Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses and Dissertations

Discipline
Institution
Keyword
Publication Year
File Type

Articles 6061 - 6090 of 8341

Full-Text Articles in Physical Sciences and Mathematics

Time-Frequency Analysis Of Terahertz Radar Signals For Rapit Heart And Breath Rate Detection, Melody L. Massar Jun 2008

Time-Frequency Analysis Of Terahertz Radar Signals For Rapit Heart And Breath Rate Detection, Melody L. Massar

Theses and Dissertations

We develop new time-frequency analytic techniques which facilitate the rapid detection of a person's heart and breath rates from the Doppler shift the movement of their body induces in a terahertz radar signal. In particular, the Doppler shift in the continuous radar return is proportional to the velocity of the person's body. Thus, a time-frequency analysis of the radar return will yield a velocity signal. This signal, in turn, may undergo a second time-frequency analysis to yield any periodic components of the velocity signal, which are often related to the heart and breath rates of the individual. One straightforward means …


Mitigating Reversing Vulnerabilities In .Net Applications Using Virtualized Software Protection, Matthew A. Zimmerman Jun 2008

Mitigating Reversing Vulnerabilities In .Net Applications Using Virtualized Software Protection, Matthew A. Zimmerman

Theses and Dissertations

Protecting intellectual property contained in application source code and preventing tampering with application binaries are both major concerns for software developers. Simply by possessing an application binary, any user is able to attempt to reverse engineer valuable information or produce unanticipated execution results through tampering. As reverse engineering tools become more prevalent, and as the knowledge required to effectively use those tools decreases, applications come under increased attack from malicious users. Emerging development tools such as Microsoft's .NET Application Framework allow diverse source code composed of multiple programming languages to be integrated into a single application binary, but the potential …


Development Of A Night Vision Goggle Heads Up Display For Paratrooper Guidance, Fernando Ontiveros Jun 2008

Development Of A Night Vision Goggle Heads Up Display For Paratrooper Guidance, Fernando Ontiveros

Theses and Dissertations

This thesis provides the proof of concept for the development and implementation of a Global Positioning System (GPS) display via Night Vision Goggles (NVG) Heads-Up Display (HUD) for paratroopers. The system has been designed for soldiers who will be able to utilize the technology in the form of a processing system worn in an ammo pouch and displayed via NVG HUD as a tunnel in the sky. The tunnel in the sky display design is essentially a series of boxes displayed within the goggle's HUD leading the paratrooper to the desired Landing Zone (LZ). The algorithm developed receives GPS and …


Ranking Search Results For Translated Content, Brian Edwin Hawkins May 2008

Ranking Search Results For Translated Content, Brian Edwin Hawkins

Theses and Dissertations

Translation Memory (TM) is a valuable tool that helps human translators in doing their job. TM consists of a collection of previously translated texts, called translation units, that may prove useful in the translation of new text. The main problem faced by translators who wish to take advantage of TM is that, although search tools do exist, there is no standardized way of effectively ranking search results. This thesis proposes a method for ranking TM search results together with a novel approach to efficiently finding common substrings that is used in the ranking process.


Optimal Interest Rate For A Borrower With Estimated Default And Prepayment Risk, Scott T. Howard May 2008

Optimal Interest Rate For A Borrower With Estimated Default And Prepayment Risk, Scott T. Howard

Theses and Dissertations

Today's mortgage industry is constantly changing, with adjustable rate mortgages (ARM), loans originated to the so-called "subprime" market, and volatile interest rates. Amid the changes and controversy, lenders continue to originate loans because the interest paid over the loan lifetime is profitable. Measuring the profitability of those loans, along with return on investment to the lender is assessed using Actuarial Present Value (APV), which incorporates the uncertainty that exists in the mortgage industry today, with many loans defaulting and prepaying. The hazard function, or instantaneous failure rate, is used as a measure of probability of failure to make a payment. …


Modeling The Hydrolyzing Action Of Secretory Phospholipase A2 With Ordinary Differential Equations And Monte Carlo Methods, Zijun Lan Dozier May 2008

Modeling The Hydrolyzing Action Of Secretory Phospholipase A2 With Ordinary Differential Equations And Monte Carlo Methods, Zijun Lan Dozier

Theses and Dissertations

Although cell membranes normally resist the hydrolysis of secretory phospholipase A2, a series of current investigations demonstrated that the changes in lipid order caused by increased calcium has a relationship with the susceptibility to phospholipase A2. To further explore this relationship, we setup ordinary differential equations models, statistic models and stochastic models to compare the response of human erythrocytes to the hydrolyzing action of secretory phospholipase A2 and the relationship between the susceptibility of hydrolysis and the physical properties of secretory phospholipase A2. Furthermore, we use models to determine the ability of calcium ionophore to increased membrane susceptibility.


Machine Code Verification Using The Bogor Framework, Joseph R. Edelman May 2008

Machine Code Verification Using The Bogor Framework, Joseph R. Edelman

Theses and Dissertations

Verification and validation of embedded systems software is tedious and time consuming. Software model checking uses a tool-based approach automating this process. In order to more accurately model software it is necessary to provide hardware support that enables the execution of software as it should run on native hardware. Hardware support often requires the creation of model checking tools specific to the instruction set architecture. The creation of software model checking tools is non-trivial. We present a strategy for using an "off-the-shelf" model checking tool, Bogor, to provide support for multiple instruction set architectures. Our strategy supports key hardware features …


Personalized Web Search By Using Learned User Profiles In Re-Ranking, Jia Hu May 2008

Personalized Web Search By Using Learned User Profiles In Re-Ranking, Jia Hu

Theses and Dissertations

Search engines return results mainly based on the submitted query; however, the same query could be in different contexts because individual users have different interests. To improve the relevance of search results, we propose re-ranking results based on a learned user profile. In our previous work we introduced a scoring function for re-ranking search results based on a learned User Interest Hierarchy (UIH). Our results indicate that we can improve relevance at lower ranks, but not at the top 5 ranks. In this thesis, we improve the scoring function by incorporating new term characteristics, image characteristics and pivoted length normalization. …


Machine Learning For Host-Based Anomaly Detection, Gaurav Tandon May 2008

Machine Learning For Host-Based Anomaly Detection, Gaurav Tandon

Theses and Dissertations

Anomaly detection techniques complement signature based methods for intrusion detection. Machine learning approaches are applied to anomaly detection for automated learning and detection. Traditional host-based anomaly detectors model system call sequences to detect novel attacks. This dissertation makes four key contributions to detect host anomalies. First, we present an unsupervised approach to clean training data using novel representations for system call sequences. Second, supervised learning with system call arguments and other attributes is proposed for enriched modeling. Third, techniques to increase model coverage for improved accuracy are presented. Fourth, we propose spatio-temporal modeling to detect suspicious behavior for mobile hosts. …


Automating Mini-Ontology Generation From Canonical Tables, Stephen G. Lynn Apr 2008

Automating Mini-Ontology Generation From Canonical Tables, Stephen G. Lynn

Theses and Dissertations

In this thesis work we develop and test MOGO (a Mini-Ontology GeneratOr.) MOGO automates the generation of mini-ontologies from canonicalized tables of data. This will help anyone trying to organize large amounts of existing data into a more searchable and accessible form. By using a number of different heuristic rules for selecting, enhancing, and modifying ontology elements, MOGO allows users to automatically, semi-automatically, or manually generate conceptual mini-ontologies from canonicalized tables of data. Ideally, MOGO operates fully automatically while allowing users to intervene to direct and correct when necessary so that they can always satisfactorily complete the translation of canonicalized …


Contribution Of Recharge Along Regional Flow Paths To Discharge At Ash Meadows, Nevada, Michelle Bushman Apr 2008

Contribution Of Recharge Along Regional Flow Paths To Discharge At Ash Meadows, Nevada, Michelle Bushman

Theses and Dissertations

Springs in the Ash Meadows, Nevada wetland area are discharging groundwater at a high volume that cannot be sustained by local, present-day precipitation and associated recharge. Previous groundwater flow models for this region have required groundwater to flow through complex geology for long distances (160km) through fractures that, in the current stress field, should be closed in many instances in the presumed flow direction. This thesis examines several possible flow paths and evaluates each flow path using chemical and isotopic signatures in the water, as well as geologic and geophysical constraints, and determines that flow from beneath the Yucca Mountain …


Geology Of The Phil Pico Mountain Quadrangle, Daggett County, Utah, And Sweetwater County, Wyoming, Alvin D. Anderson Apr 2008

Geology Of The Phil Pico Mountain Quadrangle, Daggett County, Utah, And Sweetwater County, Wyoming, Alvin D. Anderson

Theses and Dissertations

Geologic mapping in the Phil Pico Mountain quadrangle and analysis of the Carter Oil Company Carson Peak Unit 1 well have provided additional constraints on the erosional and uplift history of this section of the north flank of the Uinta Mountains. Phil Pico Mountain is largely composed of the conglomeratic facies of the early Eocene Wasatch and middle to late Eocene Bridger Formations. These formations are separated by the Henrys Fork fault which has thrust Wasatch Formation next to Bridger Formation. The Wasatch Formation is clearly synorogenic and contains an unroofing succession from the adjacent Uinta Mountains. On Phil Pico …


The Optimal Weighting Of Pre-Election Polling Data, Gregory K. Johnson Apr 2008

The Optimal Weighting Of Pre-Election Polling Data, Gregory K. Johnson

Theses and Dissertations

Pre-election polls are used to test the political landscape and predict election results. The relative weights for the state-level data from the 2006 U.S. senatorial races are considered based on the date on which the polls were conducted. Long- and short-memory weight functions are developed to specify the relative value of historical polling data. An optimal weight function is estimated by minimizing the discrepancy function between estimates from weighted polls and the election outcomes.


Mechanistic Studies On The Electrochemistry Of Glutathione And Homocysteine, Olufemi Oyesanya Apr 2008

Mechanistic Studies On The Electrochemistry Of Glutathione And Homocysteine, Olufemi Oyesanya

Theses and Dissertations

This research work has investigated the electrochemistry of glutathione (GSH)and homocysteine (HCSH) in order to develop sensors for these biological thiols.Ru(bpy)33+ and IrCl62− have been used as mediators for the electrooxidation of GSH andHCSH because direct oxidation of these thiols is slow at most conventional electrodes.The electrochemical detection of GSH and HCSH has been pursued because of their biological roles.

Concerted proton electron transfer (CPET) and stepwise proton electron transfer(PT/ET) pathways have been observed in the electrooxidation of GSH and HCSH.Oxidation of GSH by Ru(bpy)33+ carried out in deuterated and undeuterated buffered (pH= pD …


Improving Spreadsheets For Complex Problems, Brian C. Whitmer Apr 2008

Improving Spreadsheets For Complex Problems, Brian C. Whitmer

Theses and Dissertations

Spreadsheets are one of the most frequently used applications. They are used because they are easy to understand and values can be updated easily. However, many people try to use spreadsheets for problems beyond their intended scope and end up with errors and miscalculations. We present a new spreadsheet system which uses complex-values and equation code reuse to overcome the limitations of spreadsheets for complex problems. We also discuss the features necessary in order to make these enhancements useful and effective.


Generalized Constrained Interpolation, Jacob Porter Merrell Apr 2008

Generalized Constrained Interpolation, Jacob Porter Merrell

Theses and Dissertations

Interpolation is essential in digital image processing, especially magnification. Many different approaches to interpolation specific to magnification have been developed in an effort to overcome the shortcomings of bilinear and bicubic interpolation. One of these approaches, Constraint-Based Interpolation, produces an image that is free of jaggies and has less blurring than bilinear or bicubic interpolation. Although Constraint-Based Interpolation produces a visually pleasing image, there are user-chosen parameters that make the algorithm difficult to use. In this thesis we propose a method for automatic selection of those parameters and an extension of Constraint-Based Interpolation to other forms of image manipulation, such …


Increasing Dogma Scaling Through Clustering, Nathan Hyrum Ekstrom Apr 2008

Increasing Dogma Scaling Through Clustering, Nathan Hyrum Ekstrom

Theses and Dissertations

DOGMA is a distributed computing architecture developed at Brigham Young University. It makes use of idle computers to provide additional computing resources to applications, similar to Seti@home. DOGMA's ability to scale to large numbers of computers is hindered by its strict client-server architecture. Recent research with DOGMA has shown that introducing localized peer-to-peer downloading abilities enhances DOGMA's performance while reducing the amount of network and server usage. This thesis proposes to further extend the peer-to-peer abilities of DOGMA to include peering client server communication by creating dynamic clusters of clients. The client clusters aggregate their communication with only one client …


Using Hierarchical Temporal Memory For Detecting Anomalous Network Activity, Gerod M. Bonhoff Mar 2008

Using Hierarchical Temporal Memory For Detecting Anomalous Network Activity, Gerod M. Bonhoff

Theses and Dissertations

This thesis explores the nature of cyberspace and forms an argument for it as an intangible world. This research is motivated by the notion of creating intelligently autonomous cybercraft to reside in that environment and maintain domain superiority. Specifically, this paper offers 7 challenges associated with development of intelligent, autonomous cybercraft. The primary focus is an analysis of the claims of a machine learning language called Hierarchical Temporal Memory (HTM). In particular, HTM theory claims to facilitate intelligence in machines via accurate predictions. It further claims to be able to make accurate predictions of unusual worlds, like cyberspace. The research …


Tightly Integrating Optical And Inertial Sensors For Navigation Using The Ukf, Sedat Ebcin Mar 2008

Tightly Integrating Optical And Inertial Sensors For Navigation Using The Ukf, Sedat Ebcin

Theses and Dissertations

The motivation of this research is to address the benefits of tightly integrating optical and inertial sensors where GNSS signals are not available. The research begins with describing the navigation problem. Then, error and measurement models are presented. Given a set of features, a feature detection and projection algorithm is developed which utilizes inertial measurements to predict vectors in the feature space between images. The unscented Kalman filter is applied to the navigation system using the inertial measurements and feature matches to estimate the navigation trajectory. Finally, the image-aided navigation algorithm is tested using a simulation and an experiment. As …


Analysis Of Non-Uniform Gain For Control Of A Deformable Mirror In An Adaptive-Optics System, Kevin P. Vitayaudom Mar 2008

Analysis Of Non-Uniform Gain For Control Of A Deformable Mirror In An Adaptive-Optics System, Kevin P. Vitayaudom

Theses and Dissertations

The Air Force Research Laboratory’s Sodium Guidestar Adaptive Optics for Space Situational Awareness program (NGAS) has sponsored research on spatially non-uniform gain for the servo-loop controller of an adaptive optics (AO) system. The edge subapertures of a Shack-Hartmann wavefront sensor have lower signal-to-noise ratios and are more susceptible to measurement errors than fully illuminated center subapertures. These measurement errors produce errant commands over the corresponding edge actuators and can induce instabilities over these regions in strong turbulence conditions. The objective of this research was to develop and experimentally verify the use of spatially varying gain maps on the servo-loop controller …


Scramjet Fuel Injection Array Optimization Utilizing Mixed Variable Pattern Search With Kriging Surrogates, Bryan Sparkman Mar 2008

Scramjet Fuel Injection Array Optimization Utilizing Mixed Variable Pattern Search With Kriging Surrogates, Bryan Sparkman

Theses and Dissertations

Fuel-air mixing analysis of scramjet aircraft is often performed through ex- perimental research or Computational Fluid Dynamics (cfd) algorithms. Design optimization with these approaches is often impossible under a limited budget due to their high cost per run. This investigation uses jetpen, a known inexpensive analysis tool, to build upon a previous case study of scramjet design optimization. Mixed Variable Pattern Search (mvps) is compared to evolutionary algorithms in the optimization of two scramjet designs. The ¯rst revisits the previously stud- ied approach and compares the quality of mvps to prior results. The second applies mvps to a new scramjet …


A Tool To Support Ontology Creation Based On Incremental Mini-Ontology Merging, Zonghui Lian Mar 2008

A Tool To Support Ontology Creation Based On Incremental Mini-Ontology Merging, Zonghui Lian

Theses and Dissertations

This thesis addresses the problem of tool support for semi-automatic ontology mapping and merging. Solving this problem contributes to ontology creation and evolution by relieving users from tedious and time-consuming work. This thesis shows that a tool can be built that will take a “mini-ontology” and a “growing ontology” as input and make it possible to produce manually, semi-automatically, or automatically an extended growing ontology as output. Characteristics of this tool include: (1) a graphical, interactive user interface with features that will allow users to map and merge ontologies, and (2) a framework supporting pluggable, semi-automatic, and automatic mapping and …


What Constitutes An Act Of War In Cyberspace, Kelli S. Kinley Mar 2008

What Constitutes An Act Of War In Cyberspace, Kelli S. Kinley

Theses and Dissertations

In December 2005 a new mission statement was released by the Air Force Leadership, "to deliver sovereign options for the defense of the United States of America and its global interests...to fly and fight in Air, Space and Cyberspace." (Wynne & Mosley, 2005) With the stand up of the AFCYBER command and the use of cyberspace to carry out our daily mission the U.S. needs to have a clear understanding of what war in cyberspace looks like and what the laws are governing war in cyberspace. This research and it's resulting data analysis is intended to provide a better understanding …


Comparing Information Assurance Awareness Training For End-Users: A Content Analysis Examination Of Air Force And Defense Information Systems Agency User Training Modules, John W. Frugé Mar 2008

Comparing Information Assurance Awareness Training For End-Users: A Content Analysis Examination Of Air Force And Defense Information Systems Agency User Training Modules, John W. Frugé

Theses and Dissertations

Today, the threats to information security and assurance are great. While there are many avenues for IT professionals to safeguard against these threats, many times these defenses prove useless against typical system users. Mandated by laws and regulations, all government agencies and most private companies have established information assurance (IA) awareness programs, most of which include user training. Much has been given in the existing literature to laying out the guidance for the roles and responsibilities of IT professionals and higher level managers, but less is specified for "everyday" users of information systems. This thesis attempts to determine the content …


An Evaluation And Implementation Guide For Current Groundwater Mass Flux Measurement Practices, Jack G. Wheeldon Iii Mar 2008

An Evaluation And Implementation Guide For Current Groundwater Mass Flux Measurement Practices, Jack G. Wheeldon Iii

Theses and Dissertations

Contaminant mass flux is an important parameter needed for decision making at sites with contaminated groundwater. New and potentially better methods for measuring mass flux are emerging. This study looks at the conventional transect method (TM), and the newer passive flux meter (PFM), modified integral pump test (MIPT), and tandem circulating well (TCW) methods. In order to facilitate transfer and application of these innovative technologies, it is essential that potential technology users have access to credible information that addresses technology capabilities, limitations, and costs. This study provides such information on each of the methods by reviewing implementation practices and comparing …


A Delphi Study Assessing Long-Term Access To Electronic Medical Records (Emr), Byron D. Nicholson Mar 2008

A Delphi Study Assessing Long-Term Access To Electronic Medical Records (Emr), Byron D. Nicholson

Theses and Dissertations

This research effort addressed the issue of long-term access to electronic medical records as technological generations become obsolete, thereby preventing the access to patient health information. Using the Delphi methodology, experts with experience in electronic medical records and applicable systems provided insight based on their years of hands-on experience managing and/or using records and these systems. The end result of this research was a collection of ideas that medical institutions and medical informaticians must consider to ensure that patients and hospitals do not lose long-term access to electronic medical records as electronic medical records and technology continually evolves. Results of …


Improving Mixed Variable Optimization Of Computational And Model Parameters Using Multiple Surrogate Functions, David Bethea Mar 2008

Improving Mixed Variable Optimization Of Computational And Model Parameters Using Multiple Surrogate Functions, David Bethea

Theses and Dissertations

This research focuses on reducing computational time in parameter optimization by using multiple surrogates and subprocess CPU times without compromising the quality of the results. This is motivated by applications that have objective functions with expensive computational times at high fidelity solutions. Applying, matching, and tuning optimization techniques at an algorithm level can reduce the time spent on unprofitable computations for parameter optimization. The objective is to recover known parameters of a flow property reference image by comparing to a template image that comes from a computational fluid dynamics simulation, followed by a numerical image registration and comparison process. Mixed …


Suspicion Modeling In Support Of Cyber-Influence Operations/Tactics, Henry G. Paguirigan Mar 2008

Suspicion Modeling In Support Of Cyber-Influence Operations/Tactics, Henry G. Paguirigan

Theses and Dissertations

Understanding the cognitive process of IT user suspicion may assist organizations in development of network protection plans, personnel training, and tools necessary to identify and mitigate nefarious intrusions of IT systems. Exploration of a conceptual common ground between psycho-social and technology-related concepts of suspicion are the heart of this investigation. The complexities involved in merging these perspectives led to the overall research question: What is the nature of user suspicion toward IT: The research problem/phenomenon was addressed via extensive literature review, and use of the Interactive Qualitative Analysis problem/phenomenon. Analysis of the system led to the development of a model …


Estimation Of The Number Of Microbial Species Comprising A Population, Melanie R. Slattery Mar 2008

Estimation Of The Number Of Microbial Species Comprising A Population, Melanie R. Slattery

Theses and Dissertations

The purpose of this research was to evaluate the appropriateness of using non-parametric estimators, specifically the Chao1, ACES, and Jackknife methods, for estimation of the number of unique species comprising a population. It goes on to develop a parametric method for the above stated problem. This research consisted of creating diverse populations, with known numbers of species, and applying the aforementioned non-parametric and parametric methods to samples drawn from the constructed populations. The parametric fitting of several different distributions to the sample data, including the lognormal, gamma, and Weibull was considered. Both types of methodologies were then applied to sample …


Ionospheric Response To Solar Flares Using An Improved Version Of Sami2, Joseph P. Reich Iii Mar 2008

Ionospheric Response To Solar Flares Using An Improved Version Of Sami2, Joseph P. Reich Iii

Theses and Dissertations

Solar flares release energy, primarily at X-ray and EUV wavelengths, which is then absorbed mainly in Earth's ionosphere. This non-uniform absorption of energy alters the ionosphere's structure and can change the propagation of electromagnetic waves causing errors in GPS navigation, false radar echoes, and loss of High Frequency (HF) radio communications. Accurately modeling the ionospheric response to flares is the first step in predicting, and then mitigating, their effects. Accurately modeling these effects requires solar irradiance at a high cadence, to capture the flare, which may only last minutes, as well as treatment of the effects of photoelectrons. Sami2 is …