Recent Submissions

  • Realtime Physically Plausible Global Illumination Using Scalable Spherical Harmonics Hierarchies 

    Contributor:Metzgar, Jonathan Brian;
    Date Submitted:2018-05
    Global illumination that is based on physically based reflectance models using unbiased statistical path tracing methods remains the best way to simulate a realistic image, but only a few types of simple scenes can be ...
  • Authentication of legitimate users of smartphones based on app usage sequences 

    Contributor:Piferrer Torres, Enric;
    Date Submitted:2018-05
    Nowadays, it is hard to understand society without smartphones. People may own one or even more of these devices and use them regularly. Consequently, such a trend brings up many security issues, initial authentication ...
  • A Machine Learning Model for Elite Athletes 

    Contributor:Hmosze, Maadh;
    Date Submitted:2018-05
    Abstract In this research we have used different machine learning algorithms to predict the performance of the elite athletes riding bicycles. The study of measuring the performance of the athletes is based on different ...
  • Towards Automating Big Texts Security Classification 

    Contributor:Alzhrani, Khudran Maeed;
    Date Submitted:2018-05
    The U.S Government has been the target of cyber-attacks from all over the world. Former President Obama accused the Russian government of leaking emails to WikiLeaks and declared that the U.S. might be forced to respond. ...
  • CAPITALIZING ON THE SECURITY POTENTIAL OF SOFTWARE DEFINED NETWORKING BY PROVIDING A NETWORK CONFIDENCE ASSESSMENT 

    Contributor:Alcorn, Joshua Andrew;
    Date Submitted:2018-05
    The unauthorized access or theft of sensitive, personal information is becoming a weekly news item. The illegal dissemination of proprietary information to media outlets or competitors costs industry untold millions in ...
  • Hybrid Cloud Federated Identity Architecture Supporting Mission Critical First Responders 

    Contributor:Garcia, Randall E.;
    Date Submitted:2018-05
    Disaster response operations continue to suffer from poor information sharing across the responding organizations. This recurring trend results in degraded operations and potential loss of life and property. Emerging ...
  • SECURE, FAST, AND EFFICIENT HANDOFF PROTOCOLS FOR WIRELESS MESH NETWORKS 

    Contributor:Alamri, Naif;
    Date Submitted:2018-05
    In 2011, the IEEE 802.11s for wireless mesh networks (WMN) was introduced to provide the specifications and necessary changes to the MAC layer protocols which extend the network capabilities in establishing multi-hop and ...
  • EVALUATING SHORT-WAVE INFRARED IMAGES ON A CONVOLUTIONAL NEURAL NETWORK 

    Contributor:Bihn, Michael Joseph;
    Date Submitted:2017-12
    Machine learning algorithms, both neural networks and non neural networks, have been tested against RGB facial images for years. Their success is dependent on clearly distinguishable cropped faces. Poor lighting and distance ...
  • Enhancing the Bootstrapping Network in Cloud-based Onion Routing (COR) 

    Contributor:Snider, Kevin;
    Date Submitted:2017-12
    The maintenance of privacy and anonymity on the Internet has become a large concern for many users worldwide. The online service known as Tor (The Onion Router) is one of the most popular tools available to users seeking ...
  • Travel Plan Generator 

    Contributor:Shao, Likun;
    Date Submitted:2017-12
    Travelers usually have their customized travel plans before starting their trips. A good travel plan can make them convenient to arrange their trips and make trips well organized. In order to customize personal travel ...
  • FULLY HOMOMORPHIC ENCRYPTION OVER EXTERIOR PRODUCT SPACES 

    Contributor:Honorio Araujo da Silva, David William;
    Date Submitted:2017-12
    In this work I propose a new symmetric fully homomorphic encryption powered by Exterior Algebra and Product Spaces, more specifically by Geometric Algebra as a mathematical language for creating cryptographic solutions, ...
  • Autoregressive Density Estimation in Latent Spaces 

    Contributor:Olmo Hernández, Alberto;
    Date Submitted:2017-12
    We propose an extension of recent autoregressive density estimation approaches such as PixelCNN and WaveNet that models the density of a latent variable space rather than the output space. In other words, we propose a ...
  • NEURAL NETWORKS FOR HUMAN CELL DETECTION AND COUNTING 

    Contributor:Valdivieso Tamayo, Natalia;
    Date Submitted:2017-12
    In this work, we present a method to count and detect the position of breast cancer cells and bone marrow human cells using a Convolutional Neural Network (CNN). We compare our F1-results against state-of-the-art results ...
  • Improving Techniques for SQL Injection Defenses 

    Contributor:Kilaru, Divya;
    Date Submitted:2017-12
    In this thesis, we investigate how SQL injection attacks occur and how to patch a web app with the SQL injection vulnerability. Various SQL injection tools are evaluated for their functionalities and capabilities. A python ...
  • Dual Marching Squares: Implementation and Analysis Using VTK 

    Contributor:Garg, Manu;
    Date Submitted:2017-12
    ABSTRACT In the past few decades’ volume rendering is perhaps one of the most visited research topics in the field of scientific visualization. Since volume datasets are large and require considerable computing power to ...
  • Detection And Analysis Of Software Clones 

    Contributor:Sheneamer, Abdullah Mohammad;
    Date Submitted:2017-08
    Effective detection of code clones is important for software maintenance. Code clones introduce difficulty in software maintenance and lead to bug propagation. Detection of duplicated bugs within a piece of software is ...
  • CONTINUOUS AUTHENTICATION OF SMARTPHONE OWNERS BASED ON APP ACCESS BEHAVIOR 

    Contributor:Alzubaidi, Abdulaziz Ali;
    Date Submitted:2017-08
    In recent years, smartphone use has become ubiquitous. The number of the applications on these devices has increased tremendously, leading to an increase in potential threats to the personal accounts of smartphone owners. ...
  • Cloud based Web Resilience using Node.js 

    Contributor:Gunnam, Pragati;
    Date Submitted:2017-08
    Web services are used almost everyday and for everything. Combining these with cloud based services would allow the web applications to become more available for the users. Delivering such cloud based web applications to ...
  • Optimizing Pedestrian Flow In Airports 

    Contributor:Jordan, Gabriel;
    Date Submitted:2017-05
    Denver International Airport has expressed interest in discovering innovative techniques to optimize pedestrian flow in its massive airport which contains upwards of 53 million passengers each year that travel through the ...
  • BETTER LEARNING THROUGH IMPROVED DISTRIBUTIONAL MODELING 

    Contributor:Rudd, Ethan McAvoy;
    Date Submitted:2017-05
    With the 21st century well underway, machine learning algorithms have advanced considerably in the ability to tackle difficult recognition problems. However, machine recognition is still rife with challenges, some of which ...

View more