Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2013

Discipline
Institution
Keyword
Publication

Articles 31 - 38 of 38

Full-Text Articles in Other Computer Sciences

Just-In-Time Power Gating Of Gasp Circuits, Prachi Gulab Padwal Feb 2013

Just-In-Time Power Gating Of Gasp Circuits, Prachi Gulab Padwal

Dissertations and Theses

In modern integrated circuits, one way to reduce power consumption is to turn off power to parts of the circuit when those are idle. This method is called power gating. This thesis presents a state-preserving technique to achieve power savings in GasP family of asynchronous circuits by turning off the power when the circuit is idle. The power control logic turns on the power in anticipation of the receiving data. The power control logic turns off the power when the stage is idle either because it is empty or because the pipeline is clogged. The low logical effort of GasP …


Consumerization Of It, Thomas Stagliano, Anthony Dipoalo, Patricia Coonelly Jan 2013

Consumerization Of It, Thomas Stagliano, Anthony Dipoalo, Patricia Coonelly

Mathematics and Computer Science Capstones

The consumerization of information technology is one of the biggest trends occurring in the information technology (IT) industry. More organizations are allowing their employees to use their own mobile devices to share data both inside and outside the workplace. This new trend is fundamentally changing the way companies do business. The “Bring Your Own Device” (BYOD) trend is also driving a need for management of such mobile devices and greater security on the devices and for the employees. The consumerization of IT is well underway and it is more than just bringing an iPad into the office.

Many IT managers …


Object Detection And Recognition In Natural Settings, George William Dittmar Jan 2013

Object Detection And Recognition In Natural Settings, George William Dittmar

Dissertations and Theses

Much research as of late has focused on biologically inspired vision models that are based on our understanding of how the visual cortex processes information. One prominent example of such a system is HMAX [17]. HMAX attempts to simulate the biological process for object recognition in cortex based on the model proposed by Hubel & Wiesel [10]. This thesis investigates the ability of an HMAX-like system (GLIMPSE [20]) to perform object-detection in cluttered natural scenes. I evaluate these results using the StreetScenes database from MIT [1, 8]. This thesis addresses three questions: (1) Can the GLIMPSE-based object detection system replicate …


A Machine Learning Approach To Diagnosis Of Parkinson’S Disease, Sumaiya F. Hashmi Jan 2013

A Machine Learning Approach To Diagnosis Of Parkinson’S Disease, Sumaiya F. Hashmi

CMC Senior Theses

I will investigate applications of machine learning algorithms to medical data, adaptations of differences in data collection, and the use of ensemble techniques.

Focusing on the binary classification problem of Parkinson’s Disease (PD) diagnosis, I will apply machine learning algorithms to a primary dataset consisting of voice recordings from healthy and PD subjects. Specifically, I will use Artificial Neural Networks, Support Vector Machines, and an Ensemble Learning algorithm to reproduce results from [MS12] and [GM09].

Next, I will adapt a secondary regression dataset of PD recordings and combine it with the primary binary classification dataset, testing various techniques to consolidate …


Context Aware Privacy Preserving Clustering And Classification, Nirmal Thapa Jan 2013

Context Aware Privacy Preserving Clustering And Classification, Nirmal Thapa

Theses and Dissertations--Computer Science

Data are valuable assets to any organizations or individuals. Data are sources of useful information which is a big part of decision making. All sectors have potential to benefit from having information. Commerce, health, and research are some of the fields that have benefited from data. On the other hand, the availability of the data makes it easy for anyone to exploit the data, which in many cases are private confidential data. It is necessary to preserve the confidentiality of the data. We study two categories of privacy: Data Value Hiding and Data Pattern Hiding. Privacy is a huge concern …


A Novel Computational Framework For Transcriptome Analysis With Rna-Seq Data, Yin Hu Jan 2013

A Novel Computational Framework For Transcriptome Analysis With Rna-Seq Data, Yin Hu

Theses and Dissertations--Computer Science

The advance of high-throughput sequencing technologies and their application on mRNA transcriptome sequencing (RNA-seq) have enabled comprehensive and unbiased profiling of the landscape of transcription in a cell. In order to address the current limitation of analyzing accuracy and scalability in transcriptome analysis, a novel computational framework has been developed on large-scale RNA-seq datasets with no dependence on transcript annotations. Directly from raw reads, a probabilistic approach is first applied to infer the best transcript fragment alignments from paired-end reads. Empowered by the identification of alternative splicing modules, this framework then performs precise and efficient differential analysis at automatically detected …


Playing In Trelis Weyr: Investigating Collaborative Practices In A Dragons Of Pern Role-Play-Game Forum, Kathleen Marie Alley Jan 2013

Playing In Trelis Weyr: Investigating Collaborative Practices In A Dragons Of Pern Role-Play-Game Forum, Kathleen Marie Alley

USF Tampa Graduate Theses and Dissertations

This descriptive case study examined adolescents' and emerging adults' literate and social practices within the context of a role-play-game (RPG) forum, investigating the ways participants read and collaboratively composed within this space. As a researcher, I was interested in how this space functioned and how the interactions between members impacted their composing processes, with particular attention to the role of online spaces and popular culture in adolescents' motivation to engage in this forum. This study was guided by three research questions: (1) In what ways is Trelis Weyr, an RPG forum, organized as a virtual environment?; (2) In what ways, …


Accelerated Data Delivery Architecture, Michael L. Grecol Jan 2013

Accelerated Data Delivery Architecture, Michael L. Grecol

Electronic Theses and Dissertations

This paper introduces the Accelerated Data Delivery Architecture (ADDA). ADDA establishes a framework to distribute transactional data and control consistency to achieve fast access to data, distributed scalability and non-blocking concurrency control by using a clean declarative interface. It is designed to be used with web-based business applications. This framework uses a combination of traditional Relational Database Management System (RDBMS) combined with a distributed Not Only SQL (NoSQL) database and a browser-based database. It uses a single physical and conceptual database schema designed for a standard RDBMS driven application. The design allows the architect to assign consistency levels to entities …