This paper discusses two main trends in the development of virtual
machine systems: full system virtualization, where an entire hardware
architecture is replicated virtually, and paravirtualization, where an
operating system is modified so that it can be run concurrently with
other operating systems that have also been designed for paravirtualization.
This project describes a web-based information management system which has been
widely used by staff members and students at OSU. Without this system, it was very
hard for the staff members to manage a variety of fees; for example, if they want to
change a certain fee, staff members had...
Controlling a virtual character with a pen input device is difficult. Pen input
devices require freeform gestures and users are not confined to particular mapping of a
key or a button that is exactly repeatable. This is a problem since an intuitive motion
gesture for one user might not be...
Almost every student in the School of EECS undergoes the process of Blanket Credit
Registration wherein the student has to fill out the form for registration, meet the
concerned professor and obtain his approval. The staff of the department has to maintain
the details of the student and the Professor...
We have developed a framework for Web-based GIS/database (WebGD) applications
that allow users to insert, query, and delete data with map interfaces displayed by Web
browsers. The framework uses such open source software packages as Minnesota
MapServer, PostGIS, and PostgreSQL. With this framework, we can create the map
interface of...
The Services for Students with Disabilities (SSD) is the department responsible for providing reasonable
accommodation to students with documented disabilities. Each term, SSD serves approximately 500
students and receives hundreds of requests for various services. These services range from alternative
testing, alternative formats, notetaking, classroom relocation, and requests for tables...
We designed a concise way to store and manipulate GIS coverage data in a geospatial database. Our
geospatial database is implemented with PostgreSQL and PostGIS. PostgreSQL is an object-relational
database, and PostGIS supports various geospatial operations as an SQL extension. In our Oregon
Relational Spatial Topology (ORST) approach, topological relationships...
WebGen 5 is a software tool for automatically generating Web scripts that display Web forms and operate on data in a database. WebGen 5 is implemented as a collection of templates. Each template, combined with a corresponding configuration file, generates one of the following six types of Web scripts: search,...
This project aims at implementing Indexing for Web 2.0 Applications. Ajax applications consist of a set of states which are generated by the user through actions such as click, focus, blur etc. events. By saving these DOM states we can index information obtained from dynamically generated web content. To prevent...
Solar photovoltaic is considered one among many new alternatives to satisfy
our demand for energy. Solar Cells have undergone changes in the last 50 years or so
since its invention in 1954. Solar power is beginning to challenge conventional
energy sources in terms of mainstream acceptance. Solar power along with...
Virtual environments and simulations are being used increasingly to both visualize and understand data as well as to create scenarios for training and analysis purposes. In this paper, we are interested in the use of simulation and visualization of interactive virtual agents to create realistic motions for training scenarios. We...
For building robust software applications, it is important for the software engineer to make efficient use of the available building blocks. Learning the basic language constructs is only the first step in this process. It is becoming increasingly important for software engineers, especially students, to get acquainted with the available...
Dimensionality reduction (DR) is an efficient approach to reduce the size of
data by capturing the informative intrinsic features and discarding the noise. DR
methods can be grouped through a variety of categories, e.g. supervised/ unsupervised,
linear/non-linear or parametric/non-parametric. Objective function based
methods can be grouped into convex and non...
Beaversource provides both code-hosting tools and social networking in one place. Students and faculty at Oregon State University have been using Beaversource to host their projects, both for classwork and research. Several usability problems were reported in a survey conducted on Beaversource last year. Some of these issues were severe...
Application Programming Interfaces (APIs) enable software developers to utilize and create functionality that would otherwise take a lot of time and effort to build from scratch. Consequently, an essential part of software engineering training is for students to learn how to use APIs effectively. The existing jTutors system enables an...
Identifying the most relevant items in an e-commerce site is becoming more and more
difficult nowadays because of the heavy overload of information. A Java Recommender
System that uses Collaborative Filtering techniques has been developed to reduce such
information overload and even personalize the information to the individual’s preference.
The...
"A non-redundant number system has the digit set limited ranging from 0 to radix -1. While the Signed digit numbers have digit set consisting of more than radix r values. Hence it is also called redundant number system. Furthermore, the advantage of redundant number system lies in its application for...
Statistics and Metrics Generator (SMG), is a software tool that gathers, stores and reports
performance and execution metrics for a web-based software installation process. The
purpose of this project was to develop a software utility that provides feedback about software
download and installation process efficiency. A web-based software installation is...
Accreditation Board for Engineering and Technology, Inc. (ABET) is the primary organization responsible for monitoring, evaluating and certifying the quality of engineering, engineering technology, computing and applied sciences education in the United States. In 2000, ABET changed the way computer science (and engineering) programs are accredited from a ‘checklist’ approach...
Timing attacks enable an attacker to extract secret information from a cryptosystem by observing timing differences with respect to different inputs given to an encryption or decryption algorithm. Werner Schindler has proposed a timing attack on smart card devices. We implemented this attack based on the same approach for RSA...
Spatial Supervised Learning seeks to learn how to assign a label to each pixel in a spatial grid
such as the pixels of remote-sensed images. The standard approach is to treat each grid cell
separately and to use only the measured features of the grid cell to determine the assigned...
Active contour models have been widely applied to image segmentation and
analysis. It has been successfully used in contour detection for object recognition,
computer vision, computer graphics, and biomedical image processing such as X-ray,
MRI and Ultrasound images.
The energy-minimizing active contour models or snakes were developed by Kass,
Witkin...
"SAML Edit® is a PC-based tool for creation and manipulation of SAML Assertion text files (as defined by OASIS). The tool allows its user to modify the data/information contained in the underlying file. As security information between entities is exchanged using such SAML Assertion text files, the ability to manipulate...
"Collaborative filtering algorithms’ performances have been evaluated using a variety of metrics.
These metrics, such as Mean Absolute Error and Precision, have often ignored recommendations for
which they do not have data. Ignoring these recommendations has provided numbers which do not
accurately represent the user experience. Qualitatively we have seen...
This project explores a security framework, called the Persona Concept, aimed at giving the user greater control over their private data in cyberspace, in particular, their electronic credentials. The background for the Persona Concept, along with the requirements identified can be found in three (3) technical publications produced by Kal...
Current database systems apply access control mostly on tables and columns.
However, many applications require access control on individual rows in database
tables. Therefore, we have implemented a row-based access control mechanism. In
our model for access control, object groups, in addition to user groups, are used to
reduce the...
This project aims to study the performance of Secure Sockets Layer (SSL) Protocol implemented in JAVA for web applications. Secure Sockets Layer protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. In particular, this project focuses on an implementation of...
In this report, I first introduce three areas of interest to collaborative filtering researchers, namely: (a) how to solve the sparsity and scalability problems in recommendation systems; (b) how to rapidly develop and test collaborative filtering algorithms; and (c) how to apply collaborative filtering to unbounded numeric preference data. In...
"The purpose of this project is to load test, and fine tune the loan search functionality of the Broker Blueprint web application, an innovative Business-to-Business (B2B) online service aiding mortgage lenders and brokers in today's highly competitive mortgage market.
Broker Blueprint enables brokers to search for suitable mortgage loans across...
We develop a system for simulation-based optimization of defensive formations for American football. The first component of the system is an environment for simulating football plays with real physical interactions between players and their surroundings. The simulator is built on the AGEIA PhysX engine, which incorporates rigid body dynamics and...
Efficient routing of information packets in dynamically changing communication networks requires routing policies that adapt to changes in load levels, traffic patterns and network topologies. Reinforcement Learning (RL) is an area of artificial intelligence that studies algorithms that dynamically optimize their performance based on experience in an environment. RL, thus,...
WebGen is a software tool for generating Web scripts automatically for a Web-based database application. In this project, access control, AJAX support, and editable-and-insertable table mechanisms were added to WebGen. With our access control mechanism, an access-control level can be specified for each table. In access control level 1, for...
The increasing need to share and synchronize personal information, such as schedules, tasks and events, amongst users has lead to the development of inter-personal information management software like ChandlerTM. Chandler is being developed in Python at the Open Source Applications Foundation, San Francisco. Before I started working on the project...
This project addresses the problems of manually placing facial landmarks on a portrait and finding a fast way to warp the annotated image of a face. While there are many approaches to automatically find facial landmarks, most of them provide insufficient results in uncontrolled environments. Thus I introduce a method...
The topic of species distribution modelling has been on of increasing interest in
recent years. As climate change is becoming of even more interest to researchers,
more tools are needed to better analyze and predict various climate change scenarios.
One particular area of interest is that of species distribution modeling....
This project presents a new, and more versatile, method for performing Relief Mapping (also known as Parallax Occlusion Mapping), utilizing rates of change in texture coordinates across a polygon surface to calculate the texture sampling offsets used in the ray-tracing portion of the Relief Mapping algorithm. This new technique relies...
Desktop widget engines have emerged as an alternative for completing simple tasks without the need for a full-blown application or constant user interaction. Widgets can simply display data in a compact and visually appealing manner (such as stock tickers, weather forecasts, and news notifications), or go so far as to...
This paper describes a method for finding areas of interest on a two-dimensional grid map used in the real-time strategy engine Stratagus. The method involves discovering chokepoints where through all simulation agents must pass. Using a set of tunable parameters, a full set of chokepoints are located. The redundant and...
The dream of ubiquitous virtual reality (VR) tools has been a powerful presence in pop culture since before the turn of the century. But for all of its charm, VR applications are few and far between due to the high cost of hardware setups and cumbersome form factor. This project...
Many methods have been explored in the literature of multi-label learning, ranging from simple problem transformation to more complex method that capture correlation among labels. However, mostly all existing works do not address the challenge with incomplete label data. The goal of this project is to extend the work of...
A five year study of file-system metadata shows that the number of files increases by 200% and only a select few file-types contribute for over 35% of the files that exist on a file-system. It is difficult to point out a permanent selection of files that a user really cares...
Software maintenance tasks often require finding information within existing code, which is time-consuming and difficult even for professional programmers. For example, programmers may need to know what code implements certain functionality or what is the purpose of certain code. In response, researchers have developed tools to help programmers find information...
Novelty detection plays an important role in machine learning and signal processing. This
project studies novelty detection in a new setting where the data object is represented as
a bag of instances and associated with multiple class labels, referred to as multi-instance
multi-label (MIML) learning. Contrary to the common assumption...
Maintaining variation in software is a difficult problem that poses serious challenges for the understanding and editing of software artifacts. Although the C preprocessor (CPP) is often the default tool used to introduce variability to software, because of its simplicity and flexibility, it is infamous for its obtrusive syntax and...
Constructing a panorama from a set of videos is a long-standing problem in computer vision. A panorama represents an enhanced still-image representation of an entire scene captured in a set of videos, where each video shows only a part of the scene. Importantly, a panorama shows only the scene background,...
Biologists regularly collect images of leaves for their further studies. One such biological study of leaves is scoring the phenomic characters of leaves for the construction of the Tree of Life (ToL), i.e. the evolutionary lineage of taxa in botany. There is an opportunity for computer vision to help biologists...
Graphics hardware in mobile devices has become more powerful, allowing rendering techniques such as ray-cast volume rendering to be done at interactive rates. This increase of performance provides desktop capabilities combined with the portability of a tablet. Volumes can demand a high amount of memory in order to be loaded...
We model the popular board game of Clue as an MDP and evaluate Monte-Carlo policy rollout in a simulated environment pitting different agents and policies against each other. We describe the choices we made in the representation, along with some of the problems we encountered along the way. We find...
Surveys are often used in health studies to collect data about participants for scientific research. An increasing number of health scientists are turning to online data collection methods because they are less costly and can reach a large diverse population quickly. Online surveys also make it easy to track and...
CoprHD is an open source software defined storage controller platform. It holds an inventory of all storage devices in the data center and understands their connectivity. It is an operating system for a storage cloud. It is designed with two key goals in mind:
• Make an enterprise or a...
The Intel Xeon Phi is a relative newcomer to the scientific computing scene. In the recent years, GPUs have been used extensively for mathematical simulations. The Xeon Phi is Intel’s response to the use of these cards. Like the GPU, it is highly parallelizable but can be programmed like a...
RNA secondary structure prediction maps a RNA sequence to its secondary structure (set of AU, CG, and GU pairs). It is an important problem in computational biology be-cause such structures reveals crucial information about the RNAs function, which is useful in many applications ranging from noncoding RNA detection to folding...
General-purpose Graphics Processing Units (GPGPUs) have become a critical component in high-performance computing (HPC) systems in executing modern computational workloads. The high thread level parallelism (TLP) and programmable shader cores allow thousands of threads to execute in Parallel. The fast-scaling of GPGPUs have increased the demand for performance optimizations on...
This project is a custom output stage for a two-channel signal source design project at Oregon State. Starting in January, I began leading a team tasked with the development of an arbitrary waveform generator via the CreateIT Collaboratory at OSU. Undergraduate students interview into the CreateIT Collaboratory and are assigned...
Software Defined Storage is a term for data storage software to manage policy-based provisioning and management of heterogeneous data storage system abstracting underlying hardware. CoprHD is a software defined storage controller and API platform which enables policy-based management and cloud automation of storage resources for block, object and file storage...
Debugging, an integral part of software development, is difficult for end-user programmers, especially in the case of complex programs. The process of isolating errors is time consuming without the help of debugging support provided by the tool. For example, the visual programming tool LondonTube supports creation of custom mobile-cloud-web applications,...
With the development of technologies in genome sequencing and variant detection, a huge number of variants are detected. To further analyze the variants, it requires an efficient tool to annotate the functional effect of variants. This project managed to develop an efficient program to annotate the functional effect of variants...
CoprHD is an open source software-defined storage and API platform which creates an abstraction layer over multi-vendor heterogeneous storage systems. It offers the ability to discover, pool and automate the management of the storage ecosystem with the help of storage drivers establishing connections between CoprHD and storage systems. On the...
Mutation testing is one of the effective approaches measuring test adequacy of test suites. It is widely used in both academia and industry. Unfortunately, the adoption and practical use of mutation testing for Python 2.x programs face three obstacles. First, limited useful mutation operators. Existing mutation testing tools support very...
Software testing is the process of evaluating the accuracy and performance of software, and automated software testing allows programmers to develop software more efficiently by decreasing testing costs. We compared two advanced random test generators, a Feedback-Directed Random Test Generator (FDR) and a Feedback-Controlled Random Test Generator (FCR), for an...
With explosive growth of Internet access from smart phones and tablets, increasing bandwidth for WIFI system is badly needed. Depending on two years’ research, we produced a novel communication system called WIFO system, which integrates both RF (Radio Frequency) and FSO (Free Space Optical) techniques. WIFO system can significantly increase...
Hyperthermia is a cancer therapy that relies on the local heating of a cancerous tumor to kill cancer cells and disrupt the future growth of the tumor. While hyperthermia is capable of killing tumors separately, physicians often combine it with other treatment methods, typically radiation therapy, for its synergistic effects...
The constant increase in marine traffic requires a strategy to manage safety. The automatic identification system (AIS) was developed as a navigation safety device for ships in the 1990s. AIS is intended, primarily, to allow ships to view marine traffic in their area and to be seen by that traffic....
In this work, an alternating current (ac) magnetic susceptometer is designed and implemented to track the Brownian relaxation time of magnetic nanoparticles that are suspended in a liquid medium. The detection technique based on the Brownian relaxation time of magnetic nanoparticles has found its way in a variety of biosensing...
Uploading everyday information about food intake, sleep, number of steps and then generating consolidated peer visual reports for participants in large-scale health studies, often divided into multiple treatment groups, can be challenging.
This challenge is even bigger if subjects are young teenagers between the age of 14-19 active in sports,...
Network coding is a transmission paradigm that is known to achieve better network throughput in certain multicast topologies; however, the practicality of network coding has been questioned due to its high computational complexity. One of the drawbacks of using network coding is the long decoding times, this is mainly due...
Online survey data collection is becoming popular because it provides benefits in cost, ease of collecting and managing data, flexibility in format, and access to a diverse population. Surveys are often used for health studies such as Oregon State University’s WAVE Project, which utilizes the WavePipe system, a server enabling...
The problem of supporting more advanced selective undo operations has received a lot of attention. However, selective undo is generally missing in commonly used editors. Moreover, partial selective undo, the ability of undoing just part of some edit so that other edits may be undone, is not supported at all....
Severe weather in the United States causes huge insured losses to crop and property frequently.It creates major impact and elicit diverse response in the weather insurance industry. Events like hail, storm, hurricane etc. are more likely to cause catastrophe losses. So it becomes crucial to collect and analyze these extreme...
Finding an efficient way of distributing content in Peer-to-Peer (P2P) networks has become important with the growing popularity of media streaming applications. Video multicast applications rely on the efficiency of content distribution from a single source to multiple receivers where one source streams a video to a large number of...
With the increase in demand for streaming media capabilities across the Internet, the focus has shifted from traditional client-server to peer-to-peer approaches. Content Distribution Networks (CDNs) have also recently moved from web acceleration to media streaming. P2P CDNs can be used both as a delivery mechanism and as an independent...
Motivation for cloud computing applications are listed. A Cloud Computing framework – MapReduce – is implemented. A document indexing application is built as an example MapReduce application on this framework. Focus is given to ease of job submission and scalability of the underlying network.
Data centers have been charged a great amount of electric bill by the power company and demand charge can contribute up to 40% of the electric bill due to the "random" workload. This phenomenon can be avoided by using the existing Uninterrupted Power Supply (UPS) as the assistant power source...
Urban green space is associated with multiple physical and mental health outcomes. Several benefits of green space, such as stress reduction and attention restoration, are dependent on visual perception of green space exposures. However, traditional green space exposure measures do not capture street-level exposures. In this project, we apply deep...
”Until relatively recently, mankind was not aware that there was a separable binocular depth sense. Through the ages, people like Euclid and Leonardo understood that we see different images of the world with each eye. But it was Wheatstone who in 1838 explained to the world, with his stereoscope and...
The Rust programming language is a systems programming language with a strong static type system. A central feature of Rust’s type system is its unique concept of “ownership”, which enables Rust to give a user safe, low-level control over resources without the overhead of garbage collection. In Haskell, most data...
In histopathological image analysis, image classification as well as pattern detection play a crucial role in the diagnosis and treatment process since the goal is to not only differentiate cancer types but also identify cancerous manifestations. Fully supervised learning strategies tend to address these problems using manually annotated cancerous regions...
Smart Manufacturing (SM) is envisioned to make manufacturing processes more efficient through automation and integration of networked information systems. Robotic arms are integral to this vision. However the benefits of SM, enabled by automation and networking, also come with cyber risks.
In this work, we propose an anomaly detection framework...
With the need for higher spectral efficiency and data rates the rise of simultaneous transmit-and-receive (STAR) radios is becoming increasingly valuable. While many systems employ two separate channels for transmit and receive to double the data speed, this comes at the cost of doubling the RF band. This same performance...
This report presents an efficient method for semi-supervised video object segmentation – the problem of identifying foreground pixels occupied by a target object. The target is specified by the ground-truth mask in the first video frame. While the state of the art achieves a segmentation accuracy greater than 80%, it...
The Jetson Artificial Intelligence Tool chain (JAI-TC) is a set of packages, APIs and libraries for Artificial Intelligence applications to be deployed on the NVidia SOC, Jetson TX2. JAI-TC automates the installation of these items allowing for a wider set of users to leverage these technologies. Prior to this, the...
Automatic music transcription (AMT) is the task, given an acoustic representation of music, to recover a symbolic notation of the written notes expressed by the sound. Transcribing music with multiple notes sounding simultaneously is difficult for both humans and machines. Much existing work on AMT has focused on suitable acoustic...
Most database users do not know formal query languages, such as SQL, and prefer to express their information needs using usable query languages, such as keyword queries. Keyword queries, however, are inherently ambiguous and challenging for the database systems to understand and answer effectively. We propose a novel approach to...
New MS in CS students in the Electrical Engineering and Computer Science school at OSU are required to file their Program of Study by the end of their 2nd term. Many of them, especially international students, are in a totally new ecosystem, so they find it overwhelming to choose the...
People like going on trips with friends and tend to plan their trips well in advance to have the best possible experience of a destination and get the most out of the places they visit and/or the activities they plan to partake in. Right now, the Internet provides a wealth...
Movement pattern detection can be applied in a variety of applications such as assisting independent living of seniors at home, behaviour understanding in surveillance systems, sports analytics, and robotics. This project develops a scheme that fuses information from different sensors to detect movement patterns. This report contains three main parts:...
More and more people have incorporated GIF in their messaging these days and often send gif as a reply. GIF is Graphics Interchange Format and is a short-animated picture without a sound. Searching a trivial gif with a regular emotion is easy to find but if some iconic expression is...
As a general solution to the problem of managing structural and content variability in relational databases, in previous work we have introduced the Variational Database Management System (VDBMS). VDBMS consists of a representation of a variational database (VDB) and a corresponding typed query language (v-query). However, since this is a...
Wave energy is a potentially important renewable clean source of energy that can help solve the energy demand throughout the world. A great deal of research has been conducted in the last few decades and it is now reaching the point of full implementation. In order to compete with other...
Significant increases in the amount of data being streamed, collected, and processed have resulted in widespread adoption of the use of microservices to build scalable software applications. Unfortunately, current tools and frameworks are often insufficient at providing a simple, unified experience for the design, development, and deployment of microservices. They...
As a new year approaches, most of the adults on the planet show interest to form some resolution to make their lives better [Norcross et al. 2002]. One of the ways is to change their behavior and incorporate new habits that they read about or get rid of an existing...
Collaboration with people in a team environment to build software is common. In the beginning stage of a team project, it is required that a team decides what tools and services to utilize to control the source code for the project, communicate with the members, and manage the tasks. In...
This project report presents an implementation of a GenderMag Recorder's Assistant from a semi-working state to a fully working Chrome web store application. In addition, this project report also discusses the persona customization option and limitations and how the persona tool eases the process of persona customization. For results, we...
Metal grating based plasmonic filters are widely researched for their unique properties of field enhancement and localization of light beyond diffraction limit. However, the plasmonic grating filters reported in literature mostly have broadband outputs making them unsuitable for spectroscopy. In this project, we have designed, fabricated, and characterized an array...
More than 50% of American families have at least one pet nowadays, and the number is still rising. Pet caring needs are also growing with it. When people need to leave home for work or vacation, leaving pets home alone might bother some pet owners. Unfortunately, existing approaches all have...
High Performance Computing can find ubiquitous applications in the industry. HPC-applications are specifically designed to take advantage of the parallel nature of the computing systems which is often enabled by Multi-core/Many-core architectures. With this advent of Multi-processors in the mainstream systems, inter-core communication has been one of the major challenges...
Web-based online learning is seeing great adoption alongside the traditional brick-and-mortar classroom model. Online collaborative applications, tutorials and learning platforms have been a great source of knowledge for users. However, most of these applications do not provide much organizational structure to help guide and motivate users in learning new skills....
Magnetic materials can be used in modern soft robotics as a method for external stimulus actuation and motion control. By combining aspects of biology and mechanics, devices are fabricated to create a structure capable of complex movement. Applications that these devices are subject to can be broken down into four...
Safety at home and other indoor venues is one of the most important aspects of everyday life. Yet according to the National Fire Protection Association (NFPA), in 2018, approximately 3000 people died in home fires, while 11.7 thousand people were injured. Most household fires start as cooking accidents, which can...
RF-based signal identification and classification has received growing attention during recent years due to its potential use in many application domains. Of particular interest is Automatic Modulation Classification (AMC), which has been useful in addressing various spectrum related challenges such as signal jamming, policy enforcement, and spectrum sharing. Adopting AMC...