Recent Submissions

  • A Reinforcement Learning Approach to Autonomous Speed Control in Robotic Systems 

    Aghli, Nima (2017-05)
    Model-free reinforcement learning techniques have been successfully used in diverse robotic applications. In this thesis, we Implement the Q-learning algorithm as one of the most used model-free algorithms to find an ...
  • A Survey of Impact Analysis Tools for Effective Code Evolution 

    Galbo, Stephanie Perez Day (2017-04)
    Background: Software maintenance and evolution are becoming noticeably more important activities in the software development process, with the growing popularity of Agile/SCRUM and continuous integration. Impact analysis, ...
  • High Fidelity Adaptive Cyber Emulation 

    Mammadov, Samir (2017-05)
    While looking for a high-level adaptive traffic generation tool, we came to realize that no such tool exists that can be used for rapid development while being platform agnostic. Having reviewed a wide array of tools to ...
  • Language Relations on Twitter: A Network Science Approach 

    Saha, Priya (2017-04)
    Online social networks (e.g., Twitter and Facebook) play a vital role in the spreading of information in today’s world. Interestingly, the spread of information is enabled by the existence of an underlying connectivity ...
  • Effects of Virtualization in Database Benchmarking 

    Rathod, Jigarkumar Jayantibhai (2017-05)
    Many applications are being deployed on the cloud because virtualization provides inexpensive virtual machines which are easy to create and use. To perform benchmark in scale, one has to rely on virtualization. Virtualization ...
  • A Multi-Level Analysis of Collaborations in Computer Science 

    Divakarmurthy, Pramod (2015-05)
    Working in collaboration is common in today’s highly connected scientific community. By collaborating, researchers can solve challenging multi-disciplinary problems, increase knowledge dissemination as well as productivity. ...
  • Cross-Spectral Biometric Performance Analysis on High-Resolution Face Images 

    Pandian Shanmuganathan, Praveen Kumar (2016-12)
    Biometrics is increasingly being used to authenticate the identity of individuals in critical use case devices like smart phones, laptops, and several other access-control systems in our day-to-day lives. Additionally, ...
  • Open Census for Addressing False Identity Attacks in Decentralized Social Networks 

    Qin, Song (2017-05)
    We address the problem of estimating the population of a given area (e.g., a city). Unlike a centralized census where identities are reported to a single principal agency (e.g., U.S. Census Bureau) and are stored on a ...
  • Digital Quorum Sensing for Self-Organizing Malware 

    Fioravanti, Mark Edward (2016-12)
    INTRODUCTION: Malware authors present an interesting problem for the security community as they evolve and adapt to overcome network and host defenses. The determined adversary is a special class of malware author who ...
  • Soteria: A Persuasive eSecurity Assistant 

    Bhardwaj, Punica (2016-12)
    “…security is only as good as the weakest link, and people are the weakest link in the chain.” – B Schneier, 2002 Humans are often referred to as the “weakest link” in the security chain because of the poor security ...
  • A Self-Organized Approach For Detecting Communities in Networks 

    Collingsworth, Bennett C (2016-12)
    The community structure of networks reveals hidden information about the whole network structure that cannot be discerned using other topological properties. Yet, the importance of identifying community structure in ...
  • Studies with Dynamic Nuclear Imaging Image Reconstruction Algorithm 

    Chang, Haoran (2016-12)
    Non-negative matrix factorization (NMF) is a useful method for those non-negative multivariate data. In nuclear imaging, NMF, which is also called factor analysis, is used to analyze the 4D image of positron emission ...
  • Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments 

    Alshehry, Badr (2016-12)
    Contemporary security systems attempt to provide protection against distributed denial-of-service (DDoS) attacks; however, they mostly use a variety of computing and hardware resources for load distribution and request ...
  • Robotic Arm Tracing Curves Recognized by Camera 

    Findling, Timothy Karl (2016-12)
    Applications such like soldering require robot arms to follow the soldering line as present on a surface. We assume here that the surface to be soldered is remote from the robotic arm, that the soldering is performed via ...