This dissertation investigates the environmental perception of autonomous underwater robots. Autonomous underwater robots have received increasing attention among scientific and engineering societies for their superior ...
Fog computing is a relatively new distributed computing paradigm that extends cloud computing capabilities to the edge of the network. Fog servers act as an intermediate layer between end-user devices and cloud datacenters. ...
Cloud computing technology has significantly changed the computing diagram. Ever since Amazon Web Service (AWS) began offering IT infrastructure services in 2006, cloud computing technology keeps maturing, developing, and ...
The term Advanced Persistent Threats (APTs) refers both to highly-sophisticated, often nation-state attackers with tremendous resources and to the malware they employ to compromise their target – to which no organization ...
Making decisions over multivariate time series is an important topic which has gained significant interest in the past decade. A time series is a sequence of data points which are measured and ordered over uniform time ...
Ontology mediation is the process of establishing a common ground for interoperability
between domain ontologies. Ontology mapping is the task of identifying concept and
attribute correspondences between ...
Key challenges that confront the Information and Communication Technology (ICT) industry today in defining and achieving social, environmental, and economic sustainability goals include identifying sustainable operating ...
Throughout the world, 8.74 billion Internet of Things (IoT) devices have been deployed,
ranging from household thermostats to sensors in remote areas. However, these IoT devices
are resource-constrained, not only in ...
Given the deluge of data caused by crowd generated content from social media websites,
the complexity of extracting information from has increased manifold. An important
characteristic of such text is its original location ...
An Air Force evaluation of Multics, and Ken Thompson’s Turing award lecture (“Reflections on Trusting Trust”), showed that compilers can be subverted to insert malicious Trojan horses into critical software, including ...
Gallium oxide has recently emerged as a promising semiconductor material for high voltage switch applications owing to its ultra-wide band gap of ~4.8 eV and the corresponding expected critical field strength of ~8MV/cm. ...
This thesis describes a method for efficient summarization of long surveillance videos.
The method consists of four phases: ground plane calibration, detection and tracking of
scene objects, extracting information about ...
In software engineering, behavioral models such as finite state machines (FSMs) are used to represent key system behaviors. To evaluate the system behaviors, testers need to generate tests from the models and run the tests ...
Hurricanes and tropical storms represent one of the major hazards in coastal communities. Storm surge generated by strong winds and low pressure from these systems have the potential to bring extensive flooding in coastal ...
Today‟s society greatly depends on the operations of complex infrastructure networks such as transportation, utilities and telecommunication. While traditional modeling tools have provided an insight into the theoretical ...
With the Triple Bottom Line (TBL) of Sustainability, total water management
efforts must analyze alternatives to address the potentially conflicting goals of economics
(financial), environmental, and social issues. Goal ...
Over the last few decades, there has been a large growth in the development of technologies for neuroscience applications. The majority of these technologies rely on the separation of bio-particles and monitoring bioelectrical ...
The distributed manufacturing supply chain of Integrated Circuits (IC) introduces many
vulnerabilities during IC's life cycle. An adversary in an untrusted foundry can exploit these
weaknesses to design malicious hardware ...
The distributed manufacturing supply chain of Integrated Circuits (IC) introduces many vulnerabilities during IC's life cycle. An adversary in an untrusted foundry can exploit these weaknesses to design malicious hardware ...
Advances in sequencing technologies have revolutionized the eld of genomics by providing
cost e ective and high throughput solutions. In this paper, we develop a parallel
sequence assembler implemented on general purpose ...