Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

University of South Carolina

Engineering, Computer Science and Engineering

Articles 1 - 17 of 17

Full-Text Articles in Computer Engineering

Authenticating Users With 3d Passwords Captured By Motion Sensors, Jing Tian Jan 2018

Authenticating Users With 3d Passwords Captured By Motion Sensors, Jing Tian

Theses and Dissertations

Authentication plays a key role in securing various resources including corporate facilities or electronic assets. As the most used authentication scheme, knowledgebased authentication is easy to use but its security is bounded by how much a user can remember. Biometrics-based authentication requires no memorization but ‘resetting’ a biometric password may not always be possible. Thus, we propose study several behavioral biometrics (i.e., mid-air gestures) for authentication which does not have the same privacy or availability concerns as of physiological biometrics.

In this dissertation, we first propose a user-friendly authentication system Kin- Write that allows users to choose arbitrary, short and …


The Design, Development, And Evaluation Of A Usable And Privacy-Enhanced Telepresence Interface For Older Adults, Xian Wu Jan 2018

The Design, Development, And Evaluation Of A Usable And Privacy-Enhanced Telepresence Interface For Older Adults, Xian Wu

Theses and Dissertations

Maintaining health and wellness while aging-in-place independently is crucial for older adults. Telepresence technology can be potentially beneficial for this target population to stay socially connected. However, this technology is not specifically designed for older adults. For this target population to adopt such technology successfully, it is important to ensure that they do not experience usability barriers. This research uses HCI/HRI concepts and technology design principles for older adults to design, develop and test telepresence user interfaces (UI). This addresses the following research questions: 1): What are the essential usability and privacy-enhanced features needed to inform the design and development …


Ontology-Guided Pre-Release Inference Disruption, Mark Stephen Daniels Jan 2018

Ontology-Guided Pre-Release Inference Disruption, Mark Stephen Daniels

Theses and Dissertations

We investigate privacy violations occurring when non-confidential patient data is combined with medical domain ontologies to disclose a patient’s protected health information (PHI). We propose a framework that detects privacy violations and eliminates undesired inferences. Our inference channel removal process is based on controlling the release of the data items that lead to undesired inferences. These data items are either blocked from release or generalized to eliminate the disclosure of the PHI. We show that our method is sound and complete. Soundness means the only inference paths generated logically follow from released data and corresponding domain knowledge. Completeness means we …


Ms. An (Meeting Students’ Academic Needs): A Socially Adaptive Robot Tutor For Student Engagement In Math Education, Karina Liles Jan 2018

Ms. An (Meeting Students’ Academic Needs): A Socially Adaptive Robot Tutor For Student Engagement In Math Education, Karina Liles

Theses and Dissertations

This research presents a new, socially adaptive robot tutor, Ms. An (Meeting Students’ Academic Needs). The goal of this research was to use a decision tree model to develop a socially adaptive robot tutor that predicted and responded to student emotion and performance to actively engage students in mathematics education. The novelty of this multi-disciplinary project is the combination of the fields of HRI, AI, and education. In this study we 1) implemented a decision tree model to classify student emotion and performance for use in adaptive robot tutoring-an approach not applied to educational robotics; 2) presented an intuitive interface …


Tracking, Detection And Registration In Microscopy Material Images, Hongkai Yu Jan 2018

Tracking, Detection And Registration In Microscopy Material Images, Hongkai Yu

Theses and Dissertations

Fast and accurate characterization of fiber micro-structures plays a central role for material scientists to analyze physical properties of continuous fiber reinforced composite materials. In materials science, this is usually achieved by continuously crosssectioning a 3D material sample for a sequence of 2D microscopic images, followed by a fiber detection/tracking algorithm through the obtained image sequence.

To speed up this process and be able to handle larger-size material samples, we propose sparse sampling with larger inter-slice distance in cross sectioning and develop a new algorithm that can robustly track large-scale fibers from such a sparsely sampled image sequence. In particular, …


On The Security And Quality Of Wireless Communications In Outdoor Mobile Environment, Sharaf J. Malebary Jan 2018

On The Security And Quality Of Wireless Communications In Outdoor Mobile Environment, Sharaf J. Malebary

Theses and Dissertations

The rapid advancement in wireless technology along with their low cost and ease of deployment have been attracting researchers academically and commercially. Researchers from private and public sectors are investing into enhancing the reliability, robustness, and security of radio frequency (RF) communications to accommodate the demand and enhance lifestyle. RF base communications -by nature- are slower and more exposed to attacks than a wired base (LAN). Deploying such networks in various cutting-edge mobile platforms (e.g. VANET, IoT, Autonomous robots) adds new challenges that impact the quality directly. Moreover, adopting such networks in public outdoor areas make them vulnerable to various …


A Machine Learning Approach For Enhancing Security And Quality Of Service Of Optical Burst Switching Networks, Adel Dabash A. Rajab Jan 2017

A Machine Learning Approach For Enhancing Security And Quality Of Service Of Optical Burst Switching Networks, Adel Dabash A. Rajab

Theses and Dissertations

The Optical Bust Switching (OBS) network has become one of the most promising switching technologies for building the next-generation of internet backbone infrastructure. However, OBS networks still face a number of security and Quality of Service (QoS) challenges, particularly from Burst Header Packet (BHP) flooding attacks. In OBS, a core switch handles requests, reserving one of the unoccupied channels for incoming data bursts (DB) through BHP. An attacker can exploit this fact and send malicious BHP without the corresponding DB. If unresolved, threats such as BHP flooding attacks can result in low bandwidth utilization, limited network performance, high burst loss …


Blind Change Point Detection And Regime Segmentation Using Gaussian Process Regression, Sourav Das Jan 2017

Blind Change Point Detection And Regime Segmentation Using Gaussian Process Regression, Sourav Das

Theses and Dissertations

Time-series analysis is used heavily in modeling and forecasting weather, economics, medical data as well as in various other fields. Change point detection (CPD) means finding abrupt changes in the time-series when the statistical property of a certain part of it starts to differ. CPD has attracted a lot of attention in the artificial intelligence, machine learning and data mining communities. In this thesis, a novel CPD algorithm is introduced for segmenting multivariate time-series data. The proposed algorithm is a general pipeline to process any high dimensional multivariate time-series data using nonlinear non-parametric dynamic system. It consists of manifold learning …


Improving Facial Action Unit Recognition Using Convolutional Neural Networks, Shizhong Han Jan 2017

Improving Facial Action Unit Recognition Using Convolutional Neural Networks, Shizhong Han

Theses and Dissertations

Recognizing facial action units (AUs) from spontaneous facial expression is a challenging problem, because of subtle facial appearance changes, free head movements, occlusions, and limited AU-coded training data. Most recently, convolutional neural networks (CNNs) have shown promise on facial AU recognition. However, CNNs are often overfitted and do not generalize well to unseen subject due to limited AU-coded training images. In order to improve the performance of facial AU recognition, we developed two novel CNN frameworks, by substituting the traditional decision layer and convolutional layer with the incremental boosting layer and adaptive convolutional layer respectively, to recognize the AUs from …


Mobile Application For Shipping Goods For Individuals And Truckers In India, Sendurr Selvaraj Jan 2017

Mobile Application For Shipping Goods For Individuals And Truckers In India, Sendurr Selvaraj

Theses and Dissertations

India is a vast country with majority of its cities and towns connected through roads. Road transportation contributes to 86% share of the freight transport of the country with trucking companies dominating the entire space. With growing economy and demands raising, the quality of service of the trucking company remains poor. The major reasons are unorganized practice and lack of transparency. Moreover, limited access for customers to reach out to truckers to transport their goods.

This thesis aims to create a platform for customers and truckers to realize their needs with a help of a mobile application. Customers can search …


Investigate Genomic 3d Structure Using Deep Neural Network, Yan Zhang Jan 2017

Investigate Genomic 3d Structure Using Deep Neural Network, Yan Zhang

Theses and Dissertations

The 3D structures of the chromosomes play fundamental roles in essential cellular functions, e.g., gene regulation, gene expression, evolution and Hi-C technique provides the interaction density between loci on chromosomes. In this dissertation, we developed multiple algorithms, focusing the deep learning approach, to study the Hi-C datasets and the genomic 3D structures.

Building 3D structure of the genome one of the most critical purpose of the Hi-C technique. Recently, several approaches have been developed to reconstruct the 3D model of the chromosomes from HiC data. However, all of the methods are based on a particular mathematical model and lack of …


A Hierarchical Framework For Phylogenetic And Ancestral Genome Reconstruction On Whole Genome Data, Lingxi Zhou Jan 2016

A Hierarchical Framework For Phylogenetic And Ancestral Genome Reconstruction On Whole Genome Data, Lingxi Zhou

Theses and Dissertations

Gene order gets evolved under events such as rearrangements, duplications, and losses, which can change both the order and content along the genome, through the long history of genome evolution. Recently, the accumulation of genomic sequences provides researchers with the chance to handle long-standing problems about the phylogenies, or evolutionary histories, of sets of species, and ancestral genomic content and orders. Over the past few years, such problems have been proven so interesting that a large number of algorithms have been proposed in the attempt to resolve them, following different standards. The work presented in this dissertation focuses on algorithms …


Hydro-Geological Flow Analysis Using Hidden Markov Models, Chandrahas Raj Venkat Gurram Jan 2016

Hydro-Geological Flow Analysis Using Hidden Markov Models, Chandrahas Raj Venkat Gurram

Theses and Dissertations

Hidden Markov Models a class of statistical models used in various disciplines for understanding speech, finding different types of genes responsible for cancer and much more. In this thesis, Hidden Markov Models are used to obtain hidden states that can correlate the flow changes in the Wakulla Spring Cave. Sensors installed in the tunnels of Wakulla Spring Cave have recorded huge correlated changes in the water flows at numerous tunnels. Assuming the correlated flow changes are a consequence of system being in a set of discrete states, a Hidden Markov Model is calculated. This model comprising all the sensors installed …


Revealing Malicious Contents Hidden In The Internet, Muhammad Nazmus Sakib Jan 2016

Revealing Malicious Contents Hidden In The Internet, Muhammad Nazmus Sakib

Theses and Dissertations

In this age of ubiquitous communication in which we can stay constantly connected with the rest of the world, for most of the part, we have to be grateful for one particular invention - the Internet. But as the popularity of Internet connectivity grows, it has become a very dangerous place where objects of malicious content and intent can be hidden in plain sight. In this dissertation, we investigate different ways to detect and capture these malicious contents hidden in the Internet. First, we propose an automated system that mimics high-risk browsing activities such as clicking on suspicious online ads, …


Regular Expression Synthesis For Blast Two-Hit Filtering, Jordan Bradshaw Jan 2016

Regular Expression Synthesis For Blast Two-Hit Filtering, Jordan Bradshaw

Theses and Dissertations

Genomic databases are exhibiting a growth rate that is outpacing Moore's Law, which has made database search algorithms a popular application for use on emerging processor technologies. NCBI BLAST is the standard tool for performing searches against these databases, which operates by transforming each database query into a filter that is subsequently applied to the database. This requires a database scan for every query, fundamentally limiting its performance by I/O bandwidth. In this dissertation we present a functionally-equivalent variation on the NCBI BLAST algorithm that maps more suitably to an FPGA implementation. This variation of the algorithm attempts to reduce …


Efficient Partitioning And Allocation Of Data For Workflow Compositions, Annamaria Victoria Kish Jan 2016

Efficient Partitioning And Allocation Of Data For Workflow Compositions, Annamaria Victoria Kish

Theses and Dissertations

Our aim is to provide efficient partitioning and allocation of data for web service compositions. Web service compositions are represented as partial order database transactions. We accommodate a variety of transaction types, such as read-only and write-oriented transactions, to support workloads in cloud environments. We introduce an approach that partitions and allocates small units of data, called micropartitions, to multiple database nodes. Each database node stores only the data needed to support a specific workload. Transactions are routed directly to the appropriate data nodes. Our approach guarantees serializability and efficient execution.

In Phase 1, we cluster transactions based on data …


Positioning Commuters And Shoppers Through Sensing And Correlation, Rufeng Meng Jan 2016

Positioning Commuters And Shoppers Through Sensing And Correlation, Rufeng Meng

Theses and Dissertations

Positioning is a basic and important need in many scenarios of human daily activities. With position information, multifarious services could be vitalized to benefit all kinds of users, from individuals to organizations. Through positioning, people are able to obtain not only geo-location but also time related information. By aggregating position information from individuals, organizations could derive statistical knowledge about group behaviors, such as traffic, business, event, etc.

Although enormous effort has been invested in positioning related academic and industrial work, there are still many holes to be filled. This dissertation proposes solutions to address the need of positioning in people’s …