Search Results

A Top-Down Policy Engineering Framework for Attribute-Based Access Control

Description: The purpose of this study is to propose a top-down policy engineering framework for attribute-based access control (ABAC) that aims to automatically extract ACPs from requirement specifications documents, and then, using the extracted policies, build or update an ABAC model. We specify a procedure that consists of three main components: 1) ACP sentence identification, 2) policy element extraction, and 3) ABAC model creation and update. ACP sentence identification processes unrestricted natural … more
Date: May 2020
Creator: Narouei, Masoud
open access

Privacy Preserving Machine Learning as a Service

Description: Machine learning algorithms based on neural networks have achieved remarkable results and are being extensively used in different domains. However, the machine learning algorithms requires access to raw data which is often privacy sensitive. To address this issue, we develop new techniques to provide solutions for running deep neural networks over encrypted data. In this paper, we develop new techniques to adopt deep neural networks within the practical limitation of current homomorphic encrypt… more
Date: May 2020
Creator: Hesamifard, Ehsan
open access

Traffic Forecasting Applications Using Crowdsourced Traffic Reports and Deep Learning

Description: Intelligent transportation systems (ITS) are essential tools for traffic planning, analysis, and forecasting that can utilize the huge amount of traffic data available nowadays. In this work, we aggregated detailed traffic flow sensor data, Waze reports, OpenStreetMap (OSM) features, and weather data, from California Bay Area for 6 months. Using that data, we studied three novel ITS applications using convolutional neural networks (CNNs) and recurrent neural networks (RNNs). The first experimen… more
Date: May 2020
Creator: Alammari, Ali

Encrypted Collaborative Editing Software

Description: Cloud-based collaborative editors enable real-time document processing via remote connections. Their common application is to allow Internet users to collaboratively work on their documents stored in the cloud, even if these users are physically a world apart. However, this convenience comes at a cost in terms of user privacy. Hence, the growth of popularity of cloud computing application stipulates the growth in importance of cloud security. A major concern with the cloud is who has access to … more
Date: May 2020
Creator: Tran, Augustin

Multi-Source Large Scale Bike Demand Prediction

Description: Current works of bike demand prediction mainly focus on cluster level and perform poorly on predicting demands of a single station. In the first task, we introduce a contextual based bike demand prediction model, which predicts bike demands for per station by combining spatio-temporal network and environment contexts synergistically. Furthermore, since people's movement information is an important factor, which influences the bike demands of each station. To have a better understanding of peopl… more
Date: May 2020
Creator: Zhou, Yang

Determining Event Outcomes from Social Media

Description: An event is something that happens at a time and location. Events include major life events such as graduating college or getting married, and also simple day-to-day activities such as commuting to work or eating lunch. Most work on event extraction detects events and the entities involved in events. For example, cooking events will usually involve a cook, some utensils and appliances, and a final product. In this work, we target the task of determining whether events result in their expected o… more
Date: May 2020
Creator: Murugan, Srikala
open access

A Study on Usability of Mobile Software Targeted at Elderly People in China

Description: With the rapid development of mobile device technology, smartphones are now not only the tool for young people but also for elderly people. However, the complicated steps of interacting with smartphones are stopping them from having a good user experience. One of the reasons is that application designers do not take consideration of the user group of elderly people. Our pilot survey shows that most elderly people lack the skills required to use a smartphone without obstacles, like typing. We al… more
Date: May 2020
Creator: Jiang, Jingfu
open access

Managing Access during Employee Separation using Blockchain Technology

Description: On-boarding refers to bringing in an employee to a company and granting access to new hires. However, a person may go through different stages of employment, hold different jobs by the same employer and have different levels of information access during the employment duration. A shared services organization may have either limited or wide-spread access within certain groups. Off-boarding implies the removal of access of information or physical devices such as keys, computers or mobile device… more
Date: May 2020
Creator: Mears, Paula Faye
open access

Epileptic Seizure Detection and Control in the Internet of Medical Things (IoMT) Framework

Description: Epilepsy affects up to 1% of the world's population and approximately 2.5 million people in the United States. A considerable portion (30%) of epilepsy patients are refractory to antiepileptic drugs (AEDs), and surgery can not be an effective candidate if the focus of the seizure is on the eloquent cortex. To overcome the problems with existing solutions, a notable portion of biomedical research is focused on developing an implantable or wearable system for automated seizure detection and contr… more
Date: May 2020
Creator: Sayeed, Md Abu
open access

BC Framework for CAV Edge Computing

Description: Edge computing and CAV (Connected Autonomous Vehicle) fields can work as a team. With the short latency and high responsiveness of edge computing, it is a better fit than cloud computing in the CAV field. Moreover, containerized applications are getting rid of the annoying procedures for setting the required environment. So that deployment of applications on new machines is much more user-friendly than before. Therefore, this paper proposes a framework developed for the CAV edge computing scena… more
Date: May 2020
Creator: Chen, Haidi
open access

Extracting Possessions and Their Attributes

Description: Possession is an asymmetric semantic relation between two entities, where one entity (the possessee) belongs to the other entity (the possessor). Automatically extracting possessions are useful in identifying skills, recommender systems and in natural language understanding. Possessions can be found in different communication modalities including text, images, videos, and audios. In this dissertation, I elaborate on the techniques I used to extract possessions. I begin with extracting possessio… more
Date: May 2020
Creator: Chinnappa, Dhivya Infant
open access

Shepherding Network Security Protocols as They Transition to New Atmospheres: A New Paradigm in Network Protocol Analysis

Description: The solutions presented in this dissertation describe a new paradigm in which we shepherd these network security protocols through atmosphere transitions, offering new ways to analyze and monitor the state of the protocol. The approach involves identifying a protocols transitional weaknesses through adaption of formal models, measuring the weakness as it exists in the wild by statically analyzing applications, and show how to use network traffic analysis to monitor protocol implementations goin… more
Date: December 2019
Creator: Talkington, Gregory Joshua
open access

Event Sequence Identification and Deep Learning Classification for Anomaly Detection and Predication on High-Performance Computing Systems

Description: High-performance computing (HPC) systems continue growing in both scale and complexity. These large-scale, heterogeneous systems generate tens of millions of log messages every day. Effective log analysis for understanding system behaviors and identifying system anomalies and failures is highly challenging. Existing log analysis approaches use line-by-line message processing. They are not effective for discovering subtle behavior patterns and their transitions, and thus may overlook some critic… more
Date: December 2019
Creator: Li, Zongze
open access

Biomedical Semantic Embeddings: Using Hybrid Sentences to Construct Biomedical Word Embeddings and its Applications

Description: Word embeddings is a useful method that has shown enormous success in various NLP tasks, not only in open domain but also in biomedical domain. The biomedical domain provides various domain specific resources and tools that can be exploited to improve performance of these word embeddings. However, most of the research related to word embeddings in biomedical domain focuses on analysis of model architecture, hyper-parameters and input text. In this paper, we use SemMedDB to design new sentences … more
Date: December 2019
Creator: Shaik, Arshad
open access

BSM Message and Video Streaming Quality Comparative Analysis Using Wave Short Message Protocol (WSMP)

Description: Vehicular ad-hoc networks (VANETs) are used for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. The IEEE 802.11p/WAVE (Wireless Access in Vehicular Environment) and with WAVE Short Messaging Protocol (WSMP) has been proposed as the standard protocol for designing applications for VANETs. This communication protocol must be thoroughly tested before reliable and efficient applications can be built using its protocols. In this paper, we perform on-road experiments in a… more
Date: August 2019
Creator: Win, Htoo Aung
open access

Skin Detection in Image and Video Founded in Clustering and Region Growing

Description: Researchers have been involved for decades in search of an efficient skin detection method. Yet current methods have not overcome the major limitations. To overcome these limitations, in this dissertation, a clustering and region growing based skin detection method is proposed. These methods together with a significant insight result in a more effective algorithm. The insight concerns a capability to define dynamically the number of clusters in a collection of pixels organized as an image. In … more
Date: August 2019
Creator: Islam, A B M Rezbaul
open access

Application of Adaptive Techniques in Regression Testing for Modern Software Development

Description: In this dissertation we investigate the applicability of different adaptive techniques to improve the effectiveness and efficiency of the regression testing. Initially, we introduce the concept of regression testing. We then perform a literature review of current practices and state-of-the-art regression testing techniques. Finally, we advance the regression testing techniques by performing four empirical studies in which we use different types of information (e.g. user session, source code, co… more
Date: August 2019
Creator: Azizi, Maral
open access

Exploring Physical Unclonable Functions for Efficient Hardware Assisted Security in the IoT

Description: Modern cities are undergoing rapid expansion. The number of connected devices in the networks in and around these cities is increasing every day and will exponentially increase in the next few years. At home, the number of connected devices is also increasing with the introduction of home automation appliances and applications. Many of these appliances are becoming smart devices which can track our daily routines. It is imperative that all these devices should be secure. When cryptographic keys… more
Date: May 2019
Creator: Yanambaka, Venkata Prasanth
open access

A Study on Flat-Address-Space Heterogeneous Memory Architectures

Description: In this dissertation, we present a number of studies that primarily focus on data movement challenges among different types of memories (viz., 3D-DRAM, DDRx DRAM and NVM) employed together as a flat-address heterogeneous memory system. We introduce two different hardware-based techniques for prefetching data from slow off-chip phase change memory (PCM) to fast on-chip memories. The prefetching techniques efficiently fetch data from PCM and place that data into processor-resident or 3D-DRAM-resi… more
Date: May 2019
Creator: Islam, Mahzabeen
open access

A Data-Driven Computational Framework to Assess the Risk of Epidemics at Global Mass Gatherings

Description: This dissertation presents a data-driven computational epidemic framework to simulate disease epidemics at global mass gatherings. The annual Muslim pilgrimage to Makkah, Saudi Arabia is used to demonstrate the simulation and analysis of various disease transmission scenarios throughout the different stages of the event from the arrival to the departure of international participants. The proposed agent-based epidemic model efficiently captures the demographic, spatial, and temporal heterogeneit… more
Date: May 2019
Creator: Alshammari, Sultanah
open access

Extracting Temporally-Anchored Spatial Knowledge

Description: In my dissertation, I elaborate on the work that I have done to extract temporally-anchored spatial knowledge from text, including both intra- and inter-sentential knowledge. I also detail multiple approaches to infer spatial timeline of a person from biographies and social media. I present and analyze two strategies to annotate information regarding whether a given entity is or is not located at some location, and for how long with respect to an event. Specifically, I leverage semantic roles o… more
Date: May 2019
Creator: Vempala, Alakananda
open access

Networking of UAVs Using 802.11s

Description: The thesis simulates the problem of network connectivity that occurs due to the dynamic nature of a network during flight. Nine nodes are provided with initial positions and are flown based on the path provided by leader-follower control algorithm using the server-client model. The application layer provides a point to point connection between the server and client and by using socket programming in the transport layer, a server and clients are established. Each node performs a neighbor discove… more
Date: May 2019
Creator: Polumuru, Pushpa
open access

An Efficient Approach for Dengue Mitigation: A Computational Framework

Description: Dengue mitigation is a major research area among scientist who are working towards an effective management of the dengue epidemic. An effective dengue mitigation requires several other important components. These components include an accurate epidemic modeling, an efficient epidemic prediction, and an efficient resource allocation for controlling of the spread of the dengue disease. Past studies assumed homogeneous response pattern of the dengue epidemic to climate conditions throughout the r… more
Date: May 2019
Creator: Dinayadura, Nirosha
open access

Methodical Evaluation of Processing-in-Memory Alternatives

Description: In this work, I characterized a series of potential application kernels using a set of architectural and non-architectural metrics, and performed a comparison of four different alternatives for processing-in-memory cores (PIMs): ARM cores, GPGPUs, coarse-grained reconfigurable dataflow (DF-PIM), and a domain specific architecture using SIMD PIM engine consisting of a series of multiply-accumulate circuits (MACs). For each PIM alternative I investigated how performance and energy efficiency chan… more
Date: May 2019
Creator: Scrbak, Marko
Back to Top of Screen