Gallium oxide has recently emerged as a promising semiconductor material for high voltage switch applications owing to its ultra-wide band gap of ~4.8 eV and the corresponding expected critical field strength of ~8MV/cm. ...
This thesis describes a method for efficient summarization of long surveillance videos.
The method consists of four phases: ground plane calibration, detection and tracking of
scene objects, extracting information about ...
In software engineering, behavioral models such as finite state machines (FSMs) are used to represent key system behaviors. To evaluate the system behaviors, testers need to generate tests from the models and run the tests ...
Hurricanes and tropical storms represent one of the major hazards in coastal communities. Storm surge generated by strong winds and low pressure from these systems have the potential to bring extensive flooding in coastal ...
Today‟s society greatly depends on the operations of complex infrastructure networks such as transportation, utilities and telecommunication. While traditional modeling tools have provided an insight into the theoretical ...
With the Triple Bottom Line (TBL) of Sustainability, total water management
efforts must analyze alternatives to address the potentially conflicting goals of economics
(financial), environmental, and social issues. Goal ...
Over the last few decades, there has been a large growth in the development of technologies for neuroscience applications. The majority of these technologies rely on the separation of bio-particles and monitoring bioelectrical ...
The distributed manufacturing supply chain of Integrated Circuits (IC) introduces many
vulnerabilities during IC's life cycle. An adversary in an untrusted foundry can exploit these
weaknesses to design malicious hardware ...
The distributed manufacturing supply chain of Integrated Circuits (IC) introduces many vulnerabilities during IC's life cycle. An adversary in an untrusted foundry can exploit these weaknesses to design malicious hardware ...
Advances in sequencing technologies have revolutionized the eld of genomics by providing
cost e ective and high throughput solutions. In this paper, we develop a parallel
sequence assembler implemented on general purpose ...
An electronic nose (e-nose) is a biologically inspired device designed to mimic the operation of the olfactory system. The e-nose utilizes a chemical sensor array consisting of broadly responsive vapor sensors, whose ...
With the exponentially growing smartphone market, more and more people desire to have a multipurpose handheld device that not only supports voice communication and text messaging, but also provides video streaming, multimedia ...
Decision guidance (DG) analytics systems are a class of decision support systems that are designed to provide decision-makers with actionable recommendations---courses of action that, if taken, would lead to optimized ...
In this dissertation, we introduce a novel approach for secure information sharing
characterized as "Group-Centric". Traditional approaches to information sharing include
"Dissemination-Centric" and "Query-Centric" ...
Randomized controlled trials (RCTs) serve as the gold standard in researching and developing new therapeutics. A new treatment’s effectiveness is evaluated by comparing it to existing or standard treatment in an RCT. ...
This thesis describes the research and development of a hardware implementation of the Self Organizing Map (SOM) for a network intrusion detection system. As part of the thesis research, Kohonen’s SOM algorithm was examined ...
Software is prone to contain bugs and vulnerabilities. To protect it, researchers normally
go to a lower layer, such as protecting the applications from the kernel or protecting the
operating systems from the hypervisor, ...
If a quantum computer with a sufficient number of qubits was ever built, it would easily break all current American federal standards in the area of public-key cryptography, including algorithms protecting the majority of ...
Cognitive radio is an emerging technology for sensing and opportunistic spectrum access in wireless communication networks. It allows a secondary user to detect under-utilized spectrum of a primary user and to dynamically ...
Advancement in digital technology has generated a massive amount of data. Large amount of information streaming in from various sources such as phones, tablets, computers and internet has made an immense need to provide a ...