Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Physical Sciences and Mathematics

Mapping Reality Into Virtual Worlds, Josh Mcfarlane Dec 2008

Mapping Reality Into Virtual Worlds, Josh Mcfarlane

Computer Science and Computer Engineering Undergraduate Honors Theses

As virtual worlds become more prevalent, they become increasingly useful as a means of information dissemination. This thesis examines the possible connections between real world objects and their virtual world counterparts. We look at how, by attaching sensors to an object, or by using a smart object with embedded sensors, the information can be relayed to a server. From this information, it will be possible to create a duplicate object in the virtual world and have it mirror the real world object in terms of state and movement. Almost all current solutions for remotely viewing a room or area are …


Steganography In Ipv6, Barret Miller Dec 2008

Steganography In Ipv6, Barret Miller

Computer Science and Computer Engineering Undergraduate Honors Theses

Steganography is the process of hiding a secret message within another message such that it is difficult to detect the presence of the secret message. In other words, the existence of the secret message is hidden. A covert channel refers to the actual medium that is used to communicate the information such as a message, image, or file. This honors thesis uses steganography within the source address fields of Internet Protocol Version 6 (IPv6) packets to create a covert channel through which clandestine messages are passed from one party to another. A fully functional computer program was designed and written …


Service Oriented Transitive Closure Solution, Jonathan Baran Aug 2008

Service Oriented Transitive Closure Solution, Jonathan Baran

Computer Science and Computer Engineering Undergraduate Honors Theses

The goal of this project is a service based solution that utilizes parallel and distributed processing algorithms to solve the transitive closure problem for a large dataset. A dataset may be view conceptually as a table in a database, with a physical structure representing a file containing a sequence of records and fields. Two records are said to be transitively related if and only if they are directly related due to sharing of one or more specific fields, or a sequence may be made from one record to the other under the condition that all intermediate entries are related the …


Location-Based Hashing For Querying And Searching, Felix Ching May 2008

Location-Based Hashing For Querying And Searching, Felix Ching

Computer Science and Computer Engineering Undergraduate Honors Theses

The rapidly growing information technology in modern days demands an efficient searching scheme to search for desired data. Locality Sensitive Hashing (LSH) is a method for searching similar data in a database. LSH achieves high accuracy and precision for locating desired data, but consumes a significant amount of memory and time. Based on LSH, this thesis presents two novel schemes for efficient and accurate data searching: Locality Sensitive Hashing-SmithWaterman (LSH-SmithWaterman) and Secure Min-wise Locality Sensitive Hashing (SMLSH). Both methods dramatically reduce the memory and time consumption and exhibit high accuracy in data searching. Simulation results demonstrate the efficiency of the …


Adding Virtual Rfid To Second Life, Casey Bailey May 2008

Adding Virtual Rfid To Second Life, Casey Bailey

Computer Science and Computer Engineering Undergraduate Honors Theses

Second Life (SL) is a popular online 3D multi-player virtual world where the limits of creating objects and scripting interactions among objects and avatars are based on the player's imagination and scripting skill. Real life, by comparison, is often limited by current technology more than creativity. This thesis investigates a new way to merge reality and virtual reality, in particular, by modeling one emerging real world technology, radio frequency identification (RFID), in the SL virtual world. We investigate how RFID can be deployed and tested in a virtual world, a modeled healthcare facility, as a step before the much more …


An Efficient Hardware Implementation Of Target Recognition Algorithms And Investigation Of Secure Wireless Communication For A Modified Manet, Stephen Barnes May 2008

An Efficient Hardware Implementation Of Target Recognition Algorithms And Investigation Of Secure Wireless Communication For A Modified Manet, Stephen Barnes

Computer Science and Computer Engineering Undergraduate Honors Theses

This paper presents a scheme for effective wireless security of a open broadcast mobile ad-hoc network, MANET, network without significant loss of bandwidth and data integrity through a double tiered encryption scheme, and the feasibility of reducing the target tracking algorithm in [1] into a compact and efficient hardware package. Due to the open nature of MANET, modifications are necessary to secure wireless data in a potential hostile environment. Furthermore, due to power and processing limitations of small unmanned aerial vehicles (UAVs) and the processing intensive calculations of image processing, a sample hardware implementation of key functions of the target …


Computer Generation And Processing Of Music: Pitch Correction For The Human Voice, Jason Hardy May 2008

Computer Generation And Processing Of Music: Pitch Correction For The Human Voice, Jason Hardy

Computer Science and Computer Engineering Undergraduate Honors Theses

No abstract provided.


Visualization Of An Approach To Data Clustering, Marisabel Guevara May 2008

Visualization Of An Approach To Data Clustering, Marisabel Guevara

Computer Science and Computer Engineering Undergraduate Honors Theses

Using visualization and clustering goals as guidelines, this thesis explores a graphic implementation of a data clustering technique that repositions vertices by applying physical laws of charges and springs to the components of the graph. The resulting visualizations are evidence of the success of the approach as well as of the data sets that lend themselves to a clustering routine. Due to the visual product of the implementation, the algorithm is most useful as an aid in understanding the grouping pattern of a data set. Either for a rapid analysis or to assist in presentation, the visual result of the …


Multiuav2 Agent Swarming For Distributed Atr Simulation, Kyle White May 2008

Multiuav2 Agent Swarming For Distributed Atr Simulation, Kyle White

Computer Science and Computer Engineering Undergraduate Honors Theses

Traditional automatic target recognition (ATR) is performed by unmanned aerial vehicles (UAVs) depending on a central control tower to provide the high level organization of the system. The UAVs fly through a region of interest to identify targets and relay all communication through a central control tower. The centralized approach to ATR has limited fault-tolerance, scalability with regards to the number of UAVs, and susceptibility to malicious attacks on the central tower [2]. A swarm-driven alternative [1] is extended with a communication control scheme to address fault-tolerance and scalability while utilizing the higher onboard processing power now available for UAVs …


Pitch Correction On The Human Voice, Suzanne Ownbey May 2008

Pitch Correction On The Human Voice, Suzanne Ownbey

Computer Science and Computer Engineering Undergraduate Honors Theses

No abstract provided.


Developing Subgrade Inputs For Mechanistic-Empirical Pavement Design, Meagan Berlau May 2008

Developing Subgrade Inputs For Mechanistic-Empirical Pavement Design, Meagan Berlau

Computer Science and Computer Engineering Undergraduate Honors Theses

No abstract provided.


Holistic Characterization Of Parallel Programming Models In A Distributed Memory Environment, Christopher Bryan May 2008

Holistic Characterization Of Parallel Programming Models In A Distributed Memory Environment, Christopher Bryan

Computer Science and Computer Engineering Undergraduate Honors Theses

The popularity of cluster computing has increased focus on usability, especially in the area of programmability. Languages and libraries that require explicit message passing have been the standard. New languages, designed for cluster computing, are coming to the forefront as a way to simplify parallel programming. Titanium and Fortress are examples of this new class of programming paradigms. This work holistically characterizes these languages and contrasts them with the standard model of parallel programming, and presents benchmark results of small computational kernels written in these languages and models.