Recent Submissions

  • Detection And Analysis Of Software Clones 

    Contributor:Sheneamer, Abdullah Mohammad;
    Date Submitted:2017-08
    Effective detection of code clones is important for software maintenance. Code clones introduce difficulty in software maintenance and lead to bug propagation. Detection of duplicated bugs within a piece of software is ...

    Contributor:Alzubaidi, Abdulaziz Ali;
    Date Submitted:2017-08
    In recent years, smartphone use has become ubiquitous. The number of the applications on these devices has increased tremendously, leading to an increase in potential threats to the personal accounts of smartphone owners. ...
  • Cloud based Web Resilience using Node.js 

    Contributor:Gunnam, Pragati;
    Date Submitted:2017-08
    Web services are used almost everyday and for everything. Combining these with cloud based services would allow the web applications to become more available for the users. Delivering such cloud based web applications to ...
  • Optimizing Pedestrian Flow In Airports 

    Contributor:Jordan, Gabriel;
    Date Submitted:2017-05
    Denver International Airport has expressed interest in discovering innovative techniques to optimize pedestrian flow in its massive airport which contains upwards of 53 million passengers each year that travel through the ...

    Contributor:Doan, Tri Si;
    Date Submitted:2017-05
    Data mining practitioners often face problems of the unavailability of all training data at the same time and the inability to process a large amount of data due to constraints such as lack of adequate system memory. ...
  • Enhancing and Evaluating Global Pairwise Alignment of Protein-Protein Interaction Networks 

    Contributor:Elmsallati, Ahed Ashur;
    Date Submitted:2017-05
    Network Alignment over graph-structured data has recently received considerable attention in many application domains. Global network alignment tries to uniquely find the best mapping for a node in one network to only one ...

    Contributor:Rudd, Ethan McAvoy;
    Date Submitted:2017-05
    With the 21st century well underway, machine learning algorithms have advanced considerably in the ability to tackle difficult recognition problems. However, machine recognition is still rife with challenges, some of which ...
  • Advancing Fingerprint-Enhanced Authentication: Consistent, Discerning, and Durable Representation and Matching 

    Contributor:Alsaadi, Fawaz;
    Date Submitted:2017-05
    Throughout human history, the achievement of security through authentication has been filled with challenges. Technological evolution has created an unprecedented conjunction of scale and artifice that have turned our ...
  • Deep Learning For Brain Tumor Segmentation 

    Contributor:Moreno Lopez, Marc;
    Date Submitted:2017-05
    In this work, we present a novel method to segment brain tumors using deep learning. An accurate brain tumor segmentation is key for a patient to get the right treatment and for the doctor who must perform surgery. Due to ...
  • LexBank: A Multilingual Lexical Resource for Low-Resource Languages 

    Contributor:AL Tarouti, FERAS ALI;
    Date Submitted:2016-08
    In this dissertation, we present new methods to create essential lexical resources for low-resource languages. Specifically, we develop methods for enhancing automatically created wordnets. As a baseline, we start by ...
  • Towards Community Cloud Trustworthiness 

    Contributor:Alotaibi, Ahad;
    Date Submitted:2016-08
    Alotaibi, Ahad Saad (M.S, Computer science) Towards Community Cloud Trustworthiness Thesis directed by Associate Professor Edward Chow. In this thesis we presented an authorization system for community cloud. We ...
  • Human Motion: Analysis of Similarity and Dissimilarity Using Orthogonal Changes of Direction on Given Trajectories 

    Contributor:Torres Reyes, Francisco Javier;
    Date Submitted:2016-08
    The analysis of motion similarity, particularly human motion similarity, is needed in different areas of study: motion blending, where new motions are generated from previous ones and they are intended to be as realistic ...
  • Towards application-centric fairness in multi-tenant clouds with adaptive CPU sharing 

    Contributor:Ayodele, Anthony Ojo;
    Date Submitted:2016-08
    The ongoing rush for cloud-based services by small, medium, and large-scale organizations in other to reduce operational cost overhead, and have more flexibility in the deployment of business applications continues unabated. ...
  • Developing an Innovative Framework for Design and Analysis of Privacy Enhancing Video Surveillance 

    Contributor:Chattopadhyay, Ankur Chattopadhyay;
    Date Submitted:2016-05
    PEVS has been an important research area in the field of computer vision and pattern recognition during the last decade. Research publications on PEVS include different approaches for addressing various issues of privacy ...
  • Learning Indoor Localization using Radio Received Signal Strength 

    Contributor:Kulkarni, Gauri;
    Date Submitted:2016-05
    With this research we will investigate a novel machine learning approach to the prediction of location from received signal strength indicators (RSSI) values obtained from these transmitting access points. Indoor localization ...
  • The Design and Implementation of a Mobile Healthcare System with AppleWatch For Seniors (MyHealth) 

    Contributor:Alfaidi, Arij;
    Date Submitted:2016-05
    In this thesis, we developed and implemented a mobile Healthcare app, called MyHealth, on the iPhone with Apple watch to help seniors to manage their health life. MyHealth reminds the users to take their medicine and records ...
  • Connecting the Perception of Emotion to Music Signals 

    Contributor:Wood, Pamela A.;
    Date Submitted:2016-05
    Determining the emotional impact of a particular musical excerpt can be challenging when dealing with human perceptions. It is not possible to ensure that each person will have a comparable experience. In addition, cultural ...
  • Remote authentication using vaulted fingerprint verification 

    Contributor:Alzahrani, Hamdan Ahmed;
    Date Submitted:2016-05
    Fingerprint biometrics are increasingly used for identity verification. However, these require a careful balance of accuracy and privacy that is missing in many implementations. This dissertation describes a new biometric ...
  • Improving performance and sustainability in Big Data Clouds 

    Contributor:Cheng, Dazhao;
    Date Submitted:2016-05
    Big Data analytics and Cloud Computing have become two increasingly important IT paradigms to enhance business agility and productivity. As Cloud Computing offers a cost-effective way to support Big Data analytics, it ...
  • Malware provenance : detecting code reuse in malicious software 

    Contributor:Upchurch, Jason R.;
    Date Submitted:2016-05
    Detecting code reuse in software has applications in malicious code analysis and malware code search and retrieval, but is complicated by the lack of available source code. Malware Provenance examines the difficulties in ...

View more