Recent Submissions

  • Authentication of legitimate users of smartphones based on app usage sequences 

    Contributor:Piferrer Torres, Enric;
    Date Submitted:2018-05
    Nowadays, it is hard to understand society without smartphones. People may own one or even more of these devices and use them regularly. Consequently, such a trend brings up many security issues, initial authentication ...
  • A Machine Learning Model for Elite Athletes 

    Contributor:Hmosze, Maadh;
    Date Submitted:2018-05
    Abstract In this research we have used different machine learning algorithms to predict the performance of the elite athletes riding bicycles. The study of measuring the performance of the athletes is based on different ...

    Contributor:Alcorn, Joshua Andrew;
    Date Submitted:2018-05
    The unauthorized access or theft of sensitive, personal information is becoming a weekly news item. The illegal dissemination of proprietary information to media outlets or competitors costs industry untold millions in ...

    Contributor:Bihn, Michael Joseph;
    Date Submitted:2017-12
    Machine learning algorithms, both neural networks and non neural networks, have been tested against RGB facial images for years. Their success is dependent on clearly distinguishable cropped faces. Poor lighting and distance ...
  • Enhancing the Bootstrapping Network in Cloud-based Onion Routing (COR) 

    Contributor:Snider, Kevin;
    Date Submitted:2017-12
    The maintenance of privacy and anonymity on the Internet has become a large concern for many users worldwide. The online service known as Tor (The Onion Router) is one of the most popular tools available to users seeking ...
  • Travel Plan Generator 

    Contributor:Shao, Likun;
    Date Submitted:2017-12
    Travelers usually have their customized travel plans before starting their trips. A good travel plan can make them convenient to arrange their trips and make trips well organized. In order to customize personal travel ...

    Contributor:Honorio Araujo da Silva, David William;
    Date Submitted:2017-12
    In this work I propose a new symmetric fully homomorphic encryption powered by Exterior Algebra and Product Spaces, more specifically by Geometric Algebra as a mathematical language for creating cryptographic solutions, ...
  • Autoregressive Density Estimation in Latent Spaces 

    Contributor:Olmo Hernández, Alberto;
    Date Submitted:2017-12
    We propose an extension of recent autoregressive density estimation approaches such as PixelCNN and WaveNet that models the density of a latent variable space rather than the output space. In other words, we propose a ...

    Contributor:Valdivieso Tamayo, Natalia;
    Date Submitted:2017-12
    In this work, we present a method to count and detect the position of breast cancer cells and bone marrow human cells using a Convolutional Neural Network (CNN). We compare our F1-results against state-of-the-art results ...
  • Improving Techniques for SQL Injection Defenses 

    Contributor:Kilaru, Divya;
    Date Submitted:2017-12
    In this thesis, we investigate how SQL injection attacks occur and how to patch a web app with the SQL injection vulnerability. Various SQL injection tools are evaluated for their functionalities and capabilities. A python ...
  • Dual Marching Squares: Implementation and Analysis Using VTK 

    Contributor:Garg, Manu;
    Date Submitted:2017-12
    ABSTRACT In the past few decades’ volume rendering is perhaps one of the most visited research topics in the field of scientific visualization. Since volume datasets are large and require considerable computing power to ...
  • Cloud based Web Resilience using Node.js 

    Contributor:Gunnam, Pragati;
    Date Submitted:2017-08
    Web services are used almost everyday and for everything. Combining these with cloud based services would allow the web applications to become more available for the users. Delivering such cloud based web applications to ...
  • Optimizing Pedestrian Flow In Airports 

    Contributor:Jordan, Gabriel;
    Date Submitted:2017-05
    Denver International Airport has expressed interest in discovering innovative techniques to optimize pedestrian flow in its massive airport which contains upwards of 53 million passengers each year that travel through the ...
  • The Network Certification Description Language 

    Contributor:Hanson, Cody Lawrence;
    Date Submitted:2017-05
    Modern IP networks are complex entities that require constant maintenance and care. Similarly, constructing a new network comes with a high amount of upfront cost, planning, and risk. Unlike the disciplines of software ...
  • Deep Learning For Brain Tumor Segmentation 

    Contributor:Moreno Lopez, Marc;
    Date Submitted:2017-05
    In this work, we present a novel method to segment brain tumors using deep learning. An accurate brain tumor segmentation is key for a patient to get the right treatment and for the doctor who must perform surgery. Due to ...
  • Towards Community Cloud Trustworthiness 

    Contributor:Alotaibi, Ahad;
    Date Submitted:2016-08
    Alotaibi, Ahad Saad (M.S, Computer science) Towards Community Cloud Trustworthiness Thesis directed by Associate Professor Edward Chow. In this thesis we presented an authorization system for community cloud. We ...
  • Learning Indoor Localization using Radio Received Signal Strength 

    Contributor:Kulkarni, Gauri;
    Date Submitted:2016-05
    With this research we will investigate a novel machine learning approach to the prediction of location from received signal strength indicators (RSSI) values obtained from these transmitting access points. Indoor localization ...
  • The Design and Implementation of a Mobile Healthcare System with AppleWatch For Seniors (MyHealth) 

    Contributor:Alfaidi, Arij;
    Date Submitted:2016-05
    In this thesis, we developed and implemented a mobile Healthcare app, called MyHealth, on the iPhone with Apple watch to help seniors to manage their health life. MyHealth reminds the users to take their medicine and records ...
  • FHIR : Cell-Level Security and Real Time Access with Accumulo 

    Contributor:Ruiz, Daniel Alfonso;
    Date Submitted:2016-05
    The American Recovery and Reinvestment Act (ARRA) requires the adoption of Electronic Medical Records (EMRs) for seventy percent of the primary care provider population by 2014. Furthermore, by 2015 providers are expected ...
  • Non-uniformity aware disk scheduling in multitenant cloud 

    Contributor:Pasaret Herrero, Albert;
    Date Submitted:2016-05
    With cloud computing becoming more and more popular, the need for obtaining a good multitenant systems is increasing. This thesis present a variation of the CFQ I/O scheduler that will provide fair throughput allocation ...

View more