillimin e SQL dhe si rrjedhojë kemi në përdorim dialekte të …


Implementimi I Private Cloud Computing, Elvin Mala Oct 2012

Implementimi I Private Cloud Computing, Elvin Mala

Theses and Dissertations

No abstract provided.


Shërbimet Centrexe Dhe Aplikimi I Tyre Në Kosovë, Esad Simnica Oct 2012

Shërbimet Centrexe Dhe Aplikimi I Tyre Në Kosovë, Esad Simnica

Theses and Dissertations

Në këtë punim diplome diskutohet shërbimi Centrex që është emërtim për shërbimet centrexe të integruar në sistemin komutues digjital EWSD. Diskutimi është shtrirë në shtatë kapituj. Kapitulli i parë është një hyrje për shërbimin Centrex, përkatësisht fillimet e këtij shërbimi. Në kapitullin e dytë diskutohen përparësitë e shërbimit Centrex si dhe rreth përdoruesëve të këtij shërbimi. Në kapitullin e tretë diskutohen komponentet si dhe funksionet e këtij shërbimi. Në kapitullin e katërt diskutohen grupet e shërbimeve të avancuara, të cilat shërbime u ipen të gjithë anëtarëve të grupit Centrex. Këtu janë diskutuar funksionet themelore (rreth strukturës së grupit Centrex), tarifimi …


Implementing Virtual Privat Network In Small To Medium Sized Enterprises, Fatos Xhemajli Oct 2012

Implementing Virtual Privat Network In Small To Medium Sized Enterprises, Fatos Xhemajli

Theses and Dissertations

Nowadays enterprises rely heavily on computer systems for storing and processing vital information, IT plays a major role in their businesses therefore all these systems must be safe and reliable. Computer networks are a major part of all these technologies; they provide the essential link between them, connecting them into one unified information network. However, the main requirement in all this is to implement a proper security system that will keep all these information secure and protect the privacy. Small or medium-sized enterprises need to have their branches interconnected with a rapid, reliable, cost-effective access to their resources. The ability …


It Infrastructure Recovery Strategies, Flamur Gogolli Oct 2012

It Infrastructure Recovery Strategies, Flamur Gogolli

Theses and Dissertations

By taking into consideration the importance of IT services and servers in everyday business processes, the availability of these services is crucial for the functionality of the business. Given the importance that today’s technology gives to the IT, the uptime of these services can be translated to the “uptime of the business". Thus, a Recovery Strategy of IT Services is highly crucial for an IT Departments everyday operations, as disasters are naturally unpredictable and unavoidable. This thesis as the title states will produce and explain a practical approach to a Recovery Strategy for an IT Infrastructure by using a case …


Sistemet E Komunikimit Mobil 4g, Kreshnik Spahiu Oct 2012

Sistemet E Komunikimit Mobil 4g, Kreshnik Spahiu

Theses and Dissertations

Ky punim ofron një pasqyrë të nivelit të lartë të zhvillimit, evoluimit te sistemeve te komunikimi celular nga gjenerata e parë qe njihet edhe si 1G e deri tek gjenerata e 4G e ditëve te sotme, me theks te veçante ne gjeneratën e katërt apo te njohur si 4G, arkitekturën, shërbimet qe gjejnë aplikim ne ketë gjenerate. Sistemet e Komunikimi Celular kane bere revolucion ne mënyrën se si njerëzit komunikojnë duke bashkuar komunikimin dhe lëvizshmërinë. Një rrugë të gjatë për një kohë shumë të shkurtër ka arritur në Historia e tel. Evolucioni i teknologjive wireless tani ka arritur gjeneratën e …


Implementing Ospf For Isp, Milot Cakaj Oct 2012

Implementing Ospf For Isp, Milot Cakaj

Theses and Dissertations

Routing protocol has a vital role in the modern communication networks. As there are various routing protocols available, it is very important to select a right protocol among them. This selection depends on several parameters such as network convergence time, network scalability and bandwidth requirements. Each of the different routing protocols, in the context of routing protocol performance, has different architecture, adaptability, route processing delays and convergence capabilities. Among them, Open Shortest Path First (OSPF) is considered as one of the pre-eminent routing protocols for large networks. OSPF is dynamic routing protocols used in large networks to disseminate network topology …


Kalimi Prej Sistemit Gsm Në Gprs, Muharrem Muzaqi Oct 2012

Kalimi Prej Sistemit Gsm Në Gprs, Muharrem Muzaqi

Theses and Dissertations

GSM (Global System for Mobile Communications me origjine prej Groupe Spécial Mobile) është standardi me i popullarizuar për sistemet telefonisë celulare ne bote, mbretëron si teknologjia më e përdorur gjerësisht në botën telefonike celulare.

Global System for mobile (GSM) është gjenerata e dyte e celulareve e zhvilluar për shërbime të zërit dhe te dhënave duke përdorur modulimin digjital dhe njekohesiht është sistem digjital i telefonive mobile që gjerësisht përdoret në Evropë dhe në pjese të tjera te botes.

Ky system përdore variacione te TDMA (Time Division Multiple Access) qe perdoret në tri teknologjitë e telefonave wireless digjital (TDMA, GSM dhe …


Secure Virtualization In Cloud Computing, Selami Ibishi Oct 2012

Secure Virtualization In Cloud Computing, Selami Ibishi

Theses and Dissertations

Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers. One of the consequences of moving data processing and storage off company premises is that organizations have less control over their infrastructure. As a result, cloud service (CS) clients must trust that the CS provider is able to protect their data and infrastructure from both external and internal attacks. Currently however, such trust can only rely on organizational processes declared by the CS provider and can not be remotely verified and validated …


Programimi Paralel Me .Net 4.0, Valon Hoti Oct 2012

Programimi Paralel Me .Net 4.0, Valon Hoti

Theses and Dissertations

Kjo temë paraqet vetëm një pasqyrë shumë të shkurtër nga tema e gjërë e cila përdoret në fushën e llogaritjeve paralele(Parallel Computing) për treguar rreth risive të cilat e mundësojnë programimin paralel duke përdorur Visual Studio 2010 me Microsoft NetFramework 4.0 e më tej. Si e tillë, paraqet vetëm një vështrim nga aspekti teknik informativ i programimit paralel e cila është menduar për dikë për t’u njoftuar me rregullat e programimit paralel përmes Visual Studio 2010 duke përdorur gjuhën programuese C#. Këtu më shumë do të tregohet koncepti i programimit si dhe dallimet në mes të programimit paralel dhe programimit …


A Glyph And Animation-Based Visualization System For Evaluation And Comparison Of Soccer Players, Edward Burns Sep 2012

A Glyph And Animation-Based Visualization System For Evaluation And Comparison Of Soccer Players, Edward Burns

Theses and Dissertations

The dimensionality of soccer statistics relating to both player and goalkeeper specific data can be difficult to interpret. Attempting to formulate an analysis of large sums of soccer statistics can be extremely challenging if the data is not presented graphically. As a result, we developed an application, titled Soccer Scoop, which provides two separate visualizations that can aid a soccer team manager. With this application, a team manager can compare two players on different teams, analyze a particular player before signing them to a contract, measure the performance of a particular player at different positions, generate practice exercises, and determine …


Secure Browser-Based Instant Messaging, Christopher Douglas Robison Sep 2012

Secure Browser-Based Instant Messaging, Christopher Douglas Robison

Theses and Dissertations

Instant messaging is a popular form of communication over the Internet. Statistics show that instant messaging has overtaken email in popularity. Traditionally, instant messaging has consisted of a desktop client communicating with other clients via an instant messaging service provider. However, instant messaging solutions are starting to become available in the web browser–services like Google Talk, Live Messenger and Facebook. Despite the work done by researchers to secure instant messaging networks, little work has been done to secure instant messaging in the browser. We present secure browser-based instant messaging overlays as a means to enable convenient, secure communication in existing …


Creating Network Attack Priority Lists By Analyzing Email Traffic Using Predefined Profiles, Eric J. Merrit Sep 2012

Creating Network Attack Priority Lists By Analyzing Email Traffic Using Predefined Profiles, Eric J. Merrit

Theses and Dissertations

Networks can be vast and complicated entities consisting of both servers and workstations that contain information sought by attackers. Searching for specific data in a large network can be a time consuming process. Vast amounts of data either passes through or is stored by various servers on the network. However, intermediate work products are often kept solely on workstations. Potential high value targets can be passively identified by comparing user email traffic against predefined profiles. This method provides a potentially smaller footprint on target systems, less human interaction, and increased efficiency of attackers. Collecting user email traffic and comparing each …


Utilizing Graphics Processing Units For Network Anomaly Detection, Jonathan D. Hersack Sep 2012

Utilizing Graphics Processing Units For Network Anomaly Detection, Jonathan D. Hersack

Theses and Dissertations

This research explores the benefits of using commonly-available graphics processing units (GPUs) to perform classification of network traffic using supervised machine learning algorithms. Two full factorial experiments are conducted using a NVIDIA GeForce GTX 280 graphics card. The goal of the first experiment is to create a baseline for the relative performance of the CPU and GPU implementations of artificial neural network (ANN) and support vector machine (SVM) detection methods under varying loads. The goal of the second experiment is to determine the optimal ensemble configuration for classifying processed packet payloads using the GPU anomaly detector. The GPU ANN achieves …


Effects Of Architecture On Information Leakage Of A Hardware Advanced Encryption Standard Implementation, Eric A. Koziel Sep 2012

Effects Of Architecture On Information Leakage Of A Hardware Advanced Encryption Standard Implementation, Eric A. Koziel

Theses and Dissertations

Side-channel analysis (SCA) is a threat to many modern cryptosystems. Many countermeasures exist, but are costly to implement and still do not provide complete protection against SCA. A plausible alternative is to design the cryptosystem using architectures that are known to leak little information about the cryptosystem's operations. This research uses several common primitive architectures for the Advanced Encryption Standard (AES) and assesses the susceptibility of the full AES system to side-channel attack for various primitive configurations. A combined encryption/decryption core is also evaluated to determine if variation of high-level architectures affects leakage characteristics. These different configurations are evaluated under …


Automatic Content-Based Temporal Alignment Of Image Sequences With Varying Spatio-Temporal Resolution, Samuel R. Ogden Sep 2012

Automatic Content-Based Temporal Alignment Of Image Sequences With Varying Spatio-Temporal Resolution, Samuel R. Ogden

Theses and Dissertations

Many applications use multiple cameras to simultaneously capture imagery of a scene from different vantage points on a rigid, moving camera system over time. Multiple cameras often provide unique viewing angles but also additional levels of detail of a scene at different spatio-temporal resolutions. However, in order to benefit from this added information the sources must be temporally aligned. As a result of cost and physical limitations it is often impractical to synchronize these sources via an external clock device. Most methods attempt synchronization through the recovery of a constant scale factor and offset with respect to time. This limits …


Distance Vector Routing Protocols Vs Link State, Fidan Vërbovci Sep 2012

Distance Vector Routing Protocols Vs Link State, Fidan Vërbovci

Theses and Dissertations

Procesi i Rutimit të informacioneve është njëri nga proceset esenciale duke filluar nga rrjetet më të vogla komunikuese. Me rritjen dhe zhvillimin e rrjetave kompjuterike ne madhësi dhe për nga kompleksiviteti i tyre edhe çështjet e rutimit te informacioneve apo konfigurimi i rrugëve se kah duhet të shkoj ai informacion bëhet me delikat. Në këtë mënyrë duhet tu kushtohet shumë kujdese aftësive për menaxhimin e rrjetave të kompjuterëve (qofshin ato rrjeta të vogla, mesme apo të mëdha) , dizajnimin e tyre si dhe mirëmbajtjes së tyre (Network troubleshooting). Për administrimin e rrjetave te kompjuterëve dhe sistemeve te distribuimit nevojiten ekspert …