Dissertations / Theses on the topic 'Composite applications (Computer science)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Composite applications (Computer science).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Cyr, Pierre. "Development of a computer application for optimization of composite material structures." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0030/MQ64214.pdf.
Full textPaydavosi, Sarah. "Study of organic molecules and nano-particle/polymer composites for flash memory and switch applications." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/75644.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 205-218).
Organic materials exhibit fascinating optical and electronic properties which motivate their hybridization with traditional silicon-based electronics in order to achieve novel functionalities and address scaling challenges of these devices. The application of organic molecules and nano-particle/polymer composites for flash memory and switch applications is studied in this dissertation. Facilitating data storage on individual small molecules as the approach the limits in miniaturization for ultra-high density and low power consumption media may enable orders of magnitude increase in data storage capabilities. A floating gate consisting of a thin film of molecules would provide the advantage of a uniform set of identical nano-structured charge storage elements with high molecular area densities which can result in a several-fold higher density of charge-storage sites as compared to quantum dot (QD) memory and even SONOS devices. Additionally, the discrete charge storage in such nano-segmented floating gate designs limits the impact of any tunnel oxide defects to the charge stored in the proximity of the defect site. The charge retention properties of molecular films was investigated in this dissertation by injecting charges via a biased conductive atomic force microscopy (AFM) tip into molecules comprising the thin films. The Kelvin force microscopy (KFM) results revealed minimal changes in the spatial extent of the charge trapping over time after initial injection. Fabricated memory capacitors show a device durability over 105 program/erase cycles and hysteresis window of up to 12.8 V, corresponding to stored charge densities as high as 5.4x 1013 cm-2, suggesting the potential use of organic molecules in high storage capacity memory cells. Also, these results demonstrate that charge storage properties of the molecular trapping layer can be engineered by rearranging molecules and their a-orbital overlaps via addition of dopant molecules. Finally, the design, fabrication, testing and evaluation of a MEMS switch that employs viscoelastic organic polymers doped with nano-particles as the active material is presented in this dissertation. The conductivity of the nano-composite changes 10,000-fold as it is mechanically compressed. In this demonstration the compressive squeeze is applied with electric actuation. Since squeezing initiates the switching behavior, the device is referred to as a "squitch". The squitch is essentially a new type of FET that is compatible with large area processing with printing or photolithography, on rigid or flexible substrates and can exhibit large on-to-off conduction ratio.
by Sarah Paydavosi.
Ph.D.
Gibson, Jason. "Nano-Particles in Multi-Scale Composites and Ballistic Applications." Doctoral diss., University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5745.
Full textPh.D.
Doctorate
Mechanical and Aerospace Engineering
Engineering and Computer Science
Mechanical Engineering
Gärdin, Marcus. "Characterization of Graphene-Based Anisotropic Conducting Adhesives : A study regarding x-ray sensing applications." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-257844.
Full textEn vanlig metod som används för att behandla cancer är strålningsterapi. I strålningsterapi görs ett behandlingsplaneringssystem för att specificera en exakt dos av röntgenstrålning som krävs för att slå ut en tumör. För att säkerställa att man ger rätt dos av röntgenstrålning utförs en kvalitetssäkring genom att använda en fantom innehållande strålningssensorer. Sensorerna är gjorda av halvledarmaterial men har oftast anslutningar gjorda av tunga metalliska material. När man bestrålar metaller med hög intensitet, exempelvis röntgenstrålning, emitteras en sekundär spridning av elektroner i form av en fotoström som kan störa signalen i kvalitetsäkrningen. Genom att byta ut metallen som används i anslutningarna till ett kontaktmaterial med lägre atomnummer som exempelvis kolbaserade material, förhindras den sekundära spridningen av elektroner, som troligtvis minskar felet som uppstår vid kvalitetssäkringen.I detta arbete har en kartläggning av kontakter mellan stålningsdioder och ett kopparsubstrat, genom en flip-chip-bindning process med ett ledande adhesiv baserat på reducerad grafenoxid gjorts. Kontaktparametrarna som kartlagts är baserade på termiska, elektriska och mekaniska egenskaper.Kartläggningen av kontakterna har i mestadels gjort genom att jämföra olika typer av grafen baserade partiklar ett kommersiellt metalbaserat material gjort för flip-chipbindning. Resultaten från arbetet indikerar att det är möjligt att byta ut det metallbaserade partiklarna i ett anisotropt ledande adhesiv med reducerade grafenoxid-belagda polymersfärer som ett ledande material för strålningsapplikationer.
Gensel, Jérôme. "Contraintes et représentation de connaissances par objets : application au modèle Tropes." Phd thesis, Université Joseph Fourier (Grenoble), 1995. http://tel.archives-ouvertes.fr/tel-00005046.
Full textAbi, Lahoud Elie. "Composition dynamique de services : application à la conception et au développement de systèmes d'information dans un environnement distribué." Phd thesis, Université de Bourgogne, 2010. http://tel.archives-ouvertes.fr/tel-00560489.
Full textMayer, Anthony Edward. "Composite construction of high performance scientific applications." Thesis, Imperial College London, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.252520.
Full textBota, Horatiu S. "Composite web search." Thesis, University of Glasgow, 2018. http://theses.gla.ac.uk/38925/.
Full textWei, Peiran. "PREPARATION AND APPLICATIONS OF STIMULI-RESPONSIVE COMPOSITE MATERIALS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1565317654535383.
Full textHou, Dezhi. "COMPREHENSIVE EVALUATION COMPOSITE GENE FEATURES IN CANCER OUTCOME PREDICTION." Case Western Reserve University School of Graduate Studies / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=case1386952765.
Full textJohn, Sheline Anna. "Runtime verification of composite web services." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textLalani, Nisar. "Validation of Internet Applications." Thesis, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-449.
Full textToday, testing applications for Internet (web sites and other applications) is being verified using
proprietary test solutions. An application is developed and another application is developed to
test the first one. Test Competence Centre at Ericsson AB has expertise on testing telecom
applications using TTCN-2 and TTCN-3 notations. These notations have lot of potential and are
being used for testing in various areas. So far, not much work has been done on using TTCN
notations for testing Internet application. This thesis was a step through which the
capabilities/possibilities of the TTCN notation (in Web testing) could be determined.
This thesis presents investigation results of the 3 different test technologies/tools (TTCN-2,
TTCN-3 and a proprietary free software, PureTest) to see which one is the best for testing
Internet Applications and what are the drawbacks/benefits each technology has.
The background topics included are brief introduction of software testing and web testing, short
introduction of TTCN language and its version 2 and 3, description of the tool set representing
the chosen technologies, conceptual view of how the tools work, a short description of HTTP
protocol and description of HTTP adapter (Test Port).
Several benefits and drawbacks were found from all the three technologies but it can be said that
at the moment proprietary test solutions (PureTest in this case) is still the best tool to test Internet
Application. It scores over other the two technologies (TTCN-2 and TTCN-3) due to reason like
flexibility, cost effectiveness, user friendliness, small lead times for competence development etc.
TTCN-3 is more of a programming language and is certainly more flexible when compared to
TTCN-2. TTCN-3 is still evolving and it can be said that it holds promise. Some of the features
are missing which are vital for testing Internet Applications but are better than TTCN-2.
Solovey, Edward 1979. "Simulation of composite I/O automata." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/18033.
Full textIncludes bibliographical references (p. 107-108).
The IOA simulator is a tool that has been developed in the Theory of Distributed Systems group at MIT. This tool simulates the execution of automata described by the IOA language. It generates logs of execution traces and provides other pertinent information regarding the execution, such as the validity of specified invariants. Although the simulator supports paired simulation of two automata for the purpose of checking simulation relations, one of its limitations is its lack of support for the simulation of composite automata. A composite automaton represents a complex system and is made up of other automata, each representing a system component. This thesis concerns the addition of a capability to simulate composite automata in a manner that allows observing and debugging the individual system component automata. While there is work in progress on creating a tool that will translate a composite definition into a single automaton, the added ability to simulate composite automata directly will add modularity and simplicity, as well as ease of observing the behavior of individual components for the purpose of distributed debugging.
by Edward Solovey.
M.Eng.
Lowman, Tim. "Secure Computer Applications in an Enterprise Environment." NCSU, 1999. http://www.lib.ncsu.edu/theses/available/etd-19990401-134848.
Full textSophisticated computing environments support many of the complex tasks whicharise in modern enterprises. An enterprise environment is a collective ofthe organization's software, hardware, networking, and data systems.Typically, many user workstations communicate with shared servers, balancingcomputer processing throughout the organization. In a ``secure" modernenterprise issues of authentication, private communication, and protected,shared data space must be addressed. In this thesis we present a generalmodel for adding security to the currently popular enterprise architecture:the World Wide Web (WWW).
The results of our investigation into adding security to the generalWWW architecture are reported in this document. We focus onauthenticating users (Kerberos), establishing a secure communicationlink for private data exchange (SSL), protected space to store shareddata (AFS filesystem), and an enhanced server (Apache) to integrate thesecomponents. After presenting our secure model, we describe a prototypeapplication, built using our approach, which addresses a common problemof secure online submission of homework assignments in a universityenvironment.
Dingley, Sharon. "A composite framework for the strategic alignment of information systems development." Thesis, Aston University, 1996. http://publications.aston.ac.uk/10595/.
Full textLo, Felix Tun-Han. "A model of composite objects for information mesh." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/41012.
Full textIncludes bibliographical references (p. 87-88).
by Felix Tun-Han Lo.
M.Eng.
Liao, I.-En. "Fuzzy time and its applications /." The Ohio State University, 1990. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487676847117812.
Full textGelbart, Michael Adam. "Constrained Bayesian Optimization and Applications." Thesis, Harvard University, 2015. http://nrs.harvard.edu/urn-3:HUL.InstRepos:17467236.
Full textBiophysics
Boland, Ralph Patrick. "Polygon visibility decompositions with applications." Thesis, University of Ottawa (Canada), 2002. http://hdl.handle.net/10393/6244.
Full textLong, Xiang. "Numerical study on reinforcement mechanism of copper/carbon nanotubes composite." Master's thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5409.
Full textID: 031001326; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Adviser: Yuanli Bai.; Title from PDF title page (viewed April 8, 2013).; Thesis (M.S.M.E.)--University of Central Florida, 2012.; Includes bibliographical references (p. 59-66).
M.S.M.E.
Masters
Mechanical and Aerospace Engineering
Engineering and Computer Science
Mechanical Engineering; Thermofluids
Ba, Shan. "Multi-layer designs and composite gaussian process models with engineering applications." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44751.
Full textArmacost, Andrew P. (Andrew Paul). "Composite variable formulations for express shipment service network design." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/28229.
Full textIncludes bibliographical references (p. 181-187).
In this thesis, we consider large-scale network design problems, specifically the problem of designing the air network of an express shipment (i.e., overnight) delivery operation. We focus on simultaneously determining the route structure, the assignment of fleet types to routes, and the flow of packages on aircraft. Traditional formulations for network design involve modeling both flow decisions and design decisions explicitly. The bounds provided by their linear programming relaxations are often weak. Common solution strategies strengthen the bounds by adding cuts, but the shear size of the express shipment problem results in models that are intractable. To overcome this shortcoming, we introduce a new modeling approach that 1) removes the flow variables as explicit decisions and embeds them within the design variables and 2) combines the design variables into composite variables, which represent the selection of multiple aircraft routes that cover the demands for some subset of commodities. The resulting composite variable formulation provides tighter bounds and enables very good solutions to be found quickly. We apply this type of formulation to the express shipment operations of the United Parcel Service (UPS). Compared with existing plans, the model produces a solution that reduces the number of required aircraft by almost 11 percent and total annual cost by almost 25 percent. This translates to potential annual savings in the hundreds of millions of dollars. We establish the composite variable formulation to be at least as strong as the traditional network design formulation, even when the latter is strengthened by Chvital-Gomory rounding, and we demonstrate cases when strength is strictly improved. We also place the composite variable formulation in a more general setting by presenting it as a Dantzig-Wolfe decomposition of the traditional (intractable) network design formulation and by comparing composite variables to Chvital-Gomory cuts in the dual of a related formulation. Finally, we present a composite variable formulation for the Pure Fixed Charge Transportation Problem to highlight the potential application of this approach to general network design and fixed-charge problems.
by Andrew P. Armacost.
Ph.D.
Wong, Toon King. "Data connectivity for the composite information system/tool kit." Thesis, Massachusetts Institute of Technology, 1989. http://hdl.handle.net/1721.1/61054.
Full textLao, Beyer Lukas C. "Multi-modal motion planning using composite pose graph optimization." Thesis, Massachusetts Institute of Technology, 2021. https://hdl.handle.net/1721.1/130697.
Full textCataloged from the official PDF of thesis.
Includes bibliographical references (pages 30-31).
This work presents a motion planning framework for multi-modal vehicle dynamics. An approach for transcribing cost function, vehicle dynamics, and state and control constraints into a sparse factor graph is introduced. By formulating the motion planning problem in pose graph form, the motion planning problem can be addressed using efficient optimization techniques, similar to those already widely applied in dual estimation problems, e.g., pose graph optimization for simultaneous localization and mapping (SLAM). Optimization of trajectories for vehicles under various dynamics models is demonstrated. The motion planner is able to optimize the location of mode transitions, and is guided by the pose graph optimization process to eliminate unnecessary mode transitions, enabling efficient discovery of optimized mode sequences from rough initial guesses. This functionality is demonstrated by using our planner to optimize multi-modal trajectories for vehicles such as an airplane which can both taxi on the ground or fly. Extensive experiments validate the use of the proposed motion planning framework in both simulation and real-life flight experiments using a vertical take-off and landing (VTOL) fixed-wing aircraft that can transition between hover and horizontal flight modes.
by Lukas C. Lao Beyer.
M. Eng.
M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Wahab, Matthew Randall. "Multi-resolution motion textures and applications." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=101660.
Full textSeth, Ankush. "Isoluminant color picking and its applications." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82423.
Full textWu, Sun. "Approximate pattern matching and its applications." Diss., The University of Arizona, 1992. http://hdl.handle.net/10150/185914.
Full textHomer, Patrick Thomas. "Constructing scientific applications from heterogeneous resources." Diss., The University of Arizona, 1994. http://hdl.handle.net/10150/186907.
Full textMarkines, Benjamin C. "Socially induced semantic networks and applications." [Bloomington, Ind.] : Indiana University, 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3358934.
Full textTitle from PDF t.p. (viewed on Feb. 10, 2010). Source: Dissertation Abstracts International, Volume: 70-05, Section: B, page: 3003. Adviser: Filippo Menczer.
Shen, Yelong. "Social Network Mining and Its Applications." Kent State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=kent1426778906.
Full textChambers, Brent Victor. "The synthesis and characterization of model interface couples for inorganic matrix composite applications." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/32135.
Full textIncludes bibliographical references (leaves 157-164).
by Brent Victor Chambers.
Ph.D.
Masi, Barbara Ann. "Fabrication methods and costs for thermoset and thermoplastic composite processing for aerospace applications." Thesis, Massachusetts Institute of Technology, 1988. http://hdl.handle.net/1721.1/72739.
Full textMei, Yuan Ph D. Massachusetts Institute of Technology. "ZStream : a cost-based query processor for composite event detection." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/44736.
Full textIncludes bibliographical references (p. 103-104).
Composite (or Complex) event processing (CEP) systems search sequences of incoming primitive events for occurrences of user-specified event patterns. Recently, they are gaining more and more attention in a variety of areas due to their powerful and expressive query language and performance potential. Sequentiality (temporal ordering) is the primary way in which CEP relates events to each other. Examples include tracing a car's movement in a predefined area (where a car moves through a series of places), detecting anomalies in stock prices (where the rise and fall of the price of some stocks is monitored), detecting intrusion in network monitoring (where a specific sequence of malicious activities is detected) or catching break points in debugging systems (where a sequence of function calls are made). But even searching for a simple sequence pattern involving only equality constraints between its components is an NP-complete problem. Furthermore, simple sequentiality is not enough to express many real world patterns, which also involve conjunction (e.g., concurrent events), disjunction (e.g., a choice between two options) and negation, making the matching problem even more complex. In this thesis, we present a CEP system called ZStream to efficiently process such sequential patterns. Besides simple sequentiality, ZStream is also able to support other relations such as conjunction, disjunction, negation and Kleene Closure. ZStream uses a tree-based plan for both the logical and physical representation of query patterns. Using this tree-based infrastructure, ZStream is able to unify the evaluation of sequence, conjunction, disjunction, negation, and Kleene Closure as variants of the join operator. A single pattern may have several equivalent physical tree plans, with different evaluation costs. Hence a cost model is proposed to estimate the computation cost of a plan.
(cont.) Experiments show that our cost model can capture the real evaluation cost of a query plan accurately. Based on this cost model and using a simple set of statistics about operator selectivity and data rates, ZStream is able to adjust the order in which it detects patterns. In addition, we design a dynamic programming algorithm and propose equivalent transition rules to automatically search for an optimal query plan for a given pattern.
by Yuan Mei.
S.M.
Ellison, Charles McEwen III. "A formal semantics of C with applications." Thesis, University of Illinois at Urbana-Champaign, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3600342.
Full textThis dissertation shows that complex, real programming languages can be completely formalized in the [special characters omitted] Framework, yielding interpreters and analysis tools for testing and bug detection. This is demonstrated by providing, in [special characters omitted], the first complete formal semantics of the C programming language. With varying degrees of effort, tools such as interpreters, debuggers, and model-checkers, together with tools that check for memory safety, races, deadlocks, and undefined behavior are then generated from the semantics.
Being executable, the semantics has been thoroughly tested against the GCC torture test suite and successfully passes 99.2% of 776 test programs. The semantics is also evaluated against popular analysis tools, using a new test suite in addition to a third-party test suite. The semantics-based tool performs at least as well or better than the other tools tested.
Royes, Andrew. "Algorithms and applications for probabilistic relational models." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98786.
Full textLekena, Mohato Karabo. "Designing mobile multi-touch drum sequencing applications." Master's thesis, University of Cape Town, 2015. http://hdl.handle.net/11427/19977.
Full textEaglin, Todd. "Scalable, situationally aware visual analytics and applications." Thesis, The University of North Carolina at Charlotte, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10270103.
Full textThere is a need to understand large and complex datasets to provide better situa- tional awareness in-order to make timely well-informed actionable decisions in critical environments. These types of environments include emergency evacuations for large buildings, indoor routing for buildings in emergency situations, large-scale critical infrastructure for disaster planning and first responders, LiDAR analysis for coastal planning in disaster situations, and social media data for health related analysis. I introduce novel work and applications in real-time interactive visual analytics in these domains. I also detail techniques, systems and tools across a range of disciplines from GPU computing for real-time analysis to machine learning for interactive analysis on mobile and web-based platforms.
Goudie, Robert J. B. "Bayesian structural inference with applications in social science." Thesis, University of Warwick, 2011. http://wrap.warwick.ac.uk/78778/.
Full textPatel, Anup. "Pulsed field magnetization of composite superconducting bulks for magnetic bearing applications." Thesis, University of Cambridge, 2013. https://www.repository.cam.ac.uk/handle/1810/256579.
Full textChuang, Eugene (Eugene Yu) 1975. "Cyclic load resistance of reinforced concrete beams retrofitted with composite laminates." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47496.
Full textCleary, Alan Michael. "Computational Pan-Genomics| Algorithms and Applications." Thesis, Montana State University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10792396.
Full textAs the cost of sequencing DNA continues to drop, the number of sequenced genomes rapidly grows. In the recent past, the cost dropped so low that it is no longer prohibitively expensive to sequence multiple genomes for the same species. This has led to a shift from the single reference genome per species paradigm to the more comprehensive pan-genomics approach, where populations of genomes from one or more species are analyzed together.
The total genomic content of a population is vast, requiring algorithms for analysis that are more sophisticated and scalable than existing methods. In this dissertation, we explore new algorithms and their applications to pan-genome analysis, both at the nucleotide and genic resolutions. Specifically, we present the Approximate Frequent Subpaths and Frequented Regions problems as a means of mining syntenic blocks from pan-genomic de Bruijn graphs and provide efficient algorithms for mining these structures. We then explore a variety of analyses that mining synteny blocks from pan-genomic data enables, including meaningful visualization, genome classification, and multidimensional-scaling. We also present a novel interactive data mining tool for pan-genome analysis—the Genome Context Viewer—which allows users to explore pan-genomic data distributed across a heterogeneous set of data providers by using gene family annotations as a unit of search and comparison. Using this approach, the tool is able to perform traditionally cumbersome analyses on-demand in a federated manner.
Wei, Wutao. "Model Based Clustering Algorithms with Applications." Thesis, Purdue University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10830711.
Full textIn machine learning predictive area, unsupervised learning will be applied when the labels of the data are unavailable, laborious to obtain or with limited proportion. Based on the special properties of data, we can build models by understanding the properties and making some reasonable assumptions. In this thesis, we will introduce three practical problems and discuss them in detail. This thesis produces 3 papers as follow: Wei, Wutao, et al. "A Non-parametric Hidden Markov Clustering Model with Applications to Time Varying User Activity Analysis." ICMLA2015 Wei, Wutao, et al. "Dynamic Bayesian predictive model for box office forecasting." IEEE Big Data 2017. Wei, Wutao, Bowei Xi, and Murat Kantarcioglu. "Adversarial Clustering: A Grid Based Clustering Algorithm Against Active Adversaries." Submitted
User Profiling Clustering: Activity data of individual users on social media are easily accessible in this big data era. However, proper modeling strategies for user profiles have not been well developed in the literature. Existing methods or models usually have two limitations. The first limitation is that most methods target the population rather than individual users, and the second is that they cannot model non-stationary time-varying patterns. Different users in general demonstrate different activity modes on social media. Therefore, one population model may fail to characterize activities of individual users. Furthermore, online social media are dynamic and ever evolving, so are users’ activities. Dynamic models are needed to properly model users’ activities. In this paper, we introduce a non-parametric hidden Markov model to characterize the time-varying activities of social media users. In addition, based on the proposed model, we develop a clustering method to group users with similar activity patterns.
Adversarial Clustering: Nowadays more and more data are gathered for detecting and preventing cyber-attacks. Unique to the cyber security applications, data analytics techniques have to deal with active adversaries that try to deceive the data analytics models and avoid being detected. The existence of such adversarial behavior motivates the development of robust and resilient adversarial learning techniques for various tasks. In the past most of the work focused on adversarial classification techniques, which assumed the existence of a reasonably large amount of carefully labeled data instances. However, in real practice, labeling the data instances often requires costly and time-consuming human expertise and becomes a significant bottleneck. Meanwhile, a large number of unlabeled instances can also be used to understand the adversaries' behavior. To address the above mentioned challenges, we develop a novel grid based adversarial clustering algorithm. Our adversarial clustering algorithm is able to identify the core normal regions, and to draw defensive walls around the core positions of the normal objects utilizing game theoretic ideas. Our algorithm also identifies sub-clusters of attack objects, the overlapping areas within clusters, and outliers which may be potential anomalies.
Dynamic Bayesian Update for Profiling Clustering: Movie industry becomes one of the most important consumer business. The business is also more and more competitive. As a movie producer, there is a big cost in movie production and marketing; as an owner of a movie theater, it is also a problem that how to arrange the limited screens to the current movies in theater. However, all the current models in movie industry can only give an estimate of the opening week. We improve the dynamic linear model with a Bayesian framework. By using this updating method, we are also able to update the streaming adversarial data and make defensive recommendation for the defensive systems.
Williams, Bryn V. "Evolutionary neural networks : models and applications." Thesis, Aston University, 1995. http://publications.aston.ac.uk/10635/.
Full textAu, Carmen E. "Compression-based anomaly detection for video surveillance applications." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98598.
Full textThe use of a compression-based technique inherently reduces the heavy computational and storage demands that other video surveillance applications typically have placed on the system. In order to further reduce the computational and storage load, the anomaly detection algorithm is applied to edges and people, which are image features that have been extracted from the images acquired by the camera.
Gao, Si Zhu 1975. "A survey of tree models in biological applications /." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=97956.
Full textLeblanc, Alain 1964. "Some applications of the topological plane sweep algorithm." Thesis, McGill University, 1989. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=59443.
Full textLemieux, François 1961. "Finite groupoids and their applications to computational complexity." Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=40171.
Full textWe consider different restrictions on the original model. We examine the effect of restricting the kind of groupoids used, the way parentheses are placed, and we distinguish between the case where parentheses are explicitly given and the case where they are guessed nondeterministically.
We introduce the notions of linear recognition by groupoids and by programs over groupoids. This leads to new characterizations of linear context-free languages and NL. We also prove that the algebraic structure of finite groupoids induces a strict hierarchy on the classes of languages they linearly recognized.
We investigate the classes obtained when the groupoids are restricted to be quasigroups (i.e. the multiplication table forms a latin square). We prove that languages recognized by quasigroups are regular and that programs over quasigroups characterize NC$ sp1$.
We also consider the problem of evaluating a well-parenthesized expression over a finite loop (a quasigroup with an identity). This problem is in NC$ sp1$ for any finite loop, and we give algebraic conditions for its completeness. In particular, we prove that it is sufficient that the loop be nonsolvable, extending a well-known theorem of Barrington.
Finally, we consider programs where the groupoids are allowed to grow with the input length. We study the relationship between these programs and more classical models of computation like Turing machines, pushdown automata, and owner-read owner-write PRAM. As a consequence, we find a restriction on Boolean circuits that has some interesting properties. In particular, circuits that characterize NP and NL are shown to correspond, in presence of our restriction, to P and L respectively.
Byrd, William E. "Relational programming in miniKanren techniques, applications, and implementations /." [Bloomington, Ind.] : Indiana University, 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3380156.
Full textTitle from PDF t.p. (viewed on Jul 20, 2010). Source: Dissertation Abstracts International, Volume: 70-12, Section: B, page: 7659. Adviser: Daniel P. Friedman.
Barrett, Brian W. "One-sided communication for high performance computing applications." [Bloomington, Ind.] : Indiana University, 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3354909.
Full textTitle from PDF t.p. (viewed on Feb. 4, 2010). Source: Dissertation Abstracts International, Volume: 70-04, Section: B, page: 2379. Adviser: Andrew Lumsdaine.
Ma, Yu. "A composable data management architecture for scientific applications." [Bloomington, Ind.] : Indiana University, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3243773.
Full textTitle from PDF t.p. (viewed Nov. 18, 2008). Source: Dissertation Abstracts International, Volume: 67-12, Section: B, page: 7170. Adviser: Randall Bramley.