Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 2101 - 2130 of 12617

Full-Text Articles in Physical Sciences and Mathematics

Modern Crypto-Analysis Of Polyalphabetic Ciphers Using A Genetic Algorithm, Benjamin E. Heald Oct 2015

Modern Crypto-Analysis Of Polyalphabetic Ciphers Using A Genetic Algorithm, Benjamin E. Heald

Student Publications

This project involved implementing a genetic algorithm to help automate the crypto-analysis of the Vigenere cipher.


Community Owned Renewable Energy In North Coast Nsw Social Housing, Kelly Leatherman Oct 2015

Community Owned Renewable Energy In North Coast Nsw Social Housing, Kelly Leatherman

Independent Study Project (ISP) Collection

This study assesses the feasibility of implementing community owned renewable energy (CORE) technology in social housing units in North Coast NSW. I completed this study by conducting interviews with three renewable energy policy experts to ascertain the current state of renewable energy and CORE in NSW. Second, I conducted four interviews with separate social housing unit employees/residents to understand their interpretation of current barriers to implementing renewable energy in the social housing and if any of the units currently have any renewable energy technology or energy efficiency programs in place. After finishing this assessment, I did a comparative analysis with …


Comparative Study Of Terrestrial Arthropod Diversity In Primary And Re-Planted Pine Forest In A Community Forest At Andasibe, Madagascar, Tyler George, Mira Kelly-Fair, Andrea Wade Oct 2015

Comparative Study Of Terrestrial Arthropod Diversity In Primary And Re-Planted Pine Forest In A Community Forest At Andasibe, Madagascar, Tyler George, Mira Kelly-Fair, Andrea Wade

Independent Study Project (ISP) Collection

This study is a comparison of tree and terrestrial arthropod diversity along native andre-planted pine transects.Transects were laid in a primary and re-planted pine forest in Andasibe Community Forest Park. Data was collected over six days, taking measurements of trees, inspecting and collecting specimens from pitfall traps once a day. Terrestrial arthropods were identified to morphospecies and measures of diversity were calculated. To understand the health of the trees, information was collected that included trees diameter at breast height, canopy cover and soil cover. Terrestrial arthropod communities and diversity were found to be significantly different in the native and replanted …


Impact Of Invasive Species Datura Arborea On Plant Species Richness In The West Usambara Mountains, Megan Foley Oct 2015

Impact Of Invasive Species Datura Arborea On Plant Species Richness In The West Usambara Mountains, Megan Foley

Independent Study Project (ISP) Collection

Invasive species have the potential to alter the evolutionary trajectory of ecosystems and native species; however, our understanding of the community level effects of invasive plants remains poor. The Eastern Arc Mountain Chain is listed as one of the top 25 biodiversity “hotspots” of the world, yet also as one of the 17 most threatened tropical forest ecosystems worldwide. The primary threat to biodiversity in the EAM is accredited to human encroachment; however, the impact of invasive species in the EAM, and across Tanzania, remains poorly understood. National biodiversity and resource management policy do not directly address invasive species, and …


La Vida Revivida: Una Exploración De La Salud, El Medio Ambiente Y La Cultura En Los Procesos De La Producción Ecológica De Cochabamba, Ethan Wood, Emily Wyler Oct 2015

La Vida Revivida: Una Exploración De La Salud, El Medio Ambiente Y La Cultura En Los Procesos De La Producción Ecológica De Cochabamba, Ethan Wood, Emily Wyler

Independent Study Project (ISP) Collection

Esta investigación intenta explorar cómo los productores incorporan la salud, el medio ambiente, y la cultura en su proceso de producción ecológica. Para responder a esta pregunta, trabajamos con la ONG CIOEC Cochabamba y los productores ecológicos de Cochabamba, para entender cómo es la producción ecológica. Con la investigación, intentamos identificar varias maneras en las que el gobierno del departamento puede brindar más apoyo a los productores y conservar los métodos tradicionales de la producción en Cochabamba. En esta investigación, se utilizaron la observación participativa y las entrevistas semi-estructuradas.


Towards Automatic Generation Of Security-Centric Descriptions For Android Apps, Mu Zhang, Yue Duan, Qian Feng, Heng Yin Oct 2015

Towards Automatic Generation Of Security-Centric Descriptions For Android Apps, Mu Zhang, Yue Duan, Qian Feng, Heng Yin

Research Collection School Of Computing and Information Systems

To improve the security awareness of end users, Android markets directly present two classes of literal app information: 1) permission requests and 2) textual descriptions. Unfortunately, neither can serve the needs. A permission list is not only hard to understand but also inadequate; textual descriptions provided by developers are not security-centric and are significantly deviated from the permissions. To fill in this gap, we propose a novel technique to automatically generate security-centric app descriptions, based on program analysis. We implement a prototype system, DESCRIBEME, and evaluate our system using both DroidBench and real-world Android apps. Experimental results demonstrate that DESCRIBEME …


Social Signal Processing For Real-Time Situational Understanding: A Vision And Approach, Kasthuri Jeyarajah, Shuchao Yao, Raghava Muthuraju, Archan Misra, Geeth De Mel, Julie Skipper, Tarek Abdelzaher, Michael Kolodny Oct 2015

Social Signal Processing For Real-Time Situational Understanding: A Vision And Approach, Kasthuri Jeyarajah, Shuchao Yao, Raghava Muthuraju, Archan Misra, Geeth De Mel, Julie Skipper, Tarek Abdelzaher, Michael Kolodny

Research Collection School Of Computing and Information Systems

The US Army Research Laboratory (ARL) and the Air Force Research Laboratory (AFRL) have established a collaborative research enterprise referred to as the Situational Understanding Research Institute (SURI). The goal is to develop an information processing framework to help the military obtain real-time situational awareness of physical events by harnessing the combined power of multiple sensing sources to obtain insights about events and their evolution. It is envisioned that one could use such information to predict behaviors of groups, be they local transient groups (e.g., protests) or widespread, networked groups, and thus enable proactive prevention of nefarious activities. This paper …


Structural Constraints For Multipartite Entity Resolution With Markov Logic Network, Tengyuan Ye, Hady W. Lauw Oct 2015

Structural Constraints For Multipartite Entity Resolution With Markov Logic Network, Tengyuan Ye, Hady W. Lauw

Research Collection School Of Computing and Information Systems

Multipartite entity resolution seeks to match entity mentions across several collections. An entity mention is presumed unique within a collection, and thus could match at most one entity mention in each of the other collections. In addition to domain-specific features considered in entity resolution, there are a number of domain-invariant structural contraints that apply in this scenario, including one-to-one assignment as well as cross-collection transitivity. We propose a principled solution to the multipartite entity resolution problem, building on the foundation of Markov Logic Network (MLN) that combines probabilistic graphical model and first-order logic. We describe how the domain-invariant structural constraints …


Density Peaks Clustering Approach For Discovering Demand Hot Spots In City-Scale Taxi Fleet Dataset, Dongchang Liu, Shih-Fen Cheng, Yiping Yang Oct 2015

Density Peaks Clustering Approach For Discovering Demand Hot Spots In City-Scale Taxi Fleet Dataset, Dongchang Liu, Shih-Fen Cheng, Yiping Yang

Research Collection School Of Computing and Information Systems

In this paper, we introduce a variant of the density peaks clustering (DPC) approach for discovering demand hot spots from a low-frequency, low-quality taxi fleet operational dataset. From the literature, the DPC approach mainly uses density peaks as features to discover potential cluster centers, and this requires distances between all pairs of data points to be calculated. This implies that the DPC approach can only be applied to cases with relatively small numbers of data points. For the domain of urban taxi operations that we are interested in, we could have millions of demand points per day, and calculating all-pair …


What Are The Characteristics Of High-Rated Apps? A Case Study On Free Android Applications, Tian Yuan, Meiyappan Nagappan, David Lo, Ahmed E. Hassan Oct 2015

What Are The Characteristics Of High-Rated Apps? A Case Study On Free Android Applications, Tian Yuan, Meiyappan Nagappan, David Lo, Ahmed E. Hassan

Research Collection School Of Computing and Information Systems

The tremendous rate of growth in the mobile app market over the past few years has attracted many developers to build mobile apps. However, while there is no shortage of stories of how lone developers have made great fortunes from their apps, the majority of developers are struggling to break even. For those struggling developers, knowing the “DNA” (i.e., characteristics) of high-rated apps is the first step towards successful development and evolution of their apps. In this paper, we investigate 28 factors along eight dimensions to understand how high-rated apps are different from low-rated apps. We also investigate what are …


Constrained Feature Selection For Localizing Faults, Tien-Duy B. Le, David Lo, Ming Li Oct 2015

Constrained Feature Selection For Localizing Faults, Tien-Duy B. Le, David Lo, Ming Li

Research Collection School Of Computing and Information Systems

Developers often take much time and effort to find buggy program elements. To help developers debug, many past studies have proposed spectrum-based fault localization techniques. These techniques compare and contrast correct and faulty execution traces and highlight suspicious program elements. In this work, we propose constrained feature selection algorithms that we use to localize faults. Feature selection algorithms are commonly used to identify important features that are helpful for a classification task. By mapping an execution trace to a classification instance and a program element to a feature, we can transform fault localization to the feature selection problem. Unfortunately, existing …


Spectral And Performance Analysis For The Propagation And Retrieval Of Signals From Modulated Chaos Waves Transmitted Through Modified Von Karman Turbulence, Fathi H.A. Mohamed, Monish Ranjan Chatterjee Oct 2015

Spectral And Performance Analysis For The Propagation And Retrieval Of Signals From Modulated Chaos Waves Transmitted Through Modified Von Karman Turbulence, Fathi H.A. Mohamed, Monish Ranjan Chatterjee

Electrical and Computer Engineering Faculty Publications

A transfer function formalism is applied to track propagation of modulated chaos waves through modified von Karman phase turbulence; the demodulated signal is examined vis-à-vis performance relative to turbulence strength in comparison with non-chaotic propagation.


Choosing Your Weapons: On Sentiment Analysis Tools For Software Engineering Research, Robbert Jongeling, Subhajit Datta, Alexander Serebrenik Oct 2015

Choosing Your Weapons: On Sentiment Analysis Tools For Software Engineering Research, Robbert Jongeling, Subhajit Datta, Alexander Serebrenik

Research Collection School Of Computing and Information Systems

Recent years have seen an increasing attention to social aspects of software engineering, including studies of emotions and sentiments experienced and expressed by the software developers. Most of these studies reuse existing sentiment analysis tools such as SentiStrength and NLTK. However, these tools have been trained on product reviews and movie reviews and, therefore, their results might not be applicable in the software engineering domain. In this paper we study whether the sentiment analysis tools agree with the sentiment recognized by human evaluators (as reported in an earlier study) as well as with each other. Furthermore, we evaluate the impact …


Two Formulas For Success In Social Media: Learning And Network Effects, Liangfei Qiu, Qian Tang, Andrew B. Whinston Oct 2015

Two Formulas For Success In Social Media: Learning And Network Effects, Liangfei Qiu, Qian Tang, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

Recent years have witnessed an unprecedented explosion in information technology that enables dynamic diffusion of user-generated content in social networks. Online videos, in particular, have changed the landscape of marketing and entertainment, competing with premium content and spurring business innovations. In the present study, we examine how learning and network effects drive the diffusion of online videos. While learning happens through informational externalities, network effects are direct payoff externalities. Using a unique data set from YouTube, we empirically identify learning and network effects separately, and find that both mechanisms have statistically and economically significant effects on video views; furthermore, the …


A Secured Cloud System Based On Log Analysis, Sindhusha Doddapaneni Oct 2015

A Secured Cloud System Based On Log Analysis, Sindhusha Doddapaneni

Master's Projects

Now-a-days, enterprises’ acceptance over the Cloud is increasing but businesses are now finding issues related to security. Everyday, users store a large amount of data in the Cloud and user input may be malicious. Therefore, security has become the critical feature in the applications stored in the Cloud. Though there are many existing systems which provide us different encryption algorithms and security methods, there is still a possibility of attacks to applications and increasing data modifications. The idea behind this project is to find attacks and protect the applications stored in the Cloud using log analysis. The proposed solution detects …


Energy Efficiency And Quality Of Services In Virtualized Cloud Radio Access Network, Khushbu Mohta Oct 2015

Energy Efficiency And Quality Of Services In Virtualized Cloud Radio Access Network, Khushbu Mohta

Master's Projects

Cloud Radio Access Network (C-RAN) is being widely studied for soft and green fifth generation of Long Term Evolution - Advanced (LTE-A). The recent technology advancement in network virtualization function (NFV) and software defined radio (SDR) has enabled virtualization of Baseband Units (BBU) and sharing of underlying general purpose processing (GPP) infrastructure. Also, new innovations in optical transport network (OTN) such as Dark Fiber provides low latency and high bandwidth channels that can support C-RAN for more than forty-kilometer radius. All these advancements make C-RAN feasible and practical. Several virtualization strategies and architectures are proposed for C-RAN and it has …


Designing A Programming Contract Library For Java, Neha Rajkumar Oct 2015

Designing A Programming Contract Library For Java, Neha Rajkumar

Master's Projects

Programmers are now developing large and complex software systems, so it’s important to have software that is consistent, efficient, and robust. Programming contracts allow developers to specify preconditions, postconditions, and invariants in order to more easily identify programming errors. The design by contract principle [1] was first used in the Eiffel programming language [2], and has since been extended to libraries in many other languages. The purpose of my project is to design a programming contract library for Java. The library supports a set of preconditions, postconditions, and invariants that are specified in Java annotations. It incorporates contract checking for …


Sharedwealth: A Cryptocurrency To Reward Miners Evenly, Siddiq Ahmed Syed Oct 2015

Sharedwealth: A Cryptocurrency To Reward Miners Evenly, Siddiq Ahmed Syed

Master's Projects

Bitcoin [19] is a decentralized cryptocurrency that has recently gained popularity and has emerged as a popular medium of exchange. The total market capitalization is around 1.5 billion US dollars as of October 2013 [28]. All the operations of Bitcoin are maintained in a distributed public global ledger known as a block chain which consists of all the successful transactions that have ever taken place. The security of a block chain is maintained by a chain of cryptographic puzzles solved by participants called miners, who in return are rewarded with bitcoins. To be successful, the miner has to put in …


Metamorphic Code Generator Based On Bytecode Of Llvm Ir, Arjun Shah Oct 2015

Metamorphic Code Generator Based On Bytecode Of Llvm Ir, Arjun Shah

Master's Projects

Metamorphic software is famous for changing the internal structure of the code while keeping the functionality same. In order to escape the signature detection along with some advanced detection techniques, many malware writers have used metamorphism as the means. On the other hand, code morphing technique increases the diversity of the software which is considered to be a potential security advantage. In our paper, we have developed a metamorphic code generator based on the LLVM framework. The architecture of LLVM has a three-phase compiler design which includes the front end, the optimizer and the back end. It also gives assistance …


Implementing Type Inference In Jedi, Vaibhav Kamble Oct 2015

Implementing Type Inference In Jedi, Vaibhav Kamble

Master's Projects

This thesis begins with an overview of type systems: evolution, concepts, and problems. This survey is based on type systems of modern languages like Scala and Haskell. Scala has a very sophisticated type system that includes generics, polymorphism, and closures. It has a built-in type inference mechanism that enables the programmer to exclude certain type annotations. It is often not required in Scala to mention the type of a variable because the compiler can infer the type from the initialization of the variable. Study of such type system is demonstrated by the implementation of the type system. A type system …


Collaboration Prototyper: Automatic Generation Of Prototypes From Uml Collaborations, Ramya Badthody Shenoy Oct 2015

Collaboration Prototyper: Automatic Generation Of Prototypes From Uml Collaborations, Ramya Badthody Shenoy

Master's Projects

The thesis begins with a discussion of the use of designing versus prototyping in the initial stages of software development lifecycle. We present the idea of generating a working prototype directly from a UML analysis model to overcome time spent on creating a prototype. UML diagrams can be made to give sufficient information to generate code. Collaborations form the backbone of analysis models. A collaboration can be defined as a UML class diagram together with one or more sequence diagrams. Collaborations are the input of the Collaboration Prototyper (CP). CP transforms a collaboration into a Java prototype.


Scalable Techniques For Similarity Search, Siddartha Reddy Nagireddy Oct 2015

Scalable Techniques For Similarity Search, Siddartha Reddy Nagireddy

Master's Projects

Document similarity is similar to the nearest neighbour problem and has applications in various domains. In order to determine the similarity / dissimilarity of the documents first they need to be converted into sets containing shingles. Each document is converted into k-shingles, k being the length of each shingle. The similarity is calculated using Jaccard distance between sets and output into a characteristic matrix, the complexity to parse this matrix is significantly high especially when the sets are large. In this project we explore various approaches such as Min hashing, LSH & Bloom Filter to decrease the matrix size and …


Improving The Accuracy And Robustness Of Self-Tuning Histograms By Subspace Clustering, Sai Kiran Padooru Oct 2015

Improving The Accuracy And Robustness Of Self-Tuning Histograms By Subspace Clustering, Sai Kiran Padooru

Master's Projects

Self-tuning histograms are a type of histograms very popular these days, as they allow the usage of multidimensional datasets. The main advantage of them is that they have a low computational cost due to their capacity to understand the dataset. Also, they proposed a better approach as they stay up-to-date and have adaptability to query patterns. According to the above, many researchers have worked on improving the accuracy of these type of histograms, which has led to the use of subspace clustering methods as initialization values. Following this approach in this study, a self-tuning histogram code was developed with the …


A Javascript And Php Epub Reader Web Application, Xiaqing He Oct 2015

A Javascript And Php Epub Reader Web Application, Xiaqing He

Master's Projects

EPUB is one of the most popular ebook formats. It is supported by many e-Readers, such as Apple’s iBooks, BlackBerry Playbooks, Sony Reader, Kobo eReader, Amazon Kindle Fire, and the Mozilla Firefox add-on EPUBReader. In this report, we describe our implementation of a JavaScript and PHP EPUB reader web application. This web application allows users to read the EPUB format books easily across multiple devices without any specified platform lock-in. Our application provides an EPUB library. When a user logs in, he can borrow an EPUB book from the library and save into his own bookshelf, then choose any one …


Question Answering System For Yioop, Niravkumar Patel Oct 2015

Question Answering System For Yioop, Niravkumar Patel

Master's Projects

Yioop is an open source search engine developed and managed by Dr. Christopher Pollett. Currently, Yioop returns the search results of the query in the form of list of URLs, just like other search engines (Google, Bing, DuckDuckGo, etc.) This paper created a new module for Yioop. This new module, known as the Question-Answering (QA) System, takes the search queries in the form of natural language questions and returns results in the form of a short answer that is appropriate to the question asked. This feature is achieved by implementing various functionalities of Natural Language Processing (NLP). By using NLP, …


On-The-Fly Map Generator For Openstreetmap Data Using Webgl, Sreenidhi Pundi Muralidharan Oct 2015

On-The-Fly Map Generator For Openstreetmap Data Using Webgl, Sreenidhi Pundi Muralidharan

Master's Projects

This project describes an approach to create an On-the-fly Map Generator for Openstreetmap Data Using WebGL. The most common methods to generate online maps generate PNG overlay tile images from a wide range of data sources, like GeoJSON, GeoTIFF, PostGIS, CSV, and SQLite, etc., based on the coordinates and zoom-level. This project aims to send vector data for the map to the browser and hence render maps on-the-fly using WebGL. We push all of the vector computation to the GPU. This means that less data needs to be sent to the browser. We have compared existing approaches to our method …


Clustering Web Concepts Using Algebraic Topology, Harleen Kaur Ahuja Oct 2015

Clustering Web Concepts Using Algebraic Topology, Harleen Kaur Ahuja

Master's Projects

In this world of Internet, there is a rapid amount of growth in data both in terms of size and dimension. It consists of web pages that represents human thoughts. These thoughts involves concepts and associations which we can capture. Using mathematics, we can perform meaningful clustering of these pages. This project aims at providing a new problem solving paradigm known as algebraic topology in data science. Professor Vasant Dhar, Editor-In-Chief of Big Data (Professor at NYU) define data science as a generalizable extraction of knowledge from data. The core concept of semantic based search engine project developed by my …


Relationship Based Entity Recommendation System, Rakhi Poonam Verma Oct 2015

Relationship Based Entity Recommendation System, Rakhi Poonam Verma

Master's Projects

With the increase in usage of the internet as a place to search for information, the importance of the level of relevance of the results returned by search engines have increased by many folds in recent years. In this paper, we propose techniques to improve the relevance of results shown by a search engine, by using the kinds of relationships between entities a user is interested in. We propose a technique that uses relationships between entities to recommend related entities from a knowledge base which is a collection of entities and the relationships with which they are connected to other …


James City County Shoreline Management Plan, C. Scott Hardaway Jr., Donna A. Milligan, Christine A. Wilcox, Marcia Berman, Tamia Rudnicky, Karinna Nunez, Sharon A. Killeen Oct 2015

James City County Shoreline Management Plan, C. Scott Hardaway Jr., Donna A. Milligan, Christine A. Wilcox, Marcia Berman, Tamia Rudnicky, Karinna Nunez, Sharon A. Killeen

Reports

Actions taken by waterfront property owners to stabilize the shoreline can affect the health of the Bay as well as adjacent properties for decades. With these long-term implications, managers at the local level should have a more proactive role in how shorelines are managed. James City County recognizes that its natural environment is one of its most valuable assets as well as its most vulnerable (James City County, 2015). The shores of James City range from exposed open river to very sheltered creeks, and the nature of shoreline change varies accordingly (Figure 1-1). This shoreline management plan is useful for …


North-Central Nebraska Geology: Niobrara River Valley In Brown, Cherry, And Keya Paha Counties, R. M. Joeckel, L. M. Howard, S. T. Tucker Oct 2015

North-Central Nebraska Geology: Niobrara River Valley In Brown, Cherry, And Keya Paha Counties, R. M. Joeckel, L. M. Howard, S. T. Tucker

Conservation and Survey Division

No abstract provided.