Browsing RPI Theses Open Access by Subject "Computer science"
Now showing items 1-20 of 154
-
A contact model for geometrically accurate treatment of polytopes in simulation
(Rensselaer Polytechnic Institute, Troy, NY, 2014-12)I herein present a formulation of non-penetration constraints between pairs of bodies which accounts for all possible combinations of active contact. This is the first formulation that accurately models the body geometries ... -
A context-sensitive security type system for Java
(Rensselaer Polytechnic Institute, Troy, NY, 2015-05)This thesis presents the theoretical framework for A context-sensitive security type system for Java programs. The primary contribution is JSec, a two-stage protocol that prepares a program containing sensitive data to ... -
A discrete-event simulation tool for resource constrained networks
(Rensselaer Polytechnic Institute, Troy, NY, 2015-12)Resource Constrained Networks (RCN) have become a hot topic in recent years, they includes Wireless Sensor Networks (WSN), Mobile Ad-Hoc Networks (MANET) and Delay-Tolerant Networks (DTN). Security is one of the major ... -
A framework for comparison of methods for solving complemetarity problems that arise in multibody dynamics
(Rensselaer Polytechnic Institute, Troy, NY, 2016-08)Among the simulation software packages in popular use today, there is no entirely satisfactory algorithm to compute the contact impacts with friction, and unbiased comparison and physical validation remain rare. Users with ... -
A hybrid approach to developing ontology-driven applications : a case study in describing radio spectrum usage policies
(Rensselaer Polytechnic Institute, Troy, NY, 2021-05)As such, applications need a simple and stable API that abstracts much of the structure, but keeps the strengths of OWL in reasoning or clarity. To meet this need, we utilize a hybrid approach to integrating an ontology ... -
A network and agent basedmodel of political polarization
(Rensselaer Polytechnic Institute, Troy, NY, 2021-05)In this thesis we discuss the model from the paper “Polarization and Tipping Points” which the author of this thesis coauthored. We go into depth about the decisioning and reasoning behind multiple features of the model ... -
A network intrusion detection system (NIDS) based on information centrality to identify systemic cyber attacks in large systems
(Rensselaer Polytechnic Institute, Troy, NY, 2018-08)This thesis proposes a new approach to intrusion detection in networks. This approach is based on Information Centrality (IC) using which systemic attacks can perform the same level of intrusion detection using approximately ... -
A parallel ghosting algorithm for the Flexible Distributed Mesh Database (FMDB)
(Rensselaer Polytechnic Institute, Troy, NY, 2011-05) -
A step towards the practical evaluation of wildlife identification algorithms
(Rensselaer Polytechnic Institute, Troy, NY, 2022-08)Computer vision approaches have shown to be an effective tool for wildlife identification across a wide range of species. As the field grows and the amount of available data grows with it, deep learning based approaches ... -
A study of classification and embedding methods for identifying humpback whales
(Rensselaer Polytechnic Institute, Troy, NY, 2020-08)The two approaches that we consider are a classification-based approach and an embedding-based one. We were able to achieve a top-1 accuracy of 83.0% for the classifier and of 80.5% when using embeddings. While both ... -
Active learning of Gaussian mixture models using direct estimation of error reduction
(Rensselaer Polytechnic Institute, Troy, NY, 2012-05) -
Advanced optimizations for large scale parallel discrete event simulations
(Rensselaer Polytechnic Institute, Troy, NY, 2015-12)This thesis has four specific contributions to parallel discrete-event simulation. First, we demonstrate the efficacy of ultra large-scale wireless networking simulations utilizing the OLSR protocol on HPC platforms. ... -
AI enabled foreign language immersion : technology and method to acquire foreign languages with AI in immersive virtual worlds
(Rensselaer Polytechnic Institute, Troy, NY, 2020-08)Students who learn foreign languages have limited exposure to conversations in the target language as, by definition, a foreign language is the one that is not commonly spoken where they live. However, exposure to the ... -
An algorithm for network formation and an implementation of a mobile robotic router system
(Rensselaer Polytechnic Institute, Troy, NY, 2008-08)Evidence of the prevalence of wireless networking devices can be seen everywhere. These days, more and more consumer electronics are being released with the ability to communicate with each other, free from the limitations ... -
An automated information-based market maker in prediction markets
(Rensselaer Polytechnic Institute, Troy, NY, 2010-05) -
Analogical constructivism : the emergence of reasoning through analogy and action schemas
(Rensselaer Polytechnic Institute, Troy, NY, 2015-05)After a defense of the claim that cognitive structure cannot exist apart from actions (a claim which I refer to as "No-semantically-empty-structure"), I introduce PAGI World, a simulation environment rich enough in possible ... -
Analysis of random equivalence class selection algorithms for K-anonymity and another O(k)-approximation of optimal K-anonymity by cell suppression
(Rensselaer Polytechnic Institute, Troy, NY, 2010-08) -
Animal detection for photographic censusing
(Rensselaer Polytechnic Institute, Troy, NY, 2021-12)Animal population monitoring is hard to do at large scales. It is too logistically demanding to track thousands of animals with invasive tools like ear tagging, and methods like aerial surveys and hand-based counts cannot ... -
Anomaly detection and diagnosis in manufacturing processes : a comprehensive framework
(Rensselaer Polytechnic Institute, Troy, NY, 2019-08)We call this the two-step neural network algorithm, which is capable of training and predicting on multiple machines. The first step of this algorithm is an unsupervised autoencoder trained to capture the normal behavior ... -
Antikernel: a decentralized secure hardware-software operating system architecture
(Rensselaer Polytechnic Institute, Troy, NY, 2015-05)Security of monolithic kernels, and even microkernels, relies on a large and complex body of code (including both software and hardware components) being entirely bug-free. Most contemporary operating systems can be ...