Search Results

open access

FruitPAL: An IoT-Enabled Framework for Automatic Monitoring of Fruit Consumption in Smart Healthcare

Description: This research proposes FruitPAL and FruitPAL 2.0. They are full automatic devices that can detect fruit consumption to reduce the risk of disease. Allergies to fruits can seriously impair the immune system. A novel device (FruitPAL) detecting fruit that can cause allergies is proposed in this thesis. The device can detect fifteen types of fruit and alert the caregiver when an allergic reaction may have happened. The YOLOv8 model is employed to enhance accuracy and response time in detecting dan… more
Date: December 2023
Creator: Alkinani, Abdulrahman Ibrahim M.
open access

Deep Learning Approaches to Radio Map Estimation

Description: Radio map estimation (RME) is the task of predicting radio power at all locations in a two-dimensional area and at all frequencies in a given band. This thesis explores four deep learning approaches to RME: dual path autoencoders, skip connection autoencoders, diffusion, and joint learning with transmitter localization.
Date: July 2023
Creator: Locke IV, William Alexander
open access

A Platform for Aligning Academic Assessments to Industry and Federal Job Postings

Description: The proposed tool will provide users with a platform to access a side-by-side comparison of classroom assessment and job posting requirements. Using techniques and methodologies from NLP, machine learning, data analysis, and data mining: the employed algorithm analyzes job postings and classroom assessments, extracts and classifies skill units within, then compares sets of skills from different input volumes. This effectively provides a predicted alignment between academic and career sources, b… more
Date: July 2023
Creator: Parks, Tyler J.

Evaluating Stack Overflow Usability Posts in Conjunction with Usability Heuristics

Description: This thesis explores the critical role of usability in software development and uses usability heuristics as a cost-effective and efficient method for evaluating various software functions and interfaces. With the proliferation of software development in the modern digital age, developing user-friendly interfaces that meet the needs and preferences of users has become a complex process. Usability heuristics, a set of guidelines based on principles of human-computer interaction, provide a starti… more
This item is restricted from view until June 1, 2024.
Date: May 2023
Creator: Jalali, Hamed

Autonomic Zero Trust Framework for Network Protection

Description: With the technological improvements, the number of Internet connected devices is increasing tremendously. We also observe an increase in cyberattacks since the attackers want to use all these interconnected devices for malicious intention. Even though there exist many proactive security solutions, it is not practical to run all the security solutions on them as they have limited computational resources and even battery operated. As an alternative, Zero Trust Architecture (ZTA) has become popula… more
Date: May 2022
Creator: Durflinger, James
open access

Design of a Low-Cost Spirometer to Detect COPD and Asthma for Remote Health Monitoring

Description: This work develops a simple and low-cost microphone-based spirometer with a scalable infrastructure that can be used to monitor COPD and Asthma symptoms. The data acquired from the system is archived in the cloud for further procuring and reporting. To develop this system, we utilize an off-the-shelf ESP32 development board, MEMS microphone, oxygen mask, and 3D printable mounting tube to keep the costs low. The system utilizes the MEMS microphone to measure the audio signal of a user's exhalati… more
Date: May 2022
Creator: Olvera, Alejandro
open access

A Method of Combining GANs to Improve the Accuracy of Object Detection on Autonomous Vehicles

Description: As the technology in the field of computer vision becomes more and more mature, the autonomous vehicles have achieved rapid developments in recent years. However, the object detection and classification tasks of autonomous vehicles which are based on cameras may face problems when the vehicle is driving at a relatively high speed. One is that the camera will collect blurred photos when driving at high speed which may affect the accuracy of deep neural networks. The other is that small objects f… more
Date: December 2020
Creator: Ye, Fanjie

Red Door: Firewall Based Access Control in ROS

Description: ROS is a set of computer operating system framework designed for robot software development, and Red Door, a lightweight software firewall that serves the ROS, is intended to strengthen its security. ROS has many flaws in security, such as clear text transmission of data, no authentication mechanism, etc. Red Door can achieve identity verification and access control policy with a small performance loss, all without modifying the ROS source code, to ensure the availability and authentication of … more
Date: December 2020
Creator: Shen, Ziyi
open access

Towards a Unilateral Sensing System for Detecting Person-to-Person Contacts

Description: The contact patterns among individuals can significantly affect the progress of an infectious outbreak within a population. Gathering data about these interaction and mixing patterns is essential to assess computational modeling of infectious diseases. Various self-report approaches have been designed in different studies to collect data about contact rates and patterns. Recent advances in sensing technology provide researchers with a bilateral automated data collection devices to facilitate co… more
Date: December 2018
Creator: Amara, Pavan Kumar

Encrypted Collaborative Editing Software

Description: Cloud-based collaborative editors enable real-time document processing via remote connections. Their common application is to allow Internet users to collaboratively work on their documents stored in the cloud, even if these users are physically a world apart. However, this convenience comes at a cost in terms of user privacy. Hence, the growth of popularity of cloud computing application stipulates the growth in importance of cloud security. A major concern with the cloud is who has access to … more
Date: May 2020
Creator: Tran, Augustin

Determining Event Outcomes from Social Media

Description: An event is something that happens at a time and location. Events include major life events such as graduating college or getting married, and also simple day-to-day activities such as commuting to work or eating lunch. Most work on event extraction detects events and the entities involved in events. For example, cooking events will usually involve a cook, some utensils and appliances, and a final product. In this work, we target the task of determining whether events result in their expected o… more
Date: May 2020
Creator: Murugan, Srikala
open access

A Study on Usability of Mobile Software Targeted at Elderly People in China

Description: With the rapid development of mobile device technology, smartphones are now not only the tool for young people but also for elderly people. However, the complicated steps of interacting with smartphones are stopping them from having a good user experience. One of the reasons is that application designers do not take consideration of the user group of elderly people. Our pilot survey shows that most elderly people lack the skills required to use a smartphone without obstacles, like typing. We al… more
Date: May 2020
Creator: Jiang, Jingfu
open access

Managing Access during Employee Separation using Blockchain Technology

Description: On-boarding refers to bringing in an employee to a company and granting access to new hires. However, a person may go through different stages of employment, hold different jobs by the same employer and have different levels of information access during the employment duration. A shared services organization may have either limited or wide-spread access within certain groups. Off-boarding implies the removal of access of information or physical devices such as keys, computers or mobile device… more
Date: May 2020
Creator: Mears, Paula Faye
open access

BC Framework for CAV Edge Computing

Description: Edge computing and CAV (Connected Autonomous Vehicle) fields can work as a team. With the short latency and high responsiveness of edge computing, it is a better fit than cloud computing in the CAV field. Moreover, containerized applications are getting rid of the annoying procedures for setting the required environment. So that deployment of applications on new machines is much more user-friendly than before. Therefore, this paper proposes a framework developed for the CAV edge computing scena… more
Date: May 2020
Creator: Chen, Haidi
open access

Biomedical Semantic Embeddings: Using Hybrid Sentences to Construct Biomedical Word Embeddings and its Applications

Description: Word embeddings is a useful method that has shown enormous success in various NLP tasks, not only in open domain but also in biomedical domain. The biomedical domain provides various domain specific resources and tools that can be exploited to improve performance of these word embeddings. However, most of the research related to word embeddings in biomedical domain focuses on analysis of model architecture, hyper-parameters and input text. In this paper, we use SemMedDB to design new sentences … more
Date: December 2019
Creator: Shaik, Arshad

Enhanced Approach for the Classification of Ulcerative Colitis Severity in Colonoscopy Videos Using CNN

Description: Ulcerative colitis (UC) is a chronic inflammatory disease characterized by periods of relapses and remissions affecting more than 500,000 people in the United States. To achieve the therapeutic goals of UC, which are to first induce and then maintain disease remission, doctors need to evaluate the severity of UC of a patient. However, it is very difficult to evaluate the severity of UC objectively because of non-uniform nature of symptoms and large variations in their patterns. To address this,… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2019
Creator: Sure, Venkata Leela
open access

BSM Message and Video Streaming Quality Comparative Analysis Using Wave Short Message Protocol (WSMP)

Description: Vehicular ad-hoc networks (VANETs) are used for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. The IEEE 802.11p/WAVE (Wireless Access in Vehicular Environment) and with WAVE Short Messaging Protocol (WSMP) has been proposed as the standard protocol for designing applications for VANETs. This communication protocol must be thoroughly tested before reliable and efficient applications can be built using its protocols. In this paper, we perform on-road experiments in a… more
Date: August 2019
Creator: Win, Htoo Aung

Mining Biomedical Data for Hidden Relationship Discovery

Description: With an ever-growing number of publications in the biomedical domain, it becomes likely that important implicit connections between individual concepts of biomedical knowledge are overlooked. Literature based discovery (LBD) is in practice for many years to identify plausible associations between previously unrelated concepts. In this paper, we present a new, completely automatic and interactive system that creates a graph-based knowledge base to capture multifaceted complex associations among … more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2019
Creator: Dharmavaram, Sirisha
open access

Networking of UAVs Using 802.11s

Description: The thesis simulates the problem of network connectivity that occurs due to the dynamic nature of a network during flight. Nine nodes are provided with initial positions and are flown based on the path provided by leader-follower control algorithm using the server-client model. The application layer provides a point to point connection between the server and client and by using socket programming in the transport layer, a server and clients are established. Each node performs a neighbor discove… more
Date: May 2019
Creator: Polumuru, Pushpa

Parallel Analysis of Aspect-Based Sentiment Summarization from Online Big-Data

Description: Consumer's opinions and sentiments on products can reflect the performance of products in general or in various aspects. Analyzing these data is becoming feasible, considering the availability of immense data and the power of natural language processing. However, retailers have not taken full advantage of online comments. This work is dedicated to a solution for automatically analyzing and summarizing these valuable data at both product and category levels. In this research, a system was develo… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: May 2019
Creator: Wei, Jinliang
open access

Detecting Component Failures and Critical Components in Safety Critical Embedded Systems using Fault Tree Analysis

Description: Component failures can result in catastrophic behaviors in safety critical embedded systems, sometimes resulting in loss of life. Component failures can be treated as off nominal behaviors (ONBs) with respect to the components and sub systems involved in an embedded system. A lot of research is being carried out to tackle the problem of ONBs. These approaches are mainly focused on the states (i.e., desired and undesired states of a system at a given point of time to detect ONBs). In this paper,… more
Date: May 2018
Creator: Bhandaram, Abhinav
open access

Mobile-Based Smart Auscultation

Description: In developing countries, acute respiratory infections (ARIs) are responsible for two million deaths per year. Most victims are children who are less than 5 years old. Pneumonia kills 5000 children per day. The statistics for cardiovascular diseases (CVDs) are even more alarming. According to a 2009 report from the World Health Organization (WHO), CVDs kill 17 million people per year. In many resource-poor parts of the world such as India and China, many people are unable to access cardiologists… more
Date: August 2017
Creator: Chitnis, Anurag Ashok
open access

Object Recognition Using Scale-Invariant Chordiogram

Description: This thesis describes an approach for object recognition using the chordiogram shape-based descriptor. Global shape representations are highly susceptible to clutter generated due to the background or other irrelevant objects in real-world images. To overcome the problem, we aim to extract precise object shape using superpixel segmentation, perceptual grouping, and connected components. The employed shape descriptor chordiogram is based on geometric relationships of chords generated from the pa… more
Date: May 2017
Creator: Tonge, Ashwini
open access

Probabilistic Analysis of Contracting Ebola Virus Using Contextual Intelligence

Description: The outbreak of the Ebola virus was declared a Public Health Emergency of International Concern by the World Health Organisation (WHO). Due to the complex nature of the outbreak, the Centers for Disease Control and Prevention (CDC) had created interim guidance for monitoring people potentially exposed to Ebola and for evaluating their intended travel and restricting the movements of carriers when needed. Tools to evaluate the risk of individuals and groups of individuals contracting the disease… more
Date: May 2017
Creator: Gopalakrishnan, Arjun
Back to Top of Screen