Search Results

open access

Simulation of Dengue Outbreak in Thailand

Description: The dengue virus has become widespread worldwide in recent decades. It has no specific treatment and affects more than 40% of the entire population in the world. In Thailand, dengue has been a health concern for more than half a century. The highest number of cases in one year was 174,285 in 1987, leading to 1,007 deaths. In the present day, dengue is distributed throughout the entire country. Therefore, dengue has become a major challenge for public health in terms of both prevention and contr… more
Date: August 2018
Creator: Meesumrarn, Thiraphat
Partner: UNT Libraries
open access

Secure and Trusted Execution Framework for Virtualized Workloads

Description: In this dissertation, we have analyzed various security and trustworthy solutions for modern computing systems and proposed a framework that will provide holistic security and trust for the entire lifecycle of a virtualized workload. The framework consists of 3 novel techniques and a set of guidelines. These 3 techniques provide necessary elements for secure and trusted execution environment while the guidelines ensure that the virtualized workload remains in a secure and trusted state througho… more
Date: August 2018
Creator: Kotikela, Srujan D
Partner: UNT Libraries
open access

An Efficient Approach for Dengue Mitigation: A Computational Framework

Description: Dengue mitigation is a major research area among scientist who are working towards an effective management of the dengue epidemic. An effective dengue mitigation requires several other important components. These components include an accurate epidemic modeling, an efficient epidemic prediction, and an efficient resource allocation for controlling of the spread of the dengue disease. Past studies assumed homogeneous response pattern of the dengue epidemic to climate conditions throughout the r… more
Date: May 2019
Creator: Dinayadura, Nirosha
Partner: UNT Libraries
open access

Methodical Evaluation of Processing-in-Memory Alternatives

Description: In this work, I characterized a series of potential application kernels using a set of architectural and non-architectural metrics, and performed a comparison of four different alternatives for processing-in-memory cores (PIMs): ARM cores, GPGPUs, coarse-grained reconfigurable dataflow (DF-PIM), and a domain specific architecture using SIMD PIM engine consisting of a series of multiply-accumulate circuits (MACs). For each PIM alternative I investigated how performance and energy efficiency chan… more
Date: May 2019
Creator: Scrbak, Marko
Partner: UNT Libraries
open access

New Frameworks for Secure Image Communication in the Internet of Things (IoT)

Description: The continuous expansion of technology, broadband connectivity and the wide range of new devices in the IoT cause serious concerns regarding privacy and security. In addition, in the IoT a key challenge is the storage and management of massive data streams. For example, there is always the demand for acceptable size with the highest quality possible for images to meet the rapidly increasing number of multimedia applications. The effort in this dissertation contributes to the resolution of conce… more
Date: August 2016
Creator: Albalawi, Umar Abdalah S
Partner: UNT Libraries
open access

Sensing and Decoding Brain States for Predicting and Enhancing Human Behavior, Health, and Security

Description: The human brain acts as an intelligent sensor by helping in effective signal communication and execution of logical functions and instructions, thus, coordinating all functions of the human body. More importantly, it shows the potential to combine prior knowledge with adaptive learning, thus ensuring constant improvement. These qualities help the brain to interact efficiently with both, the body (brain-body) as well as the environment (brain-environment). This dissertation attempts to apply the… more
Date: August 2016
Creator: Bajwa, Garima
Partner: UNT Libraries
open access

Improving Software Quality through Syntax and Semantics Verification of Requirements Models

Description: Software defects can frequently be traced to poorly-specified requirements. Many software teams manage their requirements using tools such as checklists and databases, which lack a formal semantic mapping to system behavior. Such a mapping can be especially helpful for safety-critical systems. Another limitation of many requirements analysis methods is that much of the analysis must still be done manually. We propose techniques that automate portions of the requirements analysis process, as wel… more
Date: December 2018
Creator: Gaither, Danielle
Partner: UNT Libraries

A Top-Down Policy Engineering Framework for Attribute-Based Access Control

Description: The purpose of this study is to propose a top-down policy engineering framework for attribute-based access control (ABAC) that aims to automatically extract ACPs from requirement specifications documents, and then, using the extracted policies, build or update an ABAC model. We specify a procedure that consists of three main components: 1) ACP sentence identification, 2) policy element extraction, and 3) ABAC model creation and update. ACP sentence identification processes unrestricted natural … more
Date: May 2020
Creator: Narouei, Masoud
Partner: UNT Libraries
open access

Privacy Preserving Machine Learning as a Service

Description: Machine learning algorithms based on neural networks have achieved remarkable results and are being extensively used in different domains. However, the machine learning algorithms requires access to raw data which is often privacy sensitive. To address this issue, we develop new techniques to provide solutions for running deep neural networks over encrypted data. In this paper, we develop new techniques to adopt deep neural networks within the practical limitation of current homomorphic encrypt… more
Date: May 2020
Creator: Hesamifard, Ehsan
Partner: UNT Libraries
open access

Traffic Forecasting Applications Using Crowdsourced Traffic Reports and Deep Learning

Description: Intelligent transportation systems (ITS) are essential tools for traffic planning, analysis, and forecasting that can utilize the huge amount of traffic data available nowadays. In this work, we aggregated detailed traffic flow sensor data, Waze reports, OpenStreetMap (OSM) features, and weather data, from California Bay Area for 6 months. Using that data, we studied three novel ITS applications using convolutional neural networks (CNNs) and recurrent neural networks (RNNs). The first experimen… more
Date: May 2020
Creator: Alammari, Ali
Partner: UNT Libraries

Multi-Source Large Scale Bike Demand Prediction

Description: Current works of bike demand prediction mainly focus on cluster level and perform poorly on predicting demands of a single station. In the first task, we introduce a contextual based bike demand prediction model, which predicts bike demands for per station by combining spatio-temporal network and environment contexts synergistically. Furthermore, since people's movement information is an important factor, which influences the bike demands of each station. To have a better understanding of peopl… more
Date: May 2020
Creator: Zhou, Yang
Partner: UNT Libraries

A Performance and Security Analysis of Elliptic Curve Cryptography Based Real-Time Media Encryption

Description: This dissertation emphasizes the security aspects of real-time media. The problems of existing real-time media protections are identified in this research, and viable solutions are proposed. First, the security of real-time media depends on the Secure Real-time Transport Protocol (SRTP) mechanism. We identified drawbacks of the existing SRTP Systems, which use symmetric key encryption schemes, which can be exploited by attackers. Elliptic Curve Cryptography (ECC), an asymmetric key cryptography… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: December 2019
Creator: Sen, Nilanjan
Partner: UNT Libraries

Frameworks for Attribute-Based Access Control (ABAC) Policy Engineering

Description: In this disseration we propose semi-automated top-down policy engineering approaches for attribute-based access control (ABAC) development. Further, we propose a hybrid ABAC policy engineering approach to combine the benefits and address the shortcomings of both top-down and bottom-up approaches. In particular, we propose three frameworks: (i) ABAC attributes extraction, (ii) ABAC constraints extraction, and (iii) hybrid ABAC policy engineering. Attributes extraction framework compris… more
Date: August 2020
Creator: Alohaly, Manar
Partner: UNT Libraries
open access

Kriging Methods to Exploit Spatial Correlations of EEG Signals for Fast and Accurate Seizure Detection in the IoMT

Description: Epileptic seizure presents a formidable threat to the life of its sufferers, leaving them unconscious within seconds of its onset. Having a mortality rate that is at least twice that of the general population, it is a true cause for concern which has gained ample attention from various research communities. About 800 million people in the world will have at least one seizure experience in their lifespan. Injuries sustained during a seizure crisis are one of the leading causes of death in epilep… more
Date: August 2020
Creator: Olokodana, Ibrahim Latunde
Partner: UNT Libraries
open access

Online Construction of Android Application Test Suites

Description: Mobile applications play an important role in the dissemination of computing and information resources. They are often used in domains such as mobile banking, e-commerce, and health monitoring. Cost-effective testing techniques in these domains are critical. This dissertation contributes novel techniques for automatic construction of mobile application test suites. In particular, this work provides solutions that focus on the prohibitively large number of possible event sequences that must be s… more
Date: December 2017
Creator: Adamo, David T., Jr.
Partner: UNT Libraries
open access

Hybrid Approaches in Test Suite Prioritization

Description: The rapid advancement of web and mobile application technologies has recently posed numerous challenges to the Software Engineering community, including how to cost-effectively test applications that have complex event spaces. Many software testing techniques attempt to cost-effectively improve the quality of such software. This dissertation primarily focuses on that of hybrid test suite prioritization. The techniques utilize two or more criteria to perform test suite prioritization as it is of… more
Date: May 2018
Creator: Nurmuradov, Dmitriy
Partner: UNT Libraries

Understanding and Addressing Accessibility Barriers Faced by People with Visual Impairments on Block-Based Programming Environments

Description: There is an increased use of block-based programming environments in K-12 education and computing outreach activities to introduce novices to programming and computational thinking skills. However, despite their appealing design that allows students to focus on concepts rather than syntax, block-based programming by design is inaccessible to people with visual impairments and people who cannot use the mouse. In addition to this inaccessibility, little is known about the instructional experience… more
Date: December 2022
Creator: Mountapmbeme, Aboubakar
Partner: UNT Libraries
open access

Joint Schemes for Physical Layer Security and Error Correction

Description: The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A cipher-based cryptosystem is also presented in this research. The complexity of this scheme is reduced compared to conventional schemes. The securities… more
Date: August 2011
Creator: Adamo, Oluwayomi Bamidele
Partner: UNT Libraries
open access

Trajectory Analytics

Description: The numerous surveillance videos recorded by a single stationary wide-angle-view camera persuade the use of a moving point as the representation of each small-size object in wide video scene. The sequence of the positions of each moving point can be used to generate a trajectory containing both spatial and temporal information of object's movement. In this study, we investigate how the relationship between two trajectories can be used to recognize multi-agent interactions. For this purpose, we … more
Date: May 2015
Creator: Santiteerakul, Wasana
Partner: UNT Libraries
open access

The Procedural Generation of Interesting Sokoban Levels

Description: As video games continue to become larger, more complex, and more costly to produce, research into methods to make game creation easier and faster becomes more valuable. One such research topic is procedural generation, which allows the computer to assist in the creation of content. This dissertation presents a new algorithm for the generation of Sokoban levels. Sokoban is a grid-based transport puzzle which is computational interesting due to being PSPACE-complete. Beyond just generating levels… more
Date: May 2015
Creator: Taylor, Joshua
Partner: UNT Libraries
open access

Scene Analysis Using Scale Invariant Feature Extraction and Probabilistic Modeling

Description: Conventional pattern recognition systems have two components: feature analysis and pattern classification. For any object in an image, features could be considered as the major characteristic of the object either for object recognition or object tracking purpose. Features extracted from a training image, can be used to identify the object when attempting to locate the object in a test image containing many other objects. To perform reliable scene analysis, it is important that the features extr… more
Date: August 2011
Creator: Shen, Yao
Partner: UNT Libraries
open access

Detection and Classification of Heart Sounds Using a Heart-Mobile Interface

Description: An early detection of heart disease can save lives, caution individuals and also help to determine the type of treatment to be given to the patients. The first test of diagnosing a heart disease is through auscultation - listening to the heart sounds. The interpretation of heart sounds is subjective and requires a professional skill to identify the abnormalities in these sounds. A medical practitioner uses a stethoscope to perform an initial screening by listening for irregular sounds from the … more
Date: December 2016
Creator: Thiyagaraja, Shanti
Partner: UNT Libraries
open access

Improving Memory Performance for Both High Performance Computing and Embedded/Edge Computing Systems

Description: CPU-memory bottleneck is a widely recognized problem. It is known that majority of high performance computing (HPC) database systems are configured with large memories and dedicated to process specific workloads like weather prediction, molecular dynamic simulations etc. My research on optimal address mapping improves the memory performance by increasing the channel and bank level parallelism. In an another research direction, I proposed and evaluated adaptive page migration techniques that o… more
Date: December 2021
Creator: Adavally, Shashank
Partner: UNT Libraries
open access

Machine-Learning-Enabled Cooperative Perception on Connected Autonomous Vehicles

Description: The main research objective of this dissertation is to understand the sensing and communication challenges to achieving cooperative perception among autonomous vehicles, and then, using the insights gained, guide the design of the suitable format of data to be exchanged, reliable and efficient data fusion algorithms on vehicles. By understanding what and how data are exchanged among autonomous vehicles, from a machine learning perspective, it is possible to realize precise cooperative perceptio… more
Date: December 2021
Creator: Guo, Jingda
Partner: UNT Libraries
Back to Top of Screen