Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electronic Theses and Dissertations

2014

Discipline
Institution
Keyword

Articles 1 - 20 of 20

Full-Text Articles in Computer Engineering

A Non-Invasive Image Based System For Early Diagnosis Of Prostate Cancer., Ahmad Abdusalam Firjani Firjani Naef Dec 2014

A Non-Invasive Image Based System For Early Diagnosis Of Prostate Cancer., Ahmad Abdusalam Firjani Firjani Naef

Electronic Theses and Dissertations

Prostate cancer is the second most fatal cancer experienced by American males. The average American male has a 16.15% chance of developing prostate cancer, which is 8.38% higher than lung cancer, the second most likely cancer. The current in-vitro techniques that are based on analyzing a patients blood and urine have several limitations concerning their accuracy. In addition, the prostate Specific Antigen (PSA) blood-based test, has a high chance of false positive diagnosis, ranging from 28%-58%. Yet, biopsy remains the gold standard for the assessment of prostate cancer, but only as the last resort because of its ...


Sdsf : Social-Networking Trust Based Distributed Data Storage And Co-Operative Information Fusion., Phani Chakravarthy Polina Dec 2014

Sdsf : Social-Networking Trust Based Distributed Data Storage And Co-Operative Information Fusion., Phani Chakravarthy Polina

Electronic Theses and Dissertations

As of 2014, about 2.5 quintillion bytes of data are created each day, and 90% of the data in the world was created in the last two years alone. The storage of this data can be on external hard drives, on unused space in peer-to-peer (P2P) networks or using the more currently popular approach of storing in the Cloud. When the users store their data in the Cloud, the entire data is exposed to the administrators of the services who can view and possibly misuse the data. With the growing popularity and usage of Cloud storage services like Google ...


Avatar Captcha : Telling Computers And Humans Apart Via Face Classification And Mouse Dynamics., Darryl Felix D’Souza Dec 2014

Avatar Captcha : Telling Computers And Humans Apart Via Face Classification And Mouse Dynamics., Darryl Felix D’Souza

Electronic Theses and Dissertations

Bots are malicious, automated computer programs that execute malicious scripts and predefined functions on an affected computer. They pose cybersecurity threats and are one of the most sophisticated and common types of cybercrime tools today. They spread viruses, generate spam, steal personal sensitive information, rig online polls and commit other types of online crime and fraud. They sneak into unprotected systems through the Internet by seeking vulnerable entry points. They access the system’s resources like a human user does. Now the question arises how do we counter this? How do we prevent bots and on the other hand allow ...


Ensemble Learning Method For Hidden Markov Models., Anis Hamdi Dec 2014

Ensemble Learning Method For Hidden Markov Models., Anis Hamdi

Electronic Theses and Dissertations

For complex classification systems, data are gathered from various sources and potentially have different representations. Thus, data may have large intra-class variations. In fact, modeling each data class with a single model might lead to poor generalization. The classification error can be more severe for temporal data where each sample is represented by a sequence of observations. Thus, there is a need for building a classification system that takes into account the variations within each class in the data. This dissertation introduces an ensemble learning method for temporal data that uses a mixture of Hidden Markov Model (HMM) classifiers. We ...


Temporal Contextual Descriptors And Applications To Emotion Analysis., Haythem Balti Dec 2014

Temporal Contextual Descriptors And Applications To Emotion Analysis., Haythem Balti

Electronic Theses and Dissertations

The current trends in technology suggest that the next generation of services and devices allows smarter customization and automatic context recognition. Computers learn the behavior of the users and can offer them customized services depending on the context, location, and preferences. One of the most important challenges in human-machine interaction is the proper understanding of human emotions by machines and automated systems. In the recent years, the progress made in machine learning and pattern recognition led to the development of algorithms that are able to learn the detection and identification of human emotions from experience. These algorithms use different modalities ...


Identification, Indexing, And Retrieval Of Cardio-Pulmonary Resuscitation (Cpr) Video Scenes Of Simulated Medical Crisis., Surangkana Rawungyot Dec 2014

Identification, Indexing, And Retrieval Of Cardio-Pulmonary Resuscitation (Cpr) Video Scenes Of Simulated Medical Crisis., Surangkana Rawungyot

Electronic Theses and Dissertations

Medical simulations, where uncommon clinical situations can be replicated, have proved to provide a more comprehensive training. Simulations involve the use of patient simulators, which are lifelike mannequins. After each session, the physician must manually review and annotate the recordings and then debrief the trainees. This process can be tedious and retrieval of specific video segments should be automated. In this dissertation, we propose a machine learning based approach to detect and classify scenes that involve rhythmic activities such as Cardio-Pulmonary Resuscitation (CPR) from training video sessions simulating medical crises. This applications requires different preprocessing techniques from other video applications ...


Context Dependent Spectral Unmixing., Hamdi Jenzri Aug 2014

Context Dependent Spectral Unmixing., Hamdi Jenzri

Electronic Theses and Dissertations

A hyperspectral unmixing algorithm that finds multiple sets of endmembers is proposed. The algorithm, called Context Dependent Spectral Unmixing (CDSU), is a local approach that adapts the unmixing to different regions of the spectral space. It is based on a novel function that combines context identification and unmixing. This joint objective function models contexts as compact clusters and uses the linear mixing model as the basis for unmixing. Several variations of the CDSU, that provide additional desirable features, are also proposed. First, the Context Dependent Spectral unmixing using the Mahalanobis Distance (CDSUM) offers the advantage of identifying non-spherical clusters in ...


A Novel Nmf-Based Dwi Cad Framework For Prostate Cancer., Patrick Mcclure Aug 2014

A Novel Nmf-Based Dwi Cad Framework For Prostate Cancer., Patrick Mcclure

Electronic Theses and Dissertations

In this thesis, a computer aided diagnostic (CAD) framework for detecting prostate cancer in DWI data is proposed. The proposed CAD method consists of two frameworks that use nonnegative matrix factorization (NMF) to learn meaningful features from sets of high-dimensional data. The first technique, is a three dimensional (3D) level-set DWI prostate segmentation algorithm guided by a novel probabilistic speed function. This speed function is driven by the features learned by NMF from 3D appearance, shape, and spatial data. The second technique, is a probabilistic classifier that seeks to label a prostate segmented from DWI data as either alignat, contain ...


A Novel Diffusion Tensor Imaging-Based Computer-Aided Diagnostic System For Early Diagnosis Of Autism., Mahmoud Mostapha Aug 2014

A Novel Diffusion Tensor Imaging-Based Computer-Aided Diagnostic System For Early Diagnosis Of Autism., Mahmoud Mostapha

Electronic Theses and Dissertations

Autism spectrum disorders (ASDs) denote a significant growing public health concern. Currently, one in 68 children has been diagnosed with ASDs in the United States, and most children are diagnosed after the age of four, despite the fact that ASDs can be identified as early as age two. The ultimate goal of this thesis is to develop a computer-aided diagnosis (CAD) system for the accurate and early diagnosis of ASDs using diffusion tensor imaging (DTI). This CAD system consists of three main steps. First, the brain tissues are segmented based on three image descriptors: a visual appearance model that has ...


Image Based Approach For Early Assessment Of Heart Failure., Hisham Z. Sliman May 2014

Image Based Approach For Early Assessment Of Heart Failure., Hisham Z. Sliman

Electronic Theses and Dissertations

In diagnosing heart diseases, the estimation of cardiac performance indices requires accurate segmentation of the left ventricle (LV) wall from cine cardiac magnetic resonance (CMR) images. MR imaging is noninvasive and generates clear images; however, it is impractical to manually process the huge number of images generated to calculate the performance indices. In this dissertation, we introduce a novel, fast, robust, bi-directional coupled parametric deformable models that are capable of segmenting the LV wall borders using first- and second-order visual appearance features. These features are embedded in a new stochastic external force that preserves the topology of the LV wall ...


Text Stylometry For Chat Bot Identification And Intelligence Estimation., Nawaf Ali May 2014

Text Stylometry For Chat Bot Identification And Intelligence Estimation., Nawaf Ali

Electronic Theses and Dissertations

Authorship identification is a technique used to identify the author of an unclaimed document, by attempting to find traits that will match those of the original author. Authorship identification has a great potential for applications in forensics. It can also be used in identifying chat bots, a form of intelligent software created to mimic the human conversations, by their unique style. The online criminal community is utilizing chat bots as a new way to steal private information and commit fraud and identity theft. The need for identifying chat bots by their style is becoming essential to overcome the danger of ...


Privacy Protection In Context Aware Systems., Anala Aniruddha Pandit May 2014

Privacy Protection In Context Aware Systems., Anala Aniruddha Pandit

Electronic Theses and Dissertations

Smartphones, loaded with users’ personal information, are a primary computing device for many. Advent of 4G networks, IPV6 and increased number of subscribers to these has triggered a host of application developers to develop softwares that are easy to install on the mobile devices. During the application download process, users accept the terms and conditions that permit revelation of private information. The free application markets are sustainable as the revenue model for most of these service providers is through profiling of users and pushing advertisements to the users. This creates a serious threat to users privacy and hence it is ...


Human-Robot Interaction For Multi-Robot Systems, Bennie Lewis Jan 2014

Human-Robot Interaction For Multi-Robot Systems, Bennie Lewis

Electronic Theses and Dissertations

Designing an effective human-robot interaction paradigm is particularly important for complex tasks such as multi-robot manipulation that require the human and robot to work together in a tightly coupled fashion. Although increasing the number of robots can expand the area that the robots can cover within a bounded period of time, a poor human-robot interface will ultimately compromise the performance of the team of robots. However, introducing a human operator to the team of robots, does not automatically improve performance due to the difficulty of teleoperating mobile robots with manipulators. The human operator’s concentration is divided not only among ...


Sps: An Sms-Based Push Service For Energy Saving In Smartphone's Idle State, Erich Dondyk Jan 2014

Sps: An Sms-Based Push Service For Energy Saving In Smartphone's Idle State, Erich Dondyk

Electronic Theses and Dissertations

Despite of all the advances in smartphone technology in recent years, smartphones still remain limited by their battery life. Unlike other power hungry components in the smartphone, the cellular data and Wi-Fi interfaces often continue to be used even while the phone is in the idle state to accommodate unnecessary data traffic produced by some applications. In addition, bad reception has been proven to greatly increase energy consumed by the radio, which happens quite often when smartphone users are inside buildings. In this paper, we present a Short message service Push based Service (SPS) to save unnecessary power consumption when ...


Spectrum Map And Its Application In Cognitive Radio Networks, Saptarshi Debroy Jan 2014

Spectrum Map And Its Application In Cognitive Radio Networks, Saptarshi Debroy

Electronic Theses and Dissertations

Recent measurements on radio spectrum usage have revealed the abundance of underutilized bands of spectrum that belong to licensed users. This necessitated the paradigm shift from static to dynamic spectrum access. Cognitive radio based secondary networks that utilize such unused spectrum holes in the licensed band, have been proposed as a possible solution to the spectrum crisis. The idea is to detect times when a particular licensed band is unused and use it for transmission without causing interference to the licensed user. We argue that prior knowledge about occupancy of such bands and the corresponding achievable performance metrics can potentially ...


Human Detection, Tracking And Segmentation In Surveillance Video, Guang Shu Jan 2014

Human Detection, Tracking And Segmentation In Surveillance Video, Guang Shu

Electronic Theses and Dissertations

This dissertation addresses the problem of human detection and tracking in surveillance videos. Even though this is a well-explored topic, many challenges remain when confronted with data from real world situations. These challenges include appearance variation, illumination changes, camera motion, cluttered scenes and occlusion. In this dissertation several novel methods for improving on the current state of human detection and tracking based on learning scene-specific information in video feeds are proposed. Firstly, we propose a novel method for human detection which employs unsupervised learning and superpixel segmentation. The performance of generic human detectors is usually degraded in unconstrained video environments ...


Taming Wild Faces: Web-Scale, Open-Universe Face Identification In Still And Video Imagery, Enrique Ortiz Jan 2014

Taming Wild Faces: Web-Scale, Open-Universe Face Identification In Still And Video Imagery, Enrique Ortiz

Electronic Theses and Dissertations

With the increasing pervasiveness of digital cameras, the Internet, and social networking, there is a growing need to catalog and analyze large collections of photos and videos. In this dissertation, we explore unconstrained still-image and video-based face recognition in real-world scenarios, e.g. social photo sharing and movie trailers, where people of interest are recognized and all others are ignored. In such a scenario, we must obtain high precision in recognizing the known identities, while accurately rejecting those of no interest. Recent advancements in face recognition research has seen Sparse Representation-based Classification (SRC) advance to the forefront of competing methods ...


Synthetic Generators For Simulating Social Networks, Awrad Mohammed Ali Jan 2014

Synthetic Generators For Simulating Social Networks, Awrad Mohammed Ali

Electronic Theses and Dissertations

An application area of increasing importance is creating agent-based simulations to model human societies. One component of developing these simulations is the ability to generate realistic human social networks. Online social networking websites, such as Facebook, Google+, and Twitter, have increased in popularity in the last decade. Despite the increase in online social networking tools and the importance of studying human behavior in these networks, collecting data directly from these networks is not always feasible due to privacy concerns. Previous work in this area has primarily been limited to 1) network generators that aim to duplicate a small subset of ...


Neuromodulation Based Control Of Autonomous Robots On A Cloud Computing Platform, Cameron Muhammad Jan 2014

Neuromodulation Based Control Of Autonomous Robots On A Cloud Computing Platform, Cameron Muhammad

Electronic Theses and Dissertations

In recent years, the advancement of neurobiologically plausible models and computer networking has resulted in new ways of implementing control systems on robotic platforms. The work presents a control approach based on vertebrate neuromodulation and its implementation on autonomous robots in the open-source, open-access environment of robot operating system (ROS). A spiking neural network (SNN) is used to model the neuromodulatory function for generating context based behavioral responses of the robots to sensory input signals. The neural network incorporates three types of neurons- cholinergic and noradrenergic (ACh/NE) neurons for attention focusing and action selection, dopaminergic (DA) neurons for rewards- ...


A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr Jan 2014

A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr

Electronic Theses and Dissertations

The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.

Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall ...