"‘Biometrics is at the forefront in our agenda for homeland security,’ declared Asa Hutchinson, the Department of Homeland Security's undersecretary for border and transportation security, at the 2004 Biometric Consortium Conference” [11].
Flashy retinal scanning and voice activated computers were once considered technologies for science fiction movies and novels. Nowadays,...
The Elliptic Curve Digital Signature Algorithm (ECDSA) is a public key cryptosystem used for creation and verification of digital signatures in electronic documents. In this thesis, we created a Java applet that provides the functionality of the ECDSA using all of the NIST elliptic curves over GF(p). This applet was...
This thesis describes the implementation of an interface for querying established correspondences between anatomical structures across species. I was the main developer of this query engine, called the Comparative Anatomy Information System. My work involved developing methods to query the knowledge base, perform the specified comparison, display the anatomical hierarchies...
The computer game industry continues to progress toward realistic-looking character motion. However, even in state-of-the-art games, the use of motion capture data in character animation may result in errors such as “foot slipping,” where the feet do not match up with the floor properly during translation. Various algorithms have been...
The high cost of manually producing background characters creates a demand for a
way to automatically generate plausible behaviors. These background extras need to
behave in a manner that is believable such that they do not distract the focus of the
audience from the primary action occurring in the scene....
Media application on the internet has become more and more popular as the bandwidth of the network links increase. The bottleneck of the existing media systems is no longer the link bandwidth at user’s end, but the server’s ability to handle streaming requests. These existing streaming systems do not scale...
DiskGrapher is a graphical visualization tool designed to help users better manage the
space on their hard drives. The main goal of DiskGrapher is to provide a different
visualization technique to display information, with the goal of providing a more intuitive
understanding of the directory structure of the disk than...
Factorization of integers is an important aspect of cryptography since it can be used as an
attack against some of the common cryptographic methods being used. There are
numerous methods in existence for factoring integers. Some of these are faster than
others for general numbers, while others work best on...
The push towards higher performing and more sensitive mixed signal circuitry has required the parallel development of increasingly more complex and sensitive test and calibration harnesses. Current off-chip methods of test and calibration may require higher pin counts or induce unwanted parasitic interference.
In this thesis, the design of a...
Regression testing is a common and necessary task carried out by software practitioners to validate the quality of evolving software systems. Unfortunately, regression testing is often an expensive, time-consuming process, particularly when applied to large software systems. Consequently, practitioners may wish to prioritize the test cases in their regression test...
A financial processor is the most important component of a credit union‘s IT infrastructure. A database storing member demographic information, account balances, and transaction history, it performs financial calculations, such as interest, dividends, and maturities. It also provides a user interface, allowing tellers and financial service representatives to manage accounts...
Generating solutions to Sokoban levels is an NP-hard problem that is difficult for even modern day computers to solve due to its complexity. This project explores the creation of a Sokoban solver by eliminating as many potential moves as possible to greatly limit the overall search space. This reduction is...
Modern technology has enabled the advancement of biological research through the use of powerful machines and computers as well as innovative computer programs. Advances in sequencing technology and software enable us to make de novo assemblies of organism genomes, and the development of specialized computer programs can automate routine but...
As of February 2012, approximately 46% of American adults own a smartphone. The graphics quality of these devices gets better each year. However, they still have many more limitations in graphics processing and storage space than desktop computers. This means that applications on these devices should focus on optimizing their...
Recent work in machine learning concerns the detection and identification of bird species from audio recordings of their vocalizations. Such analysis can yield valuable ecological information concerning the activity and distribution of species in the wild. Current species-identification methods require individual syllables of bird audio as input, but field-collected audio...
Throughout Europe, Northern Africa, and the Near East, hundreds of Roman ruins lie scattered about. Many Roman aqueducts, bridges, roads, and even buildings remain standing over two thousand years after their construction, as functional as the day they were built. In the modern United States, however, many public works projects...
Buses can be impractical for those who must adhere to a strict schedule or depend on them for emergencies. While variations from the official bus schedule are understandable and largely unavoidable, a lack of communication discourages adoption at a rate disproportionate with their actual likelihood. Even if a bus is...
Over the past few decades, the ratio of women to men in many traditionally maledominated fields has become much more equal. However, in science, technology, engineering, and math (STEM) fields the ratio has not improved at the same rate. In computer science the ratio is still very uneven. Today women...
The purpose of this study is to explore kernel machine learning methods for species distribution modeling. Previous studies have shown the success of Generalized Boosted Regression Models, however kernel methods have been unexplored for species distribution modeling. Using the eBird dataset, four machine learning methods were tested for accuracy and...
One of the tasks that continues to prove difficult in robotics is the ability to grasp objects of varying shapes. It is time-consuming to acquire large amounts of real-world data in order to train accurate classifiers that can predict the success or failure of a grasp. To solve this issue,...