Now showing items 1-20 of 32

      • Realtime Physically Plausible Global Illumination Using Scalable Spherical Harmonics Hierarchies 

        Contributor:Metzgar, Jonathan Brian;
        Date Submitted:2018-05
        Global illumination that is based on physically based reflectance models using unbiased statistical path tracing methods remains the best way to simulate a realistic image, but only a few types of simple scenes can be ...
      • Towards Automating Big Texts Security Classification 

        Contributor:Alzhrani, Khudran Maeed;
        Date Submitted:2018-05
        The U.S Government has been the target of cyber-attacks from all over the world. Former President Obama accused the Russian government of leaking emails to WikiLeaks and declared that the U.S. might be forced to respond. ...
      • Hybrid Cloud Federated Identity Architecture Supporting Mission Critical First Responders 

        Contributor:Garcia, Randall E.;
        Date Submitted:2018-05
        Disaster response operations continue to suffer from poor information sharing across the responding organizations. This recurring trend results in degraded operations and potential loss of life and property. Emerging ...

        Contributor:Alamri, Naif;
        Date Submitted:2018-05
        In 2011, the IEEE 802.11s for wireless mesh networks (WMN) was introduced to provide the specifications and necessary changes to the MAC layer protocols which extend the network capabilities in establishing multi-hop and ...
      • Detection And Analysis Of Software Clones 

        Contributor:Sheneamer, Abdullah Mohammad;
        Date Submitted:2017-08
        Effective detection of code clones is important for software maintenance. Code clones introduce difficulty in software maintenance and lead to bug propagation. Detection of duplicated bugs within a piece of software is ...

        Contributor:Alzubaidi, Abdulaziz Ali;
        Date Submitted:2017-08
        In recent years, smartphone use has become ubiquitous. The number of the applications on these devices has increased tremendously, leading to an increase in potential threats to the personal accounts of smartphone owners. ...

        Contributor:Rudd, Ethan McAvoy;
        Date Submitted:2017-05
        With the 21st century well underway, machine learning algorithms have advanced considerably in the ability to tackle difficult recognition problems. However, machine recognition is still rife with challenges, some of which ...

        Contributor:Doan, Tri Si;
        Date Submitted:2017-05
        Data mining practitioners often face problems of the unavailability of all training data at the same time and the inability to process a large amount of data due to constraints such as lack of adequate system memory. ...
      • Enhancing and Evaluating Global Pairwise Alignment of Protein-Protein Interaction Networks 

        Contributor:Elmsallati, Ahed Ashur;
        Date Submitted:2017-05
        Network Alignment over graph-structured data has recently received considerable attention in many application domains. Global network alignment tries to uniquely find the best mapping for a node in one network to only one ...
      • Advancing Fingerprint-Enhanced Authentication: Consistent, Discerning, and Durable Representation and Matching 

        Contributor:Alsaadi, Fawaz;
        Date Submitted:2017-05
        Throughout human history, the achievement of security through authentication has been filled with challenges. Technological evolution has created an unprecedented conjunction of scale and artifice that have turned our ...
      • LexBank: A Multilingual Lexical Resource for Low-Resource Languages 

        Contributor:AL Tarouti, FERAS ALI;
        Date Submitted:2016-08
        In this dissertation, we present new methods to create essential lexical resources for low-resource languages. Specifically, we develop methods for enhancing automatically created wordnets. As a baseline, we start by ...
      • Human Motion: Analysis of Similarity and Dissimilarity Using Orthogonal Changes of Direction on Given Trajectories 

        Contributor:Torres Reyes, Francisco Javier;
        Date Submitted:2016-08
        The analysis of motion similarity, particularly human motion similarity, is needed in different areas of study: motion blending, where new motions are generated from previous ones and they are intended to be as realistic ...
      • Towards application-centric fairness in multi-tenant clouds with adaptive CPU sharing 

        Contributor:Ayodele, Anthony Ojo;
        Date Submitted:2016-08
        The ongoing rush for cloud-based services by small, medium, and large-scale organizations in other to reduce operational cost overhead, and have more flexibility in the deployment of business applications continues unabated. ...
      • Developing an Innovative Framework for Design and Analysis of Privacy Enhancing Video Surveillance 

        Contributor:Chattopadhyay, Ankur Chattopadhyay;
        Date Submitted:2016-05
        PEVS has been an important research area in the field of computer vision and pattern recognition during the last decade. Research publications on PEVS include different approaches for addressing various issues of privacy ...
      • Connecting the Perception of Emotion to Music Signals 

        Contributor:Wood, Pamela A.;
        Date Submitted:2016-05
        Determining the emotional impact of a particular musical excerpt can be challenging when dealing with human perceptions. It is not possible to ensure that each person will have a comparable experience. In addition, cultural ...
      • Remote authentication using vaulted fingerprint verification 

        Contributor:Alzahrani, Hamdan Ahmed;
        Date Submitted:2016-05
        Fingerprint biometrics are increasingly used for identity verification. However, these require a careful balance of accuracy and privacy that is missing in many implementations. This dissertation describes a new biometric ...
      • Improving performance and sustainability in Big Data Clouds 

        Contributor:Cheng, Dazhao;
        Date Submitted:2016-05
        Big Data analytics and Cloud Computing have become two increasingly important IT paradigms to enhance business agility and productivity. As Cloud Computing offers a cost-effective way to support Big Data analytics, it ...
      • Malware provenance : detecting code reuse in malicious software 

        Contributor:Upchurch, Jason R.;
        Date Submitted:2016-05
        Detecting code reuse in software has applications in malicious code analysis and malware code search and retrieval, but is complicated by the lack of available source code. Malware Provenance examines the difficulties in ...
      • Probabilistic Open Set Recognition 

        Contributor:Jain, Lalit Prithviraj;
        Date Submitted:2015
        Real-world tasks in computer vision, pattern recognition and machine learning often touch upon the open set recognition problem: multi-class recognition with incomplete knowledge of the world and many unknown inputs. An ...
      • Toward secure sensitive data in the cloud 

        Contributor:Alsolami, Fahad Jazi;
        Date Submitted:2015
        Cloud storage and computation have many exciting features such as low cost, scalability, and unbounded resources. These features attract many individuals and organizations to migrate their sensitive data, including biometric ...