Browsing School of Computing by Title
Now showing items 1-20 of 40
-
An Authentication Framework For Wearable Devices
(2018-07)The popularity of wearable devices (WDs) has been growing rapidly in recent years because of the convenience they add to users lives. Although WDs may be considered an extension of mobile computing devices (e.g., ... -
Building Panoramic Image Mosaics of Coral Reefs
(2018-04)Panoramic image mosaic is an important tool for accessing the preserving condition of coral reefs sites. In recent years, a number of methods and applications are made to create panoramic image mosaics by stitching a ... -
Collection and Analysis of Digital Forensic Data from Devices in the Internet of Things
(2018-12)Despite the abundance articles that have been written about the Internet of Things (IoT), little attention has been given to how digital forensics approaches can be utilized to direct advanced investigations in IoT-based ... -
A Comparison Study of Disease Spreading Models
(2018-04)Epidemic diseases have become one of the major sources of concern in modern society. Diseases such as HIV and H1N1 have infected millions of people around the world. Many studies have attempted to describe the dynamics ... -
A Comprehensive Data-Driven Characterization of Organ Transplantation
(2018-07)Organ transplantation yearly saves thousands of lives worldwide; yet, 22 people still die each day only in the USA due to the ever-increasing imbalance between the supply and demand of organs. Currently, this organ-allocation ... -
A Context-Free Method of Visualizing Streaming Object Data for the Purpose of Identifying Known Events: an Implementation and Analysis
(2017-12)This year, every second, five gigabytes of new data will be streamed to storage and yet less than half a percent of all this data will ever be analyzed. Much of this muted data is high-variety object data, unnoticed in ... -
Cross-Spectral Biometric Performance Analysis on High-Resolution Face Images
(2016-12)Biometrics is increasingly being used to authenticate the identity of individuals in critical use case devices like smart phones, laptops, and several other access-control systems in our day-to-day lives. Additionally, ... -
Data Mining Algorithms for Decision Support Based on User Activities
(2018-07)This dissertation covers four data mining problems with applications in decision support based on user activity data. The first problem is an efficient approach to maximizing spread of information in social networks ... -
Decision Support for Shared Responsibility of Cloud Security Metrics
(2017-12)With the rapid growth of cloud computing and the increasing importance of measuring the security of cloud systems, more attention has been focused on the need for security metrics that are specific to cloud computing. ... -
A Development Environment to Integrate Big Data with Deep Learning
(2018-07)This thesis describes a development environment that integrates big data architectures and deep learning models to facilitate rapid experimentation. The thesis makes three major contributions: First, it describes a ... -
Digital Quorum Sensing for Self-Organizing Malware
(2016-12)INTRODUCTION: Malware authors present an interesting problem for the security community as they evolve and adapt to overcome network and host defenses. The determined adversary is a special class of malware author who ... -
Distributed Coordination for Autonomous Guided Vehicles in Multi-agent Systems with Shared Resources
(2018-05)The decentralized path planning technique proposed in this thesis solves major challenges in the domain of MAS. These challenges are trajectory planning and collision avoidance. Generally, in a shared infrastructure where ... -
Effects of Virtualization in Database Benchmarking
(2017-05)Many applications are being deployed on the cloud because virtualization provides inexpensive virtual machines which are easy to create and use. To perform benchmark in scale, one has to rely on virtualization. Virtualization ... -
Enhancing and Reinforcing Security and Usability of User Account Authentication using Fingerprints as Username Credential
(2018-07-20)With the process of logging in, the users gain access to a computer system after identifying and authenticating themselves. The user credentials are required to login, and they are typically some form of a ... -
The Growth, Structure, and Dynamics of Crime in Cities
(2017-12)Crime is ubiquitous in cities but lacks a statistical characterization that could lead to uncovering its underlying mechanisms. Cities are, however, in a constant process of organization making difficult to analyze urban ... -
High Fidelity Adaptive Cyber Emulation
(2017-05)While looking for a high-level adaptive traffic generation tool, we came to realize that no such tool exists that can be used for rapid development while being platform agnostic. Having reviewed a wide array of tools to ... -
High Volume Test Automation With Yeager
(2017-12)High Volume Automated Testing is a powerful family of software testing techniques which enable a variety of testing goals, including the discovery of hard-to-reproduce bugs, which can enable new levels of quality assurance ... -
Identifying The Most Relevant Arguments From User Meta-Data
(2018-05)Arguments are essential objects in a debate. In the DirectDemocracyP2P system, they occur in association with signatures for petitions. The arguments of a signer on a given issue are grouped into one single justification, ... -
Information Densification of Social Constructs via Behavior Analysis of Social Media Users - A Study on Twitter
(2017-12)We live in a digital era where everyday activities are increasingly being replaced by online interactions. In addition, technology advances and data availability are changing the way we expand our knowledge about ourselves, ... -
Language Relations on Twitter: A Network Science Approach
(2017-04)Online social networks (e.g., Twitter and Facebook) play a vital role in the spreading of information in today’s world. Interestingly, the spread of information is enabled by the existence of an underlying connectivity ...