Search Results

Spatial Partitioning Algorithms for Solving Location-Allocation Problems

Description: This dissertation presents spatial partitioning algorithms to solve location-allocation problems. Location-allocations problems pertain to both the selection of facilities to serve demand at demand points and the assignment of demand points to the selected or known facilities. In the first part of this dissertation, we focus on the well known and well-researched location-allocation problem, the "p-median problem", which is a distance-based location-allocation problem that involves selection and… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: December 2019
Creator: Gwalani, Harsha
Partner: UNT Libraries
open access

BC Framework for CAV Edge Computing

Description: Edge computing and CAV (Connected Autonomous Vehicle) fields can work as a team. With the short latency and high responsiveness of edge computing, it is a better fit than cloud computing in the CAV field. Moreover, containerized applications are getting rid of the annoying procedures for setting the required environment. So that deployment of applications on new machines is much more user-friendly than before. Therefore, this paper proposes a framework developed for the CAV edge computing scena… more
Date: May 2020
Creator: Chen, Haidi
Partner: UNT Libraries

Determining Event Outcomes from Social Media

Description: An event is something that happens at a time and location. Events include major life events such as graduating college or getting married, and also simple day-to-day activities such as commuting to work or eating lunch. Most work on event extraction detects events and the entities involved in events. For example, cooking events will usually involve a cook, some utensils and appliances, and a final product. In this work, we target the task of determining whether events result in their expected o… more
Date: May 2020
Creator: Murugan, Srikala
Partner: UNT Libraries

Encrypted Collaborative Editing Software

Description: Cloud-based collaborative editors enable real-time document processing via remote connections. Their common application is to allow Internet users to collaboratively work on their documents stored in the cloud, even if these users are physically a world apart. However, this convenience comes at a cost in terms of user privacy. Hence, the growth of popularity of cloud computing application stipulates the growth in importance of cloud security. A major concern with the cloud is who has access to … more
Date: May 2020
Creator: Tran, Augustin
Partner: UNT Libraries
open access

Epileptic Seizure Detection and Control in the Internet of Medical Things (IoMT) Framework

Description: Epilepsy affects up to 1% of the world's population and approximately 2.5 million people in the United States. A considerable portion (30%) of epilepsy patients are refractory to antiepileptic drugs (AEDs), and surgery can not be an effective candidate if the focus of the seizure is on the eloquent cortex. To overcome the problems with existing solutions, a notable portion of biomedical research is focused on developing an implantable or wearable system for automated seizure detection and contr… more
Date: May 2020
Creator: Sayeed, Md Abu
Partner: UNT Libraries
open access

Extracting Possessions and Their Attributes

Description: Possession is an asymmetric semantic relation between two entities, where one entity (the possessee) belongs to the other entity (the possessor). Automatically extracting possessions are useful in identifying skills, recommender systems and in natural language understanding. Possessions can be found in different communication modalities including text, images, videos, and audios. In this dissertation, I elaborate on the techniques I used to extract possessions. I begin with extracting possessio… more
Date: May 2020
Creator: Chinnappa, Dhivya Infant
Partner: UNT Libraries
open access

Managing Access during Employee Separation using Blockchain Technology

Description: On-boarding refers to bringing in an employee to a company and granting access to new hires. However, a person may go through different stages of employment, hold different jobs by the same employer and have different levels of information access during the employment duration. A shared services organization may have either limited or wide-spread access within certain groups. Off-boarding implies the removal of access of information or physical devices such as keys, computers or mobile device… more
Date: May 2020
Creator: Mears, Paula Faye
Partner: UNT Libraries

Multi-Source Large Scale Bike Demand Prediction

Description: Current works of bike demand prediction mainly focus on cluster level and perform poorly on predicting demands of a single station. In the first task, we introduce a contextual based bike demand prediction model, which predicts bike demands for per station by combining spatio-temporal network and environment contexts synergistically. Furthermore, since people's movement information is an important factor, which influences the bike demands of each station. To have a better understanding of peopl… more
Date: May 2020
Creator: Zhou, Yang
Partner: UNT Libraries
open access

Privacy Preserving Machine Learning as a Service

Description: Machine learning algorithms based on neural networks have achieved remarkable results and are being extensively used in different domains. However, the machine learning algorithms requires access to raw data which is often privacy sensitive. To address this issue, we develop new techniques to provide solutions for running deep neural networks over encrypted data. In this paper, we develop new techniques to adopt deep neural networks within the practical limitation of current homomorphic encrypt… more
Date: May 2020
Creator: Hesamifard, Ehsan
Partner: UNT Libraries
open access

A Study on Usability of Mobile Software Targeted at Elderly People in China

Description: With the rapid development of mobile device technology, smartphones are now not only the tool for young people but also for elderly people. However, the complicated steps of interacting with smartphones are stopping them from having a good user experience. One of the reasons is that application designers do not take consideration of the user group of elderly people. Our pilot survey shows that most elderly people lack the skills required to use a smartphone without obstacles, like typing. We al… more
Date: May 2020
Creator: Jiang, Jingfu
Partner: UNT Libraries

A Top-Down Policy Engineering Framework for Attribute-Based Access Control

Description: The purpose of this study is to propose a top-down policy engineering framework for attribute-based access control (ABAC) that aims to automatically extract ACPs from requirement specifications documents, and then, using the extracted policies, build or update an ABAC model. We specify a procedure that consists of three main components: 1) ACP sentence identification, 2) policy element extraction, and 3) ABAC model creation and update. ACP sentence identification processes unrestricted natural … more
Date: May 2020
Creator: Narouei, Masoud
Partner: UNT Libraries
open access

Traffic Forecasting Applications Using Crowdsourced Traffic Reports and Deep Learning

Description: Intelligent transportation systems (ITS) are essential tools for traffic planning, analysis, and forecasting that can utilize the huge amount of traffic data available nowadays. In this work, we aggregated detailed traffic flow sensor data, Waze reports, OpenStreetMap (OSM) features, and weather data, from California Bay Area for 6 months. Using that data, we studied three novel ITS applications using convolutional neural networks (CNNs) and recurrent neural networks (RNNs). The first experimen… more
Date: May 2020
Creator: Alammari, Ali
Partner: UNT Libraries
open access

Building Reliable and Cost-Effective Storage Systems for High-Performance Computing Datacenters

Description: In this dissertation, I first incorporate declustered redundant array of independent disks (RAID) technology in the existing system by maximizing the aggregated recovery I/O and accelerating post-failure remediation. Our analytical model affirms the accelerated data recovery stage significantly improves storage reliability. Then I present a proactive data protection framework that augments storage availability and reliability. It utilizes the failure prediction methods to efficiently rescue dat… more
Date: August 2020
Creator: Qiao, Zhi
Partner: UNT Libraries

Cooperative Perception for Connected Autonomous Vehicle Edge Computing System

Description: This dissertation first conducts a study on raw-data level cooperative perception for enhancing the detection ability of self-driving systems for connected autonomous vehicles (CAVs). A LiDAR (Light Detection and Ranging sensor) point cloud-based 3D object detection method is deployed to enhance detection performance by expanding the effective sensing area, capturing critical information in multiple scenarios and improving detection accuracy. In addition, a point cloud feature based cooperative… more
Date: August 2020
Creator: Chen, Qi
Partner: UNT Libraries

Extracting Dimensions of Interpersonal Interactions and Relationships

Description: People interact with each other through natural language to express feelings, thoughts, intentions, instructions etc. These interactions as a result form relationships. Besides names of relationships like siblings, spouse, friends etc., a number of dimensions (e.g. cooperative vs. competitive, temporary vs. enduring, equal vs. hierarchical etc.) can also be used to capture the underlying properties of interpersonal interactions and relationships. More fine-grained descriptors (e.g. angry, rude,… more
Date: August 2020
Creator: Rashid, Farzana
Partner: UNT Libraries

Frameworks for Attribute-Based Access Control (ABAC) Policy Engineering

Description: In this disseration we propose semi-automated top-down policy engineering approaches for attribute-based access control (ABAC) development. Further, we propose a hybrid ABAC policy engineering approach to combine the benefits and address the shortcomings of both top-down and bottom-up approaches. In particular, we propose three frameworks: (i) ABAC attributes extraction, (ii) ABAC constraints extraction, and (iii) hybrid ABAC policy engineering. Attributes extraction framework compris… more
Date: August 2020
Creator: Alohaly, Manar
Partner: UNT Libraries
open access

Kriging Methods to Exploit Spatial Correlations of EEG Signals for Fast and Accurate Seizure Detection in the IoMT

Description: Epileptic seizure presents a formidable threat to the life of its sufferers, leaving them unconscious within seconds of its onset. Having a mortality rate that is at least twice that of the general population, it is a true cause for concern which has gained ample attention from various research communities. About 800 million people in the world will have at least one seizure experience in their lifespan. Injuries sustained during a seizure crisis are one of the leading causes of death in epilep… more
Date: August 2020
Creator: Olokodana, Ibrahim Latunde
Partner: UNT Libraries

Optimization of Massive MIMO Systems for 5G Networks

Description: In the first part of the dissertation, we provide an extensive overview of sub-6 GHz wireless access technology known as massive multiple-input multiple-output (MIMO) systems, highlighting its benefits, deployment challenges, and the key enabling technologies envisaged for 5G networks. We investigate the fundamental issues that degrade the performance of massive MIMO systems such as pilot contamination, precoding, user scheduling, and signal detection. In the second part, we optimize the perfor… more
Date: August 2020
Creator: Chataut, Robin
Partner: UNT Libraries

Combinatorial-Based Testing Strategies for Mobile Application Testing

Description: This work introduces three new coverage criteria based on combinatorial-based event and element sequences that occur in the mobile environment. The novel combinatorial-based criteria are used to reduce, prioritize, and generate test suites for mobile applications. The combinatorial-based criteria include unique coverage of events and elements with different respects to ordering. For instance, consider the coverage of a pair of events, e1 and e2. The least strict criterion, Combinatorial Coverag… more
Date: December 2020
Creator: Michaels, Ryan P.
Partner: UNT Libraries
open access

A Method of Combining GANs to Improve the Accuracy of Object Detection on Autonomous Vehicles

Description: As the technology in the field of computer vision becomes more and more mature, the autonomous vehicles have achieved rapid developments in recent years. However, the object detection and classification tasks of autonomous vehicles which are based on cameras may face problems when the vehicle is driving at a relatively high speed. One is that the camera will collect blurred photos when driving at high speed which may affect the accuracy of deep neural networks. The other is that small objects f… more
Date: December 2020
Creator: Ye, Fanjie
Partner: UNT Libraries

Red Door: Firewall Based Access Control in ROS

Description: ROS is a set of computer operating system framework designed for robot software development, and Red Door, a lightweight software firewall that serves the ROS, is intended to strengthen its security. ROS has many flaws in security, such as clear text transmission of data, no authentication mechanism, etc. Red Door can achieve identity verification and access control policy with a small performance loss, all without modifying the ROS source code, to ensure the availability and authentication of … more
Date: December 2020
Creator: Shen, Ziyi
Partner: UNT Libraries
open access

An Artificial Intelligence-Driven Model-Based Analysis of System Requirements for Exposing Off-Nominal Behaviors

Description: With the advent of autonomous systems and deep learning systems, safety pertaining to these systems has become a major concern. The existing failure analysis techniques are not enough to thoroughly analyze the safety in these systems. Moreover, because these systems are created to operate in various conditions, they are susceptible to unknown safety issues. Hence, we need mechanisms which can take into account the complexity of operational design domains, identify safety issues other than failu… more
Date: May 2021
Creator: Madala, Kaushik
Partner: UNT Libraries
open access

An Extensible Computing Architecture Design for Connected Autonomous Vehicle System

Description: Autonomous vehicles have made milestone strides within the past decade. Advances up the autonomy ladder have come lock-step with the advances in machine learning, namely deep-learning algorithms and huge, open training sets. And while advances in CPUs have slowed, GPUs have edged into the previous decade's TOP 500 supercomputer territory. This new class of GPUs include novel deep-learning hardware that has essentially side-stepped Moore's law, outpacing the doubling observation by a factor of … more
Date: May 2021
Creator: Hochstetler, Jacob Daniel
Partner: UNT Libraries
open access

Hybrid Optimization Models for Depot Location-Allocation and Real-Time Routing of Emergency Deliveries

Description: Prompt and efficient intervention is vital in reducing casualty figures during epidemic outbreaks, disasters, sudden civil strife or terrorism attacks. This can only be achieved if there is a fit-for-purpose and location-specific emergency response plan in place, incorporating geographical, time and vehicular capacity constraints. In this research, a comprehensive emergency response model for situations of uncertainties (in locations' demand and available resources), typically obtainable in lo… more
Date: May 2021
Creator: Akwafuo, Sampson E
Partner: UNT Libraries
Back to Top of Screen