Search
Now showing items 21-30 of 58
UAV Collision Avoidance Utilizing ADS-B and TCAS with Independent Ranging
(2018-07-20)
With the proliferation of Unmanned Aerial Vehicles (UAVs), their integration into the National Airspace System (NAS) is becoming increasingly imperative. To accomplish such integration, UAVs must be able to ''sense and ...
Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Model Features
(2018-11-05)
Authorship Attribution is a well-studied topic with deep roots in the field of Stylometry. This thesis examines three less traditional feature sets for the purpose of Authorship Attribution. Each feature set is examined ...
Boosting Cloud Computing Frameworks with High Performance Computing Features
(2016-10-26)
High Performance Computing (HPC) often employs a set of networked and/or distributed computers working together to solve extremely large problems. Since the early 1990's, HPC has made use of technologies such as the Message ...
Trusted, Third-Party Authenticated, Quantum Key Distribution
(2016-08-05)
This dissertation presents an algorithm that provides a way of establishing trust and authentication. The protocol negotiates a key using extensions to QKD algorithms that include non-repudiation and endpoint verification ...
Comparison of IoT Application Layer Protocols
(2017-04-25)
It has been almost 20 years since the concept of the Internet of Things was first proposed. Now, IoT has become a leading technology that is becoming pervasive in our lives. However, behind the wide deployment of IoT ...
Android Malware Detection through Machine Learning on Kernel Task Structure
(2017-12-11)
The popularity of free Android applications has risen rapidly along with the advent of smart phones. This has led to malicious Android apps being involuntarily installed, which violate the user privacy or conduct attack. ...
Cyber Security System Dynamic Modeling
(2017-12-15)
Cyber security modeling is the process of creating a normalized view of the cyber security situation. A typical cyber security model has information about the network infrastructure, security settings, and a list of possible ...
On the Machine Illusion
(2019-10-14)
In this work, we empirically study an emerging problem in the machine learning community, i.e., the adversarial samples. Specifically, we focus on the discussion within the realm of neural networks. The existence of ...
Computational Methods for Evaluation of Protein Structural Models
(2019-04-23)
Proteins are essential parts of organisms and participate in virtually every process within the cells. The function of a protein is closely related to its structure than to its amino acid sequence. Hence, the study of the ...
Prototyping the Reference Implementation of Persistent Non-Blocking Collective Communication in MPI
(2017-07-26)
This research focuses on the design, prototype implementation and standardization sta- tus of persistent non-blocking collective operations for the Message Passing Interface (MPI) standard, through functional extension of ...