Image processing tools to detect human skin in visible band imagery have been well
explored by many organizations, and approaches have been developed for many security
and military applications. Visible cameras are limited ...
The IEEE 802.11 Standard, serves as an access mechanism for multiple stations to exchange data over the wireless medium. This standard made it possible to provide Internet-
based services to untethered stations. With the ...
The Federal Air Marshal Service provides front-line security in homeland defense by protecting civil aviation from potential terrorist attacks. Unique challenges arise in maximizing effective deployment of a limited number ...
During each twelve month fiscal year (FY) cycle weapon system programs across the Department of Defense (DoD) are expected to execute their allocated budgets in an expedient and timely manner. As the FY progresses, a weapon ...
Studies have shown that cyberhate, online harassment, and use of offensive language in social media are on the rise. Use of offensive language, even online, creates an exclusive environment and can even foster real-world ...
Security is increasingly a principal concern that drives the design and construction of modern software systems. Since conventional software security approaches are often manually developed and statically deployed, they ...
In role based access control systems (RBAC) permissions are associated with roles,
and users are made members of appropriate roles thereby acquiring the roles’ permissions.
This greatly simplifies management of permissions. ...
This thesis investigates the effectiveness of formalized collaboration strategies through which patients can be transferred and resources, including staff, equipment and supplies can be shared across hospitals in response ...
This research focuses on an in-depth analysis and investigation of lean construction, specifically the impact of Lean/IPD on project success. It also investigates the influence of owner's choice of project delivery system ...
Every year thousands of students and budding entrepreneurs participate in technical
business plan competitions in over 44 institutions in the US alone. The stakes are high:
over $4 million dollars of prize money and ...
Improving the quality of decisions made by decision-makers is the ultimate goal
of research into decision-making, and the ability to assess the quality of decisions is
central to decision research. The ability to assess ...
Fair comparison of the hardware efficiency of cryptographic algorithms, modeled in
Hardware Description Languages and implemented using FPGAs, is a complex task. The
results of the comparison depend on the inherent ...
Enforcement of policy regulations and availability of auditing mechanisms are crucial building blocks for the adoption of distributed payment systems. In this thesis we provide a series of proposals towards implementing ...
A primary goal for infrared photon detection systems is to increase their operating temperature without sacrificing performance. Auger process is the most significant component that contributes to the dark current. In this ...
In games, training environments, and other virtual simulations, non-player characters (virtual agents) perform actions to interact with the 3-D graphical objects surrounding them to accomplish specified goals. These ...
Visualization of the ocular motor system is an innovative technique to examine the underlying causes of different ocular disorders. Creating three-dimensional (3D) ocular models, including the extraocular muscles and other ...
The rising popularity of Android and the GUI-driven nature of its apps have motivated the need for applicable automated testing techniques. This dissertation describes two automatic techniques for generating inputs for ...
This research details a methodology designed for creating content in support of various phishing prevention tasks including live exercises and detection algorithm research. Our system uses probabilistic context-free grammars ...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and the apps they run warrant novel techniques to explore the behavior of both downloaded and pre-installed apps. ...