Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Numerical Analysis and Scientific Computing (3)
- Theory and Algorithms (3)
- Computer Engineering (2)
- Databases and Information Systems (2)
- Earth Sciences (2)
-
- Engineering (2)
- Information Security (2)
- Physics (2)
- Quantum Physics (2)
- Social and Behavioral Sciences (2)
- Systems Architecture (2)
- Anthropology (1)
- Applied Statistics (1)
- Archaeological Anthropology (1)
- Artificial Intelligence and Robotics (1)
- Computational Engineering (1)
- Computational Linguistics (1)
- Data Science (1)
- Electrical and Computer Engineering (1)
- Geology (1)
- Geomorphology (1)
- Geophysics and Seismology (1)
- Graphics and Human Computer Interfaces (1)
- Linguistics (1)
- Mathematics (1)
- Multivariate Analysis (1)
- OS and Networks (1)
- Keyword
-
- Data mining (2)
- Machine Learning (2)
- Password managers (2)
- Quantum computing (2)
- Archaeology (1)
-
- Backprojection (1)
- Big Data (1)
- Branchless distance driven (1)
- Cloud-Scale Data Centers (1)
- Computer Simulation Calibration (1)
- Computer vision (1)
- Cuda (1)
- Cybersecurity (1)
- DAG (1)
- Distance driven (1)
- Enclosure (1)
- Erasure Coding (1)
- Evolutionary system (1)
- Extensible language (1)
- Fingerprint (1)
- Forward projection (1)
- GIS (1)
- Genetic algotithm (1)
- Geographical Information Science & Systems; Data processing; Structural Geology; Oil and Gas Database Management; Python (1)
- Geophysics (1)
- Graph theory (1)
- Hamiltonian simulation (1)
- Image classification (1)
- Image reconstruction (1)
- Information Theory (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 22 of 22
Full-Text Articles in Other Computer Sciences
Survey Of Input Modalities In The Western World, John Ezat Sadik
Survey Of Input Modalities In The Western World, John Ezat Sadik
Masters Theses
Having your account compromised can lead to serious complications in your life. One
way accounts become compromised is through the security risks associated with weak
passwords and reused passwords [22,23]. In this thesis, we seek to understand how
entering passwords on non-PC devices contributes to the problems of weak and reused
passwords. To do so, we conducted a survey that was distributed to people in the
the Western World. In our survey results, we found that users commented about
how the current password model was not created with a variety of device types in
mind, which created frustrations and complexity …
Control And Calibration Strategies For Quantum Simulation, Paul M. Kairys
Control And Calibration Strategies For Quantum Simulation, Paul M. Kairys
Doctoral Dissertations
The modeling and prediction of quantum mechanical phenomena is key to the continued development of chemical, material, and information sciences. However, classical computers are fundamentally limited in their ability to model most quantum effects. An alternative route is through quantum simulation, where a programmable quantum device is used to emulate the phenomena of an otherwise distinct physical system. Unfortunately, there are a number of challenges preventing the widespread application of quantum simulation arising from the imperfect construction and operation of quantum simulators. Mitigating or eliminating deleterious effects is critical for using quantum simulation for scientific discovery. This dissertation develops strategies …
An Analysis Of Modern Password Manager Security And Usage On Desktop And Mobile Devices, Timothy Oesch
An Analysis Of Modern Password Manager Security And Usage On Desktop And Mobile Devices, Timothy Oesch
Doctoral Dissertations
Security experts recommend password managers to help users generate, store, and enter strong, unique passwords. Prior research confirms that managers do help users move towards these objectives, but it also identified usability and security issues that had the potential to leak user data or prevent users from making full use of their manager. In this dissertation, I set out to measure to what extent modern managers have addressed these security issues on both desktop and mobile environments. Additionally, I have interviewed individuals to understand their password management behavior.
I begin my analysis by conducting the first security evaluation of the …
Characterization And Benchmarking Of Quantum Computers, Megan L. Dahlhauser
Characterization And Benchmarking Of Quantum Computers, Megan L. Dahlhauser
Doctoral Dissertations
Quantum computers are a promising technology expected to provide substantial speedups to important computational problems, but modern quantum devices are imperfect and prone to noise. In order to program and debug quantum computers as well as monitor progress towards more advanced devices, we must characterize their dynamics and benchmark their performance. Characterization methods vary in measured quantities and computational requirements, and their accuracy in describing arbitrary quantum devices in an arbitrary context is not guaranteed. The leading techniques for characterization are based on fine-grain physical models that are typically accurate but computationally expensive. This raises the question of how to …
Exploration Of Mid To Late Paleozoic Tectonics Along The Cincinnati Arch Using Gis And Python To Automate Geologic Data Extraction From Disparate Sources, Kenneth Steven Boling
Exploration Of Mid To Late Paleozoic Tectonics Along The Cincinnati Arch Using Gis And Python To Automate Geologic Data Extraction From Disparate Sources, Kenneth Steven Boling
Doctoral Dissertations
Structure contour maps are one of the most common methods of visualizing geologic horizons as three-dimensional surfaces. In addition to their practical applications in the oil and gas and mining industries, these maps can be used to evaluate the relationships of different geologic units in order to unravel the tectonic history of an area. The construction of high-resolution regional structure contour maps of a particular geologic horizon requires a significant volume of data that must be compiled from all available surface and subsurface sources. Processing these data using conventional methods and even basic GIS tools can be tedious and very …
Information Theory Problem Description Parser, Gary Brent Hurst
Information Theory Problem Description Parser, Gary Brent Hurst
Masters Theses
Data corruption and data loss create huge problems when they occur, so naturally safeguards are usually in place to recover lost data. This often involves allowing less space for data in order to allow space for an encoding that can be used to recover any data that might be lost. The question arises, then, about how to most efficiently implement these safeguards with respect to storage, network bandwidth, or some linear combination of those two things. This work has two main goals for the information theory community: to produce an intuitive-to-use problem description parser that facilitates research in the area, …
The Synmac Syntax Macroprocessor: Introduction And Manual, Version 5, Bruce J Maclennan
The Synmac Syntax Macroprocessor: Introduction And Manual, Version 5, Bruce J Maclennan
Faculty Publications and Other Works -- EECS
A syntax macroprocessor permits parameterized text substitutions with greater syntactic flexibility than allowed with ordinary macroprocessors. This report describes the \emph{synmac} syntax macroprocessor, which permits arbitrarily delimited macro invocations, and thus allows the definition of new statement and expression forms or even complete languages. Synmac is a computationally complete programming language. We define the synmac macro language, document a prototype implementation, and give examples of its use.
A Gpu Implementation Of Distance-Driven Computed Tomography, Ryan D. Wagner
A Gpu Implementation Of Distance-Driven Computed Tomography, Ryan D. Wagner
Masters Theses
Computed tomography (CT) is used to produce cross-sectional images of an object via noninvasive X-ray scanning of the object. These images have a wide range of uses including threat detection in checked baggage at airports. The projection data collected by the CT scanner must be reconstructed before the image may be viewed. In comparison to filtered backprojection methods of reconstruction, iterative reconstruction algorithms have been shown to increase overall image quality by incorporating a more complete model of the underlying physics. Unfortunately, iterative algorithms are generally too slow to meet the high throughput demands of this application. It is therefore …
Target Detection With Neural Network Hardware, Hollis Bui, Garrett Massman, Nikolas Spangler, Jalen Tarvin, Luke Bechtel, Kevin Dunn, Shawn Bradford
Target Detection With Neural Network Hardware, Hollis Bui, Garrett Massman, Nikolas Spangler, Jalen Tarvin, Luke Bechtel, Kevin Dunn, Shawn Bradford
Chancellor’s Honors Program Projects
No abstract provided.
Efficient Simulation Of A Simple Evolutionary System, Mahendra Duwal Shrestha
Efficient Simulation Of A Simple Evolutionary System, Mahendra Duwal Shrestha
Masters Theses
An infinite population model is considered for diploid evolution under the influence of crossing over and mutation. The evolution equations show how Vose’s haploid model for Genetic Algorithms extends to the diploid case, thereby making feasible simulations which otherwise would require excessive resources. This is illustrated through computations confirming the convergence of finite diploid population short-term behaviour to the behaviour predicted by the infinite diploid model. The results show the distance between finite and infinite population evolutionary trajectories can decrease in practice like the reciprocal of the square root of population size.
Under necessary and sufficient conditions (NS) concerning mutation …
Tagamajig: Image Recognition Via Crowdsourcing, Gregory Martin Simpson
Tagamajig: Image Recognition Via Crowdsourcing, Gregory Martin Simpson
Masters Theses
The University of Tennessee, Knoxville (UTK) Library possesses thousands of unlabeled gray-scale photographs from the Smoky Mountains circa the 1920s - 1940s. Their current method of identifying and labeling attributes of the photographs is to do so manually. This is problematic both because of the scale of the collection as well as the reliance on an individual's limited knowledge of the area's numerous landmarks.
In the past few years, similar dilemmas have been tackled via an approach known as crowd computing. Some examples include Floating Forests, in which users are asked to identify and mark kelp forests in satellite images, …
Quantitative Metrics For Comparison Of Hyper-Dimensional Lsa Spaces For Semantic Differences, John Christopher Martin
Quantitative Metrics For Comparison Of Hyper-Dimensional Lsa Spaces For Semantic Differences, John Christopher Martin
Doctoral Dissertations
Latent Semantic Analysis (LSA) is a mathematically based machine learning technology that has demonstrated success in numerous applications in text analytics and natural language processing. The construction of a large hyper-dimensional space, a LSA space, is central to the functioning of this technique, serving to define the relationships between the information items being processed. This hyper-dimensional space serves as a semantic mapping system that represents learned meaning derived from the input content. The meaning represented in an LSA space, and therefore the mappings that are generated and the quality of the results obtained from using the space, is completely dependent …
Interactive Feature Selection And Visualization For Large Observational Data, Jingyuan Wang
Interactive Feature Selection And Visualization For Large Observational Data, Jingyuan Wang
Doctoral Dissertations
Data can create enormous values in both scientific and industrial fields, especially for access to new knowledge and inspiration of innovation. As the massive increases in computing power, data storage capacity, as well as capability of data generation and collection, the scientific research communities are confronting with a transformation of exploiting the advanced uses of the large-scale, complex, and high-resolution data sets in situation awareness and decision-making projects. To comprehensively analyze the big data problems requires the analyses aiming at various aspects which involves of effective selections of static and time-varying feature patterns that fulfills the interests of domain users. …
Social Fingerprinting: Identifying Users Of Social Networks By Their Data Footprint, Denise Koessler Gosnell
Social Fingerprinting: Identifying Users Of Social Networks By Their Data Footprint, Denise Koessler Gosnell
Doctoral Dissertations
This research defines, models, and quantifies a new metric for social networks: the social fingerprint. Just as one's fingers leave behind a unique trace in a print, this dissertation introduces and demonstrates that the manner in which people interact with other accounts on social networks creates a unique data trail. Accurate identification of a user's social fingerprint can address the growing demand for improved techniques in unique user account analysis, computational forensics and social network analysis.
In this dissertation, we theorize, construct and test novel software and methodologies which quantify features of social network data. All approaches and methodologies are …
Automating Large-Scale Simulation Calibration To Real-World Sensor Data, Richard Everett Edwards
Automating Large-Scale Simulation Calibration To Real-World Sensor Data, Richard Everett Edwards
Doctoral Dissertations
Many key decisions and design policies are made using sophisticated computer simulations. However, these sophisticated computer simulations have several major problems. The two main issues are 1) gaps between the simulation model and the actual structure, and 2) limitations of the modeling engine's capabilities. This dissertation's goal is to address these simulation deficiencies by presenting a general automated process for tuning simulation inputs such that simulation output matches real world measured data. The automated process involves the following key components -- 1) Identify a model that accurately estimates the real world simulation calibration target from measured sensor data; 2) Identify …
A Study Of Possible Optimizations For The Task Scheduler ‘Quark’ On The Shared Memory Architecture, Vijay Gopal Joshi
A Study Of Possible Optimizations For The Task Scheduler ‘Quark’ On The Shared Memory Architecture, Vijay Gopal Joshi
Masters Theses
Multicore processors are replacing most of the single core processors nowadays.
Current trends show that there will be increasing numbers of cores on a single chip in the coming future. However, programming multicore processors remains bug prone and less productive. Thus, making use of a runtime to schedule tasks on multicore processor hides most of the complexities of parallel programming to improve productivity. QUARK is one of the runtimes available for the multicore processors. This work looks at identifying and solving performance bottlenecks for QUARK on the shared memory architecture. The problem of finding bottlenecks is divided into two parts, …
Power Management For Cloud-Scale Data Centers, Yanwei Zhang
Power Management For Cloud-Scale Data Centers, Yanwei Zhang
Masters Theses
Recent years have seen the rapid growth of large and geographically distributed data centers deployed by Internet service operators to support various services such as cloud computing. Consequently, high electricity bills, as well as negative environmental implications (e.g., CO2 emission and global warming) come along. In this thesis, we first propose a novel electricity bill capping algorithm that not only minimizes the electricity cost, but also enforces a cost budget on the monthly bill for cloud-scale data centers that impact the power markets. Our solution first explicitly models the impacts of the power demands induced by cloud-scale data centers on …
Automated Pollen Image Classification, Nicholas Quentin Haas
Automated Pollen Image Classification, Nicholas Quentin Haas
Masters Theses
This Master of Science thesis reviews previous research, proposes a method anddemonstrates proof-of-concept software for the automated matching of pollen grainimages to satisfy degree requirements at the University of Tennessee. An ideal imagesegmentation algorithm and shape representation data structure is selected, alongwith a multi-phase shape matching system. The system is shown to be invariantto synthetic image translation, rotation, and to a lesser extent global contrast andintensity changes. The proof-of-concept software is used to demonstrate how pollengrains can be matched to images of other pollen grains, stored in a database, thatshare similar features with up to a 75% accuracy rate.
A Visual Approach To Automated Text Mining And Knowledge Discovery, Andrey A. Puretskiy
A Visual Approach To Automated Text Mining And Knowledge Discovery, Andrey A. Puretskiy
Doctoral Dissertations
The focus of this dissertation has been on improving the non-negative tensor factorization technique of text mining. The improvements have been made in both pre-processing and post-processing stages, with the goal of making the non-negative tensor factorization algorithm accessible to the casual user. The improved implementation allows the user to construct and modify the contents of the tensor, experiment with relative term weights and trust measures, and experiment with the total number of algorithm output features. Non-negative tensor factorization output feature production is closely integrated with a visual post-processing tool, FutureLens, that allows the user to perform in depth analysis …
Geophysical Study At Old Stone Fort State Archaeological Park, Manchester, Tennessee, Stephen Jay Yerka
Geophysical Study At Old Stone Fort State Archaeological Park, Manchester, Tennessee, Stephen Jay Yerka
Masters Theses
The Old Stone Fort State Archaeological Park covers over 800 acres within Manchester, Tennessee, and is owned and managed by the Tennessee Division of State Parks. The central archaeological site within the park boundary is The Old Stone Fort mounds that enclose about 50 acres on a plateau above the convergence of the Big Duck and the Little Duck Rivers. The hilltop enclosure dates to the Middle Woodland Period, and radiocarbon dates obtained at the site range from the first to the fifth century A. D. Because of its size and apparent complexity, previous investigations of the site have been …
Enterprise Users And Web Search Behavior, April Ann Lewis
Enterprise Users And Web Search Behavior, April Ann Lewis
Masters Theses
This thesis describes analysis of user web query behavior associated with Oak Ridge National Laboratory’s (ORNL) Enterprise Search System (Hereafter, ORNL Intranet). The ORNL Intranet provides users a means to search all kinds of data stores for relevant business and research information using a single query. The Global Intranet Trends for 2010 Report suggests the biggest current obstacle for corporate intranets is “findability and Siloed content”. Intranets differ from internets in the way they create, control, and share content which can make it often difficult and sometimes impossible for users to find information. Stenmark (2006) first noted studies of corporate …
An Exploration Of Optimization Algorithms And Heuristics For The Creation Of Encoding And Decoding Schedules In Erasure Coding, Catherine D. Schuman
An Exploration Of Optimization Algorithms And Heuristics For The Creation Of Encoding And Decoding Schedules In Erasure Coding, Catherine D. Schuman
Chancellor’s Honors Program Projects
No abstract provided.