Follow

Theses/Dissertations from 2019

PDF

Scalable Clustering for Immune Repertoire Sequence Analysis, Prem Bhusal

PDF

Automated Vehicle Electronic Control Unit (ECU) Sensor Location Using Feature-Vector Based Comparisons, Gregory S. Buthker

PDF

Leveraging Schema Information For Improved Knowledge Graph Navigation, Rama Someswar Chittella

PDF

Anticipation in Dynamic Environments: Deciding What to Monitor, Zohreh A. Dannenhauer

PDF

Static Evaluation of Type Inference and Propagation on Global Variables with Varying Context, Ivan Frasure

PDF

Virtual Reality and Analysis Framework for Studying Different Layout Designs, Madison Glines

PDF

Accelerating Reverse Engineering Image Processing Using FPGA, Matthew Joshua Harris

PDF

Conditional Dilated Attention Tracking Model - C-DATM, Tyler Clayton Highlander

PDF

LLVM-IR based Decompilation, Ilsoo Jeon

PDF

kBot: Knowledge-Enabled Personalized Chatbot for Self-Management of Asthma in Pediatric Population, Dipesh Kadariya

PDF

Software Implementations and Applications of Elliptic Curve Cryptography, Kirill Kultinov

PDF

Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li

PDF

Use Of Virtual Reality Technology In Medical Training And Patient Rehabilitation, Sankalp Mishra

PDF

Abusive and Hate Speech Tweets Detection with Text Generation, Abhishek Nalamothu

PDF

Detecting Malicious Behavior in OpenWrt with QEMU Tracing, Jeremy Porter

PDF

Speech Enabled Navigation in Virtual Environments, Raksha Rajashekar

PDF

Recognition of Incomplete Objects based on Synthesis of Views Using a Geometric Based Local-Global Graphs, Michael Christopher Robbeloth

PDF

Rules with Right hand Existential or Disjunction with ROWLTab, Sri Jitendra Satpathy

PDF

Towards Data and Model Confidentiality in Outsourced Machine Learning, Sagar Sharma

Theses/Dissertations from 2018

PDF

Interactive Visualization of Search Results of Large Document Sets, James D. Anderson

PDF

A Multi-Formal Languages Collaborative Scheme for Complex Human Activity Recognition and Behavioral Patterns Extraction, Anargyros Angeleas

PDF

Content-based Clustering and Visualization of Social Media Text Messages, Sydney A. Barnard

PDF

Use of Adaptive Mobile Applications to Improve Mindfulness, Wiehan Boshoff

PDF

Image Stitching and Matching Tool in the Automated Iterative Reverse Engineer (AIRE) Integrated Circuit Analysis Suite, David C. Bowman

PDF

Developing a Kinect based Holoportation System, Soumya Chiday

PDF

Measuring Goal Similarity Using Concept, Context and Task Features, Vahid Eyorokon

PDF

The Feasibility of Dementia Caregiver Task Performance Measurement Using Smart Gaming Technology, Garrett G. Goodman

PDF

Malware Analysis Skills Taught in University Courses, Swetha Gorugantu

PDF

Fully Transparent Computer Vision Framework for Ship Detection and Tracking in Satellite Imagery, Jason T. Gottweis

PDF

Building an Abstract-Syntax-Tree-Oriented Symbolic Execution Engine for PHP Programs, Jin Huang

PDF

Multi-Scale and Multi-Modal Streaming Data Aggregation and Processing for Decision Support during Natural Disasters, Shruti Kar

PDF

Using Natural Language Processing and Machine Learning for Analyzing Clinical Notes in Sickle Cell Disease Patients, Shufa Khizra

PDF

Domain-specific Knowledge Extraction from the Web of Data, Sarasi Lalithsena

PDF

Slim Embedding Layers for Recurrent Neural Language Models, Zhongliang Li

PDF

Virtual Doctor: An Intelligent Human-Computer Dialogue System for Quick Response to People in Need, Stavros Mallios

PDF

Threats and Mitigation of DDoS Cyberattacks Against the U.S. Power Grid via EV Charging, Glenn Sean Morrison

PDF

A Twitter-based Study for Understanding Public Reaction on Zika Virus, RoopTeja Muppalla

PDF

Implementation of Unmanned Aerial Vehicles Reporting Plume Cloud Concentration Values in a 3D Simulation Environment, Emily Catherine Novak

PDF

Development of an iOS App for Learning Intonation of Wind Instruments, Swathi Pamidi

PDF

Overwhelming the SAA System of Delivery UAVs by Drone Swarming, Barry Lynn Pfaff

PDF

A Stochastic Petri Net Reverse Engineering Methodology for Deep Understanding of Technical Documents, Giorgia Rematska

PDF

A Model for Seasonal Dynamic Networks, Jace D. Robinson

PDF

A Semantically Enhanced Approach to Identify Depression-Indicative Symptoms Using Twitter Data, Ankita Saxena

PDF

Development of a Human-AI Teaming Based Mobile Language Learning Solution for Dual Language Learners in Early and Special Educations, Saurabh Shukla

PDF

Verifying Data-Oriented Gadgets in Binary Programs to Build Data-Only Exploits, Zachary David Sisco

PDF

Sensor Data Streams Correlation Platform for Asthma Management, Vaikunth Sridharan

PDF

Augment the Multi-Modal Interaction Capabilities of HoloLens Through Networked Sensory Devices, Subhadra Tummalapally

PDF

Multiple Drone Detection and Acoustic Scene Classification with Deep Learning, Hari Charan Vemula

Theses/Dissertations from 2017

PDF

Intelligent Tutoring System Effects on the Learning Process, Ali Talib Qasim Al-Aqbi

PDF

Detection of DDoS Attacks against the SDN Controller using Statistical Approaches, Basheer Husham Ali Al-Mafrachi

PDF

Finding Street Gang Member Profiles on Twitter, Lakshika Balasuriya

PDF

Conditional Correlation Analysis, Sanjeev Bhatta

PDF

Development of an Ultra-Portable Non-Contact Wound Measurement System, Anka Babu Billa

PDF

Efficient Reasoning Algorithms for Fragments of Horn Description Logics, David Carral

PDF

Portable Motion Lab for Diagnostic and Rehabilitation Processes, Yogesh Laxman Chavan

PDF

Characterizing Concepts in Taxonomy for Entity Recommendations, Siva Kumar Cheekula

PDF

Harassment Detection on Twitter using Conversations, Venkatesh Edupuganti

PDF

Semantics-based Summarization of Entities in Knowledge Graphs, Kalpa Gunaratna

PDF

Collaboratively Detecting HTTP-based Distributed Denial of Service Attack using Software Defined Network, Ademola A. Ikusan

PDF

Exploiting Alignments in Linked Data for Compression and Query Answering, Amit Krishna Joshi

PDF

Automated Rendering of Schema Diagram for Ontologies, Nazifa Karima

PDF

Development of a Performance Assessment System for Language Learning, Imen Kasrani

PDF

Detecting Information Leakage in Android Malware Using Static Taint Analysis, Soham P. Kelkar

PDF

Data-Driven Network-Centric Threat Assessment, Dae Wook Kim

PDF

Implementation and Evaluation of Goal Selection in a Cognitive Architecture, Sravya Kondrakunta

PDF

Sched-ITS: An Interactive Tutoring System to Teach CPU Scheduling Concepts in an Operating Systems Course, Bharath Kumar Koya

PDF

An Optimization Compiler Framework Based on Polyhedron Model for GPGPUs, Lifeng Liu

PDF

Multi-Class Classification of Textual Data: Detection and Mitigation of Cheating in Massively Multiplayer Online Role Playing Games, Naga Sai Nikhil Maguluri

PDF

Model Preparation and User Interface Aspects for Microsoft Hololens Medical Tutorial Applications, Andrew J. McNutt

PDF

Diffusion Maps and Transfer Subspace Learning, Olga L. Mendoza-Schrock

PDF

Visualization of Carbon Monoxide Particles Released from Firearms, Sadan Suneesh Menon

PDF

Virtuo-ITS: An Interactive Tutoring System to Teach Virtual Memory Concepts of an Operating System, Venkata Krishna Kanth Musunuru

PDF

Semantic Web Foundations for Representing, Reasoning, and Traversing Contextualized Knowledge Graphs, Vinh Thi Kim Nguyen

PDF

Development of an Android Based Performance Assessment System for Motivational Interviewing Training, Sowmya Pappu

PDF

OCLEP+: One-Class Intrusion Detection Using Length of Patterns, Sai Kiran Pentukar

PDF

Deep Learning Approach for Intrusion Detection System (IDS) in the Internet of Things (IoT) Network using Gated Recurrent Neural Networks (GRU), Manoj Kumar Putchala

PDF

Adapting the Search Space while Limiting Damage during Learning in a Simulated Flapping Wing Micro Air Vehicle, Monica Sam

PDF

Gait Analysis from Wearable Devices using Image and Signal Processing, Bradley A. Schneider

PDF

Settings Protection Add-on: A User-Interactive Browser Extension to Prevent the Exploitation of Preferences, Venkata Naga Siva Seelam

PDF

Rendering OWL in LaTeX for Improved Readability: Extensions to the OWLAPI, Cogan M. Shimizu

PDF

Smart EV Charging for Improved Sustainable Mobility, Ashutosh Shivakumar

PDF

Distance Learning and Attribute Importance Analysis by Linear Regression on Idealized Distance Functions, Rupesh Kumar Singh

PDF

Web-Delivered Assembly Language Interactive Training and its Sequence Identification for Software Reverse Engineering, Sunethra Thimmapuram

Theses/Dissertations from 2016

PDF

Identifying Tweets with Implicit Entity Mentions, Adarsh Koruthu Alex

PDF

Software Defined Secure Ad Hoc Wireless Networks, Maha Alqallaf

PDF

Towards Best Practices for Crowdsourcing Ontology Alignment Benchmarks, Reihaneh Amini

PDF

Knowledge-Empowered Probabilistic Graphical Models for Physical-Cyber-Social Systems, Pramod Anantharam

PDF

A Closed Loop Research Platform that Enables Dynamic Control of Wing Gait Patterns in a Vertically Constrained Flapping Wing - Micro Air Vehicle, Hermanus Van Botha

PDF

Mining and Analyzing Subjective Experiences in User Generated Content, Lu Chen

PDF

Computer Graphics and Visualization based Analysis and Record System for Hand Surgery and Therapy Practice, Venkatamanikanta Subrahmanyakartheek Gokavarapu

PDF

GPU-Accelerated Feature Tracking, Alex Graves

PDF

Private Record Linkage: A Comparison of Selected Techniques for Name Matching, Pawel B. Grzebala

PDF

Knowledge Driven Search Intent Mining, Ashutosh Jadhav

PDF

Resqu: A Framework for Automatic Evaluation of Knowledge-Driven Automatic Summarization, Nishita Jaykumar

PDF

Identifying Offensive Videos on YouTube, Rajeshwari Kandakatla

PDF

Personalized and Adaptive Semantic Information Filtering for Social Media, Pavan Kapanipathi

PDF

Detecting PHP-based Cross-Site Scripting Vulnerabilities Using Static Program Analysis, Steven M. Kelbley

PDF

Framework for Semantic Integration and Scalable Processing of City Traffic Events, Surendra Brahma Marupudi

PDF

Wikimatcher: Leveraging Wikipedia for Ontology Alignment, Helena Brooke McCurdy

PDF

De-Anonymization Attack Anatomy and Analysis of Ohio Nursing Workforce Data Anonymization, Jacob M. Miracle