Search Results

open access

Maintaining Web Applications Integrity Running on RADIUM

Description: Computer security attacks take place due to the presence of vulnerabilities and bugs in software applications. Bugs and vulnerabilities are the result of weak software architecture and lack of standard software development practices. Despite the fact that software companies are investing millions of dollars in the research and development of software designs security risks are still at large. In some cases software applications are found to carry vulnerabilities for many years before being ideā€¦ more
Date: August 2015
Creator: Ur-Rehman, Wasi
Partner: UNT Libraries
open access

Predictive Modeling for Persuasive Ambient Technology

Description: Computer scientists are increasingly aware of the power of ubiquitous computing systems that can display information in and about the user's environment. One sub category of ubiquitous computing is persuasive ambient information systems that involve an informative display transitioning between the periphery and center of attention. The goal of this ambient technology is to produce a behavior change, implying that a display must be informative, unobtrusive, and persuasive. While a significant boā€¦ more
Date: August 2015
Creator: Powell, Jason W.
Partner: UNT Libraries
open access

Radium: Secure Policy Engine in Hypervisor

Description: The basis of todayā€™s security systems is the trust and confidence that the system will behave as expected and are in a known good trusted state. The trust is built from hardware and software elements that generates a chain of trust that originates from a trusted known entity. Leveraging hardware, software and a mandatory access control policy technology is needed to create a trusted measurement environment. Employing a control layer (hypervisor or microkernel) with the ability to enforce a fineā€¦ more
Date: August 2015
Creator: Shah, Tawfiq M.
Partner: UNT Libraries
open access

Towards Resistance Detection in Health Behavior Change Dialogue Systems

Description: One of the challenges fairly common in motivational interviewing is patient resistance to health behavior change. Hence, automated dialog systems aimed at counseling patients need to be capable of detecting resistance and appropriately altering dialog. This thesis focusses primarily on the development of such a system for automatic identification of patient resistance to behavioral change. This enables the dialogue system to direct the discourse towards a more agreeable ground and helping the pā€¦ more
Date: August 2015
Creator: Sarma, Bandita
Partner: UNT Libraries
open access

Unique Channel Email System

Description: Email connects 85% of the world. This paper explores the pattern of information overload encountered by majority of email users and examine what steps key email providers are taking to combat the problem. Besides fighting spam, popular email providers offer very limited tools to reduce the amount of unwanted incoming email. Rather, there has been a trend to expand storage space and aid the organization of email. Storing email is very costly and harmful to the environment. Additionally, informatā€¦ more
Date: August 2015
Creator: Balakchiev, Milko
Partner: UNT Libraries
open access

Classifying Pairwise Object Interactions: A Trajectory Analytics Approach

Description: We have a huge amount of video data from extensively available surveillance cameras and increasingly growing technology to record the motion of a moving object in the form of trajectory data. With proliferation of location-enabled devices and ongoing growth in smartphone penetration as well as advancements in exploiting image processing techniques, tracking moving objects is more flawlessly achievable. In this work, we explore some domain-independent qualitative and quantitative features in rawā€¦ more
Date: May 2015
Creator: Janmohammadi, Siamak
Partner: UNT Libraries
open access

Distributed Frameworks Towards Building an Open Data Architecture

Description: Data is everywhere. The current Technological advancements in Digital, Social media and the ease at which the availability of different application services to interact with variety of systems are causing to generate tremendous volumes of data. Due to such varied services, Data format is now not restricted to only structure type like text but can generate unstructured content like social media data, videos and images etc. The generated Data is of no use unless been stored and analyzed to deriveā€¦ more
Date: May 2015
Creator: Venumuddala, Ramu Reddy
Partner: UNT Libraries
open access

Investigation on Segmentation, Recognition and 3D Reconstruction of Objects Based on LiDAR Data Or MRI

Description: Segmentation, recognition and 3D reconstruction of objects have been cutting-edge research topics, which have many applications ranging from environmental and medical to geographical applications as well as intelligent transportation. In this dissertation, I focus on the study of segmentation, recognition and 3D reconstruction of objects using LiDAR data/MRI. Three main works are that (I). Feature extraction algorithm based on sparse LiDAR data. A novel method has been proposed for feature extrā€¦ more
Date: May 2015
Creator: Tang, Shijun
Partner: UNT Libraries
open access

The Procedural Generation of Interesting Sokoban Levels

Description: As video games continue to become larger, more complex, and more costly to produce, research into methods to make game creation easier and faster becomes more valuable. One such research topic is procedural generation, which allows the computer to assist in the creation of content. This dissertation presents a new algorithm for the generation of Sokoban levels. Sokoban is a grid-based transport puzzle which is computational interesting due to being PSPACE-complete. Beyond just generating levelsā€¦ more
Date: May 2015
Creator: Taylor, Joshua
Partner: UNT Libraries
open access

Space and Spectrum Engineered High Frequency Components and Circuits

Description: With the increasing demand on wireless and portable devices, the radio frequency front end blocks are required to feature properties such as wideband, high frequency, multiple operating frequencies, low cost and compact size. However, the current radio frequency system blocks are designed by combining several individual frequency band blocks into one functional block, which increase the cost and size of devices. To address these issues, it is important to develop novel approaches to further advā€¦ more
Date: May 2015
Creator: Arigong, Bayaner
Partner: UNT Libraries
open access

Trajectory Analytics

Description: The numerous surveillance videos recorded by a single stationary wide-angle-view camera persuade the use of a moving point as the representation of each small-size object in wide video scene. The sequence of the positions of each moving point can be used to generate a trajectory containing both spatial and temporal information of object's movement. In this study, we investigate how the relationship between two trajectories can be used to recognize multi-agent interactions. For this purpose, we ā€¦ more
Date: May 2015
Creator: Santiteerakul, Wasana
Partner: UNT Libraries
open access

Video Analytics with Spatio-Temporal Characteristics of Activities

Description: As video capturing devices become more ubiquitous from surveillance cameras to smart phones, the demand of automated video analysis is increasing as never before. One obstacle in this process is to efficiently locate where a human operatorā€™s attention should be, and another is to determine the specific types of activities or actions without ambiguity. It is the special interest of this dissertation to locate spatial and temporal regions of interest in videos and to develop a better action repreā€¦ more
Date: May 2015
Creator: Cheng, Guangchun
Partner: UNT Libraries
open access

Exploration of Visual, Acoustic, and Physiological Modalities to Complement Linguistic Representations for Sentiment Analysis

Description: This research is concerned with the identification of sentiment in multimodal content. This is of particular interest given the increasing presence of subjective multimodal content on the web and other sources, which contains a rich and vast source of people's opinions, feelings, and experiences. Despite the need for tools that can identify opinions in the presence of diverse modalities, most of current methods for sentiment analysis are designed for textual data only, and few attempts have beeā€¦ more
Date: December 2014
Creator: PĆ©rez-Rosas, VerĆ³nica
Partner: UNT Libraries
open access

Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform

Description: Mobile phones are one of the essential parts of modern life. Making a phone call is not the main purpose of a smart phone anymore, but merely one of many other features. Online social networking, chatting, short messaging, web browsing, navigating, and photography are some of the other features users enjoy in modern smartphones, most of which are provided by mobile apps. However, with this advancement, many security vulnerabilities have opened up in these devices. Malicious apps are a major thrā€¦ more
Date: December 2014
Creator: Fazeen, Mohamed & Issadeen, Mohamed
Partner: UNT Libraries
open access

A New Look at Retargetable Compilers

Description: Consumers demand new and innovative personal computing devices every 2 years when their cellular phone service contracts are renewed. Yet, a 2 year development cycle for the concurrent development of both hardware and software is nearly impossible. As more components and features are added to the devices, maintaining this 2 year cycle with current tools will become commensurately harder. This dissertation delves into the feasibility of simplifying the development of such systems by employing heā€¦ more
Date: December 2014
Creator: Burke, Patrick William
Partner: UNT Libraries
open access

Smartphone-based Household Travel Survey - a Literature Review, an App, and a Pilot Survey

Description: High precision data from household travel survey (HTS) is extremely important for the transportation research, traffic models and policy formulation. Traditional methods of data collection were imprecise because they relied on peopleā€™s memories of trip information, such as date and location, and the remainder data had to be obtained by certain supplemental tools. The traditional methods suffered from intensive labor, large time consumption, and unsatisfactory data precision. Recent research treā€¦ more
Date: December 2014
Creator: Wang, Qian (Computer scientist)
Partner: UNT Libraries
open access

Uncertainty Evaluation in Large-scale Dynamical Systems: Theory and Applications

Description: Significant research efforts have been devoted to large-scale dynamical systems, with the aim of understanding their complicated behaviors and managing their responses in real-time. One pivotal technological obstacle in this process is the existence of uncertainty. Although many of these large-scale dynamical systems function well in the design stage, they may easily fail when operating in realistic environment, where environmental uncertainties modulate system dynamics and complicate real-timeā€¦ more
Date: December 2014
Creator: Zhou, Yi (Software engineer)
Partner: UNT Libraries
open access

A Computational Methodology for Addressing Differentiated Access of Vulnerable Populations During Biological Emergencies

Description: Mitigation response plans must be created to protect affected populations during biological emergencies resulting from the release of harmful biochemical substances. Medical countermeasures have been stockpiled by the federal government for such emergencies. However, it is the responsibility of local governments to maintain solid, functional plans to apply these countermeasures to the entire target population within short, mandated time frames. Further, vulnerabilities in the population may serā€¦ more
Date: August 2014
Creator: O'Neill, Martin Joseph, II
Partner: UNT Libraries
open access

General Purpose Computing in Gpu - a Watermarking Case Study

Description: The purpose of this project is to explore the GPU for general purpose computing. The GPU is a massively parallel computing device that has a high-throughput, exhibits high arithmetic intensity, has a large market presence, and with the increasing computation power being added to it each year through innovations, the GPU is a perfect candidate to complement the CPU in performing computations. The GPU follows the single instruction multiple data (SIMD) model for applying operations on its data.ā€¦ more
Date: August 2014
Creator: Hanson, Anthony
Partner: UNT Libraries
open access

Modeling Epidemics on Structured Populations: Effects of Socio-demographic Characteristics and Immune Response Quality

Description: Epidemiologists engage in the study of the distribution and determinants of health-related states or events in human populations. Eventually, they will apply that study to prevent and control problems and contingencies associated with the health of the population. Due to the spread of new pathogens and the emergence of new bio-terrorism threats, it has become imperative to develop new and expand existing techniques to equip public health providers with robust tools to predict and control healthā€¦ more
Date: August 2014
Creator: Reyes Silveyra, Jorge A.
Partner: UNT Libraries
open access

Procedural Generation of Content for Online Role Playing Games

Description: Video game players demand a volume of content far in excess of the ability of game designers to create it. For example, a single quest might take a week to develop and test, which means that companies such as Blizzard are spending millions of dollars each month on new content for their games. As a result, both players and developers are frustrated with the inability to meet the demand for new content. By generating content on-demand, it is possible to create custom content for each player basedā€¦ more
Date: August 2014
Creator: Doran, Jonathon
Partner: UNT Libraries
open access

Secure and Energy Efficient Execution Frameworks Using Virtualization and Light-weight Cryptographic Components

Description: Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms facilitate the construction of trustworthy secure systems; however, existing hardware security approaches require modifications to the micro-architecture of the processor and such changes are extremely time consuming and expensive to test and implement. Additionally, they incorporate cryptographic security mechanisms that are computationally intensive and account for excessive energy consumptionā€¦ more
Date: August 2014
Creator: Nimgaonkar, Satyajeet
Partner: UNT Libraries
open access

Autonomic Failure Identification and Diagnosis for Building Dependable Cloud Computing Systems

Description: The increasingly popular cloud-computing paradigm provides on-demand access to computing and storage with the appearance of unlimited resources. Users are given access to a variety of data and software utilities to manage their work. Users rent virtual resources and pay for only what they use. In spite of the many benefits that cloud computing promises, the lack of dependability in shared virtualized infrastructures is a major obstacle for its wider adoption, especially for mission-critical appā€¦ more
Date: May 2014
Creator: Guan, Qiang
Partner: UNT Libraries
open access

Ddos Defense Against Botnets in the Mobile Cloud

Description: Mobile phone advancements and ubiquitous internet connectivity are resulting in ever expanding possibilities in the application of smart phones. Users of mobile phones are now capable of hosting server applications from their personal devices. Whether providing services individually or in an ad hoc network setting the devices are currently not configured for defending against distributed denial of service (DDoS) attacks. These attacks, often launched from a botnet, have existed in the space of ā€¦ more
Date: May 2014
Creator: Jensen, David
Partner: UNT Libraries
Back to Top of Screen