Recent Submissions

  • LexBank: A Multilingual Lexical Resource for Low-Resource Languages 

    Contributor:AL Tarouti, FERAS ALI;
    Date Submitted:2016-08
    In this dissertation, we present new methods to create essential lexical resources for low-resource languages. Specifically, we develop methods for enhancing automatically created wordnets. As a baseline, we start by ...
  • Towards Community Cloud Trustworthiness 

    Contributor:Alotaibi, Ahad;
    Date Submitted:2016-08
    Alotaibi, Ahad Saad (M.S, Computer science) Towards Community Cloud Trustworthiness Thesis directed by Associate Professor Edward Chow. In this thesis we presented an authorization system for community cloud. We ...
  • Human Motion: Analysis of Similarity and Dissimilarity Using Orthogonal Changes of Direction on Given Trajectories 

    Contributor:Torres Reyes, Francisco Javier;
    Date Submitted:2016-08
    The analysis of motion similarity, particularly human motion similarity, is needed in different areas of study: motion blending, where new motions are generated from previous ones and they are intended to be as realistic ...
  • Towards application-centric fairness in multi-tenant clouds with adaptive CPU sharing 

    Contributor:Ayodele, Anthony Ojo;
    Date Submitted:2016-08
    The ongoing rush for cloud-based services by small, medium, and large-scale organizations in other to reduce operational cost overhead, and have more flexibility in the deployment of business applications continues unabated. ...
  • Developing an Innovative Framework for Design and Analysis of Privacy Enhancing Video Surveillance 

    Contributor:Chattopadhyay, Ankur Chattopadhyay;
    Date Submitted:2016-05
    PEVS has been an important research area in the field of computer vision and pattern recognition during the last decade. Research publications on PEVS include different approaches for addressing various issues of privacy ...
  • Learning Indoor Localization using Radio Received Signal Strength 

    Contributor:Kulkarni, Gauri;
    Date Submitted:2016-05
    With this research we will investigate a novel machine learning approach to the prediction of location from received signal strength indicators (RSSI) values obtained from these transmitting access points. Indoor localization ...
  • The Design and Implementation of a Mobile Healthcare System with AppleWatch For Seniors (MyHealth) 

    Contributor:Alfaidi, Arij;
    Date Submitted:2016-05
    In this thesis, we developed and implemented a mobile Healthcare app, called MyHealth, on the iPhone with Apple watch to help seniors to manage their health life. MyHealth reminds the users to take their medicine and records ...
  • Connecting the Perception of Emotion to Music Signals 

    Contributor:Wood, Pamela A.;
    Date Submitted:2016-05
    Determining the emotional impact of a particular musical excerpt can be challenging when dealing with human perceptions. It is not possible to ensure that each person will have a comparable experience. In addition, cultural ...
  • Remote authentication using vaulted fingerprint verification 

    Contributor:Alzahrani, Hamdan Ahmed;
    Date Submitted:2016-05
    Fingerprint biometrics are increasingly used for identity verification. However, these require a careful balance of accuracy and privacy that is missing in many implementations. This dissertation describes a new biometric ...
  • Improving performance and sustainability in Big Data Clouds 

    Contributor:Cheng, Dazhao;
    Date Submitted:2016-05
    Big Data analytics and Cloud Computing have become two increasingly important IT paradigms to enhance business agility and productivity. As Cloud Computing offers a cost-effective way to support Big Data analytics, it ...
  • Malware provenance : detecting code reuse in malicious software 

    Contributor:Upchurch, Jason R.;
    Date Submitted:2016-05
    Detecting code reuse in software has applications in malicious code analysis and malware code search and retrieval, but is complicated by the lack of available source code. Malware Provenance examines the difficulties in ...
  • FHIR : Cell-Level Security and Real Time Access with Accumulo 

    Contributor:Ruiz, Daniel Alfonso;
    Date Submitted:2016-05
    The American Recovery and Reinvestment Act (ARRA) requires the adoption of Electronic Medical Records (EMRs) for seventy percent of the primary care provider population by 2014. Furthermore, by 2015 providers are expected ...
  • Non-uniformity aware disk scheduling in multitenant cloud 

    Contributor:Pasaret Herrero, Albert;
    Date Submitted:2016-05
    With cloud computing becoming more and more popular, the need for obtaining a good multitenant systems is increasing. This thesis present a variation of the CFQ I/O scheduler that will provide fair throughput allocation ...
  • Friendly Security Code-Based Image and Audio 

    Contributor:Alharbi, Khalid A.;
    Date Submitted:2016-05
    The intent of our research is the development of the CAPTCHA system and improve the accessibility and usability of the CAPTCHA system. Accessibility is one of the two vital components of a CAPTCHA system. In the current ...
  • Lifeline Infrastructure Risk Analysis (LIRA) Application 

    Contributor:Burkhart, Aaron Michael;
    Date Submitted:2015-12
    The field of Critical Infrastructure Protection has received increased attention in the face of terrorism, natural disasters, and other threats to lifeline assets. Several standards and methodologies have been proposed and ...
  • On community-based authentication factor 

    Contributor:Alkhattabi, Khalid Hammad;
    Date Submitted:2015-12
    In this thesis, we explore the use of community Information as a factor for authentication and authorization, called it Community-based Factor (CBF), and resent the design and implementation of a Community-based Authentication ...
  • MAUE : A Framework For Detecting Energy Bugs From User Interactions On Mobile Applications 

    Contributor:Alshammeri, Menwa Hayef K.;
    Date Submitted:2015-12
    Smart phones are becoming ubiquitous in our society, being used for email, business, entertainment, every day activities, and more. Such devices are improving exponentially in terms of computation power and application ...
  • Probabilistic Open Set Recognition 

    Contributor:Jain, Lalit Prithviraj;
    Date Submitted:2015
    Real-world tasks in computer vision, pattern recognition and machine learning often touch upon the open set recognition problem: multi-class recognition with incomplete knowledge of the world and many unknown inputs. An ...
  • Automatically creating multilingual lexical resources 

    Contributor:Lam, Khang Nhut;
    Date Submitted:2015
    Bilingual dictionaries and WordNets are important resources for natural language processing tasks such as information retrieval and machine translation. However, lexical resources are usually available only for resource-rich ...
  • Toward secure sensitive data in the cloud 

    Contributor:Alsolami, Fahad Jazi;
    Date Submitted:2015
    Cloud storage and computation have many exciting features such as low cost, scalability, and unbounded resources. These features attract many individuals and organizations to migrate their sensitive data, including biometric ...

View more