Now showing items 1-20 of 28

      • Detection And Analysis Of Software Clones 

        Contributor:Sheneamer, Abdullah Mohammad;
        Date Submitted:2017-08
        Effective detection of code clones is important for software maintenance. Code clones introduce difficulty in software maintenance and lead to bug propagation. Detection of duplicated bugs within a piece of software is ...
      • CONTINUOUS AUTHENTICATION OF SMARTPHONE OWNERS BASED ON APP ACCESS BEHAVIOR 

        Contributor:Alzubaidi, Abdulaziz Ali;
        Date Submitted:2017-08
        In recent years, smartphone use has become ubiquitous. The number of the applications on these devices has increased tremendously, leading to an increase in potential threats to the personal accounts of smartphone owners. ...
      • ENSEMBLE LEARNING FOR MULTIPLE DATA MINING PROBLEMS 

        Contributor:Doan, Tri Si;
        Date Submitted:2017-05
        Data mining practitioners often face problems of the unavailability of all training data at the same time and the inability to process a large amount of data due to constraints such as lack of adequate system memory. ...
      • Enhancing and Evaluating Global Pairwise Alignment of Protein-Protein Interaction Networks 

        Contributor:Elmsallati, Ahed Ashur;
        Date Submitted:2017-05
        Network Alignment over graph-structured data has recently received considerable attention in many application domains. Global network alignment tries to uniquely find the best mapping for a node in one network to only one ...
      • BETTER LEARNING THROUGH IMPROVED DISTRIBUTIONAL MODELING 

        Contributor:Rudd, Ethan McAvoy;
        Date Submitted:2017-05
        With the 21st century well underway, machine learning algorithms have advanced considerably in the ability to tackle difficult recognition problems. However, machine recognition is still rife with challenges, some of which ...
      • Advancing Fingerprint-Enhanced Authentication: Consistent, Discerning, and Durable Representation and Matching 

        Contributor:Alsaadi, Fawaz;
        Date Submitted:2017-05
        Throughout human history, the achievement of security through authentication has been filled with challenges. Technological evolution has created an unprecedented conjunction of scale and artifice that have turned our ...
      • LexBank: A Multilingual Lexical Resource for Low-Resource Languages 

        Contributor:AL Tarouti, FERAS ALI;
        Date Submitted:2016-08
        In this dissertation, we present new methods to create essential lexical resources for low-resource languages. Specifically, we develop methods for enhancing automatically created wordnets. As a baseline, we start by ...
      • Human Motion: Analysis of Similarity and Dissimilarity Using Orthogonal Changes of Direction on Given Trajectories 

        Contributor:Torres Reyes, Francisco Javier;
        Date Submitted:2016-08
        The analysis of motion similarity, particularly human motion similarity, is needed in different areas of study: motion blending, where new motions are generated from previous ones and they are intended to be as realistic ...
      • Towards application-centric fairness in multi-tenant clouds with adaptive CPU sharing 

        Contributor:Ayodele, Anthony Ojo;
        Date Submitted:2016-08
        The ongoing rush for cloud-based services by small, medium, and large-scale organizations in other to reduce operational cost overhead, and have more flexibility in the deployment of business applications continues unabated. ...
      • Developing an Innovative Framework for Design and Analysis of Privacy Enhancing Video Surveillance 

        Contributor:Chattopadhyay, Ankur Chattopadhyay;
        Date Submitted:2016-05
        PEVS has been an important research area in the field of computer vision and pattern recognition during the last decade. Research publications on PEVS include different approaches for addressing various issues of privacy ...
      • Connecting the Perception of Emotion to Music Signals 

        Contributor:Wood, Pamela A.;
        Date Submitted:2016-05
        Determining the emotional impact of a particular musical excerpt can be challenging when dealing with human perceptions. It is not possible to ensure that each person will have a comparable experience. In addition, cultural ...
      • Remote authentication using vaulted fingerprint verification 

        Contributor:Alzahrani, Hamdan Ahmed;
        Date Submitted:2016-05
        Fingerprint biometrics are increasingly used for identity verification. However, these require a careful balance of accuracy and privacy that is missing in many implementations. This dissertation describes a new biometric ...
      • Improving performance and sustainability in Big Data Clouds 

        Contributor:Cheng, Dazhao;
        Date Submitted:2016-05
        Big Data analytics and Cloud Computing have become two increasingly important IT paradigms to enhance business agility and productivity. As Cloud Computing offers a cost-effective way to support Big Data analytics, it ...
      • Malware provenance : detecting code reuse in malicious software 

        Contributor:Upchurch, Jason R.;
        Date Submitted:2016-05
        Detecting code reuse in software has applications in malicious code analysis and malware code search and retrieval, but is complicated by the lack of available source code. Malware Provenance examines the difficulties in ...
      • Probabilistic Open Set Recognition 

        Contributor:Jain, Lalit Prithviraj;
        Date Submitted:2015
        Real-world tasks in computer vision, pattern recognition and machine learning often touch upon the open set recognition problem: multi-class recognition with incomplete knowledge of the world and many unknown inputs. An ...
      • Toward secure sensitive data in the cloud 

        Contributor:Alsolami, Fahad Jazi;
        Date Submitted:2015
        Cloud storage and computation have many exciting features such as low cost, scalability, and unbounded resources. These features attract many individuals and organizations to migrate their sensitive data, including biometric ...
      • Automatically creating multilingual lexical resources 

        Contributor:Lam, Khang Nhut;
        Date Submitted:2015
        Bilingual dictionaries and WordNets are important resources for natural language processing tasks such as information retrieval and machine translation. However, lexical resources are usually available only for resource-rich ...
      • Moving MapReduce into the Cloud : Elasticity, Efficiency and Scalability 

        Contributor:Guo, Yanfei;
        Date Submitted:2015
        Moving MapReduce into the cloud and leveraging the elastic resource allocation of cloud computing offer an opportunity for efficiency and affordable big data analytics. However, due to the virtualization overhead, the ...
      • Toward secure, trusted, and privacy-enhanced biometrics in the cloud 

        Contributor:Albahdal, Abdullah;
        Date Submitted:2015
        Biometric technology has been used for decades as a strong method to identify and authenticate individuals. As for its effectiveness and accuracy, biometric technology has gained popularity in a wide range of fields and ...
      • Optimizing large-scale scientific applications through the integration of higher-level semantics and analytical performance modeling 

        Contributor:Guo, Jichi;
        Date Submitted:2014
        The emergence of multi-core architectures makes it essential for optimizing compilers to automatically extract parallelism for large scientific applications composed of many subroutines residing in different files. Inlining ...