Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 121

Full-Text Articles in Physical Sciences and Mathematics

Randomized Algorithms For Resource Allocation In Device To Device Communication., Subhankar Ghosal Dr. Dec 2022

Randomized Algorithms For Resource Allocation In Device To Device Communication., Subhankar Ghosal Dr.

Doctoral Theses

In device to device (D2D) communication, two users residing in close proximity can directly communicate between them, through a common channel, without the need of a base station. A pair of D2D users forms a link and a channel needs to be allocated to it. The interference relationship among the active links at time t is modelled as an interference graph g(t). To establish interference-free communication, we have to assign a channel vector C(t) and a power vector corresponding to the active links such that the required signal to interference plus noise ratio (SINR) is satisfied for each link. Since …


Constructions And Analyses Of Efficient Symmetric-Key Primitives For Authentication And Encryption., Sebati Ghosh Dr. Aug 2022

Constructions And Analyses Of Efficient Symmetric-Key Primitives For Authentication And Encryption., Sebati Ghosh Dr.

Doctoral Theses

In symmetric key cryptography there are two fundamental objectives, viz. 1. confidentiality or secrecy of message from unexpected party and 2. authentication of message which includes authenticating the source of the message as well as integrity of the message against any unwanted modification. Let us first concentrate on confidentiality. In classical symmetric key cryptography two parties, say Alice and Bob, first secretly exchange a key-pair (e, d). Later, if Alice wishes to send a secret message m ∈ M to Bob, she computes c = Ee(m) and transmits c to Bob. Upon receiving c, Bob computes Dd(c) = m and …


Morphological Network: Network With Morphological Neurons., Ranjan Mondal Dr. Aug 2022

Morphological Network: Network With Morphological Neurons., Ranjan Mondal Dr.

Doctoral Theses

Image processing with traditional approaches mainly use the tools of linear systems. However, linear approaches are not well suited and may even fail to solve problems involving geometrical aspects of the image. Thus, nonlinear geometric approaches like morphological operations are very popular in those cases. Morphological operations are nonlinear operations based on a set and lattice-theoretic methodology for image analysis that are capable of describing the geometrical structure of image objects quantitatively. It is suitable for various problems in image processing, computer vision, and pattern recognition. While solving problems with morphology, a particular structuring element is defined. Structuring elements have …


Mining The Soma Cube For Gems: Isomorphic Subgraphs Reveal Equivalence Classes, Edward Vogel, My Tram Jul 2022

Mining The Soma Cube For Gems: Isomorphic Subgraphs Reveal Equivalence Classes, Edward Vogel, My Tram

Journal of Humanistic Mathematics

Soma cubes are an example of a dissection puzzle, where an object is broken down into pieces, which must then be reassembled to form either the original shape or some new design. In this paper, we present some interesting discoveries regarding the Soma Cube. Equivalence classes form aesthetically pleasing shapes in the solution set of the puzzle. These gems are identified by subgraph isomorphisms using SNAP!/Edgy, a simple block-based computer programming language. Our preliminary findings offer several opportunities for researchers from middle school to undergraduate to utilize graphs, group theory, topology, and computer science to discover connections between computation and …


Computing Well-Structured Subgraphs In Geometric Intersection Graphs., Satyabrata Jana Dr. Jul 2022

Computing Well-Structured Subgraphs In Geometric Intersection Graphs., Satyabrata Jana Dr.

Doctoral Theses

For a set of geometric objects, the associative geometric intersection graph is the graph with a vertex for each object and an edge between two vertices if and only if the corresponding objects intersect. Geometric intersection graphs are very important due to their theoretical properties and applicability. Based on the different geometric objects, several types of geometric intersection graphs are defined. Given a graph G, an induced (either vertex or edge) subgraph H ⊆ G is said to be an well-structured subgraph if H satisfies certain properties among the vertices in H. This thesis studies some well-structured subgraphs finding problems …


Temporal Sentiment Mapping System For Time-Synchronized Data, Jiachen Ma Jul 2022

Temporal Sentiment Mapping System For Time-Synchronized Data, Jiachen Ma

Dissertations (1934 -)

Temporal sentiment labels are used in various multimedia studies. They are useful for numerous classification and detection tasks such as video tagging, segmentation, and labeling. However, generating a large-scale sentiment dataset through manual labeling is usually expensive and challenging. Some recent studies explored the possibility of using online Time-Sync Comments (TSCs) as the primary source of their sentiment maps. Although the approach has positive results, existing TSCs datasets are limited in scale and content categories. Guidelines for generating such data within a constrained budget are yet to be developed and discussed. This dissertation tries to address the above issues by …


Efficient Handover Mechanisms For Heterogeneous Networks., Shankar Kumar Ghosh Dr. Apr 2022

Efficient Handover Mechanisms For Heterogeneous Networks., Shankar Kumar Ghosh Dr.

Doctoral Theses

In this thesis, some analytical frameworks have been developed to analyze the effect of different system parameters on handover performances in heterogeneous network (HetNet) and based on such frameworks, some efficient handover algorithms have been proposed. The study starts with an analytical framework to investigate the effect of resource allocation mechanisms, upper layer mobility management protocols (MMPs) and handover decision metrics on user perceived throughput. This analysis reveals that among other factors, handover decision metric plays a crucial role in determining user perceived throughput in HetNet. Subsequently, we develop two handover decision metrics for ultra dense networks (UDN) and unlicensed …


Zero-Knowledge Proof, Deniability And Their Applications In Blockchain, E-Voting And Deniable Secret Handshake Protocols., Somnath Panja Dr. Feb 2022

Zero-Knowledge Proof, Deniability And Their Applications In Blockchain, E-Voting And Deniable Secret Handshake Protocols., Somnath Panja Dr.

Doctoral Theses

In this thesis, we propose a cryptographic technique for an authenticated, end-to-end verifiable and secret ballot election. Currently, almost all verifiable e-voting systems require trusted authorities to perform the tallying process except for the DRE-i and DRE-ip systems. We have shown a weaknesses in the DRE-ip system and proposed a solution. We have modified the DRE-ip system so that no adversary can create and post a valid ballot on the public bulletin board without detection. We provide security proofs to prove the security properties of the proposed scheme. We propose two methods to store these ballots using blockchain and cloud …


Many-Objective Evolutionary Algorithms: Objective Reduction, Decomposition And Multi-Modality., Monalisa Pal Dr. Jan 2022

Many-Objective Evolutionary Algorithms: Objective Reduction, Decomposition And Multi-Modality., Monalisa Pal Dr.

Doctoral Theses

Evolutionary Algorithms (EAs) for Many-Objective Optimization (MaOO) problems are challenging in nature due to the requirement of large population size, difficulty in maintaining the selection pressure towards global optima and inability of accurate visualization of high-dimensional Pareto-optimal Set (in decision space) and Pareto-Front (in objective space). The quality of the estimated set of Pareto-optimal solutions, resulting from the EAs for MaOO problems, is assessed in terms of proximity to the true surface (convergence) and uniformity and coverage of the estimated set over the true surface (diversity). With more number of objectives, the challenges become more profound. Thus, better strategies have …


Mathematical Formulations For Complex Resource Scheduling Problems., T. R. Lalita Dr. Jan 2022

Mathematical Formulations For Complex Resource Scheduling Problems., T. R. Lalita Dr.

Doctoral Theses

This thesis deals with development of effective models for large scale real-world resource scheduling problems. Efficient utilization of resources is crucial for any organization or industry as resources are often scarce. Scheduling them in an optimal way can not only take care of the scarcity but has potential economic benefits. Optimal utilization of resources reduces costs and thereby provides a competitive edge in the business world. Resources can be of different types such as human (personnel-skilled and unskilled), financial(budgets), materials, infrastructures(airports and seaports with designed facilities, windmills, warehouses’ area, hotel rooms etc) and equipment (microprocessors, cranes, machinery, aircraft simulators for …


On Class Imbalanced Learning:Design Of Non-Parametricclassifiers, Performance Indices, And Deep Oversampling Strategies., Sankha Mullick Dr. Jan 2022

On Class Imbalanced Learning:Design Of Non-Parametricclassifiers, Performance Indices, And Deep Oversampling Strategies., Sankha Mullick Dr.

Doctoral Theses

The relevance of classification is almost endless in the everyday application of machine learning. However, the performance of a classifier is only limited to the fulfillment of the inherent assumptions it makes about the training examples. For example, to facilitate unbiased learning a classifier is expected to be trained with an equal number of labeled data instances from all of the classes. However, in a large number of practical applications such as anomaly detection, semantic segmentation, disease prediction, etc. it may not be possible to gather an equal number of diverse training points for all the classes. This results in …


Optimal Eavesdropping In Quantum Cryptography, Atanu Acharyya Dr. Jan 2022

Optimal Eavesdropping In Quantum Cryptography, Atanu Acharyya Dr.

Doctoral Theses

Quantum key distribution (QKD) has raised some promise for more secured communication than its classical counterpart. It allows the legitimate parties to detect eavesdropping which introduces error in the channel. If disturbed, there are ways to distill a secure key within some threshold error-rate. The amount of information gained by an attacker is generally quantified by (Shannon) mutual information. Knowing the maximum amount of information that an intruder can gain is important for post-processing purposes, and we mainly focus on that side in the thesis. Renyi information is also useful especially when post-processing is considered. The scope of this thesis …


Secret Sharing And Its Variants, Matroids,Combinatorics., Shion Samadder Chaudhury Dr. Dec 2021

Secret Sharing And Its Variants, Matroids,Combinatorics., Shion Samadder Chaudhury Dr.

Doctoral Theses

The main focus of this thesis is secret sharing. Secret Sharing is a very basic and fundamental cryptographic primitive. It is a method to share a secret by a dealer among different parties in such a way that only certain predetermined subsets of parties can together reconstruct the secret while some of the remaining subsets of parties can have no information about the secret. Secret sharing was introduced independently by Shamir [139] and Blakely [20]. What they introduced is called a threshold secret sharing scheme. In such a secret sharing scheme the subsets of parties that can reconstruct a secret …


Some Nonparametric Hybrid Predictive Models : Asymptotic Properties And Applications., Tanujit Chakraborty Dr. Nov 2021

Some Nonparametric Hybrid Predictive Models : Asymptotic Properties And Applications., Tanujit Chakraborty Dr.

Doctoral Theses

Prediction problems like classification, regression, and time series forecasting have always attracted both the statisticians and computer scientists worldwide to take up the challenges of data science and implementation of complicated models using modern computing facilities. But most traditional statistical and machine learning models assume the available data to be well-behaved in terms of the presence of a full set of essential features, equal size of classes, and stationary data structures in all data instances, etc. Practical data sets from the domain of business analytics, process and quality control, software reliability, and macroeconomics, to name a few, suffer from various …


Dealing With Classification Irregularities In Real-World Scenarios., Payel Sadhukhan Dr. Jul 2021

Dealing With Classification Irregularities In Real-World Scenarios., Payel Sadhukhan Dr.

Doctoral Theses

Data processing by the human sensory system comes naturally. This processing, commonly denoted as pattern recognition and analysis are carried out spontaneously by humans. In day to day life, in most cases, decision making by humans come without any conscious effort. From the middle of the past century, humans have shown interest to render their abstraction capabilities (pattern recognition and analysis) to the machine. The abstraction capability of the machine is ’machine intelligence’ or ’machine learning’ [87].The primary goal of machine learning methods is to extract some meaningful information from the ’data’. Data refers to the information or attributes that …


Studies On Diagnostic Coverage And X-Sensitivity In Logic Circuits., Manjari Pradhan Dr. Apr 2021

Studies On Diagnostic Coverage And X-Sensitivity In Logic Circuits., Manjari Pradhan Dr.

Doctoral Theses

Today’s integrated circuits comprise billions of interconnected transistors assembled on a tiny silicon chip, and testing them to ensure functional and timing correctness continues to be a major challenge to designers and test engineers with further downscaling of transistors. Although substantial progress has been witnessed during the last five decades in the area of algorithmic test generation and fault diagnosis, applications of combinatorial and machinelearning (ML) techniques to solve these problems remain largely unexplored till date. In this thesis, we study three problems in the context of digital logic test and diagnosis. The first problem is that of fault diagnosis …


Essays In Social Choice Theory., Dipjyoti Majumdar Dr. Feb 2021

Essays In Social Choice Theory., Dipjyoti Majumdar Dr.

Doctoral Theses

The purpose of this thesis is to explore some issues in social choice theory and decision theory. Social choice theory provides the theoretical foundations for the field of public choice and welfare economics. It tries to bring together normative aspects like perspective value judgements and positive aspects, like strategic con- siderations. The second feature which is our focus, is closely related to the problem of providing appropriate incentives to agents, an issue of prime importance in eco- nomics.Consider for example, a set of agents who must elect one among a set of can- didates. These candidates may be physical agents …


In Silicoidentification Of Toxins And Their Effect Onhost Pathways: Feature Extraction, Classificationand Pathway Prediction., Rishika Sen Dr. Jan 2021

In Silicoidentification Of Toxins And Their Effect Onhost Pathways: Feature Extraction, Classificationand Pathway Prediction., Rishika Sen Dr.

Doctoral Theses

Identification of toxins, which are either proteins or small molecules, from pathogens is of paramount importance due to their crucial role as first-line invaders infiltrating a host, often leading to infection of the host. These toxins can affect specific proteins, like enzymes that catalyze metabolic pathways, affect metabolites that form the basis of metabolic reactions, and prevent the progression of those pathways, or more generally they may affect the regular functioning of other proteins in signaling pathways in the host. In this regard, the thesis addresses the problem of identification of toxins, and the effect of perturbations by toxins on …


Analyzing Yankees And Red Sox Sentiment Over The Course Of A Season, Connor Koch Nov 2020

Analyzing Yankees And Red Sox Sentiment Over The Course Of A Season, Connor Koch

Honors Projects in Data Science

This paper investigates data collected on twitter which references the Yankees or Red Sox during the 2020 Major League Baseball (MLB) season. The objective is to analyze the sentiment of tweets referencing the Yankees and Red Sox over the course of the season. In addition, an investigation of the networks within the data and the topics that were prevalent will be conducted. The 2020 MLB season was started late because of the COVID-19 pandemic and was a season like no other. The expectation of a dataset revolving around baseball is that the topics discussed would be about baseball. The findings …


Provable Security Of Symmetric-Key Cryptographic Schemes., Ashwin Jha Dr. Oct 2020

Provable Security Of Symmetric-Key Cryptographic Schemes., Ashwin Jha Dr.

Doctoral Theses

In this thesis, we provide quantitative and/or qualitative improvements in the provable security of several symmetric-key schemes, encompassing major information security goals, viz. data authentication, encryption, and authenticated encryption.AUTHENTICATION AND INTEGRITY: Among authentication schemes, we analyze the CBC-MAC family and counter-based MACs (XMACC, XMACR, PCS, LightMAC etc.), referred as the XMAC family. First, we revisit the security proofs for CBC-MAC and EMAC, and identify a critical flaw in the state-of-the-art results. We revise the security proofs and obtain significantly better bounds in case of EMAC, ECBC and FCBC. Second, we study the security of CBC-MAC family, when the underlying primitive …


Image Dehazing From The Perspective Of Environmental Illumination., Sanchayan Santra Dr. Jul 2020

Image Dehazing From The Perspective Of Environmental Illumination., Sanchayan Santra Dr.

Doctoral Theses

Haze and fog are atmospheric phenomena where the particles suspended in the air obscure visibility by scattering the light propagating through the atmosphere. As a result only a part of the reflected light reaches the observer. So, the apparent intensity of the objects get reduced. Apart from that, the in-scatter of the atmospheric light creates a translucent veil, which is a common sight during haze. Image dehazing methods try to recover a haze-free version of a given image by removing the effects of haze.Although attempts have been made to accurately estimate the scene transmittance, the estimation of environmental illumination has …


Interview Of Stephen Andrilli, Ph.D., Stephen Francis Andrilli Ph.D., Jane Highley Apr 2019

Interview Of Stephen Andrilli, Ph.D., Stephen Francis Andrilli Ph.D., Jane Highley

All Oral Histories

Stephen Francis Andrilli was born in August 1952 in Bryn Mawr, PA. He was born to Francis and Leatrice Andrilli. Dr. Andrilli is the oldest of four children; his three sisters are Carol (now Carol Strosser), Patricia (now Patricia Kempczynski), and Barbara (now Barbara Parkes). Aside from a few years of living in Gettysburg, Dr. Andrilli has lived in the Philadelphia area for most of his life. He attended St. Jerome School, where he finished 8th grade. He then attended LaSalle College High School, where he graduated in 1969 at age 16. He entered La Salle University (formerly La Salle …


Using Magic In Computing Education And Outreach, Ronald I. Greenberg, Dale F. Reed Oct 2018

Using Magic In Computing Education And Outreach, Ronald I. Greenberg, Dale F. Reed

Computer Science: Faculty Publications and Other Works

This special session explores the use of magic tricks based on computer science ideas; magic tricks help grab students' attention and can motivate them to invest more deeply in underlying CS concepts. Error detection ideas long used by computer scientists provide a particularly rich basis for working such "magic'', with a CS Unplugged parity check activity being a notable example. Prior work has shown that one can perform much more sophisticated tricks than the relatively well-known CS Unplugged activity, and these tricks can motivate analyses across a wide variety of computer science concepts and are relevant to learning objectives across …


Computing Minimum Rainbow And Strong Rainbow Colorings Of Block Graphs, Melissa Karanen, Juho Lauri Jun 2018

Computing Minimum Rainbow And Strong Rainbow Colorings Of Block Graphs, Melissa Karanen, Juho Lauri

Michigan Tech Publications

A path in an edge-colored graph G is rainbow if no two edges of it are colored the same. The graph G is rainbow-connected if there is a rainbow path between every pair of vertices. If there is a rainbow shortest path between every pair of vertices, the graph G is strongly rainbow-connected. The minimum number of colors needed to make G rainbow-connected is known as the rainbow connection number of G, and is denoted by src(G). Similarly, the minimum number of colors needed to make G strongly rainbow-connected is known as the strong rainbow connection number of G, and …


Using Microsoft Excel To Teach Simulation Concepts To Business Students, Robert F. Gordon Ph.D. Oct 2017

Using Microsoft Excel To Teach Simulation Concepts To Business Students, Robert F. Gordon Ph.D.

Faculty Works: MCS (1984-2023)

The application of computers to solving business problems, the area of study known as decision support systems, is an important component in the education of business students today. One major type of decision support system is computer simulation, which is the technique most often used to solve queuing problems in the industry. This paper describes how to teach the concepts of computer simulation, explain the key components of simulation software, and provide hands-on experience to solve these problems by using Microsoft Excel.


Mechanism Design In Sequencing Problems., Parikshit De Dr. Jul 2017

Mechanism Design In Sequencing Problems., Parikshit De Dr.

Doctoral Theses

Collective decision making is an important social issue, since it depends on individual preferences that are not publicly observable. Therefore, the question is, whether it is possible to elicit the private information available to individuals and then how to extract the private information in various strategic environment; Mechanism design deals with these questions. The difference between game theory and mechanism design is that, the former tries to predict the outcome of a strategic environment in some “equilibrium” but the latter tries to design or restrict the environment in such a way that the desired objective is attained, that is, the …


Visualizing Sorting Algorithms, Brian Faria Jan 2017

Visualizing Sorting Algorithms, Brian Faria

Honors Projects

This paper discusses a study performed on animating sorting algorithms as a learning aid for classroom instruction. A web-based animation tool was created to visualize four common sorting algorithms: Selection Sort, Bubble Sort, Insertion Sort, and Merge Sort. The animation tool would represent data as a bar-graph and after selecting a data-ordering and algorithm, the user can run an automated animation or step through it at their own pace. Afterwards, a study was conducted with a voluntary student population at Rhode Island College who were in the process of learning algorithms in their Computer Science curriculum. The study consisted of …


Some Contemporary Issues In Software Reliability., Vignesh Subrahmaniam Dr. Oct 2016

Some Contemporary Issues In Software Reliability., Vignesh Subrahmaniam Dr.

Doctoral Theses

No abstract provided.


Digital Circles And Balls: Characterization, Properties, And Applications To Image Analysis., Sahadev Bera Dr. Feb 2016

Digital Circles And Balls: Characterization, Properties, And Applications To Image Analysis., Sahadev Bera Dr.

Doctoral Theses

In this thesis, we have reported some new theoretical findings, empirical formulations, useful heuristics, and efficient algorithms related to digital circle, digital disc, and digital sphere, along with their practical applications to the analysis of geometric information embedded in a digital image. Detecting digital circles and circular arcs from a digital image is very important in shape recognition. Several image processing techniques were proposed over the years to extract circles and circular arc from a digital image and to interpret related issues. We have proposed a novel technique for the segmentation of a digital circle, which is based on a …


Some Results On Analysis And Implementation Of Hc-128 Stream Cipher., Shashwat Raizada Dr. Jan 2016

Some Results On Analysis And Implementation Of Hc-128 Stream Cipher., Shashwat Raizada Dr.

Doctoral Theses

The HC-128 stream cipher is a successful entrant in the eStream candidate list (software profile) and is the lighter variant of HC-256 stream cipher. Apart from the analysis by the designer of the cipher (Hongjun Wu) to conjecture the security of this cipher, there are only a few other observations on this cipher despite being the focus of researchers during the three phases of eStream evaluation and later efforts in the community. Till date none of the security claims in favor of HC-128 by the designer could be broken. One may expect HC-128 stream cipher to be popular in commercial …