Dissertations / Theses on the topic 'Communication in science – data processing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Communication in science – data processing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Wist, Dominic, and Ralf Wollowski. "STG decomposition : avoiding irreducible CSC conflicts by internal communication." Universität Potsdam, 2007. http://opus.kobv.de/ubp/volltexte/2009/3296/.
Full textHine, Nicolas A. "Towards a multimedia communication service for people with disabilities." Thesis, University of Dundee, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271377.
Full textEarle, Nicholas John. "Designing a visual component of communication within 3D avatar virtual worlds." Thesis, University of Plymouth, 2001. http://hdl.handle.net/10026.1/2600.
Full textNehme, Rimma V. "Continuous query processing on spatio-temporal data streams." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-082305-154035/.
Full textAlexanderson, Simon. "Performance, Processing and Perception of Communicative Motion for Avatars and Agents." Doctoral thesis, KTH, Tal, musik och hörsel, TMH, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-218272.
Full textQC 20171127
Yanggratoke, Rerngvit. "GPU Network Processing." Thesis, KTH, Telekommunikationssystem, TSLab, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103694.
Full textNätverksteknik ansluter fler och fler människor runt om i världen. Det har blivit en viktig del av vårt dagliga liv. För att denna anslutning skall vara sömlös, måste nätet vara snabbt. Den snabba tillväxten i nätverkstrafiken och olika kommunikationsprotokoll sätter stora krav på processorer som hanterar all trafik. Befintliga lösningar på detta problem, t.ex. ASIC, FPGA, NPU, och TOE är varken kostnadseffektivt eller lätta att hantera, eftersom de kräver speciell hårdvara och anpassade konfigurationer. Denna avhandling angriper problemet på ett annat sätt genom att avlasta nätverks processningen till grafikprocessorer som sitter i vanliga pc-grafikkort. Avhandlingen främsta mål är att ta reda på hur GPU bör användas för detta. Avhandlingen följer fallstudie modell och de valda fallen är lager 2 Bloom filter forwardering och ``flow lookup'' i Openflow switch. Implementerings alternativ och utvärderingsmetodik föreslås för både fallstudierna. Sedan utvecklas och utvärderas en prototyp för att jämföra mellan traditionell CPU- och GPU-offload. Det primära resultatet från detta arbete utgör kriterier för nätvärksprocessfunktioner lämpade för GPU offload och vilka kompromisser som måste göras. Kriterier är inget inter-paket beroende, liknande processflöde för alla paket. och möjlighet att köra fler processer på ett paket paralellt. GPU offloading ger ökad fördröjning och minneskonsumption till förmån för högre troughput.
Gandhi, Rajiv. "Communication infratructure for a distributed actor system /." This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-03302010-020449/.
Full textIruria, Daniel Muriuki. "An information systems study on the generation, communication, and utilisation of information on agricultural technology and innovations for small-scale farmers in Kenya." Thesis, University of Strathclyde, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.299078.
Full textGreen, Charles A. "An empirical study on the effects of a collaboration-aware computer system and several communication media alternatives on product quality and time to complete in a co-authoring environment." Thesis, Virginia Tech, 1992. http://hdl.handle.net/10919/40617.
Full textMaster of Science
Lunemann, Carolin. "Quantum cryptography : security analysis of multiuser quantum communication with embedded authentication." Master's thesis, Universität Potsdam, 2006. http://opus.kobv.de/ubp/volltexte/2007/1275/.
Full textIn der Diplomarbeit werden drei verschiedene quantenkryptographische Protokolle mit dem Schwerpunkt auf authentifizierten Quantennetzwerken analysiert. Die Sicherheit der Protokolle gegenüber verschiedenen Angriffen wird untersucht, wobei der Fokus auf kompletten Personifikationsattacken („impersonation attacks“) liegt. Auf Basis der Sicherheitsanalyse und den Netzwerkanforderungen werden entsprechende Verbesserungen vorgeschlagen. Um die Gefahr von Personifikationen realistisch abschätzen zu können, wird außerdem der Einfluss des Testablaufs analysiert. Um zusätzlichen Schutz gegen Personifikationsattacken zu gewährleisten, werden die Rahmenbedingungen für eine allgemeine Testspezifikation festgelegt.
Mahr, Philipp. "Resource efficient communication in network-based reconfigurable on-chip systems." Phd thesis, Universität Potsdam, 2012. http://opus.kobv.de/ubp/volltexte/2012/5991/.
Full textDie Leistungsfähigkeit rekonfigurierbarer Rechensysteme steigt kontinuierlich und ermöglicht damit die parallele Ausführung von immer mehr und immer größeren Anwendungen. Die Vielfalt an Anwendungen macht es allerdings unmöglich ein optimales Kommunikationsnetzwerk zu entwickeln, welches die Anforderung jeder denkbaren Anwendung berücksichtigt. Die Performanz des rekonfigurierbaren Rechensystems sinkt. Das Kommunikationsnetzwerk ist jedoch nicht der einzige Teil des Systems, der Einfluss auf die Kommunikation- sperformanz nimmt. Die Ressourcenverwaltung des Systems beeinflusst durch die Platzierung der Anwendungen die Latenz zwischen Kommunikationspartnern und die Kommunikationslast im Netzwerk. Kommunikationsprotokolle beeinträchtigen die Performanz der Kommunikation durch Daten und Rechen- overhead, die ebenso zu erhöhter Netzwerklast sowie Ressourcenanforderungen führen. In einem ganzheitlichen Kommunikationsansatz wird nicht nur das Kommunikationsnetzwerk berücksichtigt, sondern außerdem Ressourcenverwaltung, Kommunikationsprotokolle und die anderweitige Verwendung vorhandener, temporär ungenutzter Kommunikationsressourcen. Durch Einbeziehung dieser Aspekte während Entwurfs- und Laufzeit und durch Optimierung unter Berücksichtigung der Kommunikationsanforderungen, wird eine ressourceneneffizien tere Kommunikation erreicht. Ausführliche Evaluationen zeigen, dass eine ganzheitliche Betrachtung von Kommunikationsfaktoren, Verbesserungen von Performanz und Flexibilität erzielt.
Neelamegam, Jothi P. "Zero-sided communication : challenges in implementing time-based channels using the MPI/RT specification." Master's thesis, Mississippi State : Mississippi State University, 2002. http://library.msstate.edu/etd/show.asp?etd=etd-03252002-153109.
Full textDurbeck, Lisa J. "Global Energy Conservation in Large Data Networks." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/78291.
Full textPh. D.
Bharadwaj, V. "Distributed Computation With Communication Delays: Design And Analysis Of Load Distribution Strategies." Thesis, Indian Institute of Science, 1994. https://etd.iisc.ac.in/handle/2005/161.
Full textBharadwaj, V. "Distributed Computation With Communication Delays: Design And Analysis Of Load Distribution Strategies." Thesis, Indian Institute of Science, 1994. http://hdl.handle.net/2005/161.
Full textWist, Dominic, Mark Schaefer, Walter Vogler, and Ralf Wollowski. "STG decomposition : internal communication for SI implementability." Universität Potsdam, 2010. http://opus.kobv.de/ubp/volltexte/2010/4078/.
Full textSTG-Dekomposition ist ein bewährter Ansatz zur Bewältigung der Komplexitätsprobleme bei der Logiksynthese von SI (speed independent) Schaltungen – ein robuster asynchroner (d.h. ohne Taktsignal arbeitender digitaler) Schaltungstyp. Allerdings können dabei Komponenten mit irreduziblen CSC-Konflikten entstehen. Durch Verallgemeinerung früherer Arbeiten wird gezeigt, wie solche Konflikte durch Einführung interner Kommunikation zwischen den Komponenten gelöst werden können, und zwar ausschließlich durch Verwendung an der Graphenstruktur ansetzender Verfahren.
Li, Yafei. "Efficient group queries in location-based social networks." HKBU Institutional Repository, 2015. https://repository.hkbu.edu.hk/etd_oa/203.
Full textDu, Wei. "Advanced middleware support for distributed data-intensive applications." Connect to resource, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1126208308.
Full textTitle from first page of PDF file. Document formatted into pages; contains xix, 183 p.; also includes graphics (some col.). Includes bibliographical references (p. 170-183). Available online via OhioLINK's ETD Center
Li, Yingjie. "Information dissemination and routing in communication networks." Columbus, Ohio : Ohio State University, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1132767756.
Full textZhang, Bo. "XOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lan." Thesis, Peninsula Technikon, 2004. http://hdl.handle.net/20.500.11838/1376.
Full textEncryption was used whenever someone wanted to send a secret message to someone. The quality of the algorithm and key combination were the factors that ensured the strength of the system. However, until there were some automation one could not use complex methods for encryption because it simply took too long to encrypt and decrypt messages (even worse for images), manually. Optical technologies have recently been employed in encryption. Compared with traditional computer and electrical systems, optical technologies offer primarily two types of benefits, namely optical systems have an inherent capability for parallel processing, that is, rapid transmission of information, and information can be hidden in any of several dimensions, such as phase or spatial frequency. Optical systems therefore have an excellent capability for encoding information. In this project an image encryption technique was developed using exclusive-OR (XOR) operations in the optical domain before the captured image entered a digital computer network for further processing. A gray-level image of the object to be encrypted was converted a binary format and a pixel by pixel exclusive OR operation was performed on it with a random key-bit by making use of polarization encoding in LCD technology, before the encrypted binary image was detected by a CCD. The image may also be used as an input to a computer for comparison with a database. However, noise alters the encrypted bit and the value of the noisy encrypted bit is no longer binary. In this research the encryption techniques was evaluated and tested for applicability to encrypt and decrypt successfully. The noise performance was tested and compared. The technique was applied for image transmission over a wireless IP broadband link. Images (optical and thermal) captured from telemedicine application was transmitted and decrypted with reasonable success in this application.
Li, Ling Feng. "An image encryption system based on two-dimensional quantum random walks." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950660.
Full textHenry, Didier. "Modèles de propagation de l'information et méthodes de sciences des données." Thesis, Antilles, 2018. http://www.theses.fr/2018ANTI0323/document.
Full textNowadays, online social media has transformed the way we create, share and access information. These platforms rely on gigantic networks that promote the free exchange of information between hundreds of millions of people around the world, and this instantly.Whether related to a global event or in connection with a local event, these messages may influence a society and may contain information useful for the detection or prediction of real-world phenomena.However, some broadcast messages can have a very negative impact in real life. These messages containing false information can have disastrous consequences.To avoid and anticipate these dramatic situations, follow rumors, avoid bad reputations, it is necessary to study and then model the propagation of information.However, most of the diffusion models introduced are based on axiomatic hypotheses represented by mathematical models. As a result, these models are far removed from the users' dissemination behaviors in that they do not incorporate observations made on concrete dissemination cases. In our work, we study the phenomenon of diffusion of information at two scales. On a microscopic scale, we observed diffusion behaviors based on the personality traits of users by analyzing the messages they post in terms of feelings and emotions. On a macroscopic scale, we analyzed the evolution of the diffusion phenomenon by taking into account the geographical dimension of the users
Amedzo, Ephraim Kofi. "The integration of information and communication technology into rural schools of South Africa : a case study of schools in Malamulele /." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/329.
Full textAmpatzis, Christos. "On the evolution of autonomous decision-making and communication in collective robotics." Doctoral thesis, Universite Libre de Bruxelles, 2008. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210445.
Full textbehaviour for groups of simulated and real robots. Our contribution will be on
the design of non-trivial individual and collective behaviour; decisions about solitary or
social behaviour will be temporal and they will be interdependent with communicative
acts. In particular, we study time-based decision-making in a social context: how the
experiences of robots unfold in time and how these experiences influence their interaction
with the rest of the group. We propose three experiments based on non-trivial real-world
cooperative scenarios. First, we study social cooperative categorisation; signalling and
communication evolve in a task where the cooperation among robots is not a priori required.
The communication and categorisation skills of the robots are co-evolved from
scratch, and the emerging time-dependent individual and social behaviour are successfully
tested on real robots. Second, we show on real hardware evidence of the success of evolved
neuro-controllers when controlling two autonomous robots that have to grip each other
(autonomously self-assemble). Our experiment constitutes the first fully evolved approach
on such a task that requires sophisticated and fine sensory-motor coordination, and it
highlights the minimal conditions to achieve assembly in autonomous robots by reducing
the assumptions a priori made by the experimenter to a functional minimum. Third, we
present the first work in the literature to deal with the design of homogeneous control
mechanisms for morphologically heterogeneous robots, that is, robots that do not share
the same hardware characteristics. We show how artificial evolution designs individual
behaviours and communication protocols that allow the cooperation between robots of
different types, by using dynamical neural networks that specialise on-line, depending on
the nature of the morphology of each robot. The experiments briefly described above
contribute to the advancement of the state of the art in evolving neuro-controllers for
collective robotics both from an application-oriented, engineering point of view, as well as
from a more theoretical point of view.
Doctorat en Sciences de l'ingénieur
info:eu-repo/semantics/nonPublished
Chavan, Rohit. "JAVA synchronized collaborative multimedia toolkit: A collaborative communication tool." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2549.
Full textJones, Stephen W. "Intercultural development in global service-learning." Scholarly Commons, 2011. https://scholarlycommons.pacific.edu/uop_etds/789.
Full textZhang, Hongwei. "Dependable messaging in wireless sensor networks." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1155607973.
Full textSun, Zhibin. "Application of artificial neural networks in early detection of Mastitis from improved data collected on-line by robotic milking stations." Lincoln University, 2008. http://hdl.handle.net/10182/665.
Full textRuan, Jianhua, Han-Shen Yuh, and Koping Wang. "Spider III: A multi-agent-based distributed computing system." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2249.
Full textSOLE, MARIELLA. "Communication technologies and data processing for safety." Doctoral thesis, Università degli Studi di Cagliari, 2014. http://hdl.handle.net/11584/266424.
Full textDaveau, Jean-Marc. "Spécifications systèmes et synthèse de la communication pour le co-design logiciel/matériel." Grenoble INPG, 1997. https://tel.archives-ouvertes.fr/tel-00002996.
Full textAs the system complexity grows there is a need for new methods to handle large system design. One way to manage that complexity is to rise the level of abstraction of the specifications by using system level description languages. On the other side, as the level of abstraction rise the gap between the concepts used for the specification at the system level (communication channels, interacting processes, data types) and those used for hardware synthesis becomes wider. Although these languages are well suited for the specification and validation of complex real time distributed systems, the concepts manipulated are not easy to map onto hardware description languages. It is thus necessary to defines methods for system level synthesis enabling efficient synthesis from system level specifications. The subject of this thesis is the presentation of a new approach of generation of C and VHDL code from system level specifications in SDL. This approach solves the main problem encountered by previous approach : inter process communications. SDL communication can be translated in VHDL for synthesis. This is achieved by the use of a powerful intermediate form that support the modelling for synthesis of a wide range of communication schemes. This intermediate form allows to apply to the system a set of transformations in order to obtain the desired solution. The main refinement step, called communication synthesis is aimed at fixing the protocol and interface used by the different processes to communicate. The refined specification can be translated in C and VHDL and synthesised by commercial tools. We illustrate the feasibility of this approach through an application to a telecommunication example : the TCP/IP over ATM protocol
Hoyt, Matthew Ray. "Automatic Tagging of Communication Data." Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc149611/.
Full textRavindran, K. "Reliable client-server communication in distributed programs." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/27514.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Benmusa, Tammam A. "The processing and interpretation of communication network performance data." Thesis, Loughborough University, 2005. https://dspace.lboro.ac.uk/2134/13503.
Full textGanz, Frieder. "Intelligent communication and information processing for cyber-physical data." Thesis, University of Surrey, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.654752.
Full textNavaratnam, Srivallipuranandan. "Reliable group communication in distributed systems." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26505.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Singer, Andrew C. (Andrew Carl). "Signal processing and communication with solitons." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/11011.
Full textIncludes bibliographical references (p. 137-142).
by Andrew Carl Singer.
Ph.D.
Golab, Lukasz. "Sliding Window Query Processing over Data Streams." Thesis, University of Waterloo, 2006. http://hdl.handle.net/10012/2930.
Full textThis dissertation begins with the observation that the two fundamental requirements of a DSMS are dealing with transient (time-evolving) rather than static data and answering persistent rather than transient queries. One implication of the first requirement is that data maintenance costs have a significant effect on the performance of a DSMS. Additionally, traditional query processing algorithms must be re-engineered for the sliding window model because queries may need to re-process expired data and "undo" previously generated results. The second requirement suggests that a DSMS may execute a large number of persistent queries at the same time, therefore there exist opportunities for resource sharing among similar queries.
The purpose of this dissertation is to develop solutions for efficient query processing over sliding windows by focusing on these two fundamental properties. In terms of the transient nature of streaming data, this dissertation is based upon the following insight. Although the data keep changing over time as the windows slide forward, the changes are not random; on the contrary, the inputs and outputs of a DSMS exhibit patterns in the way the data are inserted and deleted. It will be shown that the knowledge of these patterns leads to an understanding of the semantics of persistent queries, lower window maintenance costs, as well as novel query processing, query optimization, and concurrency control strategies. In the context of the persistent nature of DSMS queries, the insight behind the proposed solution is that various queries may need to be refreshed at different times, therefore synchronizing the refresh schedules of similar queries creates more opportunities for resource sharing.
Vijayakumar, Nithya Nirmal. "Data management in distributed stream processing systems." [Bloomington, Ind.] : Indiana University, 2007. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3278228.
Full textSource: Dissertation Abstracts International, Volume: 68-09, Section: B, page: 6093. Adviser: Beth Plale. Title from dissertation home page (viewed May 9, 2008).
RUBIN, ANDREA. "FOOD IMMERSION. LE RAPPRESENTAZIONI DEL CIBO E DEL RISCHIO ALIMENTARE NELLA SFERA PUBBLICA." Doctoral thesis, Università Cattolica del Sacro Cuore, 2018. http://hdl.handle.net/10280/50315.
Full textThesis work consists in empirical research on the communication of the food theme, in a techno-scientific framework. Recently, nutrition has been linked to a lot of interests: social, economical, industrial, commercial, political, media but also scientific ones. These are significant issues that concern the public opinion and attract the media attention. In a society that revolves strongly around media, it becomes relevant to observe how the public discourse on themes like food and nutrition is being shaped among the public sphere. In addition, the rising of several techno-scientific projects that concern the field of nutrition cannot help but suggest to look at nutrition, and its symbolism, like a privileged object through which one can also observe the existing ties between science, technology and society. This study started by exploring the characteristics of the narrative of the food theme and its presence in the public arena through an analysis of the main Italian daily newspapers. One former longitudinal analysis, in the time-span 1992-2013, found- through an innovative tool of textual analysis ( topic detection)- the presence of some emerging themes. Next, we shifted our attention to the last period (2010-2016), with the aim to focus on the majority of the recent events and to verify whether the media discourse on food and nutrition gained new relevance or forms in the media agenda and in the public discussion. The research work is composed of two other different kind of analysis: on the one hand, it will discuss the emerging results from three focus groups that provided useful indications on the relationship between food, media and the public opinion; on the other hand, we sought to identify a relation between media coverage and the attitudes of the public opinion by adopting a “risk indicator” and the data from certain European surveys.
RUBIN, ANDREA. "FOOD IMMERSION. LE RAPPRESENTAZIONI DEL CIBO E DEL RISCHIO ALIMENTARE NELLA SFERA PUBBLICA." Doctoral thesis, Università Cattolica del Sacro Cuore, 2018. http://hdl.handle.net/10280/50315.
Full textThesis work consists in empirical research on the communication of the food theme, in a techno-scientific framework. Recently, nutrition has been linked to a lot of interests: social, economical, industrial, commercial, political, media but also scientific ones. These are significant issues that concern the public opinion and attract the media attention. In a society that revolves strongly around media, it becomes relevant to observe how the public discourse on themes like food and nutrition is being shaped among the public sphere. In addition, the rising of several techno-scientific projects that concern the field of nutrition cannot help but suggest to look at nutrition, and its symbolism, like a privileged object through which one can also observe the existing ties between science, technology and society. This study started by exploring the characteristics of the narrative of the food theme and its presence in the public arena through an analysis of the main Italian daily newspapers. One former longitudinal analysis, in the time-span 1992-2013, found- through an innovative tool of textual analysis ( topic detection)- the presence of some emerging themes. Next, we shifted our attention to the last period (2010-2016), with the aim to focus on the majority of the recent events and to verify whether the media discourse on food and nutrition gained new relevance or forms in the media agenda and in the public discussion. The research work is composed of two other different kind of analysis: on the one hand, it will discuss the emerging results from three focus groups that provided useful indications on the relationship between food, media and the public opinion; on the other hand, we sought to identify a relation between media coverage and the attitudes of the public opinion by adopting a “risk indicator” and the data from certain European surveys.
Chen, Siheng. "Data Science with Graphs: A Signal Processing Perspective." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/724.
Full textDerksen, Timothy J. (Timothy John). "Processing of outliers and missing data in multivariate manufacturing data." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/38800.
Full textIncludes bibliographical references (leaf 64).
by Timothy J. Derksen.
M.Eng.
Lian, Xiang. "Efficient query processing over uncertain data /." View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?CSED%202009%20LIAN.
Full textDa, Yanan. "A Big Spatial Data System for Efficient and Scalable Spatial Data Processing." Thesis, Southern Illinois University at Edwardsville, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10682760.
Full textToday, a large amount of spatial data is generated from a variety of sources, such as mobile devices, sensors, and satellites. Traditional spatial data processing techniques no longer satisfy the efficiency and scalability requirements for large-scale spatial data processing. Existing Big Data processing frameworks such as Hadoop and Spark have been extended to support effective large-scale spatial data processing. In addition to processing data in distributed schemes utilizing computer clusters for efficiency and scalability, single node performance can also be improved by making use of multi-core processors. In this thesis, we investigate approaches to parallelize line segment intersection algorithms for spatial computations on multi-core processors, which can be used as node-level algorithms for distributed spatial data processing. We first provide our design of line segment intersection algorithms and introduce parallelization techniques. Then, we describe experimental results using multiple data sets and speed ups are examined with varying numbers of processing cores. Equipped with the efficient underlying algorithm for spatial computation, we investigate how to build a native big spatial data system from the ground up. We provide a system design for distributed large-scale spatial data management and processing using a two-level hash based Quadtree index as well as algorithms for spatial operations.
Wang, Jiayin. "Building Efficient Large-Scale Big Data Processing Platforms." Thesis, University of Massachusetts Boston, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10262281.
Full textIn the era of big data, many cluster platforms and resource management schemes are created to satisfy the increasing demands on processing a large volume of data. A general setting of big data processing jobs consists of multiple stages, and each stage represents generally defined data operation such as ltering and sorting. To parallelize the job execution in a cluster, each stage includes a number of identical tasks that can be concurrently launched at multiple servers. Practical clusters often involve hundreds or thousands of servers processing a large batch of jobs. Resource management, that manages cluster resource allocation and job execution, is extremely critical for the system performance.
Generally speaking, there are three main challenges in resource management of the new big data processing systems. First, while there are various pending tasks from dierent jobs and stages, it is difficult to determine which ones deserve the priority to obtain the resources for execution, considering the tasks' different characteristics such as resource demand and execution time. Second, there exists dependency among the tasks that can be concurrently running. For any two consecutive stages of a job, the output data of the former stage is the input data of the later one. The resource management has to comply with such dependency. The third challenge is the inconsistent performance of the cluster nodes. In practice, run-time performance of every server is varying. The resource management needs to dynamically adjust the resource allocation according to the performance change of each server.
The resource management in the existing platforms and prior work often rely on fixed user-specic congurations, and assumes consistent performance in each node. The performance, however, is not satisfactory under various workloads. This dissertation aims to explore new approaches to improving the eciency of large-scale big data processing platforms. In particular, the run-time dynamic factors are carefully considered when the system allocates the resources. New algorithms are developed to collect run-time data and predict the characteristics of jobs and the cluster. We further develop resource management schemes that dynamically tune the resource allocation for each stage of every running job in the cluster. New findings and techniques in this dissertation will certainly provide valuable and inspiring insights to other similar problems in the research community.
Li, Quanzhong. "Indexing and path query processing for XML data." Diss., The University of Arizona, 2004. http://hdl.handle.net/10150/290141.
Full textWang, Yi. "Data Management and Data Processing Support on Array-Based Scientific Data." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1436157356.
Full textGrinman, Alex J. "Natural language processing on encrypted patient data." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/113438.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 85-86).
While many industries can benefit from machine learning techniques for data analysis, they often do not have the technical expertise nor computational power to do so. Therefore, many organizations would benefit from outsourcing their data analysis. Yet, stringent data privacy policies prevent outsourcing sensitive data and may stop the delegation of data analysis in its tracks. In this thesis, we put forth a two-party system where one party capable of powerful computation can run certain machine learning algorithms from the natural language processing domain on the second party's data, where the first party is limited to learning only specific functions of the second party's data and nothing else. Our system provides simple cryptographic schemes for locating keywords, matching approximate regular expressions, and computing frequency analysis on encrypted data. We present a full implementation of this system in the form of a extendible software library and a command line interface. Finally, we discuss a medical case study where we used our system to run a suite of unmodified machine learning algorithms on encrypted free text patient notes.
by Alex J. Grinman.
M. Eng.
Westlund, Kenneth P. (Kenneth Peter). "Recording and processing data from transient events." Thesis, Massachusetts Institute of Technology, 1988. https://hdl.handle.net/1721.1/129961.
Full textIncludes bibliographical references.
by Kenneth P. Westlund Jr.
Thesis (B.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1988.