Now showing items 1-20 of 235

    • Adaptive weighing of context models for lossless data compression 

      Mahoney, Matthew V. (2005-12-21)
      Until recently the state of the art in lossless data compression was prediction by partial match (PPM). A PPM model estimates the next-symbol probability distribution by combining statistics from the longest matching ...
    • An algorithm for clearing combinatorial markets 

      Nzouonta, Josiane Domgang (2003-12-15)
      It was recently shown possible to solve single item auctions without revealing any secret except for the solution. Namely, with vMB-share [4], the seller and the buyer only learn each other's identity and the selling price ...
    • Algorithms for string searching on a Beowulf cluster 

      Kattamuri, Kishore Ramakrishna (2003-12-18)
      String matching is a subject of both theoretical and practical interest in computer science. Theoretically, time and space complexity of the algorithms and on the practical side searching for keywords, names, phrases etc., ...
    • Ammonia Feedstock Production by Chemical Looping Reactors 

      Charbonneau, Nate; DeLellis, Daniel; Naqi, Ahmad
      A preliminary design for production of an ammonia feedstock plant using a chemical looping reactor system is presented. This novel fluidized bed configuration produces discrete streams of hydrogen, nitrogen, and carbon ...
    • Analysis of hostile network reconnaissance to anticipate and mitigate network attacks 

      Rivera, Luis Angel (2005-04-19)
      Network security systems today such as current intrusion detection systems, intrusion prevention systems and firewalls are good at reacting to attacks as they occur or shortly after they occur. Current security systems ...
    • An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection 

      Mahoney, Matthew V.; Chan, Philip K. (2003-01-27)
      We investigate potential simulation artifacts and their effects on the evaluation of network anomaly detection systems in the 1999 DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set. A statistical ...
    • Analysis of the Gal-Chen-Zhang single-Doppler velocity retrieval 

      Lazarus, Steven M.; Shapiro, Alan; Droegemeier, Kelvin (American Meteorological Society, 1999-01)
      The authors present herein an analysis of a single-Doppler velocity retrieval (SDVR) technique whereby the unobserved wind components are determined from single-Doppler radar data. The analysis is designed to provide ...
    • Analyzing Thermal and Mechanical Effects of Pulsed Laser Irradiation on Tissues 

      Ganguly, Mohit (2014-05)
      Pulsed lasers are known for their spatial and temporal specificity in delivering heat energy to the tissues. This is useful in laser ablation treatment mechanism where damage to the healthy tissues is highly undesired. ...
    • Android Home Automation 

      Almazrouei, Ahmed; Almansoori, Sayah; Al Neyadi, Abdulla
      Dimensions: 10 x 10 x 5 (cm) • Controlled using an Android Application • Controlling up to 3 appliances. • 2 : On/Off • 1 : Speed/Brightness control • Application interface: • Two sets of radio buttons: On/Off for ...
    • Appointment Cancellation Re-Scheduling Application 

      Aldurayhim, Yasir; Zhao, Boxiong; Maris, Andrew; Alharbi, Mishal
      The main idea of this project is to create commercial android applications to solve the issue of late cancellations and rescheduling in private practices. These applications will ease the difficulties of both client and ...
    • AppVeil: Controlling Android App Permissions 

      Berringer, Joseph; Fostiropoulos, Iordanis
      Our project lets you take any Android app and change the way it can access sensitive information and features on your device. You can block these features, making the target app obtain false information like “your contacts ...
    • Authorship is continuous: detecting plagiarism in student code assignments with version control 

      Koss, Ian Mathias (2012-06)
      In academia, the conflict between plagiarist and instructor is reaching a crescendo. The increasing availability of source material available from the Internet, either for free or for hire, is met by the increasing ...
    • An automated Oracle for verifying GUI objects 

      Takahashi, Juichi (2003-06-08)
      The promise of test automation - the automatic application of software inputs to find bugs - is tempered by the difficulty of automatically verifying behavior. Indeed, the lack of tools for behavior verification is a major ...
    • Babcock Street Pedestrian Underpass 

      Miller, Nicholas; Jansen, Jacob; Knowles, Roccou; Cano, Enrique; Akins, Ashley; Alshamari, Fahad
      The pedestrian underpass was developed in order to fulfill the needs of our client, The Florida Institute of Technology (FIT). The client goal was to improve pedestrian safety and access crossing Babcock Street (SR-507). ...
    • Big Data Medical Diagnostics System/ 

      Beavers, Tabitha; Binns, Andrew; Wells, Michael
      Misplaced ECG leads are estimated to be the cause of as much as 4% of misleading results1 given to patients, occasionally causing fatalities^2. This project seeks to replace current leads with a pad of ECG electrodes, ...
    • Biofabrication: 3D Printing for Tissue Engineering 

      Bailey, Ryan; Baskerville, Scott; Gilchrist, Victoria; Weng Kwan, Michael; McClure, Ian
      Biofabrication is the use of additive manufacturing (3D printing) for biological applications. The ultimate goal of biofabrication is to print viable organs for transplantation using patients’ own cells. In order for ...
    • Biomagnification of Mercury in the Indian River Lagoon, Florida 

      Beckett, Kate
      Concentrations of total mercury (THg) were determined for seven lower trophic level biota: plankton (>153 μm), anchovies (Anchoa hepsetus), crown conchs (Melongena corona), tulip snails (Fasciolaria tulipa), mullet (Mugil ...
    • BIOROW Real-Time Rowing Monitor 

      Gomez-Feria Ferreiro, Jose; Woodle, Chris
      The rower needs technical feedback that can provide information about the rowers motion. Improving rowing technique can help reduce the injuries acquired in the sport. The BIOROW model is a technique feedback system that ...
    • Black box software testing instructor's manual: foundations in software testing, bug advocacy, and test design courses 

      Fiedler, Rebecca L.; Kaner, Cem; Hoffman, Douglas (2012-09-24)
      We prepared this manual for instructors interested in using BBST materials in their own classes. It explains how to acquire your own copies of course materials; acquaints you with other resources for teaching software ...
    • Boundary detection in tokenizing network application payload for anomaly detection 

      Vargiya, Rachna; Chan, Philip K. (2003-06-11)
      Most of the current anomaly detection methods for network traffic rely on the packet header for studying network traffic behavior. We believe that significant information lies in the payload of the packet and hence it is ...