Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of South Florida (8)
- Wright State University (8)
- Western University (5)
- Old Dominion University (4)
- University of Tennessee, Knoxville (4)
-
- Air Force Institute of Technology (3)
- California Polytechnic State University, San Luis Obispo (3)
- Purdue University (3)
- University of Denver (3)
- University of Nevada, Las Vegas (3)
- Portland State University (2)
- University of Arkansas, Fayetteville (2)
- University of Kentucky (2)
- University of Massachusetts Amherst (2)
- University of Texas at El Paso (2)
- DePaul University (1)
- Eastern Michigan University (1)
- Georgia Southern University (1)
- Louisiana State University (1)
- Louisiana Tech University (1)
- Rochester Institute of Technology (1)
- The University of Southern Mississippi (1)
- University of New Orleans (1)
- University of North Florida (1)
- Wayne State University (1)
- Keyword
-
- Department of Computer Science and Engineering (8)
- Applied sciences (4)
- Clustering (3)
- Daniel Felix Ritchie School of Engineering and Computer Science (3)
- Machine learning (3)
-
- Adaptive (2)
- Big Data (2)
- CUDA (2)
- Cloud Computing (2)
- Computer Science (2)
- NoSQL (2)
- Robotics (2)
- Simulation (2)
- Teleoperation (2)
- Virtual reality in medicine (2)
- #antcenter (1)
- 3-tier (1)
- 3D Reconstruction (1)
- 3d printing (1)
- 6D BIM (1)
- ABANDON (1)
- Academic -- UNF -- Computing; Message Oriented Middleware (1)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (1)
- Access control (1)
- Analysis (1)
- Android (1)
- Anomaly Analysis (1)
- Anomaly Detection (1)
- Anomaly Modeling (1)
- Anomaly detection (1)
- Publication
-
- Browse all Theses and Dissertations (8)
- USF Tampa Graduate Theses and Dissertations (8)
- Electronic Thesis and Dissertation Repository (5)
- Electronic Theses and Dissertations (4)
- Open Access Dissertations (4)
-
- Computer Engineering (3)
- Masters Theses (3)
- Theses and Dissertations (3)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (3)
- Computer Science Theses & Dissertations (2)
- Dissertations and Theses (2)
- Doctoral Dissertations (2)
- Graduate Theses and Dissertations (2)
- Open Access Theses & Dissertations (2)
- College of Computing and Digital Media Dissertations (1)
- Computational Modeling & Simulation Engineering Theses & Dissertations (1)
- Dental Hygiene Theses & Dissertations (1)
- Dissertations (1)
- Honors Theses (1)
- Master's Theses and Doctoral Dissertations (1)
- Open Access Theses (1)
- Theses (1)
- Theses and Dissertations--Computer Science (1)
- Theses and Dissertations--Electrical and Computer Engineering (1)
- UNF Graduate Theses and Dissertations (1)
- University of New Orleans Theses and Dissertations (1)
- Wayne State University Dissertations (1)
Articles 1 - 30 of 64
Full-Text Articles in Computer Engineering
Disaster Data Management In Cloud Environments, Katarina Grolinger
Disaster Data Management In Cloud Environments, Katarina Grolinger
Electronic Thesis and Dissertation Repository
Facilitating decision-making in a vital discipline such as disaster management requires information gathering, sharing, and integration on a global scale and across governments, industries, communities, and academia. A large quantity of immensely heterogeneous disaster-related data is available; however, current data management solutions offer few or no integration capabilities and limited potential for collaboration. Moreover, recent advances in cloud computing, Big Data, and NoSQL have opened the door for new solutions in disaster data management.
In this thesis, a Knowledge as a Service (KaaS) framework is proposed for disaster cloud data management (Disaster-CDM) with the objectives of 1) facilitating information gathering …
On The Interoperability Of Programming Languages Based On The Fork-Join Parallelism Model, Sushek Shekar
On The Interoperability Of Programming Languages Based On The Fork-Join Parallelism Model, Sushek Shekar
Electronic Thesis and Dissertation Repository
This thesis describes the implementation of MetaFork, a meta-language for concurrency platforms targeting multicore architectures. First of all, MetaFork is a multithreaded language based on the fork-join model of concurrency: it allows the programmer to express parallel algorithms assuming that tasks are dynamically scheduled at run-time. While MetaFork makes no assumption about the run-time system, it formally defines the serial C-elision of a MetaFork program. In addition, MetaFork is a suite of source-to-source compilers permitting the automatic translation of multithreaded programs between programming languages based on the fork-join model. Currently, this compilation framework supports the OpenMP and CilkPlus concurrency platforms. …
Design And Development Of A Low-Cost Handheld Picoammeter, Malcolm Stagg
Design And Development Of A Low-Cost Handheld Picoammeter, Malcolm Stagg
Honors Theses
No abstract provided.
Nonlinear Adaptive Diffusion Models For Image Denoising, Ajay Kumar Mandava
Nonlinear Adaptive Diffusion Models For Image Denoising, Ajay Kumar Mandava
UNLV Theses, Dissertations, Professional Papers, and Capstones
Most of digital image applications demand on high image quality. Unfortunately, images often are degraded by noise during the formation, transmission, and recording processes. Hence, image denoising is an essential processing step preceding visual and automated analyses. Image denoising methods can reduce image contrast, create block or ring artifacts in the process of denoising. In this dissertation, we develop high performance non-linear diffusion based image denoising methods, capable to preserve edges and maintain high visual quality. This is attained by different approaches: First, a nonlinear diffusion is presented with robust M-estimators as diffusivity functions. Secondly, the knowledge of textons derived …
Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe
Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe
Dissertations
The author developed a unified nD framework and process ontology for Building Information Modeling (BIM). The research includes a framework developed for 6D BIM, nD BIM, and nD ontology that defines the domain and sub-domain constructs for future nD BIM dimensions. The nD ontology defines the relationships of kinds within any new proposed dimensional domain for BIM. The developed nD BIM framework and ontology takes into account the current 2D-5D BIM dimensions. There is a synergy between the 6D and nD framework that allows the nD framework and ontology to be utilized as a unified template for future dimensional development. …
Attitudes And Behaviors In Online Communities: Empirical Studies Of The Effects Of Social, Community, And Individual Characteristics, Richard Kumi
Graduate Theses and Dissertations
Online communities and communities of practice bring people together to promote and support shared goals and exchange information. Personal interactions are important to many of these communities and one of the important outcomes of personal interactions in online communities and communities of practice is user-generated content. The three essays in the current study examines behavior motivation in online communities and communities of practice to understand how Social and personal psychological factors, and user-generated influence attitudes, intentions and behaviors in online communities.
The first essay addresses two research questions. First, how does Social capital influence exchange and combination behaviors in online …
Application Of Computer Algebra In List Decoding, Muhammad Foizul Islam Chowdhury
Application Of Computer Algebra In List Decoding, Muhammad Foizul Islam Chowdhury
Electronic Thesis and Dissertation Repository
The amount of data that we use in everyday life (social media, stock analysis, satellite communication etc.) are increasing day by day. As a result, the amount of data needs to be traverse through electronic media as well as to store are rapidly growing and there exist several environmental effects that can damage these important data during travelling or while in storage devices. To recover correct information from noisy data, we do use error correcting codes. The most challenging work in this area is to have a decoding algorithm that can decode the code quite fast, in addition with the …
A Novel Defense Mechanism Against Web Crawler Intrusion, Alireza Aghamohammadi
A Novel Defense Mechanism Against Web Crawler Intrusion, Alireza Aghamohammadi
Master's Theses and Doctoral Dissertations
Web robots also known as crawlers or spiders are used by search engines, hackers and spammers to gather information about web pages. Timely detection and prevention of unwanted crawlers increases privacy and security of websites. In this research, a novel method to identify web crawlers is proposed to prevent unwanted crawler to access websites. The proposed method suggests a five-factor identification process to detect unwanted crawlers. This study provides the pretest and posttest results along with a systematic evaluation of web pages with the proposed identification technique versus web pages without the proposed identification process. An experiment was performed with …
Reasoning Across Language And Vision In Machines And Humans, Andrei Barbu
Reasoning Across Language And Vision In Machines And Humans, Andrei Barbu
Open Access Dissertations
Humans not only outperform AI and computer-vision systems, but use an unknown computational mechanism to perform tasks for which no suitable approaches exist. I present work investigating both novel tasks and how humans approach them in the context of computer vision and linguistics. I demonstrate a system which, like children, acquires high-level linguistic knowledge about the world. Robots learn to play physically-instantiated board games and use that knowledge to engage in physical play. To further integrate language and vision I develop an approach which produces rich sentential descriptions of events depicted in videos. I then show how to simultaneously detect …
Predictive Duty Cycling Of Radios And Cameras Using Augmented Sensing In Wireless Camera Networks, Joonhwa Shin
Predictive Duty Cycling Of Radios And Cameras Using Augmented Sensing In Wireless Camera Networks, Joonhwa Shin
Open Access Dissertations
Energy efficiency dominates practically every aspect of the design of wireless camera networks (WCNs), and duty cycling of radios and cameras is an important tool for achieving high energy efficiencies. However, duty cycling in WCNs is made complex by the camera nodes having to anticipate the arrival of the objects in their field-of-view. What adds to this complexity is the fact that radio duty cycling and camera duty cycling are tightly coupled notions in WCNs.
Abstract In this dissertation, we present a predictive framework to provide camera nodes with an ability to anticipate the arrival of an object in the …
Use Of Immersive Visualization For The Control Of Dental Anxiety During Dental Hygiene Treatment, Carmelo Padrino-Barrios
Use Of Immersive Visualization For The Control Of Dental Anxiety During Dental Hygiene Treatment, Carmelo Padrino-Barrios
Dental Hygiene Theses & Dissertations
Purpose: The purpose of this study was to determine the effectiveness of immersive visualization (IV) therapy, a technique that provides visual and stereoscopic display through the use of eyewear, in anxious patients during an oral prophylaxis. Methods: A convenience sample of thirty adults was enrolled. A split mouth design was utilized. Subjects were randomly divided into two groups: group A (use of IV for the right side of the mouth), and group B (use of IV for the left side of the mouth). Subjects received a full mouth oral prophylaxis (removal of supra and subgingival calculus and selective polishing), always …
Trust-But-Verify: Guaranteeing The Integrity Of User-Generated Content In Online Applications, Akshay Dua
Trust-But-Verify: Guaranteeing The Integrity Of User-Generated Content In Online Applications, Akshay Dua
Dissertations and Theses
Online applications that are open to participation lack reliable methods to establish the integrity of user-generated information. Users may unknowingly own compromised devices, or intentionally publish forged information. In these scenarios, applications need some way to determine the "correctness" of autonomously generated information. Towards that end, this thesis presents a "trust-but-verify" approach that enables open online applications to independently verify the information generated by each participant. In addition to enabling independent verification, our framework allows an application to verify less information from more trustworthy users and verify more information from less trustworthy ones. Thus, an application can trade-off performance for …
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Electronic Thesis and Dissertation Repository
With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …
Semantically Grounded Learning From Unstructured Demonstrations, Scott D. Niekum
Semantically Grounded Learning From Unstructured Demonstrations, Scott D. Niekum
Open Access Dissertations
Robots exhibit flexible behavior largely in proportion to their degree of semantic knowledge about the world. Such knowledge is often meticulously hand-coded for a narrow class of tasks, limiting the scope of possible robot competencies. Thus, the primary limiting factor of robot capabilities is often not the physical attributes of the robot, but the limited time and skill of expert programmers. One way to deal with the vast number of situations and environments that robots face outside the laboratory is to provide users with simple methods for programming robots that do not require the skill of an expert.
For this …
Reconfigurable Technologies For Next Generation Internet And Cluster Computing, Deepak C. Unnikrishnan
Reconfigurable Technologies For Next Generation Internet And Cluster Computing, Deepak C. Unnikrishnan
Open Access Dissertations
Modern web applications are marked by distinct networking and computing characteristics. As applications evolve, they continue to operate over a large monolithic framework of networking and computing equipment built from general-purpose microprocessors and Application Specific Integrated Circuits (ASICs) that offers few architectural choices. This dissertation presents techniques to diversify the next-generation Internet infrastructure by integrating Field-programmable Gate Arrays (FPGAs), a class of reconfigurable integrated circuits, with general-purpose microprocessor-based techniques. Specifically, our solutions are demonstrated in the context of two applications - network virtualization and distributed cluster computing.
Network virtualization enables the physical network infrastructure to be shared among several …
Reliability Models Applied To Smartphone Applications, Sonia Meskini
Reliability Models Applied To Smartphone Applications, Sonia Meskini
Electronic Thesis and Dissertation Repository
Smartphones have become the most used electronic devices. They carry out most of the functionalities of desktops, offering various useful applications that suit the user’s needs. Therefore, instead of the operator, the user has been the main controller of the device and its applications, therefore its reliability has become an emergent requirement. As a first step, based on collected smartphone applications failure data, we investigated and evaluated the efficacy of Software Reliability Growth Models (SRGMs) when applied to these smartphone data in order to check whether they achieve the same accuracy as in the desktop/laptop area. None of the selected …
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
University of New Orleans Theses and Dissertations
Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …
Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose
Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose
Doctoral Dissertations
Multi-stage visual architectures have recently found success in achieving high classification accuracies over image datasets with large variations in pose, lighting, and scale. Inspired by techniques currently at the forefront of deep learning, such architectures are typically composed of one or more layers of preprocessing, feature encoding, and pooling to extract features from raw images. Training these components traditionally relies on large sets of patches that are extracted from a potentially large image dataset. In this context, high-dimensional feature space representations are often helpful for obtaining the best classification performances and providing a higher degree of invariance to object transformations. …
Human Action Recognition Via Fused Kinematic Structure And Surface Representation, Salah R. Althloothi
Human Action Recognition Via Fused Kinematic Structure And Surface Representation, Salah R. Althloothi
Electronic Theses and Dissertations
Human action recognition from visual data has remained a challenging problem in the field of computer vision and pattern recognition. This dissertation introduces a new methodology for human action recognition using motion features extracted from kinematic structure, and shape features extracted from surface representation of human body. Motion features are used to provide sufficient information about human movement, whereas shape features are used to describe the structure of silhouette. These features are fused at the kernel level using Multikernel Learning (MKL) technique to enhance the overall performance of human action recognition. In fact, there are advantages in using multiple types …
Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise
Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise
Masters Theses
An enumeration hybrid automaton has been shown in principle to be ready for automated transformation into a Simulink implementation. This paper describes a strategy for and a demonstration of automated construction. This is accomplished by designing a data model which represents EHA data and providing a mapping from EHA data points to Simulink blocks.
Segmentation And Model Generation For Large-Scale Cyber Attacks, Steven E. Strapp
Segmentation And Model Generation For Large-Scale Cyber Attacks, Steven E. Strapp
Theses
Raw Cyber attack traffic can present more questions than answers to security analysts. Especially with large-scale observables it is difficult to identify which packets are relevant and what attack behaviors are present. Many existing works in Host or Flow Clustering attempt to group similar behaviors to expedite analysis; these works often phrase the problem directly as offline unsupervised machine learning. This work proposes online processing to simultaneously model coordinating actors and segment traffic that is relevant to a target of interest, all while it is being received. The goal is not just to aggregate similar attack behaviors, but to provide …
Http Mailbox - Asynchronous Restful Communication, Sawood Alam
Http Mailbox - Asynchronous Restful Communication, Sawood Alam
Computer Science Theses & Dissertations
Traditionally, general web services used only the GET and POST methods of HTTP while several other HTTP methods like PUT, PATCH, and DELETE were rarely utilized. Additionally, the Web was mainly navigated by humans using web browsers and clicking on hyperlinks or submitting HTML forms. Clicking on a link is always a GET request while HTML forms only allow GET and POST methods. Recently, several web frameworks/libraries have started supporting RESTful web services through APIs. To support HTTP methods other than GET and POST in browsers, these frameworks have used hidden HTML form fields as a workaround to convey the …
A Multi-Configuration Display Methodology Incorporating Reflection For Real-Time Haptic-Interactive Virtual Environments, Mohammad F. Obeid
A Multi-Configuration Display Methodology Incorporating Reflection For Real-Time Haptic-Interactive Virtual Environments, Mohammad F. Obeid
Computational Modeling & Simulation Engineering Theses & Dissertations
There is a natural need for real-time min-or reflection in many interactive virtual reality applications to achieve visuo-haptic collocation through optical reflection. Its use, however, calls for adjustments to the original model since a mirror reverses image characteristics. This thesis introduces a design and implementation of a generic configuration component for virtual environments that adjusts image characteristics and haptic interfaces to accommodate various display setups while preserving the correct orientation and properties of the original models in the graphical scene. Four different but related approaches were developed for image connection and are compared and contrasted against primary criteria. The haptic …
Applied Hypergame Theory For Network Defense, Alan S. Gibson
Applied Hypergame Theory For Network Defense, Alan S. Gibson
Theses and Dissertations
Cyber operations are the most important aspect of military conflicts in the 21st century, but unfortunately they are also among the least understood. The continual battle for network dominance between attackers and defenders is considered to be a complex game. Hypergame theory is an extension of game theory that addresses the kind of games where misperception exists, as is often the case in military engagements. Hypergame theory, like game theory, uses a game model to determine strategy selection, but goes beyond game theory by examining subgames that exist within the full game. The inclusion of misperception and misinformation in the …
Equivalence Checking For High-Assurance Behavioral Synthesis, Kecheng Hao
Equivalence Checking For High-Assurance Behavioral Synthesis, Kecheng Hao
Dissertations and Theses
The rapidly increasing complexities of hardware designs are forcing design methodologies and tools to move to the Electronic System Level (ESL), a higher abstraction level with better productivity than the state-of-the-art Register Transfer Level (RTL). Behavioral synthesis, which automatically synthesizes ESL behavioral specifications to RTL implementations, plays a central role in this transition. However, since behavioral synthesis is a complex and error-prone translation process, the lack of designers' confidence in its correctness becomes a major barrier to its wide adoption. Therefore, techniques for establishing equivalence between an ESL specification and its synthesized RTL implementation are critical to bring behavioral synthesis …
Channels: Easy Video Content Consumption, Alexander R. Ledwith
Channels: Easy Video Content Consumption, Alexander R. Ledwith
Computer Engineering
The idea for this project is to take a user’s digital movie and television show library, and organize the individual videos into lists that will continuously and concurrently play like cable TV channels. This means that when a list of channels is switched to, video content will automatically start playing, possibly in the middle, based on a schedule. It should serve the needs of the user by allowing the user to quickly watch any of their existing channels, easily add a new channel based on chosen criteria or manual selection, and easily add new video content. In addition, the product …
Inform 7 Usability Precompiler, Chad Robert Brantley, Timothy Phan
Inform 7 Usability Precompiler, Chad Robert Brantley, Timothy Phan
Computer Engineering
Inform 7 Usability Precompiler or I7UP is a project which helps Inform 7 authors with their stories by diversifying the possibilities in the author’s interactive fiction. I7UP reads and analyzes the Inform story that is passed in through python and natural language processing then provides the user with a selection of choices to add to his story and lastly automatically generates the corresponding Inform 7 code. By utilizing the combination of Python, Django, and HTML/CSS, I7UP is able to provide an easytouse interface which helps generate additional "Understand" statements and "Conjugated Verb" statements. I7UP is an authoring aid for Inform …
Protocases, Christopher M. Polis
Protocases, Christopher M. Polis
Computer Engineering
Design and implementation of a 3D printing web application.
Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton
Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton
Masters Theses
Since its inception, Tor has offered anonymity for internet users around the world. Tor now offers bridges to help users evade internet censorship, but the primary distribution schemes that provide bridges to users in need have come under attack. This thesis explores how threshold RSA can help strengthen Tor's infrastructure while also enabling more powerful bridge distribution schemes. We implement a basic threshold RSA signature system for the bridge authority and a reputation-based social network design for bridge distribution. Experimental results are obtained showing the possibility of quick responses to requests from honest users while maintaining both the secrecy and …
Programming Dense Linear Algebra Kernels On Vectorized Architectures, Jonathan Lawrence Peyton
Programming Dense Linear Algebra Kernels On Vectorized Architectures, Jonathan Lawrence Peyton
Masters Theses
The high performance computing (HPC) community is obsessed over the general matrix-matrix multiply (GEMM) routine. This obsession is not without reason. Most, if not all, Level 3 Basic Linear Algebra Subroutines (BLAS) can be written in terms of GEMM, and many of the higher level linear algebra solvers' (i.e., LU, Cholesky) performance depend on GEMM's performance. Getting high performance on GEMM is highly architecture dependent, and so for each new architecture that comes out, GEMM has to be programmed and tested to achieve maximal performance. Also, with emergent computer architectures featuring more vector-based and multi to many-core processors, GEMM performance …