Theses/Dissertations - Computer Science
Permanent URI for this collectionhttps://hdl.handle.net/2104/4810
Browse
Browsing Theses/Dissertations - Computer Science by Issue Date
Now showing 1 - 20 of 24
- Results Per Page
- Sort Options
Item Evolving a disjunctive predator prey swarm using PSO : adapting swarms with swarms.(2006-02-15T15:56:04Z) Riyaz, Firasath; Maurer, Peter M.; Marks, Robert J., II (Robert Jackson), 1950-; Computer Science.; Baylor University. Dept. of Computer Science.Swarm Intelligence is the study of "the emergent collective intelligence of groups of simple agents." Recent research has explored the important applications in the field of business, telecommunications, robotics and optimization. This thesis models a simple prey swarm disjunctively, i.e. a number of disjoint survival attributes are aggregated into a single response. The swarm was initialized using heuristics. We studied the ability of this swarm to evolve its performance using a particle swarm optimization on the disjunctive rules. The rules are characterized through use of a fuzzy inference engine and the rules adapted through changing of the rule membership functions. The result was both improved performance and unexpected emergent behavior for example individual members of the prey swarm began to sacrifice their life to lengthen the life of the swarm aggregate. The disjunctive swarm is found to be robust against rule failures.Item Java bytecode compilation for high-performance, platform-independent logical inference.(2006-05-11T16:38:51Z) Arte, Ashish.; Sturgill, David Brian.; Computer Science.; Baylor University. Dept. of Computer Science.Automated reasoning systems are powerful computer programs capable of solving complex problems. They are characterized as computationally intensive having high performance requirements. Very few reasoning systems have been implemented in Java so far; its performance is regarded as an impediment to its use as a programming language for computationally intensive applications such as automated reasoning. In this thesis we discuss techniques that motivate the use of Java as the underlying platform to design a framework for high-performance logical inference. The techniques are centered around the idea of using a specialized compiler that can generate Java classes which contain Java bytecodes customized for performing reasoning efficiently. The benefit of generating bytecodes customized for logical inference is reflected in the improved performance observed from the experiments conducted.Item Design of a microwave sensor for non-invasive determination of blood-glucose concentration.(2006-05-27T14:46:59Z) Green, Eric C.; Jean, B. Randall.; Engineering.; Baylor University. Dept. of Electrical and Computer Engineering.Diabetes is a disease that afflicts millions worldwide. To control the effects of this disease, diabetics must check their blood glucose levels on a regular basis. Currently, all daily glucose monitoring techniques are invasive, requiring a sample of blood. Microwave sensors are non-destructive and non-contact measuring devices, making them ideal for the measurement of parameters in industrial processes. Current uses of microwave sensors range from measuring moisture content of corn chips to measuring concentration of a solute in water. If a microwave sensor were developed to determine blood glucose concentration, it could be the first daily-use glucose-measuring technique that is truly non-invasive. This thesis provides background on diabetes and microwave measurement. From this background, a sensor is developed and its advantages are illustrated. The thesis concludes by making suggestions for improving the sensor and recommendations on how to implement the sensor into a useful product.Item Analysis of transaction throughput in P2P environments.(2006-05-28T01:24:49Z) Chokkalingam, Arun.; Speegle, Gregory David.; Donahoo, Michael J.; Gipson, Stephen L. (Stephen Lloyd); Green, Gina C., 1962-; Computer Science.; Baylor University. Dept. of Computer Science.In recent years P2P systems have gained tremendous popularity. Support of a transaction processing facility in P2P systems would provide databases at a low cost. Extending distributed database algorithms such as 2PC and ROWA to P2P environments might not provide the best performance because the P2P systems are characterized by high site failure rates and an unpredictable network topology. The choice of algorithms in building P2PDB is difficult because of the lack of information about the performance of database algorithms in P2P environments. This thesis analyzes the performance of one such algorithm, the epidemic algorithm against the performance of traditional database algorithms in simulated P2P environments.Item PG-means: learning the number of clusters in data.(2007-03-19T14:52:48Z) Feng, Yu.; Hamerly, Gregory James, 1977-; Computer Science.; Baylor University. Dept. of Computer Science.We present a novel algorithm called PG-means in this thesis. This algorithm is able to determine the number of clusters in a classical Gaussian mixture model automatically. PG-means uses efficient statistical hypothesis tests on one-dimensional projections of the data and model to determine if the examples are well represented by the model. In so doing, we apply a statistical test to the entire model at once, not just on a per-cluster basis. We show that this method works well in difficult cases such as overlapping clusters, eccentric clusters and high dimensional clusters. PG-means also works well on non-Gaussian clusters and many true clusters. Further, the new approach provides a much more stable estimate of the number of clusters than current methods.Item "Two-way" obliviousness in general aspect-oriented modeling.(2008-10-01T16:55:12Z) Roberts, Nathan V.; Song, Eunjee.; Computer Science.; Baylor University. Dept. of Computer Science.A key problem in software development is producing systems that are maintainable even as the concerns at play evolve. Aspect-oriented programming (AOP) seeks to foster maintainability by isolating the specifications of cross-cutting concerns, allowing them to be modified in relative isolation from the rest of the system. Research in aspect-oriented modeling (AOM) aims to develop a model-layer analogue of AOP, allowing integration with accepted modeling practices. Aspects usually allow developers of the primary model to be oblivious to the aspects that modify the primary model; because of this, aspects can be closely coupled to potentially transient details of the primary model. When those details change, the aspects that depend on them may no longer have the desired effect. In this thesis, we examine three approaches to AOM, and introduce a novel solution to the problem of obliviousness by extending a graph-transformational approach to AOM.Item Studies of active information in search.(2010) Ewert, Winston.; Hamerly, Gregory James, 1977-; Computer Science.; Baylor University. Dept. of Computer Science.A search process is an attempt to locate a solution to a problem, such as an optimization problem, where the space is usually too large to exhaustively sample. In order to investigate this idea this work looks a three examples of searches as cases studies. The examples considered are the location of a hidden string using a hamming distance, the encoding of a binary string using a perceptron, and developing programs using nand gates. In all of these cases, it is shown that the search processes work by making use of problem specific information. In addition, the algorithms used to demonstrate these search processes are often relatively inefficient at extracting the information from the available knowledge sources.Item An OCL-based verification approach to analyzing static properties of a UML model.(2010-06-23T12:33:42Z) Sun, Wuliang.; Song, Eunjee.; Computer Science.; Baylor University. Dept. of Computer Science.There is a need for more rigorous analysis techniques that developers can use for verifying the critical properties in UML models. The UML-based Specification Environment (USE) tool supports verification of invariants, preconditions, and postconditions specified in the Object Constraint Language (OCL), which is useful when checking critical properties. However, the USE requires one to specify a model using its own textual language and does not allow one to import any model specification files created by other UML modeling tools. Hence, we often create a model with OCL constraints using a modeling tool such as the IBM Rational Software Architect (RSA) and then use the USE for the model verification. This approach, however, requires a manual transformation between two different specification formats, which diminishes the benefit of model-level verification. In this thesis, we describe our own implementation of a specification transformation engine based on the Model-Driven Architecture (MDA) framework.Item MultiKarma : a fully decentralized virtual multi-currency.(2011-09-14) Allen, Jon D. (Jon Douglas); Donahoo, Michael J.; Computer Science.; Baylor University. Dept. of Computer Science.Participant-based technologies enable users to contribute resources to a shared pool that in the aggregate provides valuable services, such as social networks, massive multiplayer online games, file exchange, etc. Such systems depend on participant contribution; however, some peers may be unwilling to contribute at a level on par with their consumption. Monetary systems incentivize participation through compensation that allows portability, asynchronous participation, granularity and misbehavior costs. The use of government-backed currencies for incentive structures in participant-based systems results in exchange barriers and high transaction costs, while centralized virtual currencies (e.g., Facebook credits) remove many of the benefits of currency. Karma proposes the use of peer-to-peer systems to create a decentralized, consensus-based currency; however, it lacks a complete specification or implementation. We provide a specification, implementation, and evaluation of Karma. Next, we extend Karma to create a multi-currency system called MultiKarma where participants can mint, manage, and distribute their own currency.Item Information storage capacity of genetic algorithm fitness maps.(2011-09-14) Montañez, George D.; Hamerly, Gregory James, 1977-; Computer Science.; Baylor University. Dept. of Computer Science.To accurately measure the amount of information a genetic algorithm can generate, we must first measure the amount of information one can store, using a fitness map. The amount of information generated, minus the storage capacity, gives a tighter estimate on the levels of information generated by genetic algorithms. To measure the information storage capacity of fitness maps, we use the method suggested by Abu-Mostafa et al. (Abu-Mostafa and St Jacques, 1985) for measuring the information storage capacity of general forms of memory. Additionally, we measure the information in reference to the active information metric, as developed by Dembski et al. (Dembski and Marks, 2009). Our results show that a number of bits linear in the size of the search space can be stored in a fitness map, but only a logarithmic number of bits can be extracted by a genetic algorithm with stabilizing population and fixed population size.Item Age classification from facial images for detecting retinoblastoma.(2012-11-29) Chiam, Tak Chien.; Hamerly, Gregory James, 1977-; Computer Science.; Baylor University. Dept. of Computer Science.Facial age estimation from images is a difficult problem, both because it is naturally difficult to tell the exact age of a person visually, and because of the variations in images, such as illumination, pose, and expression. We want to classify people into two groups, children (age ≤ 5) and adults (age > 5), to facilitate the detection of retinoblastoma, a type of pediatric cancer. Current regression based methods are ineffective, as they usually have mean absolute error of 5 years, which is too high for our purposes. We study the facial anthropometric measurements of humans at different ages, and build a system based on these growth patterns. We detect 76 facial landmarks using Active Shape Models, analyze all possible ratios computable from these landmarks, and use the best ratios as input into a Support Vector Machine. Our final system does very well on our problem, correctly classifying 85% of images.Item Performance improvements to peer-to-peer file transfers using network coding.(2013-09-16) Kelley, Aaron A.; Poucher, William Benjamin, 1948-; Computer Science.; Baylor University. Dept. of Computer Science.A common peer-to-peer approach to large data distribution is to divide the data into blocks. Peers will gather blocks from other peers in parallel. Problems with this approach are that each peer must know which blocks other peers have available, and in some instances it may not be possible to complete a download if certain blocks are not available in the network. Network coding, a method of distributing data over a peer-to-peer network by employing linear algebra, addresses these issues but comes with a substantial computational overhead. We examine possibilities for mitigating this extra computational cost through reduction of number of operations required to perform matrix multiplication in a finite field, by taking advantage of the small number of elements in the field and precomputing results. We evaluate our approach through simulation and demonstrate that it may serve to allow for faster transfer times on a more robust peer-to-peer network.Item Faster k-means clustering.(2013-09-24) Drake, Jonathan, 1989-; Hamerly, Gregory James, 1977-; Computer Science.; Baylor University. Dept. of Computer Science.The popular k-means algorithm is used to discover clusters in vector data automatically. We present three accelerated algorithms that compute exactly the same clusters much faster than the standard method. First, we redesign Hamerly’s algorithm to use k heaps to avoid checking distance bounds for all n points, with little empirical gain. Second, we use an adaptive number of distance bounds to avoid redundant calculations (Drake and Hamerly 2012). Experiments show the superior performance of adaptive k-means in medium dimension (20 ≤ d ≤ 200) on uniform random data. Finally, we reformulate the triangle inequality to constrain the search space for a point’s nearest center to an annular region centered at the origin. For uniform random data, annulus k-means is competitive with or much faster than other algorithms in low dimension (d < 20), and it outperforms other algorithms on five of six naturally-clustered, real-world datasets tested (d ≤ 74).Item Designing incentives in P2P systems.(2013-09-24) Berciu, Radu Mihai.; Donahoo, Michael J.; Computer Science.; Baylor University. Dept. of Computer Science.The goal of this thesis is bringing closer together the game theoretic approach of creating incentives with the requirements and properties of P2P systems. Briefly, we detail the P2P system context that incentive mechanisms must address, focusing on the main properties (e.g., the existence of cheap identities), types of transacted goods, common goals (e.g., maximize utilization, robustness to rational manipulations) and common problems (e.g., easy-riding) of such systems; we define the design space for P2P incentive mechanisms through the first taxonomy for such mechanisms and examine the main classes; we analyze in-depth how known incentive mechanisms achieve their goals, from both a P2P systems and a game theory perspectives using BitTorrent and mechanism design models; we bundle our prescriptions into a framework for designing P2P incentive mechanisms, and we use it to create an incentive mechanism for a BitTorrent-like system.Item Giving the users a hand : towards touchless hand gestures for the desktop.(2014-09-05) Hari Haran, Alvin Jude.; Poor, G. Michael.; Computer Science.; Baylor University. Dept. of Computer Science.Touchless, mid-air, gesture-based interactions have recently moved out of laboratories and Hollywood movies and into the hands of users. There is little difference in the interaction style and techniques used today from that of the 1980's, despite advances in the technology enabling this interaction. For this interaction to achieve mainstream popularity, and to be as ubiquitous as the keyboard or the mouse, common problems such as the "Gorilla Arm Syndrome'' will have to be addressed. Additionally, the common use-case such as gestural navigation, selection, and manipulation will need to be improved and eventually standardized. This thesis presents solutions to existing problems and introduces possible interaction techniques that allows users to perform the actions above. This is expected to pave the way for touchless mid-air hand gestures to be a ubiquitous form of interaction on the desktop.Item Models for rested touchless gestural interaction.(2015-07-31) Guinness, Darren, 1990-; Poor, G. Michael.Touchless mid-air gestural interaction has gained mainstream attention with the emergence of off-the-shelf commodity devices such as the Leap Motion and the Xbox Kinect. One of the issues with this form of interaction is fatigue, a problem colloquially known as the "Gorilla Arm Syndrome.'' However, by allowing interaction from a rested position, whereby the elbow is rested on a surface, this problem can be limited in its effect. In this paper we evaluate 3 possible methods for performing touchless mid-air gestural interaction from a rested position: a basic rested interaction, a simple calibrated interaction which models palm positions onto a hyperplane, and a more complex calibration which models the arm's interaction space using the angles of the forearm as input. The results of this work found that the two modeled interactions conform to Fitts's law and also demonstrated that implementing a simple model can improve interaction by improving performance and accuracy.Item Alternatives using the Leap Motion to extend mid-air word-gesture keyboards.(2015-12-14) Benoit, Garrett.; Poor, G. Michael.Lately, the use of touchless, mid-air, gesture-based interactions has increased significantly due to the popularity of augmented and virtual reality and advances in other industries (e.g., medicine, gaming), and with this wide-spread application comes the need for effecient, mid-air text-entry. Word-gesture keyboards have garnered attention in recent years, now coming standard on most Android devices, offering efficient means of gesture-based text-entry. For the first time, Markussen et al. combined the two with the inception of Vulture \cite{ref_vulture}, the first mid-air, word-gesture keyboard, providing the fastest means of mid-air text-entry yet. This thesis builds on the findings of Markussen et al. and presents alternatives means for word separation in mid-air text-entry for word-gesture keyboards, exploring and identifying the problems of new techniques and presenting possible solutions. Of the new techniques, a bimodal approach shows great promise, reaching a mean text-entry rate of 15.8 Words Per Minutes for a single session with no training.Item Force touch gesture based interaction for virtual keyboards.(2018-04-20) Zhunussov, Kuanysh, 1994-; Poor, G. Michael.With extreme popularity of touch screen mobile devices, the demand for effective one-handed text-entry on virtual keyboards is continually growing. To increase text-entry speed and decrease error rate, this thesis proposes force touch gesture based suggestion selection for virtual keyboards and analyzes the performance compared to standard keying and swyping keyboards. The prototype, called OctoType, was built for iOS smartphones to take advantage of the 3D-touch technology by implementing an interaction based on OctoPocus, a dynamic gesture guide. Two users studies were conducted to evaluate performance of OctoType. The results showed that OctoType outperforms standard keying keyboards by 13.1% in terms of text-entry speed. Moreover, OctoType registered force touch gestures with an accuracy of greater than 97%. Given these advantages of force touch gesture based interaction, this thesis also introduces the framework, called Gesturizer, that provides a conflict-free gesture interaction with arbitrary shapes to iOS applications running on devices with 3D-touch.Item Investigating rhythmic accuracy using 3D spatial interaction for digital musical input : MoveMIDI.(2020-07-19) Arterbury, Timothy, 1996-; Poor, G. Michael.Many human-computer interfaces exist which allow users to interact with music software to create and perform music. Some interfaces allow users to interact using movements of their body to create music. This thesis describes a form of movement interaction called 3D spatial interaction and evaluates its application for human control of music software by utilizing the MoveMIDI prototype and conceptual framework. MoveMIDI interprets a user's positional body movement relative to its virtual 3D environment to control music software. In a user study, the usability of the initial MoveMIDI prototype as a rhythmic input device was evaluated by measuring rhythmic accuracy of participants using the prototype, a drum interface with sticks, and a finger-drumming interface. The study revealed initial spatial unsureness of participants using MoveMIDI due to visualization issues and lack of haptic feedback. These issues prompted the creation of a follow-up prototype using head-mounted display 3D visualization and haptic feedback.Item Optimizing k-means clustering using mini-batches and distance bounds.(2020-10-22) Shrestha Khimbaja, Sumit, 1994-; Hamerly, Gregory James, 1977-Clustering is a crucial branch of machine learning that groups the input data into different clusters based on the features of the data without the training label. K-means clustering is a widely used iterative clustering technique that groups data into k clusters by repeatedly minimizing a criterion function. The standard k-means algorithm, Lloyd’s algorithm, is simple and easy to implement the algorithm. But it does perform a lot of unnecessary work while computing the distance between the data points and the centers. This increases the runtime of the algorithm and makes it unsuitable for real-life applications. Previous works on k-means optimizations have used the triangle inequality law to generate geometric bounds for the data points which are then used to prevent unnecessary distance computations. Another approach to accelerate the k-means algorithm is to use only using a subset of data instead of the entire data in a single iteration. Due to the reduction in data size used for computation, this method also generates faster clustering results. In this thesis, we are proposing an algorithm that accelerates the k-means algorithm by using geometric bounds on mini-batches. We are combining the triangle inequality based optimization technique with the mini-batch approach by running the k-means algorithm in minibatches for multiple iterations and using the geometric bounds within the mini-batch to reduce the distance computations. The results show that there is a large speedup over the existing optimization techniques in terms of runtime while producing good quality clusters.