Browsing Computer Science and Electrical Engineering Electronic Theses and Dissertations (UMKC) by Thesis Department "Telecommunications and Computer Networking (UMKC)"
Now showing items 21-40 of 46
-
ICE-MILK: Intelligent Crowd Engineering using Machine-based Internet of Things Learning and Knowledge Building
(2022)The lack of proper crowd safety control and management often leads to spreading human casualties and infectious diseases (e.g., COVID-19). Many Machine Learning (ML) technologies inspired by computer vision and video ... -
Ice-Mocha: Intelligent crowd engineering using mobile internet of things characterization and analytics
(2019)Human casualties at entertaining, religious, or political crowd events often occur due to the lack of proper crowd safety management. Notably, for a moving crowd, a minor accident can create a panic for the people to start ... -
Image compression and energy harvesting for energy constrained sensors
(2013)The advances in complementary metal-oxide-semiconductor (CMOS) technology have led to the integration of all components of electronic system into a single integrated circuit. Ultra-low power circuit techniques have reduced ... -
Internet of Things (IoT) Applications With Diverse Direct Communication Methods
(University of Missouri--Kansas City, 2016)Internet of Things (IoT) is a network of physical objects or things that are embedded with electronics, software, sensors, and network connectivity - which enable the object to collect and exchange data. Rapid proliferation ... -
Investigation of Jordanian pre-service teachers' beliefs about learning and teaching of mathematics
(2013)This study investigated Jordanian pre-service teachers' beliefs about the learning and teaching of mathematics. One aim of the study was to identify possible explanations for why Jordanian students score much lower than ... -
IP/MPLS over OTN over DWDM multilayer networks: optimization models, algorithms, and analyses
(University of Missouri--Kansas City, 2011-05-24)Over the past decade, multilayer network design has received significant attention in the scientific literature. However, the explicit modeling of IP/MPLS over OTN over DWDM in which the OTN layer is specifically considered ... -
Learning Efficient Deep Feature Extraction For Mobile Ocular Biometrics
(2020)Ocular biometrics uses physical traits from eye regions such as iris, conjunctival vasculature, and periocular for recognizing the person. Ocular biometrics has gained popularity amongst research and industry alike for its ... -
Lightweight cryptographic protocols for mobile devices
(2020)In recent years, a wide range of resource-constrained devices have been built and integrated into many networked systems. These devices collect and transfer data over the Internet in order for users to access the data or ... -
MAC layer resource allocation algorithms for OFDM/TDMA wireless networks
(2014-09-30)In wireless networks employing OFDMA/TDMA, orthogonal channels and timeslots are available resources that should be distributed between users fairly and in a collision-free manner. Furthermore, the available resources ... -
Measurement And Improvement of Quality-of-Experience For Online Video Streaming Services
(2015)HTTP based online video streaming services have been consistently dominating the online traffic for the past few years. Measuring and improving the performance of these services is an important challenge. Traditional ... -
Multi-Modal Ocular Recognition in presence of occlusion in Mobile Devices
(University of Missouri -- Kansas City, 2018)The existence eyeglasses in human faces cause real challenges for ocular, facial, and soft-based (such as eyebrows) biometric recognition due to glasses reflection, shadow, and frame occlusion. In this regard, two operations ... -
A New Approach for Fast Processing of SPARQL Queries on RDF Quadruples
(2015-06-19)The Resource Description Framework (RDF) is a standard model for representing data on the Web. It enables the interchange and machine processing of data by considering its semantics. While RDF was first proposed with the ... -
Novel High Performance Ultra Low Power Static Random Access Memories (SRAMs) Based on Next Generation Technologies
(2019)Next Big Thing Is Surely Small: Nanotechnology Can Bring Revolution. Nanotechnology leads the world towards many new applications in various fields of computing, communication, defense, entertainment, medical, renewable ... -
Optimization of Handover, Survivability, Multi-Connectivity and Secure Slicing in 5G Cellular Networks using Matrix Exponential Models and Machine Learning
(2022)This works proposes optimization of cellular handovers, cellular network survivability modeling, multi-connectivity and secure network slicing using matrix exponentials and machine learning techniques. We propose matrix ... -
Practical Memristor Emulator Circuit Development Techniques for Analog Applications
(University of Missouri -- Kansas City, 2017)Emerging memristor technology is drawing widespread attention during recent time due to its potential diverse applications in nanoelectronic memories, logic and neu romorphic computer architectures, digital and analog ... -
A quality metric to improve wrapper feature selection in multiclass subject invariant brain computer interfaces
(University of Missouri--Kansas City, 2012-06-05)Brain computer interface systems based on electroencephalograph (EEG) signals have limitations which challenge their application as a practical device for general use. The signal features generated by the brain states ... -
Redundant adder architectures for cell-based technology
(University of Missouri--Kansas City, 2012-01-06)The amenity of our daily lives has come to rely on an enormous number of embedded systems, such as mobile phones, anti-spin systems for cars, high de nition streaming video and portable devices. The utmost important ... -
Scalable Acceleration of The Characteristic Mode Analysis Computational Toolbox Using Big Data Techniques
(2021)Characteristic Mode Analysis (CMA) is used in the design and analysis of a wide range of electromagnetic devices such as antennas and nano-structures. CMA provides physical insight into a target's electromagnetic response ... -
Security Management of Smart Home Internet-Of-Things: A Framework, Finite-State Attack Modeling, And Worst Attack Vulnerability Analysis
(2023)Smart Home Internet of Things (SHIoT) provides a rich compendium of innovative, ubiquitous, and interactive services to users using a variety of smart sensors, devices and applications. However, owing to the strongly ... -
A semantic framework for event-driven service composition
(University of Missouri--Kansas City, 2011-09-14)Service Oriented Architecture (SOA) has become a popular paradigm for designing distributed systems where loosely coupled services (i.e. computational entities) can be integrated seamlessly to provide complex composite ...