Follow


Theses/Dissertations from 2020

PDF

Keyless Anti-Jamming Communication via Randomized DSSS, Ahmad Alagil

PDF

Active Deep Learning Method to Automate Unbiased Stereology Cell Counting, Saeed Alahmari

PDF

Composition of Atomic-Obligation Security Policies, Yan Cao Albright

PDF

Sentiment Analysis in Peer Review, Zachariah J. Beasley

PDF

Feature Selection Via Random Subsets Of Uncorrelated Features, Long Kim Dang

PDF

Composition of Atomic-Obligation Security Policies, Danielle Ferguson

PDF

Beyond the Hype: Challenges of Neural Networks as Applied to Social Networks, Anthony Hernandez

PDF

Privacy-Preserving and Functional Information Systems, Thang Hoang

PDF

Managing Off-Grid Power Use for Solar Fueled Residences with Smart Appliances, Prices-to-Devices and IoT, Donnelle L. January

PDF

Establishing Topological Data Analysis: A Comparison of Visualization Techniques, Tanmay J. Kotha

PDF

Machine Learning for the Internet of Things: Applications, Implementation, and Security, Vishalini Laguduva Ramnath

PDF

Automating the Classification of Mosquito Specimens Using Image Processing Techniques, Mona Minakshi

PDF

Functional Object-Oriented Network: A Knowledge Representation for Service Robotics, David Andrés Paulius Ramos

PDF

Lung Nodule Malignancy Prediction from Computed Tomography Images Using Deep Learning, Rahul Paul

PDF

Efficient Viewshed Computation Algorithms On GPUs and CPUs, Faisal F. Qarah

PDF

Relational Joins on GPUs for In-Memory Database Query Processing, Ran Rui

PDF

Efficient Forward-Secure and Compact Signatures for the Internet of Things (IoT), Efe Ulas Akay Seyitoglu

PDF

Detecting Symptoms of Chronic Obstructive Pulmonary Disease and Congestive Heart Failure via Cough and Wheezing Sounds Using Smart-Phones and Machine Learning, Anthony Windmon

PDF

Toward Culturally Relevant Emotion Detection Using Physiological Signals, Khadija Zanna

Theses/Dissertations from 2019

PDF

Beyond Labels and Captions: Contextualizing Grounded Semantics for Explainable Visual Interpretation, Sathyanarayanan Narasimhan Aakur

PDF

Empirical Analysis of a Cybersecurity Scoring System, Jaleel Ahmed

PDF

Phenomena of Social Dynamics in Online Games, Essa Alhazmi

PDF

A Machine Learning Approach to Predicting Community Engagement on Social Media During Disasters, Adel Alshehri

PDF

Measuring Influence Across Social Media Platforms: Empirical Analysis Using Symbolic Transfer Entropy, Abhishek Bhattacharjee

PDF

A Communication-Centric Framework for Post-Silicon System-on-chip Integration Debug, Yuting Cao

PDF

Authentication and SQL-Injection Prevention Techniques in Web Applications, Cagri Cetin

PDF

Multimodal Emotion Recognition Using 3D Facial Landmarks, Action Units, and Physiological Data, Diego Fabiano

PDF

Robotic Motion Generation by Using Spatial-Temporal Patterns from Human Demonstrations, Yongqiang Huang

PDF

A Flexible, Natural Deduction, Automated Reasoner for Quick Deployment of Non-Classical Logic, Trisha Mukhopadhyay

PDF

An Efficient Run-time CFI Check for Embedded Processors to Detect and Prevent Control Flow Based Attacks, Srivarsha Polnati

PDF

Force Feedback and Intelligent Workspace Selection for Legged Locomotion Over Uneven Terrain, John Rippetoe

PDF

Detecting Digitally Forged Faces in Online Videos, Neilesh Sambhu

PDF

Malicious Manipulation in Service-Oriented Network, Software, and Mobile Systems: Threats and Defenses, Dakun Shen

PDF

Parallelization of Genetic Algorithm to Solve MAX-3SAT Problem on GPUs, Prakruthi Shivram

PDF

Authentication Usability Methodology, Jean-Baptiste Subils

PDF

Autonomous Monocular Obstacle Detection for Avoidance in Quadrotor UAVs, Panos Valavanis

PDF

On Automation of Code Transformations for Concept Inventory Misconceptions, Dmytro Vitel

PDF

Wireless Physical Layer Design for Confidentiality and Authentication, Tao Wang

PDF

Detecting RTL Trojans Using Artificial Immune Systems and High Level Behavior Classification, Farhath Zareen

Theses/Dissertations from 2018

PDF

Duty-Cycle Based Physical Unclonable Functions (PUFs) for Hardware Security Applications, Mahmood Javed Azhar

PDF

Dynamic Energy-Aware Database Storage and Operations, Peyman Behzadnia

PDF

SR Flip-Flop Based Physically Unclonable Function (PUF) for Hardware Security, Rohith Prasad Challa

PDF

Drone Movement Control using Gesture Recognition from Wearable Devices, Venkata Sireesha Dadi

PDF

A Quantitative Analysis of Shape Characteristics of Marine Snow Particles with Interactive Visualization: Validation of Assumptions in Coagulation Models, Palak P. Dave

PDF

A Fall Prevention System for the Elderly and Visually Impaired, Yueng Santiago De La Hoz Isaza

PDF

Channel Camouflage and Manipulation Techniques in Wireless Networks, Song Fang

PDF

Borromean: Preserving Binary Node Attribute Distributions in Large Graph Generations, Clayton A. Gandy

PDF

Change Descriptors for Determining Nodule Malignancy in Lung CT Screening Images, Benjamin Geiger

PDF

Emerging Non-Volatile Memory Technologies for Computing and Security, Rekha Govindaraj

PDF

Gate Level Probabilistic Simulation Based Hardware Trojan Susceptibility Analysis of Combinational Circuits, Venkata Lakshmi Bhargavi Gurram

PDF

Improving the Security of Building Automation Systems Through an seL4-based Communication Framework, Richard Habeeb

PDF

Identification of Individuals from Ears in Real World Conditions, Earnest Eugene Hansley

PDF

A Key Based Obfuscation and Anonymization of Behavior VHDL Models, Balausha Varshini Kandikonda

PDF

Similarity Based Large Scale Malware Analysis: Techniques and Implications, Yuping Li

PDF

Parallelizing Tabu Search Based Optimization Algorithm on GPUs, Vinaya Malleypally

PDF

Offensive and Defensive Security for Everyday Computer Systems, Ian Markwood

PDF

A Machine Learning Framework to Classify Mosquito Species from Smart-phone Images, Mona Minakshi

PDF

A Point Cloud Approach to Object Slicing for 3D Printing, William Edward Oropallo Jr.

PDF

On the Feasibility of Profiling, Forecasting and Authenticating Internet Usage Based on Privacy Preserving NetFlow Logs, Soheil Sarmadi

PDF

Emotion Recognition Using Deep Convolutional Neural Network with Large Scale Physiological Data, Astha Sharma

PDF

Determining Level of Cognitive Impairment via Computing Fractals using a Computer, Kodhanda Karthik Siriyala

PDF

Orientation Invariance Methods for Inertial Gait, Ravichandran Subramanian

PDF

A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems, Xiaolong Wang

PDF

Precise, General, and Efficient Data-flow Analysis for Security Vetting of Android Apps, Fengguo Wei

PDF

Automatic Multimodal Assessment of Neonatal Pain, Ghada Zamzmi

Theses/Dissertations from 2017

PDF

Mitigation of Insider Attacks for Data Security in Distributed Computing Environments, Santosh Aditham

PDF

Adaptive Region-Based Approaches for Cellular Segmentation of Bright-Field Microscopy Images, Hady Ahmady Phoulady

PDF

Context-based Human Activity Recognition Using Multimodal Wearable Sensors, Pratool Bharti

PDF

Initial Comparative Empirical Usability Testing for the Collaborative Authentication System, Kim Bursum

PDF

Scalable Unsupervised Learning with Game Theory, Alireza Chakeri

PDF

Semantic Description of Activities in Videos, Fillipe Dias Moreira De Souza

PDF

Active Cleaning of Label Noise Using Support Vector Machines, Rajmadhan Ekambaram

PDF

Learning to Predict Clinical Outcomes from Soft Tissue Sarcoma MRI, Hamidreza Farhidzadeh

PDF

Estimation of Human Poses Categories and Physical Object Properties from Motion Trajectories, Mona Fathollahi Ghezelghieh

PDF

Lung CT Radiomics: An Overview of Using Images as Data, Samuel Hunt Hawkins

PDF

Strong-DISM: A First Attempt to a Dynamically Typed Assembly Language (D-TAL), Ivory Hernandez

PDF

Experimental Analysis on the Feasibility of Voice Based Symmetric Key Generation for Embedded Devices, Surya Bharat Kamineni

PDF

Multi-Scale Spatial Cognition Models and Bio-Inspired Robot Navigation, Martin I. Llofriu Alonso

PDF

Constructing a Clinical Research Data Management System, Michael C. Quintero

PDF

Computing the Rectilinear Crossing Number of K, Soundarya Revoori

PDF

An Anthropological Study of Security Operations Centers to Improve Operational Efficiency, Sathya Chandran Sundaramurthy

PDF

Lost In The Crowd: Are Large Social Graphs Inherently Indistinguishable?, Subramanian Viswanathan Vadamalai

Theses/Dissertations from 2016

PDF

Parallelization of Push-based System for Molecular Simulation Data Analysis with GPU, Iliiazbek Akhmedov

PDF

Enforcing Security Policies On GPU Computing Through The Use Of Aspect-Oriented Programming Techniques, Bader Albassam

PDF

Voltage Droop Analysis and Mitigation in STTRAM-based Last Level Cache, Radha Krishna Aluru

PDF

Locomotion in Virtual Reality for Room Scale Tracked Areas, Evren Bozgeyikli

PDF

Virtual Reality Serious Games for Individuals with Autism Spectrum Disorder: Design Considerations, Lal Bozgeyikli

PDF

Protocol Guided Trace Analysis for Post-Silicon Debug Under Limited Observability, Yuting Cao Cao

PDF

Scalable Clustering Using the Dempster-Shafer Theory of Evidence, Alireza Chakeri

PDF

Fast Computation on Processing Data Warehousing Queries on GPU Devices, Sam Cyrus

PDF

Label Noise Cleaning Using Support Vector Machines, Rajmadhan Ekambaram

PDF

Pedestrian Detection in Low Quality Moving Camera Videos, Saurabh Hinduja

PDF

Secure Communication Scheme in Smart Home Environment, Hari Krishna Jonnalagadda

PDF

MsSpark: Implementation of Molecular Simulation Queries Using Apache Spark, Parneet Kaur

PDF

Design Exploration and Application of Reversible Circuits in Emerging Technologies, Saurabh Kotiyal

PDF

Threshold Voltage Defined Switches and Gates to Prevent Reverse Engineering, Ithihasa Reddy Nirmala

PDF

Automatic Pain Assessment from Infants’ Crying Sounds, Chih-Yun Pai

PDF

Determining the Effectiveness of Soil Treatment on Plant Stress using Smart-phone Cameras, Anurag Panwar

PDF

A Smartphone-based System for Clinical Gait Assessment, Andres Alfredo Perez Leon

PDF

A Quantified Model of Security Policies, with an Application for Injection-Attack Prevention, Donald James Ray