Search
Now showing items 1-20 of 87
Self adapting smart electrical grid
(2014-07-30)
Following the invention of electricity the electrical grid system was one of the biggest achievements of the twentieth century. It has been responsible for delivering power to millions of homes and businesses. As the demand for power increases due...
A Hardware/Software Co-integration Approach for Securing Network Infrastructure using Reconfigurable Computing
(2022)
In the last two decades, there has been a rapid proliferation of connected devices spanning various application domains. Coupled with the rise of novel computer networking paradigms, such as Internet-of-Things (IoT), edge computing, fog computing...
Toward smart Mobility by Enhancing Travel-Time Reliability
(University of Missouri -- Kansas City, 2018)
Here is my abstract – Smart mobility is an essential element in building smart
cities. To realize connected and automated smart mobility as a service, the capability to
efficiently estimate the travel-time reliability ...
Traffic Engineering for LISP-Enabled Networks
(2013)
Inter-Domain Traffic engineering in the Internet faces serious limitations because of the current IP routing and addressing architecture. This coupled with Border Gateway Protocol’s (BGP’s) way of selecting performance-blind paths forces ISPs to de...
Scalable Acceleration of The Characteristic Mode Analysis Computational Toolbox Using Big Data Techniques
(2021)
matrix operations in CMA run faster on this hardware. Furthermore, this dissertation explores the use of hybrid computational platforms that combine multi-core CPUs with GPUs. To optimize CMA efficiency, we broke down its algorithm into basic matrix...
InfoKiosk: An Information Kiosk With Text-Free User Interface
(University of Missouri--Kansas City, 2011-01-20)
Even though computer usage may seem very intuitive to almost everyone, they have minimum usability requirements that the user's ability to read is in the language being used. In developing countries such as India, where the adult literacy rate is 66...
SiDR: a Secure inter-Domain Routing protocol for future internet
(University of Missouri--Kansas City, 2011-08-26)
Inter-domain routing is a critical functionality that help connect autonomous systems
in the Internet. In recent years, there have been concerns in regard to its vulnerabilities
such as IP prefix hijacking and worm ...
iHear – Lightweight Machine Learning Engine with Context Aware Audio Recognition Model
(University of Missouri–Kansas City, 2016)
With the increasing popularity and affordability of smartphones, there is a high demand to add
machine-learning engines to smartphones. However, Machine Learning with smartphones is typically
not feasible due to the heavy ...
A Novel cell phone based application for tracking the vaccination coverage in rural communities
(2013)
Millions of children born worldwide do not receive proper vaccination. Driven by
the concern for the lives of such children, institutions and organizations around the world
have emphasized the need to strengthen vaccination ...
Siamese Network-Based Multi-Modal Deepfake Detection
(2020)
Deep learning widely applies to solve various problems in healthcare, robotics, and computer vision. Presently, an emerging deep learning application called "deepfake" has raised concerns about the multiple types of security threats that may pose...
Ocular motion classification for mobile device presentation attack detection
(2020)
As a practical pursuit of quantified uniqueness, biometrics explores the parameters that make us who we are and provides the tools we need to secure the integrity of that identity. In our culture of constant connectivity, ...
Anonymous Multicast Communication for Wireless Networks Using Layered Encryption and Hashing
(University of Missouri--Kansas City, 2010)
A sensor network consists of autonomous sensors that operate cooperatively to monitor sensitive information in various environments. A sensor node often sends the information to the base node(s). The base nodes contain the ...
iMOST: Intelligent Motion-Sensing Approaches for Tracking Emotion
(University of Missouri -- Kansas City, 2018)
The aged, minor, and disease members often find it hard to express themselves. They are not fully aware of their need for any help or how to ask for help. The lack of communication ability decreases the quality of life and ...
A Novel Deep Learning-Based Framework for Context Aware Semantic Segmentation in Medical Imaging
(2023)
Deep learning has an enormous impact on medical image analysis. Many computer-aided diagnostic systems equipped with deep networks are rapidly reducing human intervention in healthcare. Among several applications, medical image semantic segmentation...
Decision Support System for Pull Requests Review Using Path-based Network Portrait Divergence and Visualization
(2022)
Pull requests are widely used in open-source and
industrial environments to contribute and assess contributions.
Unlike the typical code review process, pull requests provide
a more lightweight approach for committing, ...
Improving Cuckoo Hashing with Perfect Hashing
(University of Missouri--Kansas City, 2017)
In computer science, the data structure is a systematic way of organizing data such that
it can be used efficiently. There are many hashing techniques that aim at storing keys in
memory to increase key access efficiency ...
Context-Aware Adaptive Model for Smart Energy
(2013)
Building energy awareness and providing feedback on energy use is a vital component in transforming the behavior of individuals and communities towards a more efficient use of electric power. An enormous amount of energy consumption data is been...
Security Management of Smart Home Internet-Of-Things: A Framework, Finite-State Attack Modeling, And Worst Attack Vulnerability Analysis
(2023)
Smart Home Internet of Things (SHIoT) provides a rich compendium of innovative, ubiquitous, and interactive services to users using a variety of smart sensors, devices and applications. However, owing to the strongly ...
Distributed Perimeter Firewall Policy Management Framework
(University of Missouri--Kansas City, 2017)
A perimeter firewall is the first line of defense that stops unwanted packets (based on
defined firewall policies) entering the organization that deploys it. In the real world, every
organization maintains a perimeter ...
KB4DL: Building a Knowledge Base for Deep Learning
(University of Missouri -- Kansas City, 2019)
Deep Learning (DL) has received considerable attention from the AI community. However, we
suffer from the lack of ability in interpretation and annotation of the outcomes from
extensive and exhausting learning efforts. ...