Theses/Dissertations from 2018
A Recommender System for Improving Program Security Through Source Code Mining and Knowledge Extraction, Fitzroy Nembhard
A Comparison Study of Disease Spreading Models, Douglas Nogueira Oliveira
First Steps in Retrofitting a Versatile Software Testing Infrastructure to Android, Carol Anne Oliver
A Novel Approach to Containerize Existing Applications, Vineet Haresh Palan
A Comprehensive Data-Driven Characterization of Organ Transplantation, Diego Marconi Pinheiro Ferreira Silva
A Study of Cloud Haskell With Applications to MapReduce, Shreyas Ramnath
A Framework for Characterizing the Security Posture of Cyber Systems, Matthew Ridley
Identifying The Most Relevant Arguments From User Meta-Data, Roussi Roussev
Standardizing the Requirements Specification of Multi-Agent Systems, Khaled Ali M Slhoub
Automatic Anuran Species Recognition via Vocalization, Katrina Smart
Privus: Take Back Your Privacy The Effect of a User-Centered Approach on Privacy Management, Aral Tasher
Transfer Learning with Convolutional Neural Networks Applied to Periocular Biometrics, Kushal Vangara
Two Channel SDM Communication System Simultaneously Operating at 10Gb/s Using C-band Transceivers, Han Wang
Phonon Polariton Enhanced Infrared Waveguides, Yuchen Yang
Theses/Dissertations from 2017
A Reinforcement Learning Approach to Autonomous Speed Control in Robotic Systems, Nima Aghli
The Impact of Different Propagation Environments on the Performance of Wireless Sensor Networks, Abdallah Mubark Aldosary
Decision Support for Shared Responsibility of Cloud Security Metrics, Moteeb Aieed Al Moteri
Low Complexity Transmission Schemes for Future Wireless Communication Systems, Geamel Alyami
Interpolation Methods for Coverage Area in Cellular Systems, Abdlmagid Mohamed Basere
A Context-Free Method of Visualizing Streaming Object Data for the Purpose of Identifying Known Events: an Implementation and Analysis, Quinn Gregory Carver
An Extrinsic Fabry-Perot Interferometric Sensor using Intermodal Phase Shifting and Demultiplexing of the Propagating Modes in a Few-Mode Fiber, Julius Chatterjee
High Volume Test Automation with Yeager, Casey Doran
Arabic Speech Recognition Systems, Hamda M. M. Eljagmani
A Survey of Impact Analysis Tools for Effective Code Evolution, Stephanie Perez Day Galbo
Comparison of Reference Signal Received Power Measurements between Cell Phone and Scanning Receiver in LTE, Sahin Gullu
Analysis, A Technique, and Incremental Learning of Wake-Up-Word Speech Recognition, Ahmad Zuhair S. Hasanain
A Mixed-Reality Approach for Cyber-situation Awareness, Tapas Dipakkumar Joshi
Repeatability of Reference Signal Received Power Measurements in LTE Networks, Hayder A Abdulrasool Khzaali
High Fidelity Adaptive Cyber Emulation, Samir Mammadov
Managed Containers for Increased Cyber-Resilience, Xavier J. Merino Aguilera
Planar Electromagnetic Band Gap for Broadband Switching Noise Mitigation in High-Speed PCB, Kevin H. Nguyen
Performance Evaluation of Mission Critical Communications Services over LTE Networks, Kehinde Olumide Olasupo
Optimization Framework for Deployment of Wireless Sensor Networks, Tajudeen Olawale Olasupo
The Growth, Structure, and Dynamics of Crime in Cities, Marcos Oliveira
Information Densification of Social Constructs via Behavior Analysis of Social Media Users – A Study on Twitter, Diogo F. Pacheco
Open Census for Addressing False Identity Attacks in Decentralized Social Networks, Song Qin
Effects of Virtualization in Database Benchmarking, Jigarkumar Jayantibhai Rathod
Hybrid Phonon Polaritons Mimic TE Surface Wave Enhanced Supercoupling, Delroy Dominic Rebello
Efficiency Analysis and Optimization of Light Trapping in Amorphous Silicon Heterojunction Solar Cell with Lumerical FDTD/DEVICE, Muhammad Riaz
Language Relations on Twitter: A Network Science Approach, Priya Saha
Measurement Comparison of RF Receivers in UMTS 1900MHz, Mohammed Najat Mohammed Sayan
Mining Location and User Information from Users’ Trajectories, Marcello Tomasini
Optical Nanoantenna Impedance Matching and Duality and hybrid Surface Phononic Waveguide, Yuancheng Xu
Theses/Dissertations from 2016
Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments, Brad Alshehry
Analysis Tools and Defense Mechanisms for DoS Hash Attacks, Pratick Henry Bakhtiani
Soteria: A Persuasive eSecurity Assistant, Punica Bhardwaj
Robust Structured Tracking, Ivan Bogun
A Robust Speaker Identification Algorithm Based On Atomic Decomposition and Sparse Redundant Dictionary Learning, Thomas James Bryan Jr.
Studies with Dynamic Nuclear Imaging Image Reconstruction Algorithm, Haoran Chang
A Self-Organized Approach for Detecting Communities in Networks, Ben Collingsworth
Google Speech Recognition using Embedded System, Anita Devi
Robotic Arm Tracing Curves Recognized by Camera, Timothy Karl Findling
Digital Quorum Sensing for Self-Organizing Malware, Mark E. Fioravanti II
Angle of Attack Visualization: A Proposal for a Tangible Interactive In-flight Loss of Control Recovery System, Nicholas Kasdaglis
AES Encryption Algorithm using ARM TrustZone Technology, Chia-Che Lee
Evaluation of User Perceived QoE in Mobile Systems Using Social Media Analytics, Ahmed Yaseen Mjhool
Real-Time Monitoring of Sand and Dust Storm Winds Using Wireless Sensor Technology, Hana Mohammed Mujlid
Analysis of the FM Radio Spectrum for Secondary Licensing of Low-Power Short-Range Cognitive Internet-of-Things Devices via Cognitive Radio, Derek Thomas Otermat
Cross-Spectral Biometric Performance Analysis on High-Resolution Face Images, Praveen Kumar Pandian Shanmuganathan
Feature Based Object Tracking: A Probabilistic Approach, Kaleb Smith
Specialized Distributed Hardware Design for Real-Time Atmospheric Turbulence Mitigation Error Correction Calculation, Subhadra Subramanian
GBANN-V: Genetically Based Artificial Neural Network With Validation for Optimal Feature Selection and Data Mining, Eric W. Worden
Theses/Dissertations from 2015
Framework for Open-Source Software Update Mechanism: Resistance to Stacking the Deck Attack, Khalid Alhamed
A Methodology for Evaluating the Strength of Cued-recall Graphical Passwords, Mohammad N. Alshehri
A Multi-Level Analysis of Collaborations in Computer Science, Pramod Divakarmurthy
Towards a Usable-Security Engineering Framework for Enhancing Software Development, Yasser M. Hausawi
Using a Personalized Machine Learning Approach to Detect Stolen Phones, Huizhong Hu
Identifying Student Behavior for Improving Online Course Performance with Machine Learning, Makoto Mori
A Foundation for Cyber Experimentation, Evan Lawrence Stoner
Estimating Effectiveness of Twitter Messages with a Personalized Machine Learning Approach, Xunhu Sun
Contribution to t he Onboard Context Sensitive Information System ( of Commercial Aircraft, Wei Tan
NAT Traversal Techniques and UDP Keep-Alive Interval Optimization, Christopher Daniel Widmer
Detecting Harmful Hand Behavior with Machine Learning from Wearable Motion Sensor Data, Lingfeng Zhang
Comparing the Effect of Smoothing and N-gram Order : Finding the Best Way to Combine the Smoothing and Order of N-gram, Wenyang Zhang
Theses/Dissertations from 2014
Using Variations of Shape and Appearance in Alignment Methods for Classifying Human Actions, Sultan Mohammad Almotairi
Gammatone and MFCC Features in Speaker Recognition, Wison Burgos
Distributed GUI Testing of iOS Applications with HadoopUnit, Krissada Dechokul
Resonant Coupling of an Infrared Metasurface with PMMA, Michael Francis Finch
Measurement Based Statistical Model for Path Loss Prediction for Relaying Systems Operating in 1900 MHz Band, Masoud Dao Hamid
Holographic-Based Leaky Wave Antennas and Phonon-Enhanced Waveguides for Infrared Applications, Franklin Muriuki Manene
Infrared Leaky Wave Antenna Coupled Bolometer, Navaneeth Premkumar
Theses/Dissertations from 2012
Authorship is Continuous: Detecting Plagiarism in Student Code Assignments with Version Control, Ian Mathias Koss
Theses/Dissertations from 2008
Personalized Web Search by Using Learned User Profiles in Re-ranking, Jia Hu
Machine Learning for Host-based Anomaly Detection, Gaurav Tandon
Theses/Dissertations from 2007
Type Inference, Type Improvement, and Type Simplification in a Language with User-Defined Polymorphic Relational Operators, Lajos Pál Nagy
Malicious Mobile Code Related Experiments with an Extensible Network Simulator, Attila Ondi
Theses/Dissertations from 2006
A Swarm-based Model for Increasing Impulse Shopping in Supermarkets, Zeehan-ul-hassan Usmani
Theses/Dissertations from 2005
Mindshare: a Collaborative Peer-to-Peer System for Small Groups, Gareth Charles Farrington
Learning Implicit User Interest Hierarchy for Web Personalization, Hyoung-rae Kim
Correlogram Method for Comparing Bio-Sequences, Gandhali P. Samant
Keyword Spotting Using Normalization of Posterior Probability Confidence Measures, Rachna Vijay Vargiya
Theses/Dissertations from 2004
Reduced Index Sparse Representation in a Parallel Environment, Pedro Alfonso Escallon
MOOL: an Object-Oriented Programming Language with Generics and Modules., María Lucía Barrón Estrada
Web-based Trend Analysis of Rocket Data Using XML, Mark Randall Gibson
On The Use of Randomness in Computing To Perform Intelligent Tasks, Ryan Scott Regensburger
Analysis of Hostile Network Reconnaissance to Anticipate and Mitigate Network Attacks, Luis Angel Rivera
Learning States for Detecting Anomalies in Time Series, Stan Weidner Salvador
Modeling the Spread and Prevention of Malicious Mobile Code Via Simulation CS-2004-15, Christopher Brian Shirey
Quantifying software maintainability on re-engineered translation of FORTRAN to C++ code, Zane Grey Tomlinson Jr.