Follow

Theses/Dissertations from 2018

PDF

Identifying The Most Relevant Arguments From User Meta-Data, Roussi Roussev

PDF

Standardizing the Requirements Specification of Multi-Agent Systems, Khaled Ali M Slhoub

PDF

Automatic Anuran Species Recognition via Vocalization, Katrina Smart

PDF

Privus: Take Back Your Privacy The Effect of a User-Centered Approach on Privacy Management, Aral Tasher

PDF

Transfer Learning with Convolutional Neural Networks Applied to Periocular Biometrics, Kushal Vangara

PDF

Two Channel SDM Communication System Simultaneously Operating at 10Gb/s Using C-band Transceivers, Han Wang

PDF

Phonon Polariton Enhanced Infrared Waveguides, Yuchen Yang

Theses/Dissertations from 2017

PDF

A Reinforcement Learning Approach to Autonomous Speed Control in Robotic Systems, Nima Aghli

PDF

Mathematical model and experimental verification of spatially multiplexed system using ray theory and modified Laguerre Gaussian beams, Saud Alanzi

PDF

The Impact of Different Propagation Environments on the Performance of Wireless Sensor Networks, Abdallah Mubark Aldosary

PDF

Decision Support for Shared Responsibility of Cloud Security Metrics, Moteeb Aieed Al Moteri

PDF

Low Complexity Transmission Schemes for Future Wireless Communication Systems, Geamel Alyami

PDF

Interpolation Methods for Coverage Area in Cellular Systems, Abdlmagid Mohamed Basere

PDF

A Context-Free Method of Visualizing Streaming Object Data for the Purpose of Identifying Known Events: an Implementation and Analysis, Quinn Gregory Carver

PDF

An Extrinsic Fabry-Perot Interferometric Sensor using Intermodal Phase Shifting and Demultiplexing of the Propagating Modes in a Few-Mode Fiber, Julius Chatterjee

PDF

High Volume Test Automation with Yeager, Casey Doran

PDF

Arabic Speech Recognition Systems, Hamda M. M. Eljagmani

PDF

A Survey of Impact Analysis Tools for Effective Code Evolution, Stephanie Perez Day Galbo

PDF

Comparison of Reference Signal Received Power Measurements between Cell Phone and Scanning Receiver in LTE, Sahin Gullu

PDF

Analysis, A Technique, and Incremental Learning of Wake-Up-Word Speech Recognition, Ahmad Zuhair S. Hasanain

PDF

A Mixed-Reality Approach for Cyber-situation Awareness, Tapas Dipakkumar Joshi

PDF

Repeatability of Reference Signal Received Power Measurements in LTE Networks, Hayder A Abdulrasool Khzaali

PDF

High Fidelity Adaptive Cyber Emulation, Samir Mammadov

PDF

Managed Containers for Increased Cyber-Resilience, Xavier J. Merino Aguilera

PDF

Planar Electromagnetic Band Gap for Broadband Switching Noise Mitigation in High-Speed PCB, Kevin H. Nguyen

PDF

Performance Evaluation of Mission Critical Communications Services over LTE Networks, Kehinde Olumide Olasupo

PDF

Optimization Framework for Deployment of Wireless Sensor Networks, Tajudeen Olawale Olasupo

PDF

The Growth, Structure, and Dynamics of Crime in Cities, Marcos Oliveira

PDF

Information Densification of Social Constructs via Behavior Analysis of Social Media Users – A Study on Twitter, Diogo F. Pacheco

PDF

Open Census for Addressing False Identity Attacks in Decentralized Social Networks, Song Qin

PDF

Effects of Virtualization in Database Benchmarking, Jigarkumar Jayantibhai Rathod

PDF

Hybrid Phonon Polaritons Mimic TE Surface Wave Enhanced Supercoupling, Delroy Dominic Rebello

PDF

Efficiency Analysis and Optimization of Light Trapping in Amorphous Silicon Heterojunction Solar Cell with Lumerical FDTD/DEVICE, Muhammad Riaz

PDF

Language Relations on Twitter: A Network Science Approach, Priya Saha

PDF

Measurement Comparison of RF Receivers in UMTS 1900MHz, Mohammed Najat Mohammed Sayan

PDF

Mining Location and User Information from Users’ Trajectories, Marcello Tomasini

PDF

Optical Nanoantenna Impedance Matching and Duality and hybrid Surface Phononic Waveguide, Yuancheng Xu

Theses/Dissertations from 2016

PDF

Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments, Brad Alshehry

PDF

Analysis Tools and Defense Mechanisms for DoS Hash Attacks, Pratick Henry Bakhtiani

PDF

Soteria: A Persuasive eSecurity Assistant, Punica Bhardwaj

PDF

Robust Structured Tracking, Ivan Bogun

PDF

A Robust Speaker Identification Algorithm Based On Atomic Decomposition and Sparse Redundant Dictionary Learning, Thomas James Bryan Jr.

PDF

Studies with Dynamic Nuclear Imaging Image Reconstruction Algorithm, Haoran Chang

PDF

A Self-Organized Approach for Detecting Communities in Networks, Ben Collingsworth

PDF

Google Speech Recognition using Embedded System, Anita Devi

PDF

Robotic Arm Tracing Curves Recognized by Camera, Timothy Karl Findling

PDF

Digital Quorum Sensing for Self-Organizing Malware, Mark E. Fioravanti II

PDF

Angle of Attack Visualization: A Proposal for a Tangible Interactive In-flight Loss of Control Recovery System, Nicholas Kasdaglis

PDF

AES Encryption Algorithm using ARM TrustZone Technology, Chia-Che Lee

PDF

Evaluation of User Perceived QoE in Mobile Systems Using Social Media Analytics, Ahmed Yaseen Mjhool

PDF

Real-Time Monitoring of Sand and Dust Storm Winds Using Wireless Sensor Technology, Hana Mohammed Mujlid

PDF

Analysis of the FM Radio Spectrum for Secondary Licensing of Low-Power Short-Range Cognitive Internet-of-Things Devices via Cognitive Radio, Derek Thomas Otermat

PDF

Cross-Spectral Biometric Performance Analysis on High-Resolution Face Images, Praveen Kumar Pandian Shanmuganathan

PDF

Feature Based Object Tracking: A Probabilistic Approach, Kaleb Smith

PDF

Specialized Distributed Hardware Design for Real-Time Atmospheric Turbulence Mitigation Error Correction Calculation, Subhadra Subramanian

PDF

GBANN-V: Genetically Based Artificial Neural Network With Validation for Optimal Feature Selection and Data Mining, Eric W. Worden

Theses/Dissertations from 2015

PDF

Framework for Open-Source Software Update Mechanism: Resistance to Stacking the Deck Attack, Khalid Alhamed

PDF

A Methodology for Evaluating the Strength of Cued-recall Graphical Passwords, Mohammad N. Alshehri

PDF

A Multi-Level Analysis of Collaborations in Computer Science, Pramod Divakarmurthy

PDF

Towards a Usable-Security Engineering Framework for Enhancing Software Development, Yasser M. Hausawi

PDF

Using a Personalized Machine Learning Approach to Detect Stolen Phones, Huizhong Hu

PDF

Identifying Student Behavior for Improving Online Course Performance with Machine Learning, Makoto Mori

PDF

A Foundation for Cyber Experimentation, Evan Lawrence Stoner

PDF

Estimating Effectiveness of Twitter Messages with a Personalized Machine Learning Approach, Xunhu Sun

PDF

Contribution to t he Onboard Context Sensitive Information System ( of Commercial Aircraft, Wei Tan

PDF

NAT Traversal Techniques and UDP Keep-Alive Interval Optimization, Christopher Daniel Widmer

PDF

Detecting Harmful Hand Behavior with Machine Learning from Wearable Motion Sensor Data, Lingfeng Zhang

PDF

Comparing the Effect of Smoothing and N-gram Order : Finding the Best Way to Combine the Smoothing and Order of N-gram, Wenyang Zhang

Theses/Dissertations from 2014

PDF

Using Variations of Shape and Appearance in Alignment Methods for Classifying Human Actions, Sultan Mohammad Almotairi

PDF

Gammatone and MFCC Features in Speaker Recognition, Wison Burgos

PDF

Distributed GUI Testing of iOS Applications with HadoopUnit, Krissada Dechokul

PDF

Resonant Coupling of an Infrared Metasurface with PMMA, Michael Francis Finch

PDF

Measurement Based Statistical Model for Path Loss Prediction for Relaying Systems Operating in 1900 MHz Band, Masoud Dao Hamid

PDF

Holographic-Based Leaky Wave Antennas and Phonon-Enhanced Waveguides for Infrared Applications, Franklin Muriuki Manene

PDF

Infrared Leaky Wave Antenna Coupled Bolometer, Navaneeth Premkumar

Theses/Dissertations from 2012

PDF

Authorship is Continuous: Detecting Plagiarism in Student Code Assignments with Version Control, Ian Mathias Koss

Theses/Dissertations from 2008

PDF

Personalized Web Search by Using Learned User Profiles in Re-ranking, Jia Hu

PDF

Machine Learning for Host-based Anomaly Detection, Gaurav Tandon

Theses/Dissertations from 2007

PDF

Type Inference, Type Improvement, and Type Simplification in a Language with User-Defined Polymorphic Relational Operators, Lajos Pál Nagy

PDF

Malicious Mobile Code Related Experiments with an Extensible Network Simulator, Attila Ondi

Theses/Dissertations from 2006

PDF

A Swarm-based Model for Increasing Impulse Shopping in Supermarkets, Zeehan-ul-hassan Usmani

Theses/Dissertations from 2005

PDF

Mindshare: a Collaborative Peer-to-Peer System for Small Groups, Gareth Charles Farrington

PDF

Learning Implicit User Interest Hierarchy for Web Personalization, Hyoung-rae Kim

PDF

Correlogram Method for Comparing Bio-Sequences, Gandhali P. Samant

PDF

Keyword Spotting Using Normalization of Posterior Probability Confidence Measures, Rachna Vijay Vargiya

Theses/Dissertations from 2004

PDF

Reduced Index Sparse Representation in a Parallel Environment, Pedro Alfonso Escallon

PDF

MOOL: an Object-Oriented Programming Language with Generics and Modules., María Lucía Barrón Estrada

PDF

Web-based Trend Analysis of Rocket Data Using XML, Mark Randall Gibson

PDF

On The Use of Randomness in Computing To Perform Intelligent Tasks, Ryan Scott Regensburger

PDF

Analysis of Hostile Network Reconnaissance to Anticipate and Mitigate Network Attacks, Luis Angel Rivera

PDF

Learning States for Detecting Anomalies in Time Series, Stan Weidner Salvador

PDF

Modeling the Spread and Prevention of Malicious Mobile Code Via Simulation CS-2004-15, Christopher Brian Shirey

PDF

Quantifying software maintainability on re-engineered translation of FORTRAN to C++ code, Zane Grey Tomlinson Jr.

PDF

Solving Combinatorial Optimization Problems Using a New Algorithm Based on Gravitational Attraction, Barry Lynn Webster

Theses/Dissertations from 2003

PDF

Design and Implementation of Exception Handling with Zero Overhead in Functional Languages, Ramon Zatarain Cabada

PDF

Migration from a Waterfall/Non SEI CMM Compliant Process to a RUP/SEI CMM Compliant Process, Chad Amos Chamberlin

PDF

A Machine Learning Approach to Detecting Attacks by Identifying Anomalies in Network Traffic, Matthew Vincent Mahoney

PDF

An Algorithm for Clearing Combinatorial Markets, Josiane Domgang Nzouonta

PDF

Pair Programming to Facilitate the Training of Newly-Hired Programmers, Mark Anthony Poff

PDF

Strategies for Testing Web Applications from the Client Side, Lawrence Thaddeus Prevatte III