Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,750 Full-Text Articles 72,968 Authors 23,183,657 Downloads 378 Institutions

All Articles in Computer Sciences

Faceted Search

55,750 full-text articles. Page 1668 of 2034.

Automated Filtering And Attribution Of Archive Bathymetry Based On A Priori Knowledge, Rodney Wade Ladner 2013 University of Southern Mississippi

Automated Filtering And Attribution Of Archive Bathymetry Based On A Priori Knowledge, Rodney Wade Ladner

Master's Theses

Hydrographic offices hold large volumes of historical bathymetric data. Many of these valuable datasets were collected using older generation survey systems and contain little or no metadata. Current efforts to utilize these data require human intervention to remove outliers and assess quality. This thesis develops automated algorithms based on a priori knowledge of existing bathymetric topography to remove errant soundings and concurrently provide an estimate of uncertainty.


Hybrid Methods For Feature Selection, Iunniang Cheng 2013 Western Kentucky University

Hybrid Methods For Feature Selection, Iunniang Cheng

Masters Theses & Specialist Projects

Feature selection is one of the important data preprocessing steps in data mining. The feature selection problem involves finding a feature subset such that a classification model built only with this subset would have better predictive accuracy than model built with a complete set of features. In this study, we propose two hybrid methods for feature selection. The best features are selected through either the hybrid methods or existing feature selection methods. Next, the reduced dataset is used to build classification models using five classifiers. The classification accuracy was evaluated in terms of the area under the Receiver Operating Characteristic …


Ikriya: Simulating Software Quality Enhancement With Selected Replacement Policies, Sindhu Dharani Murthy 2013 Western Kentucky University

Ikriya: Simulating Software Quality Enhancement With Selected Replacement Policies, Sindhu Dharani Murthy

Masters Theses & Specialist Projects

The quality of information systems in any organization helps to determine the
efficiency of the organization. Many organizations maintain a custom software portfolio, whose quality is important to the organization. Management would like to optimize the portfolio’s quality. Decisions about software replacement or enhancement are made based on organizational needs and priorities. The development resources allocated help in determining the quality of new software, and should be put to optimal use. Enhancing existing software might sound cheap and easy but it is not always efficient. This thesis proposes a simulation model - iKriya - for this problem. It explores the …


Efficient Architectures For Retrieving Mixed Data With Rest Architecture Style And Html5 Support, Koushik Maddipudi 2013 Western Kentucky University

Efficient Architectures For Retrieving Mixed Data With Rest Architecture Style And Html5 Support, Koushik Maddipudi

Masters Theses & Specialist Projects

Software as a service is an emerging but important aspect of the web. Web
Services play a vital role in providing it. Web Services are commonly provided in one of two architectural styles: a "REpresentational State Transfer" (REST), or using the "Simple Object Access Protocol" (SOAP.) Originally most web content was text and small images. But more recent services involve complex data structures including text, images, audio, and video. The task of optimizing data to provide delivery of these structures is a complex one, involving both theoretical and practical aspects. In this thesis work, I have considered two architectures developed …


Traditional Media Seen From Social Media, Jisun AN, Daniele QUERCIA, Meeyoung CHA, Krishna GUMMADI, Jon CROWCROFT 2013 Singapore Management University

Traditional Media Seen From Social Media, Jisun An, Daniele Quercia, Meeyoung Cha, Krishna Gummadi, Jon Crowcroft

Research Collection School Of Computing and Information Systems

With the advent of social media services, media outlets have started reaching audiences on social-networking sites. On Twitter, users actively follow a wide set of media sources, form interpersonal networks, and propagate interesting stories to their peers. These media subscription and interaction patterns, which had previously been hidden behind media corporations' databases, offer new opportunities to understand media supply and demand on a large scale. Through a map that connects 77 media outlets based on Twitter subscription patterns, we are able to answer a variety of questions: to what extent New York Times and the Wall Street Journal readers overlap? …


Gesture Based Home Automation For The Physically Disabled, Alexander Hugh Nelson 2013 University of Arkansas, Fayetteville

Gesture Based Home Automation For The Physically Disabled, Alexander Hugh Nelson

Graduate Theses and Dissertations

Paralysis and motor-impairments can greatly reduce the autonomy and quality of life of a patient while presenting a major recurring cost in home-healthcare. Augmented with a non-invasive wearable sensor system and home-automation equipment, the patient can regain a level of autonomy at a fraction of the cost of home nurses. A system which utilizes sensor fusion, low-power digital components, and smartphone cellular capabilities can extend the usefulness of such a system to allow greater adaptivity for patients with various needs. This thesis develops such a system as a Bluetooth enabled glove device which communicates with a remote web server to …


Personalized News Recommender Using Twitter, Satya Srinivasa Nirmal Jonnalagedda 2013 University of Arkansas, Fayetteville

Personalized News Recommender Using Twitter, Satya Srinivasa Nirmal Jonnalagedda

Graduate Theses and Dissertations

Online news reading has become a widely popular way to read news articles from news sources around the globe. With the enormous amount of news articles available, users are easily swamped by information of little interest to them. News recommender systems are one approach to help users find interesting articles to read. News recommender systems present the articles to individual users based on their interests rather than presenting articles in order of their occurrence. In this thesis, we present our research on developing personalized news recommendation system with the help of a popular micro-blogging service "Twitter". The news articles are …


A Secure And Fair Resource Sharing Model For Community Clouds, Santhosh S. Anand 2013 University of Arkansas, Fayetteville

A Secure And Fair Resource Sharing Model For Community Clouds, Santhosh S. Anand

Graduate Theses and Dissertations

Cloud computing has gained a lot of importance and has been one of the most discussed segment of today's IT industry. As enterprises explore the idea of using clouds, concerns have emerged related to cloud security and standardization. This thesis explores whether the Community Cloud Deployment Model can provide solutions to some of the concerns associated with cloud computing. A secure framework based on trust negotiations for resource sharing within the community is developed as a means to provide standardization and security while building trust during resource sharing within the community. Additionally, a model for fair sharing of resources is …


Section Abstracts: Computer Science, 2013 Old Dominion University

Section Abstracts: Computer Science

Virginia Journal of Science

Abstracts of the Computer Science Section for the 91st Annual Virginia Journal of Science Meeting, May 2013


Collocation Error Correction In Web Queries And Text Documents, Alan T. Varghese 2013 Montclair State University

Collocation Error Correction In Web Queries And Text Documents, Alan T. Varghese

Theses, Dissertations and Culminating Projects

Collocations are words in English that occur together frequently. Non-native speakers of English tend to confuse certain terms with other similar terms. This causes one of the terms to be substituted with a term that is not commonly used with the other term. “Powerful tea” is an example of such an odd collocation. In this scenario the more commonly used term is “strong tea”.

This paper proposes an approach called CollOrder to detect such odd collocations in written English. CollOrder also provides suggestions to correct the odd collocate. These suggestions are filtered and ranked as top-k suggestions.

We make use …


Real Time Pattern Recognition In Digital Video With Applications To Safety In Construction Sites, Dinesh Bajracharya 2013 University of Nevada, Las Vegas

Real Time Pattern Recognition In Digital Video With Applications To Safety In Construction Sites, Dinesh Bajracharya

UNLV Theses, Dissertations, Professional Papers, and Capstones

In construction sites, various guidelines are provided for the correct use of safety equipment. Many fatalities and injuries occur to people because of the lack of exercise of these guidelines and proper monitoring of the violations. In order to improve these standards and amend the cause, a video based monitoring tool will be created for a construction site.

Based on the real time video obtained from cameras on the site, a classification algorithm will be created which has the intelligence to recognize if any safety rules have been violated. A classification vector will be created based on the different classifiers, …


Simulation And Analysis Of Insider Attacks, Christopher Blake Clark 2013 University of Nevada, Las Vegas

Simulation And Analysis Of Insider Attacks, Christopher Blake Clark

UNLV Theses, Dissertations, Professional Papers, and Capstones

An insider is an individual (usually an employee, contractor, or business partner) that has been trusted with access to an organization's systems and sensitive data for legitimate purposes. A malicious insider abuses this access in a way that negatively impacts the company, such as exposing, modifying, or defacing software and data.

Many algorithms, strategies, and analyses have been developed with the intent of detecting and/or preventing insider attacks. In an academic setting, these tools and approaches show great promise. To be sure of their effectiveness, however, these analyses need to be tested. While real data is available on insider attacks …


Scheduling Jobs On Two Uniform Parallel Machines To Minimize The Makespan, Sandhya Kodimala 2013 University of Nevada, Las Vegas

Scheduling Jobs On Two Uniform Parallel Machines To Minimize The Makespan, Sandhya Kodimala

UNLV Theses, Dissertations, Professional Papers, and Capstones

The problem of scheduling n independent jobs on m uniform parallel machines such that the total completion time is minimized is a NP-Hard problem. We propose several heuristic-based online algorithms for machines with different speeds called Q2||Cmax. To show the efficiency of the proposed online algorithms, we compute the optimal solution for Q2||Cmax using pseudo-polynomial algorithms based on dynamic programming method. The pseudo-polynomial algorithm has time complexity O (n T2) and can be run on reasonable time for small number of jobs and small processing times. This optimal offline algorithm is …


Necessary And Sufficient Conditions For Generalized Uniform Fuzzy Partitions, Michal Holčapek, Irina Perfilieva, Vilém Novák, Vladik Kreinovich 2013 University of Ostrava

Necessary And Sufficient Conditions For Generalized Uniform Fuzzy Partitions, Michal Holčapek, Irina Perfilieva, Vilém Novák, Vladik Kreinovich

Departmental Technical Reports (CS)

The fundamental concept in the theory of fuzzy transform (F-transform) is that of fuzzy partition. The original definition assumes that each two fuzzy subsets overlap in such a way that sum of membership degrees in each point is equal to 1. However, this condition can be generalized to obtain a denser fuzzy partition that leads to improvement of approximation properties of F-transform. However, a problem arises how one can effectively construct such type of fuzzy partitions. We use a generating function having special properties and it is not immediately clear whether it really defines a general uniform fuzzy partition. In …


Algorithms And A Software Application For The Discovery Of Heparin-Binding Proteins For Chemical Analysis, Christopher Dempewolf 2013 University of Arkansas, Fayetteville

Algorithms And A Software Application For The Discovery Of Heparin-Binding Proteins For Chemical Analysis, Christopher Dempewolf

Computer Science and Computer Engineering Undergraduate Honors Theses

Heparin is a biological molecule that plays a vital role in anticoagulation. As such, it is used for the prevention of blood clotting in a variety of medical disorders. However, it is easily contaminated with foreign substances, and this can prove fatal for a person receiving heparin. In order to prevent this, proteins that easily bind to heparin need to be added to the solution. Then, the unwanted substances can easily be filtered out. Certain sequences or patterns of amino acids are known to have a high probability of binding to heparin. Thus, proteins that contain large numbers of these …


Document Classification, Shane K. Panter 2013 Boise State University

Document Classification, Shane K. Panter

Boise State University Theses and Dissertations

We present an overview of the document classification process and present research conducted against the newly constructed SBIR-STTR corpus. Specifically, the current methods in use for annotation, corpus construction, feature construction, feature weighting, and classifier algorithms are surveyed. We introduce a new dataset derived from public data downloaded from sbir.gov and the Text Annotation Toolkit (TAT) 1 for use in classification research.

TAT is a collection of independent components packaged together into one open source software application. TAT was engineered to support the document classification process and workflow. Tracking of changes in a working corpus, saving data used in the …


System For Detection Of Defects In Cables Of Bridge Structures, Emad Ismail Abdel Salam 2013 University of Wisconsin-Milwaukee

System For Detection Of Defects In Cables Of Bridge Structures, Emad Ismail Abdel Salam

Theses and Dissertations

Over the last 75 years, many cable-supported bridges have been built in America, Europe, Asia and other parts of the world. However, over the years these bridges have aged and been exposed to environmental conditions such as rain, snow, de-icing and harmful chemicals. These conditions cause various levels of deterioration in bridges, particularly corrosion. Corrosion causes a loss of cross-section in the steel, adversely affecting the bridge's capacity to carry its service loads, and can possibly cause bridge failures. Although many methods have been attempted to inspect these bridges, most have offered limited success. In the recent years, it has …


Automated Midline Shift Detection On Brain Ct Images For Computer-Aided Clinical Decision Support, Xuguang Qi 2013 Virginia Commonwealth University

Automated Midline Shift Detection On Brain Ct Images For Computer-Aided Clinical Decision Support, Xuguang Qi

Theses and Dissertations

Midline shift (MLS), the amount of displacement of the brain’s midline from its normal symmetric position due to illness or injury, is an important index for clinicians to assess the severity of traumatic brain injury (TBI). In this dissertation, an automated computer-aided midline shift estimation system is proposed. First, a CT slice selection algorithm (SSA) is designed to automatically select a subset of appropriate CT slices from a large number of raw images for MLS detection. Next, ideal midline detection is implemented based on skull bone anatomical features and global rotation assumptions. For the actual midline detection algorithm, a window …


Exploration Of Mouth Shading And Lighting In Cg Production, Chaoren Li 2013 Clemson University

Exploration Of Mouth Shading And Lighting In Cg Production, Chaoren Li

All Theses

The lighting and shading of human teeth in current computer animation features and live-action movies with effects are often intentionally avoided or processed by simple methods since they interact with light in complex ways through their intricate layered structure. The semi-translucent appearance of natural human teeth which result from subsurface scattering is difficult to replicate in synthetic scenes, though two techniques are often implemented. The first technique is to create an anatomically correct layered model, and render the teeth with both theoretically and empirically derived optical parameters of human teeth using physical subsurface materials. The second technique largely takes advantage …


A Study Of Possible Optimizations For The Task Scheduler ‘Quark’ On The Shared Memory Architecture, Vijay Gopal Joshi 2013 University of Tennessee, Knoxville

A Study Of Possible Optimizations For The Task Scheduler ‘Quark’ On The Shared Memory Architecture, Vijay Gopal Joshi

Masters Theses

Multicore processors are replacing most of the single core processors nowadays.

Current trends show that there will be increasing numbers of cores on a single chip in the coming future. However, programming multicore processors remains bug prone and less productive. Thus, making use of a runtime to schedule tasks on multicore processor hides most of the complexities of parallel programming to improve productivity. QUARK is one of the runtimes available for the multicore processors. This work looks at identifying and solving performance bottlenecks for QUARK on the shared memory architecture. The problem of finding bottlenecks is divided into two parts, …


Digital Commons powered by bepress