Follow


Theses/Dissertations from 2018

PDF

Duty-Cycle Based Physical Unclonable Functions (PUFs) for Hardware Security Applications, Mahmood Javed Azhar

PDF

Dynamic Energy-Aware Database Storage and Operations, Peyman Behzadnia

PDF

SR Flip-Flop Based Physically Unclonable Function (PUF) for Hardware Security, Rohith Prasad Challa

PDF

Drone Movement Control using Gesture Recognition from Wearable Devices, Venkata Sireesha Dadi

PDF

A Quantitative Analysis of Shape Characteristics of Marine Snow Particles with Interactive Visualization: Validation of Assumptions in Coagulation Models, Palak P. Dave

PDF

A Fall Prevention System for the Elderly and Visually Impaired, Yueng Santiago De La Hoz Isaza

PDF

Channel Camouflage and Manipulation Techniques in Wireless Networks, Song Fang

PDF

Borromean: Preserving Binary Node Attribute Distributions in Large Graph Generations, Clayton A. Gandy

PDF

Change Descriptors for Determining Nodule Malignancy in Lung CT Screening Images, Benjamin Geiger

PDF

Emerging Non-Volatile Memory Technologies for Computing and Security, Rekha Govindaraj

PDF

Gate Level Probabilistic Simulation Based Hardware Trojan Susceptibility Analysis of Combinational Circuits, Venkata Lakshmi Bhargavi Gurram

PDF

Improving the Security of Building Automation Systems Through an seL4-based Communication Framework, Richard Habeeb

PDF

Identification of Individuals from Ears in Real World Conditions, Earnest Eugene Hansley

PDF

A Key Based Obfuscation and Anonymization of Behavior VHDL Models, Balausha Varshini Kandikonda

PDF

Similarity Based Large Scale Malware Analysis: Techniques and Implications, Yuping Li

PDF

Parallelizing Tabu Search Based Optimization Algorithm on GPUs, Vinaya Malleypally

PDF

Offensive and Defensive Security for Everyday Computer Systems, Ian Markwood

PDF

A Machine Learning Framework to Classify Mosquito Species from Smart-phone Images, Mona Minakshi

PDF

A Point Cloud Approach to Object Slicing for 3D Printing, William Edward Oropallo Jr.

PDF

On the Feasibility of Profiling, Forecasting and Authenticating Internet Usage Based on Privacy Preserving NetFlow Logs, Soheil Sarmadi

PDF

Emotion Recognition Using Deep Convolutional Neural Network with Large Scale Physiological Data, Astha Sharma

PDF

Determining Level of Cognitive Impairment via Computing Fractals using a Computer, Kodhanda Karthik Siriyala

PDF

Orientation Invariance Methods for Inertial Gait, Ravichandran Subramanian

PDF

A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems, Xiaolong Wang

PDF

Precise, General, and Efficient Data-flow Analysis for Security Vetting of Android Apps, Fengguo Wei

PDF

Automatic Multimodal Assessment of Neonatal Pain, Ghada Zamzmi

Theses/Dissertations from 2017

PDF

Mitigation of Insider Attacks for Data Security in Distributed Computing Environments, Santosh Aditham

PDF

Adaptive Region-Based Approaches for Cellular Segmentation of Bright-Field Microscopy Images, Hady Ahmady Phoulady

PDF

Context-based Human Activity Recognition Using Multimodal Wearable Sensors, Pratool Bharti

PDF

Initial Comparative Empirical Usability Testing for the Collaborative Authentication System, Kim Bursum

PDF

Scalable Unsupervised Learning with Game Theory, Alireza Chakeri

PDF

Semantic Description of Activities in Videos, Fillipe Dias Moreira De Souza

PDF

Active Cleaning of Label Noise Using Support Vector Machines, Rajmadhan Ekambaram

PDF

Learning to Predict Clinical Outcomes from Soft Tissue Sarcoma MRI, Hamidreza Farhidzadeh

PDF

Estimation of Human Poses Categories and Physical Object Properties from Motion Trajectories, Mona Fathollahi Ghezelghieh

PDF

Lung CT Radiomics: An Overview of Using Images as Data, Samuel Hunt Hawkins

PDF

Strong-DISM: A First Attempt to a Dynamically Typed Assembly Language (D-TAL), Ivory Hernandez

PDF

Experimental Analysis on the Feasibility of Voice Based Symmetric Key Generation for Embedded Devices, Surya Bharat Kamineni

PDF

Multi-Scale Spatial Cognition Models and Bio-Inspired Robot Navigation, Martin I. Llofriu Alonso

PDF

Constructing a Clinical Research Data Management System, Michael C. Quintero

PDF

Computing the Rectilinear Crossing Number of K, Soundarya Revoori

PDF

An Anthropological Study of Security Operations Centers to Improve Operational Efficiency, Sathya Chandran Sundaramurthy

PDF

Lost In The Crowd: Are Large Social Graphs Inherently Indistinguishable?, Subramanian Viswanathan Vadamalai

Theses/Dissertations from 2016

PDF

Parallelization of Push-based System for Molecular Simulation Data Analysis with GPU, Iliiazbek Akhmedov

PDF

Enforcing Security Policies On GPU Computing Through The Use Of Aspect-Oriented Programming Techniques, Bader Albassam

PDF

Voltage Droop Analysis and Mitigation in STTRAM-based Last Level Cache, Radha Krishna Aluru

PDF

Locomotion in Virtual Reality for Room Scale Tracked Areas, Evren Bozgeyikli

PDF

Virtual Reality Serious Games for Individuals with Autism Spectrum Disorder: Design Considerations, Lal Bozgeyikli

PDF

Protocol Guided Trace Analysis for Post-Silicon Debug Under Limited Observability, Yuting Cao Cao

PDF

Scalable Clustering Using the Dempster-Shafer Theory of Evidence, Alireza Chakeri

PDF

Fast Computation on Processing Data Warehousing Queries on GPU Devices, Sam Cyrus

PDF

Label Noise Cleaning Using Support Vector Machines, Rajmadhan Ekambaram

PDF

Pedestrian Detection in Low Quality Moving Camera Videos, Saurabh Hinduja

PDF

Secure Communication Scheme in Smart Home Environment, Hari Krishna Jonnalagadda

PDF

MsSpark: Implementation of Molecular Simulation Queries Using Apache Spark, Parneet Kaur

PDF

Design Exploration and Application of Reversible Circuits in Emerging Technologies, Saurabh Kotiyal

PDF

Threshold Voltage Defined Switches and Gates to Prevent Reverse Engineering, Ithihasa Reddy Nirmala

PDF

Automatic Pain Assessment from Infants’ Crying Sounds, Chih-Yun Pai

PDF

Determining the Effectiveness of Soil Treatment on Plant Stress using Smart-phone Cameras, Anurag Panwar

PDF

A Smartphone-based System for Clinical Gait Assessment, Andres Alfredo Perez Leon

PDF

A Quantified Model of Security Policies, with an Application for Injection-Attack Prevention, Donald James Ray

PDF

Impact of Visualization on Engineers – A Survey, Dhaval Kashyap Shah

PDF

Behavioral Modeling and FPGA Synthesis of IEEE 802.11n Orthogonal Frequency Division Multiplexing (OFDM) Scheme, Ragahv Sharma

PDF

A Communication Protocol for Nanogrids and its Application in Off-Grid Rural Areas of Developing Countries, Sowmya Srikanth

PDF

Efficient Algorithms and Applications in Topological Data Analysis, Junyi Tu

PDF

Video Data Collection for Continuous Identity Assurance, Janani Venkatesan

PDF

Methodologies to Exploit ATPG Tools for De-camouflaging, Deepak Reddy Vontela

PDF

Authentication in Wireless Body Area Networks (WBAN), Nagalaxmi Yenuganti

PDF

The Role of Social Ties in Dynamic Networks, Xiang Zuo

Theses/Dissertations from 2015

PDF

Computational Methods for Biomarker Identification in Complex Disease, Amin Ahmadi Adl

PDF

DCMS: A Data Analytics and Management System for Molecular Simulation, Meryem Berrada

PDF

Design, Testing and Implementation of a New Authentication Method Using Multiple Devices, Cagri Cetin

PDF

The Use of Textural Kinetic Habitats to Mine Diagnostic Information from DCE MR Images of Breast Tumors, Baishali Chaudhury

PDF

Reducing the Control Burden of Legged Robotic Locomotion through Biomimetic Consonance in Mechanical Design and Control, Caitrin Elizabeth Eaton

PDF

Improvements on Scientific System Analysis, Vladimir Grupchev

PDF

Security of Non-Volatile Memories - Attack Models, Analyses, and Counter-Measures, Jae-Won Jang

PDF

Developing a Compiler for a Regular Expression Based Policy Specification Language, Cory Michael Juhlin

PDF

Low Power Real-time Video and Audio Embedded System Design for Naturalistic Bicycle Study, Janardhan Bhima Reddy Karri

PDF

Content Abuse and Privacy Concerns in Online Social Networks, Md Imrul Kayes

PDF

Visual SLAM and Surface Reconstruction for Abdominal Minimally Invasive Surgery, Bingxiong Lin

PDF

A Comparative Study of Dual-tree Algorithms for Computing Spatial Distance Histogram, Chengcheng Mou

PDF

Embedded System Design for Real-time Monitoring of Solitary Embedded System Design for Real-time Monitoring of Solitary, Robert Philip O'Brien

PDF

A Comparative Study of Formal Verification Techniques for Authentication Protocols, Hernan Miguel Palombo

PDF

Direct Solutions to Perceptual Organization Problems, Ravi Kumar Panchumarthy

PDF

Synthesis Techniques for Sub-threshold Leakage and NBTI Optimization in Digital VLSI Systems, Shilpa Pendyala

PDF

Low-Power and Robust Level-Shifter with Contention Mitigation for Memory and Standalone Applications, Kenneth M. Ramclam

PDF

Authentication Via Multiple Associated Devices, Jean-Baptiste Subils

PDF

Precise Detection of Injection Attacks on Concrete Systems, Clayton Whitelaw

PDF

Knowledge Discovery and Predictive Modeling from Brain Tumor MRIs, Mu Zhou