Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Discipline
Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 50

Full-Text Articles in Other Computer Sciences

A Visual Approach To Automated Text Mining And Knowledge Discovery, Andrey A. Puretskiy Dec 2010

A Visual Approach To Automated Text Mining And Knowledge Discovery, Andrey A. Puretskiy

Doctoral Dissertations

The focus of this dissertation has been on improving the non-negative tensor factorization technique of text mining. The improvements have been made in both pre-processing and post-processing stages, with the goal of making the non-negative tensor factorization algorithm accessible to the casual user. The improved implementation allows the user to construct and modify the contents of the tensor, experiment with relative term weights and trust measures, and experiment with the total number of algorithm output features. Non-negative tensor factorization output feature production is closely integrated with a visual post-processing tool, FutureLens, that allows the user to perform in depth analysis …


Approximate Disassembly Using Dynamic Programming, Abhishek Shah Dec 2010

Approximate Disassembly Using Dynamic Programming, Abhishek Shah

Master's Projects

Most commercial anti-virus software uses signature based techniques to detect whether a file is infected by a virus or not. However, signature based detection systems are unable to detect metamorphic viruses, since such viruses change their internal structure from generation to generation. Previous work has shown that hidden Markov models (HMMs) can be used to detect metamorphic viruses. In this technique, the code is disassembled and the resulting opcode sequences are used for training and detection. Due to the disassembly step, this process is not efficient enough to use when a decision has to be made in real time.

In …


Automatic Execution Path Finding Tool, Fan Yang Dec 2010

Automatic Execution Path Finding Tool, Fan Yang

Master's Projects

Today, there are many hackers trying to break software using reverse engineering tech- niques. To better protect software, we need to understand reverse engineering methods. This project presents a tool that automatically analyzes executable code in a manner simi- lar to the way an attack might analyze code.

Using reverse engineering techniques, executables can be disassembled to yield an as- sembly code representation of the program. Assembly code is much more human reada- ble than binary code. With assembly code, an attacker can attempt to modify the program to do something other than what was intended by the developer.

The …


Geophysical Study At Old Stone Fort State Archaeological Park, Manchester, Tennessee, Stephen Jay Yerka Dec 2010

Geophysical Study At Old Stone Fort State Archaeological Park, Manchester, Tennessee, Stephen Jay Yerka

Masters Theses

The Old Stone Fort State Archaeological Park covers over 800 acres within Manchester, Tennessee, and is owned and managed by the Tennessee Division of State Parks. The central archaeological site within the park boundary is The Old Stone Fort mounds that enclose about 50 acres on a plateau above the convergence of the Big Duck and the Little Duck Rivers. The hilltop enclosure dates to the Middle Woodland Period, and radiocarbon dates obtained at the site range from the first to the fifth century A. D. Because of its size and apparent complexity, previous investigations of the site have been …


Online Application Monitoring Tool, Sathya Anandan Dec 2010

Online Application Monitoring Tool, Sathya Anandan

Master's Projects

In some classes, students take online tests and some types of network activity (for example trying to find the answers in www.google.com) will be considered as cheating during the exam. It would be useful if instructor could monitor online activities of each student to detect cheating. The goal of this project is to develop such a tool using client/server architecture. Tool should display the student's hostname and the website visited during unauthorized web activity. Professor should able to see the applications opened by all students and he will have an option to view the log files of all the students …


Functional Reactive Musical Performers, Justin M. Phillips Dec 2010

Functional Reactive Musical Performers, Justin M. Phillips

Master's Theses

Computers have been assisting in recording, sound synthesis and other fields of music production for quite some time. The actual performance of music continues to be an area in which human players are chosen over computer performers. Musical performance is an area in which personalization is more important than consistency. Human players play with each other, reacting to phrases and ideas created by the players that they are playing with. Computer performers lack the ability to react to the changes in the performance that humans perceive naturally, giving the human players an advantage over the computer performers.

This thesis creates …


A Study On Masquerade Detection, Lin Huang Dec 2010

A Study On Masquerade Detection, Lin Huang

Master's Projects

In modern computer systems, usernames and passwords have been by far the most common forms of authentication. A security system relying only on password protection is defenseless when the passwords of legitimate users are compromised. A masquerader can impersonate a legitimate user by using a compromised password.

An intrusion detection system (IDS) can provide an additional level of protection for a security system by inspecting user behavior. In terms of detection techniques, there are two types of IDSs: signature-based detection and anomaly-based detection. An anomaly-based intrusion detection technique consists of two steps: 1) creating a normal behavior model for legitimate …


Improved Worm Simulator And Simulations, Arnold Suvatne Dec 2010

Improved Worm Simulator And Simulations, Arnold Suvatne

Master's Projects

According to the latest Microsoft Security Intelligence Report (SIR), worms were the second most prevalent information security threat detected in the first half of 2010 – the top threat being Trojans. Given the prevalence and damaging effects of worms, research and development of worm counter strategies are garnering an increased level of attention. However, it is extremely risky to test and observe worm spread behavior on a public network. What is needed is a packet level worm simulator that would allow researchers to develop and test counter strategies against rapidly spreading worms in a controlled and isolated environment. Jyotsna Krishnaswamy, …


Computational Mirna Target Prediction In Animals, Leyan Tang Dec 2010

Computational Mirna Target Prediction In Animals, Leyan Tang

Master's Projects

miRNAs are a class of small RNA molecules about 22 nucleotides long that regulate gene expression at the post-transcriptional level. The discovery of the second miRNA 10 years ago was as much a surprise in its own way as the very structure of DNA discovered a half century earlier[1]. How could these small molecules regulate so many genes? During the past decade the complex cascade of regulation has been investigated and reported in detail[2]. The regions of the genome called untranslated regions, or UTRs, proved true to their name: they were indeed untranslated, but certainly not unimportant: they act as …


Intrusion Detection And Prevention System: Sql-Injection Attacks, Varian Luong Dec 2010

Intrusion Detection And Prevention System: Sql-Injection Attacks, Varian Luong

Master's Projects

Personally identifiable information (PII) is information regarding things such as bank accounts, retirement or stock investment accounts, credit card accounts, medical records, or insurance claims. There is a need to protect the PII in databases that are connected to the ubiquitous, global network that is the Internet. If there is any vulnerability in the protection in a system that holds PII, then it presents an opportunity for an unauthorized person to access this PII. One of the techniques available to would- be information thieves is SQL injection (SQL-I). In this project, a system is developed to analyze the values submitted …


A Microrna Target Prediction Algorithm, Rupinder Singh Dec 2010

A Microrna Target Prediction Algorithm, Rupinder Singh

Master's Projects

MicroRNA target prediction using the experimental methods is a challenging task. To accelerate the process of miRNA target validation, many computational methods are used. Computational methods yield many potential candidates for experimental validation. This project is about developing a new computational method using dynamic programming to predict miRNA targets with more accuracy. The project discusses the currently available computational methods and develops a new algorithm using the currently available knowledge about miRNA interactions.


Automated Breast Profile Segmentation For Roi Detection Using Digital Mammograms, Sameem Abdul Kareem Nov 2010

Automated Breast Profile Segmentation For Roi Detection Using Digital Mammograms, Sameem Abdul Kareem

Sameem Abdul Kareem

Mammography is currently the most effective imaging modality used by radiologists for the screening of breast cancer. Finding an accurate, robust and efficient breast profile segmentation technique still remains a challenging problem in digital mammography. Extraction of the breast profile region and the pectoral muscle is an essential pre-processing step in the process of computer-aided detection. Primarily it allows the search for abnormalities to be limited to the region of the breast tissue without undue influence from the background of the mammogram. The presence of pectoral muscle in mammograms biases detection procedures, which recommends removing the pectoral muscle during mammogram …


Defining The Security Professional: Definition Through A Body Of Knowledge, Mel Griffiths, David J. Brooks, Jeffrey Corkill Nov 2010

Defining The Security Professional: Definition Through A Body Of Knowledge, Mel Griffiths, David J. Brooks, Jeffrey Corkill

Australian Security and Intelligence Conference

A subject that eludes a consensus definition, security is an amalgam of disciplines that is moving inexorably towards professionalisation. Yet identifying who or what defines a security professional remains as difficult and elusory as a comprehensive definition of security that captures all of its modern facets and many actors. The view of elevating such a discipline as security to the status of a profession provokes polarised opinions. This article reviews the literature, examining what elements identify a security professional and exploring the significant themes and issues. To support these elements, security experts (n=27) were surveyed using a multidimensional scaling technique …


National Security: A Propositional Study To Develop Resilience Indicators As An Aid To Personnel Vetting, David Brooks, Jeff Corkill, Julie-Ann Pooley, Lynne Cohen, Cath Ferguson, Craig Harmes Nov 2010

National Security: A Propositional Study To Develop Resilience Indicators As An Aid To Personnel Vetting, David Brooks, Jeff Corkill, Julie-Ann Pooley, Lynne Cohen, Cath Ferguson, Craig Harmes

Australian Security and Intelligence Conference

Within the National Security domain there is a convergence of security responsibility across the national security agencies, law enforcement and private security sectors. The sensitivity of this environment requires individuals operating in the domain to be honest, trustworthy and loyal. Personnel vetting is a formal process used to determine an individual’s suitability for access to this domain. Notwithstanding this process, significant breaches of trust, security, and corruption still occur. In psychology, resilience is a well researched phenomenon that is considered a multidimensional construct where individual attributes, family aspects and social environment interact in aiding individuals to deal with vulnerability. There …


“Make A Bomb In Your Mums Kitchen”: Cyber Recruiting And Socialisation Of ‘White Moors’ And Home Grown Jihadists, Robyn Torok Nov 2010

“Make A Bomb In Your Mums Kitchen”: Cyber Recruiting And Socialisation Of ‘White Moors’ And Home Grown Jihadists, Robyn Torok

Australian Counter Terrorism Conference

As a consequence of the war on terror, al-Qaeda and associated jihad groups have evolved and made increasing use of internet technologies for cyber recruitment. Recently, there has been an increasing focus on recruiting home grown terrorists who can more easily escape the scrutiny of cross border entries. Case study analysis indicates that links do exist between cyber tools, radicalisation and terrorism, however, the strength and nature of these relationships is generally unclear. Evidence does seem to support that cyber tools are most significant in the initial phases of recruitment and radicalisation. Coupled with this is the strong evolution of …


A Clustering Comparison Measure Using Density Profiles And Its Application To The Discovery Of Alternate Clusterings, Eric Bae, James Bailey, Guozhu Dong Nov 2010

A Clustering Comparison Measure Using Density Profiles And Its Application To The Discovery Of Alternate Clusterings, Eric Bae, James Bailey, Guozhu Dong

Kno.e.sis Publications

Data clustering is a fundamental and very popular method of data analysis. Its subjective nature, however, means that different clustering algorithms or different parameter settings can produce widely varying and sometimes conflicting results. This has led to the use of clustering comparison measures to quantify the degree of similarity between alternative clusterings. Existing measures, though, can be limited in their ability to assess similarity and sometimes generate unintuitive results. They also cannot be applied to compare clusterings which contain different data points, an activity which is important for scenarios such as data stream analysis. In this paper, we introduce a …


Digitally Optimizing "Smart" Photovoltaics, Nicholas M. Christensen Oct 2010

Digitally Optimizing "Smart" Photovoltaics, Nicholas M. Christensen

Von Braun Symposium Student Posters

No abstract provided.


Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan Oct 2010

Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan

Computer Science Faculty Publications

Personalization constitutes the mechanisms necessary to automatically customize information content, structure, and presentation to the end user to reduce information overload. Unlike traditional approaches to personalization, the central theme of our approach is to model a website as a program and conduct website transformation for personalization by program transformation (e.g., partial evaluation, program slicing). The goal of this paper is study personalization through a program transformation lens and develop a formal model, based on program transformations, for personalized interaction with hierarchical hypermedia. The specific research issues addressed involve identifying and developing program representations and transformations suitable for classes of hierarchical …


Stockmarket Trading Using Fundamental Variables And Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn Sep 2010

Stockmarket Trading Using Fundamental Variables And Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn

Tobias Hahn

This paper uses a neural network methodology developed by Vanstone & Finnie[1] to develop a successful stockmarket trading system. The approach is based on these same 4 fundamental variables used within the Aby et al. fundamental trading strategies [2, 3], and demonstrates the important role neural networks have to play within complex and noisy environments, such as that provided by the stockmarket.


Stockmarket Trading Using Fundamental Variables And Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn Sep 2010

Stockmarket Trading Using Fundamental Variables And Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn

Bruce Vanstone

This paper uses a neural network methodology developed by Vanstone & Finnie[1] to develop a successful stockmarket trading system. The approach is based on these same 4 fundamental variables used within the Aby et al. fundamental trading strategies [2, 3], and demonstrates the important role neural networks have to play within complex and noisy environments, such as that provided by the stockmarket.


Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba Sep 2010

Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba

Dissertations

The advent of cloud computing in recent years has sparked an interest from different organisations, institutions and users to take advantage of web applications. This is a result of the new economic model for the Information Technology (IT) department that cloud computing promises. The model promises a shift from an organisation required to invest heavily for limited IT resources that are internally managed, to a model where the organisation can buy or rent resources that are managed by a cloud provider, and pay per use. Cloud computing also promises scalability of resources and on-demand availability of resources.

Although, the adoption …


A Comparative Study Of Threshold-Based Feature Selection Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hulse Aug 2010

A Comparative Study Of Threshold-Based Feature Selection Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hulse

Dr. Huanjing Wang

Abstract Given high-dimensional software measurement data, researchers and practitioners often use feature (metric) selection techniques to improve the performance of software quality classification models. This paper presents our newly proposed threshold-based feature selection techniques, comparing the performance of these techniques by building classification models using five commonly used classifiers. In order to evaluate the effectiveness of different feature selection techniques, the models are evaluated using eight different performance metrics separately since a given performance metric usually captures only one aspect of the classification performance. All experiments are conducted on three Eclipse data sets with different levels of class imbalance. The …


A Comparative Study Of Filter-Based Feature Ranking Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao Aug 2010

A Comparative Study Of Filter-Based Feature Ranking Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao

Dr. Huanjing Wang

One factor that affects the success of machine learning is the presence of irrelevant or redundant information in the training data set. Filter-based feature ranking techniques (rankers) rank the features according to their relevance to the target attribute and we choose the most relevant features to build classification models subsequently. In order to evaluate the effectiveness of different feature ranking techniques, a commonly used method is to assess the classification performance of models built with the respective selected feature subsets in terms of a given performance metric (e.g., classification accuracy or misclassification rate). Since a given performance metric usually can …


A Comparative Study Of Threshold-Based Feature Selection Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hulse Aug 2010

A Comparative Study Of Threshold-Based Feature Selection Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hulse

Computer Science Faculty Publications

Abstract Given high-dimensional software measurement data, researchers and practitioners often use feature (metric) selection techniques to improve the performance of software quality classification models. This paper presents our newly proposed threshold-based feature selection techniques, comparing the performance of these techniques by building classification models using five commonly used classifiers. In order to evaluate the effectiveness of different feature selection techniques, the models are evaluated using eight different performance metrics separately since a given performance metric usually captures only one aspect of the classification performance. All experiments are conducted on three Eclipse data sets with different levels of class imbalance. The …


A Comparative Study Of Filter-Based Feature Ranking Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao Aug 2010

A Comparative Study Of Filter-Based Feature Ranking Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao

Computer Science Faculty Publications

One factor that affects the success of machine learning is the presence of irrelevant or redundant information in the training data set. Filter-based feature ranking techniques (rankers) rank the features according to their relevance to the target attribute and we choose the most relevant features to build classification models subsequently. In order to evaluate the effectiveness of different feature ranking techniques, a commonly used method is to assess the classification performance of models built with the respective selected feature subsets in terms of a given performance metric (e.g., classification accuracy or misclassification rate). Since a given performance metric usually can …


Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn Aug 2010

Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn

MIS/OM/DS Faculty Publications

Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …


Bringing Geospatial Technology (Gis) To The Curriculum, Daniel Farkas, Roy Girasa, Joseph F. Ryan, Martha Kelly, Medaline Philbert Jun 2010

Bringing Geospatial Technology (Gis) To The Curriculum, Daniel Farkas, Roy Girasa, Joseph F. Ryan, Martha Kelly, Medaline Philbert

Cornerstone 3 Reports : Interdisciplinary Informatics

Geographic Information Systems utilize data that has location information associated with it – a location such as an address or latitude and longitude. This leads to the ability to solve problems with an underlying spatial focus. Whether real-time sensing of scientific data, conducting market analysis, understanding socio-economic population trends, conducting epidemiological studies, or teaching kids how to better understand their world, GIS systems provide a unique way for students, faculty, researchers, and professionals from a variety of disciplines to understand, analyze, and visualize data in different ways.


Optimization Of P3ht-Pcbm Polymer Solar Cells Through Device Simulation And Manufacturing, James Boom Jun 2010

Optimization Of P3ht-Pcbm Polymer Solar Cells Through Device Simulation And Manufacturing, James Boom

Computer Engineering

Given a good model and implementation of that model, computer simulation can be used to reduce the time and material costs of research. To this end I worked with other students to manufacture, test and simulate the single layer P3HT-PCBM solar cell. Using the data collected from this project, future work can then be done with the project's simulator to further optimize these types of solar cell devices.


Measurement And Interpolation Of Sea Surface Temperature And Salinity In The Tropical Pacific: A 9,000 Nautical Mile Research Odyssey, Amber Brooks Jun 2010

Measurement And Interpolation Of Sea Surface Temperature And Salinity In The Tropical Pacific: A 9,000 Nautical Mile Research Odyssey, Amber Brooks

Earth and Soil Sciences

The purpose of this project was to compare spline and inverse distance weighting interpolation tools on data collected in the tropical Pacific Ocean by ship and data from a global network of CTD floats, known as Argo floats (fig.1), to provide evidence that technological advancement and integration is aiding our understanding of the ocean-atmosphere system of planet Earth. Thirty-one sea surface temperature and salinity samples were manually taken across a 9,000 nautical mile trek of the Pacific Ocean for the months of April, May and June 2008. Argo ASCII globally gridded monthly averaged sea surface temperature and salinity data, from …


Engaging Students In Real-Life Data And Network Security Assessment Of Pace Computing Environment, Narayan Murthy, Ravi Ravishanker Jun 2010

Engaging Students In Real-Life Data And Network Security Assessment Of Pace Computing Environment, Narayan Murthy, Ravi Ravishanker

Cornerstone 3 Reports : Interdisciplinary Informatics

No abstract provided.