Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Engineering, Computer Science and Engineering

Publication Year

Articles 1 - 12 of 12

Full-Text Articles in Computer Engineering

Authenticating Users With 3d Passwords Captured By Motion Sensors, Jing Tian Jan 2018

Authenticating Users With 3d Passwords Captured By Motion Sensors, Jing Tian

Theses and Dissertations

Authentication plays a key role in securing various resources including corporate facilities or electronic assets. As the most used authentication scheme, knowledgebased authentication is easy to use but its security is bounded by how much a user can remember. Biometrics-based authentication requires no memorization but ‘resetting’ a biometric password may not always be possible. Thus, we propose study several behavioral biometrics (i.e., mid-air gestures) for authentication which does not have the same privacy or availability concerns as of physiological biometrics.

In this dissertation, we first propose a user-friendly authentication system Kin- Write that allows users to choose arbitrary, short and …


A Machine Learning Approach For Enhancing Security And Quality Of Service Of Optical Burst Switching Networks, Adel Dabash A. Rajab Jan 2017

A Machine Learning Approach For Enhancing Security And Quality Of Service Of Optical Burst Switching Networks, Adel Dabash A. Rajab

Theses and Dissertations

The Optical Bust Switching (OBS) network has become one of the most promising switching technologies for building the next-generation of internet backbone infrastructure. However, OBS networks still face a number of security and Quality of Service (QoS) challenges, particularly from Burst Header Packet (BHP) flooding attacks. In OBS, a core switch handles requests, reserving one of the unoccupied channels for incoming data bursts (DB) through BHP. An attacker can exploit this fact and send malicious BHP without the corresponding DB. If unresolved, threats such as BHP flooding attacks can result in low bandwidth utilization, limited network performance, high burst loss …


Blind Change Point Detection And Regime Segmentation Using Gaussian Process Regression, Sourav Das Jan 2017

Blind Change Point Detection And Regime Segmentation Using Gaussian Process Regression, Sourav Das

Theses and Dissertations

Time-series analysis is used heavily in modeling and forecasting weather, economics, medical data as well as in various other fields. Change point detection (CPD) means finding abrupt changes in the time-series when the statistical property of a certain part of it starts to differ. CPD has attracted a lot of attention in the artificial intelligence, machine learning and data mining communities. In this thesis, a novel CPD algorithm is introduced for segmenting multivariate time-series data. The proposed algorithm is a general pipeline to process any high dimensional multivariate time-series data using nonlinear non-parametric dynamic system. It consists of manifold learning …


Mobile Application For Shipping Goods For Individuals And Truckers In India, Sendurr Selvaraj Jan 2017

Mobile Application For Shipping Goods For Individuals And Truckers In India, Sendurr Selvaraj

Theses and Dissertations

India is a vast country with majority of its cities and towns connected through roads. Road transportation contributes to 86% share of the freight transport of the country with trucking companies dominating the entire space. With growing economy and demands raising, the quality of service of the trucking company remains poor. The major reasons are unorganized practice and lack of transparency. Moreover, limited access for customers to reach out to truckers to transport their goods.

This thesis aims to create a platform for customers and truckers to realize their needs with a help of a mobile application. Customers can search …


Investigate Genomic 3d Structure Using Deep Neural Network, Yan Zhang Jan 2017

Investigate Genomic 3d Structure Using Deep Neural Network, Yan Zhang

Theses and Dissertations

The 3D structures of the chromosomes play fundamental roles in essential cellular functions, e.g., gene regulation, gene expression, evolution and Hi-C technique provides the interaction density between loci on chromosomes. In this dissertation, we developed multiple algorithms, focusing the deep learning approach, to study the Hi-C datasets and the genomic 3D structures.

Building 3D structure of the genome one of the most critical purpose of the Hi-C technique. Recently, several approaches have been developed to reconstruct the 3D model of the chromosomes from HiC data. However, all of the methods are based on a particular mathematical model and lack of …


Improving Facial Action Unit Recognition Using Convolutional Neural Networks, Shizhong Han Jan 2017

Improving Facial Action Unit Recognition Using Convolutional Neural Networks, Shizhong Han

Theses and Dissertations

Recognizing facial action units (AUs) from spontaneous facial expression is a challenging problem, because of subtle facial appearance changes, free head movements, occlusions, and limited AU-coded training data. Most recently, convolutional neural networks (CNNs) have shown promise on facial AU recognition. However, CNNs are often overfitted and do not generalize well to unseen subject due to limited AU-coded training images. In order to improve the performance of facial AU recognition, we developed two novel CNN frameworks, by substituting the traditional decision layer and convolutional layer with the incremental boosting layer and adaptive convolutional layer respectively, to recognize the AUs from …


A Hierarchical Framework For Phylogenetic And Ancestral Genome Reconstruction On Whole Genome Data, Lingxi Zhou Jan 2016

A Hierarchical Framework For Phylogenetic And Ancestral Genome Reconstruction On Whole Genome Data, Lingxi Zhou

Theses and Dissertations

Gene order gets evolved under events such as rearrangements, duplications, and losses, which can change both the order and content along the genome, through the long history of genome evolution. Recently, the accumulation of genomic sequences provides researchers with the chance to handle long-standing problems about the phylogenies, or evolutionary histories, of sets of species, and ancestral genomic content and orders. Over the past few years, such problems have been proven so interesting that a large number of algorithms have been proposed in the attempt to resolve them, following different standards. The work presented in this dissertation focuses on algorithms …


Hydro-Geological Flow Analysis Using Hidden Markov Models, Chandrahas Raj Venkat Gurram Jan 2016

Hydro-Geological Flow Analysis Using Hidden Markov Models, Chandrahas Raj Venkat Gurram

Theses and Dissertations

Hidden Markov Models a class of statistical models used in various disciplines for understanding speech, finding different types of genes responsible for cancer and much more. In this thesis, Hidden Markov Models are used to obtain hidden states that can correlate the flow changes in the Wakulla Spring Cave. Sensors installed in the tunnels of Wakulla Spring Cave have recorded huge correlated changes in the water flows at numerous tunnels. Assuming the correlated flow changes are a consequence of system being in a set of discrete states, a Hidden Markov Model is calculated. This model comprising all the sensors installed …


Revealing Malicious Contents Hidden In The Internet, Muhammad Nazmus Sakib Jan 2016

Revealing Malicious Contents Hidden In The Internet, Muhammad Nazmus Sakib

Theses and Dissertations

In this age of ubiquitous communication in which we can stay constantly connected with the rest of the world, for most of the part, we have to be grateful for one particular invention - the Internet. But as the popularity of Internet connectivity grows, it has become a very dangerous place where objects of malicious content and intent can be hidden in plain sight. In this dissertation, we investigate different ways to detect and capture these malicious contents hidden in the Internet. First, we propose an automated system that mimics high-risk browsing activities such as clicking on suspicious online ads, …


Regular Expression Synthesis For Blast Two-Hit Filtering, Jordan Bradshaw Jan 2016

Regular Expression Synthesis For Blast Two-Hit Filtering, Jordan Bradshaw

Theses and Dissertations

Genomic databases are exhibiting a growth rate that is outpacing Moore's Law, which has made database search algorithms a popular application for use on emerging processor technologies. NCBI BLAST is the standard tool for performing searches against these databases, which operates by transforming each database query into a filter that is subsequently applied to the database. This requires a database scan for every query, fundamentally limiting its performance by I/O bandwidth. In this dissertation we present a functionally-equivalent variation on the NCBI BLAST algorithm that maps more suitably to an FPGA implementation. This variation of the algorithm attempts to reduce …


Efficient Partitioning And Allocation Of Data For Workflow Compositions, Annamaria Victoria Kish Jan 2016

Efficient Partitioning And Allocation Of Data For Workflow Compositions, Annamaria Victoria Kish

Theses and Dissertations

Our aim is to provide efficient partitioning and allocation of data for web service compositions. Web service compositions are represented as partial order database transactions. We accommodate a variety of transaction types, such as read-only and write-oriented transactions, to support workloads in cloud environments. We introduce an approach that partitions and allocates small units of data, called micropartitions, to multiple database nodes. Each database node stores only the data needed to support a specific workload. Transactions are routed directly to the appropriate data nodes. Our approach guarantees serializability and efficient execution.

In Phase 1, we cluster transactions based on data …


Positioning Commuters And Shoppers Through Sensing And Correlation, Rufeng Meng Jan 2016

Positioning Commuters And Shoppers Through Sensing And Correlation, Rufeng Meng

Theses and Dissertations

Positioning is a basic and important need in many scenarios of human daily activities. With position information, multifarious services could be vitalized to benefit all kinds of users, from individuals to organizations. Through positioning, people are able to obtain not only geo-location but also time related information. By aggregating position information from individuals, organizations could derive statistical knowledge about group behaviors, such as traffic, business, event, etc.

Although enormous effort has been invested in positioning related academic and industrial work, there are still many holes to be filled. This dissertation proposes solutions to address the need of positioning in people’s …