Gallium oxide has recently emerged as a promising semiconductor material for high voltage switch applications owing to its ultra-wide band gap of ~4.8 eV and the corresponding expected critical field strength of ~8MV/cm. ...
This thesis describes a method for efficient summarization of long surveillance videos.
The method consists of four phases: ground plane calibration, detection and tracking of
scene objects, extracting information about ...
In software engineering, behavioral models such as finite state machines (FSMs) are used to represent key system behaviors. To evaluate the system behaviors, testers need to generate tests from the models and run the tests ...
Hurricanes and tropical storms represent one of the major hazards in coastal communities. Storm surge generated by strong winds and low pressure from these systems have the potential to bring extensive flooding in coastal ...
Today‟s society greatly depends on the operations of complex infrastructure networks such as transportation, utilities and telecommunication. While traditional modeling tools have provided an insight into the theoretical ...
With the Triple Bottom Line (TBL) of Sustainability, total water management
efforts must analyze alternatives to address the potentially conflicting goals of economics
(financial), environmental, and social issues. Goal ...
Over the last few decades, there has been a large growth in the development of technologies for neuroscience applications. The majority of these technologies rely on the separation of bio-particles and monitoring bioelectrical ...
Advances in sequencing technologies have revolutionized the eld of genomics by providing
cost e ective and high throughput solutions. In this paper, we develop a parallel
sequence assembler implemented on general purpose ...
An electronic nose (e-nose) is a biologically inspired device designed to mimic the operation of the olfactory system. The e-nose utilizes a chemical sensor array consisting of broadly responsive vapor sensors, whose ...
With the exponentially growing smartphone market, more and more people desire to have a multipurpose handheld device that not only supports voice communication and text messaging, but also provides video streaming, multimedia ...
In this dissertation, we introduce a novel approach for secure information sharing
characterized as "Group-Centric". Traditional approaches to information sharing include
"Dissemination-Centric" and "Query-Centric" ...
This thesis describes the research and development of a hardware implementation of the Self Organizing Map (SOM) for a network intrusion detection system. As part of the thesis research, Kohonen’s SOM algorithm was examined ...
Software is prone to contain bugs and vulnerabilities. To protect it, researchers normally
go to a lower layer, such as protecting the applications from the kernel or protecting the
operating systems from the hypervisor, ...
If a quantum computer with a sufficient number of qubits was ever built, it would easily break all current American federal standards in the area of public-key cryptography, including algorithms protecting the majority of ...
Cognitive radio is an emerging technology for sensing and opportunistic spectrum access in wireless communication networks. It allows a secondary user to detect under-utilized spectrum of a primary user and to dynamically ...
Advancement in digital technology has generated a massive amount of data. Large amount of information streaming in from various sources such as phones, tablets, computers and internet has made an immense need to provide a ...
Developing agent behaviors is often a tedious, time-consuming task consisting of repeated code, test, and debug cycles. Despite the difficulties, complex agent behaviors have been developed, but they required significant ...
Multivariate cryptosystems belong to the five most promising families of post-quantum
cryptography (PQC) schemes. Among them, the Unbalanced Oil and Vinegar (UOV) and
the Rainbow signature schemes have been extensively ...
Recovering deleted information from storage drives is a long-standing problem. Prior research has approached information recovery by developing file-carving techniques. However, two issues present significant challenges ...
The development of reliable, portable gas sensors that can detect harmful gases
in real-time with high sensitivity and selectivity, is very important for clean environment
and national security. In the last few decades, ...