Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (17)
- Purdue University (12)
- University of South Carolina (6)
- California Polytechnic State University, San Luis Obispo (3)
- University of Arkansas, Fayetteville (3)
-
- University of Nevada, Las Vegas (3)
- Edith Cowan University (2)
- Old Dominion University (2)
- South Dakota State University (2)
- University of Massachusetts Amherst (2)
- University of South Florida (2)
- University of Tennessee, Knoxville (2)
- Valparaiso University (2)
- Walden University (2)
- Western University (2)
- Kennesaw State University (1)
- La Salle University (1)
- Loyola Marymount University and Loyola Law School (1)
- Michigan Technological University (1)
- Missouri University of Science and Technology (1)
- Nova Southeastern University (1)
- Portland State University (1)
- University at Albany, State University of New York (1)
- University of Louisville (1)
- University of New Orleans (1)
- University of North Florida (1)
- University of Texas at El Paso (1)
- University of Vermont (1)
- Virginia Commonwealth University (1)
- Keyword
-
- Department of Computer Science and Engineering (17)
- Applied sciences (14)
- Engineering, Computer Science and Engineering (6)
- Computer Science (4)
- Computer vision (4)
-
- Information Technology (4)
- Security (4)
- Semantic Web (3)
- Analysis (2)
- Android (2)
- Autonomous (2)
- Classification (2)
- Cloud Computing (2)
- Energy efficiency (2)
- Framework (2)
- Image processing (2)
- Internet of Things (2)
- IoT (2)
- PHP (2)
- Privacy (2)
- Pure sciences (2)
- Robotics (2)
- Social Media (2)
- Visualization (2)
- 3D face analysis (1)
- 3d modeling (1)
- ADE (1)
- AER interfacing (1)
- Academic -- UNF -- Computing (1)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (1)
- Publication
-
- Browse all Theses and Dissertations (17)
- Theses and Dissertations (7)
- Open Access Dissertations (6)
- Open Access Theses (6)
- Computer Engineering (3)
-
- Electronic Theses and Dissertations (3)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (3)
- Doctoral Dissertations (2)
- Electronic Thesis and Dissertation Repository (2)
- Graduate Theses and Dissertations (2)
- Masters Theses (2)
- Theses: Doctorates and Masters (2)
- USF Tampa Graduate Theses and Dissertations (2)
- Walden Dissertations and Doctoral Studies (2)
- CCE Theses and Dissertations (1)
- Chancellor’s Honors Program Projects (1)
- Computational Modeling & Simulation Engineering Theses & Dissertations (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Dissertations and Theses (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Electrical & Computer Engineering Theses & Dissertations (1)
- Graduate College Dissertations and Theses (1)
- HON499 projects (1)
- Honors Thesis (1)
- Information Technology Capstone Research Project Reports (1)
- Information Technology Master Theses (1)
- KSU Journey Honors College Capstones and Theses (1)
- Legacy Theses & Dissertations (2009 - 2024) (1)
- Open Access Theses & Dissertations (1)
- UNF Graduate Theses and Dissertations (1)
Articles 1 - 30 of 76
Full-Text Articles in Physical Sciences and Mathematics
Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan
Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan
Information Technology Capstone Research Project Reports
The purpose of this project is to design a suitable network system for universities in developing countries. The aim was to design a network with high-quality security and low cost, in such a way that network devices of universities in developing countries, will meet standards associated with the universities in developed countries. This project will help to enhance education in developing countries. There are many devices that were used in designing the network, such as routers, switches, backup, firewall, and servers. All devices were connected to each other to make integration network system and configured by putting IP addresses to …
Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held
Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held
Electronic Thesis and Dissertation Repository
Efficient and accurate tomographic image reconstruction has been an intensive topic of research due to the increasing everyday usage in areas such as radiology, biology, and materials science. Computed tomography (CT) scans are used to analyze internal structures through capture of x-ray images. Cone-beam CT scans project a cone-shaped x-ray to capture 2D image data from a single focal point, rotating around the object. CT scans are prone to multiple artifacts, including motion blur, streaks, and pixel irregularities, therefore must be run through image reconstruction software to reduce visual artifacts. The most common algorithm used is the Feldkamp, Davis, and …
Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell
Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell
Computer Engineering
The purpose of the “Android Drone” project was to create a quadcopter that can be controlled by user input sent over the phone’s Wi-Fi connection or 4G internet connection. Furthermore, the purpose was also to be able to receive live video feedback over the internet connection, thus making the drone an inexpensive option compared to other, equivalent drones that might cost thousands of dollars. Not only that, but the Android phone also has a host of other useful features that could be utilized by the drone: this includes GPS, pathing, picture taking, data storage, networking and TCP/IP, a Java software …
What Broke Where For Distributed And Parallel Applications — A Whodunit Story, Subrata Mitra
What Broke Where For Distributed And Parallel Applications — A Whodunit Story, Subrata Mitra
Open Access Dissertations
Detection, diagnosis and mitigation of performance problems in today's large-scale distributed and parallel systems is a difficult task. These large distributed and parallel systems are composed of various complex software and hardware components. When the system experiences some performance or correctness problem, developers struggle to understand the root cause of the problem and fix in a timely manner. In my thesis, I address these three components of the performance problems in computer systems. First, we focus on diagnosing performance problems in large-scale parallel applications running on supercomputers. We developed techniques to localize the performance problem for root-cause analysis. Parallel applications, …
Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti
Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti
Open Access Theses
This study introduced an interaction technique that used tangible interaction for 3D modeling. A hybrid interaction technique using a Kinect camera and a smartphone with a gyroscope was developed for the navigating objects in a 3D modeling software. It was then tested on 20 participants categorized as amateurs who had basic 3D/ CAD modeling experience and 20 participants categorized as the experts who had extensive experience working with the modeling software. This research study presents the need for existence of such interaction technique, gaps from the related previous studies, statistical findings from the current study and possible reasons for the …
Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat
Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat
Open Access Theses
Advancements in computer vision are still not reliable enough for detecting video content including humans and their actions. Microtask crowdsourcing on task markets such as Amazon Mechnical Turk and Upwork can bring humans into the loop. However, engaging crowd workers to annotate non-public video footage risks revealing the identities of people in the video who may have a right to anonymity.
This thesis demonstrates how we can engage untrusted crowd workers to detect behaviors and objects, while robustly concealing the identities of all faces. We developed a web-based system that presents obfuscated videos to crowd workers, and provides them with …
Just In Time Assembly (Jita) - A Run Time Interpretation Approach For Achieving Productivity Of Creating Custom Accelerators In Fpgas, Sen Ma
Graduate Theses and Dissertations
The reconfigurable computing community has yet to be successful in allowing programmers to access FPGAs through traditional software development flows. Existing barriers that prevent programmers from using FPGAs include: 1) knowledge of hardware programming models, 2) the need to work within the vendor specific CAD tools and hardware synthesis. This thesis presents a series of published papers that explore different aspects of a new approach being developed to remove the barriers and enable programmers to compile accelerators on next generation reconfigurable manycore architectures. The approach is entitled Just In Time Assembly (JITA) of hardware accelerators. The approach has been defined …
Context-Sensitive Auto-Sanitization For Php, Jared M. Smith, Richard J. Connor, David P. Cunningham, Kyle G. Bashour, Walter T. Work
Context-Sensitive Auto-Sanitization For Php, Jared M. Smith, Richard J. Connor, David P. Cunningham, Kyle G. Bashour, Walter T. Work
Chancellor’s Honors Program Projects
No abstract provided.
A Reduced Labeled Samples (Rls) Framework For Classification Of Imbalanced Concept-Drifting Streaming Data., Elaheh Arabmakki
A Reduced Labeled Samples (Rls) Framework For Classification Of Imbalanced Concept-Drifting Streaming Data., Elaheh Arabmakki
Electronic Theses and Dissertations
Stream processing frameworks are designed to process the streaming data that arrives in time. An example of such data is stream of emails that a user receives every day. Most of the real world data streams are also imbalanced as is in the stream of emails, which contains few spam emails compared to a lot of legitimate emails. The classification of the imbalanced data stream is challenging due to the several reasons: First of all, data streams are huge and they can not be stored in the memory for one time processing. Second, if the data is imbalanced, the accuracy …
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
UNLV Theses, Dissertations, Professional Papers, and Capstones
Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
HON499 projects
The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information includes …
Intrinsic Functions For Securing Cmos Computation: Variability, Modeling And Noise Sensitivity, Xiaolin Xu
Intrinsic Functions For Securing Cmos Computation: Variability, Modeling And Noise Sensitivity, Xiaolin Xu
Doctoral Dissertations
A basic premise behind modern secure computation is the demand for lightweight cryptographic primitives, like identifier or key generator. From a circuit perspective, the development of cryptographic modules has also been driven by the aggressive scalability of complementary metal-oxide-semiconductor (CMOS) technology. While advancing into nano-meter regime, one significant characteristic of today's CMOS design is the random nature of process variability, which limits the nominal circuit design. With the continuous scaling of CMOS technology, instead of mitigating the physical variability, leveraging such properties becomes a promising way. One of the famous products adhering to this double-edged sword philosophy is the Physically …
Achieving High Reliability And Efficiency In Maintaining Large-Scale Storage Systems Through Optimal Resource Provisioning And Data Placement, Lipeng Wan
Doctoral Dissertations
With the explosive increase in the amount of data being generated by various applications, large-scale distributed and parallel storage systems have become common data storage solutions and been widely deployed and utilized in both industry and academia. While these high performance storage systems significantly accelerate the data storage and retrieval, they also bring some critical issues in system maintenance and management. In this dissertation, I propose three methodologies to address three of these critical issues.
First, I develop an optimal resource management and spare provisioning model to minimize the impact brought by component failures and ensure a highly operational experience …
Interactive Logical Analysis Of Planning Domains, Rajesh Kalyanam
Interactive Logical Analysis Of Planning Domains, Rajesh Kalyanam
Open Access Dissertations
Humans exhibit a significant ability to answer a wide range of questions about previously unencountered planning domains, and leverage this ability to construct “general-purpose'' solution plans for the domain.
The long term vision of this research is to automate this ability, constructing a system that utilizes reasoning to automatically verify claims about a planning domain. The system would use this ability to automatically construct and verify a generalized plan to solve any planning problem in the domain. The goal of this thesis is to start with baseline results from the interactive verification of claims about planning domains and develop the …
Exploring Spin-Transfer-Torque Devices And Memristors For Logic And Memory Applications, Zoha Pajouhi
Exploring Spin-Transfer-Torque Devices And Memristors For Logic And Memory Applications, Zoha Pajouhi
Open Access Dissertations
As scaling CMOS devices is approaching its physical limits, researchers have begun exploring newer devices and architectures to replace CMOS.
Due to their non-volatility and high density, Spin Transfer Torque (STT) devices are among the most prominent candidates for logic and memory applications. In this research, we first considered a new logic style called All Spin Logic (ASL). Despite its advantages, ASL consumes a large amount of static power; thus, several optimizations can be performed to address this issue. We developed a systematic methodology to perform the optimizations to ensure stable operation of ASL.
Second, we investigated reliable design of …
Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song
Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song
Open Access Theses
Nowadays, more and more data is being generated by various software applications, services and smart devices every second. The data contains abundant information about people’s daily lives. This research explored the possibility of improving smartwatches’ context awareness by using common ubiquitous data. The researcher developed a prototype system consisting of an Android application and a web application, and conducted an experiment where 10 participants performed several tasks with the help of a smartwatch. The result showed a significant improvement of the smartwatch’s context awareness running the prototype application, which used ubiquitous data to automatically execute proper actions according to contexts. …
Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde
Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde
Open Access Theses
The objective of the research presented in this thesis is to evaluate the importance of query selectivity for monitoring DBMS activity and detect insider threat. We propose query selectivity as an additional component to an existing anomaly detection system (ADS). We first look at the advantages of working with this particular ADS. This is followed by a discussion about some existing limitations in the anomaly detection system (ADS) and how it affects its overall performance. We look at what query selectivity is and how it can help improve upon the existing limitations of the ADS. The system is then implemented …
A Haptic Surface Robot Interface For Large-Format Touchscreen Displays, Mark Price
A Haptic Surface Robot Interface For Large-Format Touchscreen Displays, Mark Price
Masters Theses
This thesis presents the design for a novel haptic interface for large-format touchscreens. Techniques such as electrovibration, ultrasonic vibration, and external braked devices have been developed by other researchers to deliver haptic feedback to touchscreen users. However, these methods do not address the need for spatial constraints that only restrict user motion in the direction of the constraint. This technology gap contributes to the lack of haptic technology available for touchscreen-based upper-limb rehabilitation, despite the prevalent use of haptics in other forms of robotic rehabilitation. The goal of this thesis is to display kinesthetic haptic constraints to the touchscreen user …
Vision-Based Motion For A Humanoid Robot, Khalid Abdullah Alkhulayfi
Vision-Based Motion For A Humanoid Robot, Khalid Abdullah Alkhulayfi
Dissertations and Theses
The overall objective of this thesis is to build an integrated, inexpensive, human-sized humanoid robot from scratch that looks and behaves like a human. More specifically, my goal is to build an android robot called Marie Curie robot that can act like a human actor in the Portland Cyber Theater in the play Quantum Debate with a known script of every robot behavior. In order to achieve this goal, the humanoid robot need to has degrees of freedom (DOF) similar to human DOFs. Each part of the Curie robot was built to achieve the goal of building a complete humanoid …
Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh
Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh
Electronic Thesis and Dissertation Repository
With the transformation of cloud computing technologies from an attractive trend to a business reality, the need is more pressing than ever for efficient cloud service management tools and techniques. As cloud technologies continue to mature, the service model, resource allocation methodologies, energy efficiency models and general service management schemes are not yet saturated. The burden of making this all tick perfectly falls on cloud providers. Surely, economy of scale revenues and leveraging existing infrastructure and giant workforce are there as positives, but it is far from straightforward operation from that point. Performance and service delivery will still depend on …
Computational Modeling Of Facial Response For Detecting Differential Traits In Autism Spectrum Disorders, Manar D. Samad
Computational Modeling Of Facial Response For Detecting Differential Traits In Autism Spectrum Disorders, Manar D. Samad
Electrical & Computer Engineering Theses & Dissertations
This dissertation proposes novel computational modeling and computer vision methods for the analysis and discovery of differential traits in subjects with Autism Spectrum Disorders (ASD) using video and three-dimensional (3D) images of face and facial expressions. ASD is a neurodevelopmental disorder that impairs an individual’s nonverbal communication skills. This work studies ASD from the pathophysiology of facial expressions which may manifest atypical responses in the face. State-of-the-art psychophysical studies mostly employ na¨ıve human raters to visually score atypical facial responses of individuals with ASD, which may be subjective, tedious, and error prone. A few quantitative studies use intrusive sensors on …
A Simulation-Based Layered Framework Framework For The Development Of Collaborative Autonomous Systems, Ioannis Sakiotis
A Simulation-Based Layered Framework Framework For The Development Of Collaborative Autonomous Systems, Ioannis Sakiotis
Computational Modeling & Simulation Engineering Theses & Dissertations
The purpose of this thesis is to introduce a simulation-based software framework that facilitates the development of collaborative autonomous systems. Significant commonalities exist in the design approaches of both collaborative and autonomous systems, mirroring the sense, plan, act paradigm, and mostly adopting layered architectures. Unfortunately, the development of such systems is intricate and requires low-level interfacing which significantly detracts from development time. Frameworks for the development of collaborative and autonomous systems have been developed but are not flexible and center on narrow ranges of applications and platforms. The proposed framework utilizes an expandable layered structure that allows developers to define …
Enforcing Security Policies On Gpu Computing Through The Use Of Aspect-Oriented Programming Techniques, Bader Albassam
Enforcing Security Policies On Gpu Computing Through The Use Of Aspect-Oriented Programming Techniques, Bader Albassam
USF Tampa Graduate Theses and Dissertations
This thesis presents a new security policy enforcer designed for securing parallel computation on CUDA GPUs. We show how the very features that make a GPGPU desirable have already been utilized in existing exploits, fortifying the need for security protections on a GPGPU. An aspect weaver was designed for CUDA with the goal of utilizing aspect-oriented programming for security policy enforcement. Empirical testing verified the ability of our aspect weaver to enforce various policies. Furthermore, a performance analysis was performed to demonstrate that using this policy enforcer provides no significant performance impact over manual insertion of policy code. Finally, future …
Musictrakr, Benjamin Lin
Musictrakr, Benjamin Lin
Computer Engineering
MusicTrackr is an IoT device that musicians attach to their instruments. The device has a start and stop button that allows users to record their playing sessions. Each recorded session is sent wirelessly to a cloud database. An accompanying website displays all of the recorded sessions, organized by date. After picking a specific date, the user can view graphs showing total practice time and average session length as well play back any recordings during that date. In addition, the user may add comments to any specific date or recording. Lastly, the user may tag a specific date with a color …
Prosense, Johnny Favazza Ii, Casey Glasgow, Matt Epperson
Prosense, Johnny Favazza Ii, Casey Glasgow, Matt Epperson
Computer Engineering
This project aims to gather advanced data sets from MEMS sensors and GPS and deliver it to the user, who can capitalize on the data. The once negligible half-degree difference of your board barreling down a wave can be recorded from a gyro and exploited for the perfect turn. The exact speed dreaded by longboarders where speed wobbles turn into a road rash can be analysed and consequently avoided. Ascertaining the summit of your flight using combined GPS sensors from the ski ramp allows for the correct timing of tricks. When it comes to pursuing excellence in professional sports, amateur …
A Study Of Three Paradigms For Storing Geospatial Data: Distributed-Cloud Model, Relational Database, And Indexed Flat File, Matthew A. Toups
A Study Of Three Paradigms For Storing Geospatial Data: Distributed-Cloud Model, Relational Database, And Indexed Flat File, Matthew A. Toups
University of New Orleans Theses and Dissertations
Geographic Information Systems (GIS) and related applications of geospatial data were once a small software niche; today nearly all Internet and mobile users utilize some sort of mapping or location-aware software. This widespread use reaches beyond mere consumption of geodata; projects like OpenStreetMap (OSM) represent a new source of geodata production, sometimes dubbed “Volunteered Geographic Information.” The volume of geodata produced and the user demand for geodata will surely continue to grow, so the storage and query techniques for geospatial data must evolve accordingly.
This thesis compares three paradigms for systems that manage vector data. Over the past few decades …
Augmented Reality In The Classroom, Patrick Jb Foster, Sean Cunniff
Augmented Reality In The Classroom, Patrick Jb Foster, Sean Cunniff
Honors Thesis
Low vision can have an exceptionally negative impact on a student’s ability to learn, especially when subjected to the conventional education system. In this environment, students are expected to adhere to a lecture that delivers most information visually via a whiteboard or a projector screen. The goal of this project is to create a customizable application for a smartphone that implements selective processing in order to make it easier for visually impaired students to engage with and learn from lectures.
Specifically, this application is written in the Java language for the Android platform. The application uses OpenGL ES, a C-like …
Inferring Intrinsic Beliefs Of Digital Images Using A Deep Autoencoder, Seok H. Lee
Inferring Intrinsic Beliefs Of Digital Images Using A Deep Autoencoder, Seok H. Lee
Computer Science and Computer Engineering Undergraduate Honors Theses
Training a system of artificial neural networks on digital images is a big challenge. Often times digital images contain a large amount of information and values for artificial neural networks to understand. In this work, the inference model is proposed in order to absolve this problem. The inference model is composed of a parameterized autoencoder that endures the loss of information caused by the rescaling of images and transition model that predicts the effect of an action on the observation. To test the inference model, the images of a moving robotic arm were given as the data set. The inference …
Hardware Trojan Detection Via Golden Reference Library Matching, Lucas Weaver
Hardware Trojan Detection Via Golden Reference Library Matching, Lucas Weaver
Graduate Theses and Dissertations
Due to the proliferation of hardware Trojans in third party Intellectual Property (IP) designs, the issue of hardware security has risen to the forefront of computer engineering. Because of the miniscule size yet devastating effects of hardware Trojans, few detection methods have been presented that adequately address this problem facing the hardware industry. One such method with the ability to detect hardware Trojans is Structural Checking. This methodology analyzes a soft IP at the register-transfer level to discover malicious inclusions. An extension of this methodology is presented that expands the list of signal functionalities, termed assets, in addition to introducing …
Efficient Algorithms For Clustering Polygonal Obstacles, Sabbir Kumar Manandhar
Efficient Algorithms For Clustering Polygonal Obstacles, Sabbir Kumar Manandhar
UNLV Theses, Dissertations, Professional Papers, and Capstones
Clustering a set of points in Euclidean space is a well-known problem having applications in pattern recognition, document image analysis, big-data analytics, and robotics. While there are a lot of research publications for clustering point objects, only a few articles have been reported for clustering a given distribution of obstacles. In this thesis we examine the development of efficient algorithms for clustering a given set of convex obstacles in the 2D plane. One of the methods presented in this work uses a Voronoi diagram to extract obstacle clusters. We also consider the implementation issues of point/obstacle clustering algorithms.