Hurricanes and tropical storms represent one of the major hazards in coastal communities. Storm surge generated by strong winds and low pressure from these systems have the potential to bring extensive flooding in coastal ...
Today‟s society greatly depends on the operations of complex infrastructure networks such as transportation, utilities and telecommunication. While traditional modeling tools have provided an insight into the theoretical ...
With the Triple Bottom Line (TBL) of Sustainability, total water management
efforts must analyze alternatives to address the potentially conflicting goals of economics
(financial), environmental, and social issues. Goal ...
Over the last few decades, there has been a large growth in the development of technologies for neuroscience applications. The majority of these technologies rely on the separation of bio-particles and monitoring bioelectrical ...
Advances in sequencing technologies have revolutionized the eld of genomics by providing
cost e ective and high throughput solutions. In this paper, we develop a parallel
sequence assembler implemented on general purpose ...
An electronic nose (e-nose) is a biologically inspired device designed to mimic the operation of the olfactory system. The e-nose utilizes a chemical sensor array consisting of broadly responsive vapor sensors, whose ...
With the exponentially growing smartphone market, more and more people desire to have a multipurpose handheld device that not only supports voice communication and text messaging, but also provides video streaming, multimedia ...
In this dissertation, we introduce a novel approach for secure information sharing
characterized as "Group-Centric". Traditional approaches to information sharing include
"Dissemination-Centric" and "Query-Centric" ...
This thesis describes the research and development of a hardware implementation of the Self Organizing Map (SOM) for a network intrusion detection system. As part of the thesis research, Kohonen’s SOM algorithm was examined ...
Software is prone to contain bugs and vulnerabilities. To protect it, researchers normally
go to a lower layer, such as protecting the applications from the kernel or protecting the
operating systems from the hypervisor, ...
If a quantum computer with a sufficient number of qubits was ever built, it would easily break all current American federal standards in the area of public-key cryptography, including algorithms protecting the majority of ...
Cognitive radio is an emerging technology for sensing and opportunistic spectrum access in wireless communication networks. It allows a secondary user to detect under-utilized spectrum of a primary user and to dynamically ...
Advancement in digital technology has generated a massive amount of data. Large amount of information streaming in from various sources such as phones, tablets, computers and internet has made an immense need to provide a ...
Developing agent behaviors is often a tedious, time-consuming task consisting of repeated code, test, and debug cycles. Despite the difficulties, complex agent behaviors have been developed, but they required significant ...
Multivariate cryptosystems belong to the five most promising families of post-quantum
cryptography (PQC) schemes. Among them, the Unbalanced Oil and Vinegar (UOV) and
the Rainbow signature schemes have been extensively ...
Recovering deleted information from storage drives is a long-standing problem. Prior research has approached information recovery by developing file-carving techniques. However, two issues present significant challenges ...
The development of reliable, portable gas sensors that can detect harmful gases
in real-time with high sensitivity and selectivity, is very important for clean environment
and national security. In the last few decades, ...
The objective of this work is to create a control mechanism for smooth operation of powered wheelchairs through speech recognition and humming detection. Users of wheelchairs are estimated to be about 200 million people ...
This dissertation presents a hybrid filtering method and a case-based reasoning
framework for enhancing the effectiveness of Web search. Web search may not reflect
user needs, intent, context, and preferences, because ...
Coal Combustion Products (CCPs) also known as coal ash/residues are generated when coal is burnt to generate electricity or steam. CCPs include fly ash, bottom ash, flue gas desulfurization (FGD) materials (FGD solids, FGD ...