This collection includes theses and dissertations from the Department of Computer Engineering and Computer Science, in the J.B. Speed School of Engineering. It is not exhaustive since most paper theses and dissertations have not been digitized. Generally, paper copies of theses and dissertations published prior to 2014 (Master of Engineering, prior to 2005) can be accessed in the University of Louisville Libraries. If you would like to add your thesis or dissertation to this collection, please fill out the Electronic Theses & Dissertations form.
Theses/Dissertations from 2012
3D visualization of in-flight recorded data., Gyuchoon Cho 1975-
Hand gesture recognition using Kinect., Yi Li 1989-
Parallelizing a network intrusion detection system using a GPU., Anju Panicker Madhusoodhanan Sathik 1984-
Embedded non-interactive CAPTCHA for Fischer Random Chess., Ryan McDaniel
A systems-based approach for detecting molecular interactions across tissues., Fahim Mohammad
Role based access control and authentication for SCADA field devices using a dual Bloom filter and challenge-response., Jacob Schreiver
Toward an isomorphic diagram of the Backus-Naur form., Neil A. Smith
Enhanced web-based summary generation for search., Brent Wenerstrom 1980-
Theses/Dissertations from 2011
Stereoscopic vision in vehicle navigation., Behnoush Abdollahi 1986-
A water distribution and treatment simulation for testing cyber security enhancements for water sector SCADA systems., Justin Robert Adams
Unsupervised and semi-supervised clustering with learnable cluster dependent kernels., Ouiem Bchir 1978-
Coronal loop detection from solar images and extraction of salient contour groups from cluttered images., Nurcan Durak
Clustering digital ink content to assist with the grading of student work., Jared Hatfield
Image annotation and retrieval based on multi-modal feature clustering and similarity propagation., Mohamed Maher Ben Ismail 1979-
Using principal component analysis for early fault detection in Louisville water distribution system., Kevin M. Kastensmidt
An implementation of a multi-touch Draw-A-Secret password schema for Windows-based computers., Matthew Lichtenberger
Data center resilience assessment : storage, networking and security., Yehia H. Khalil Mohamed
Image registration and visualization of in situ gene expression images., Ernur Saka
Swarm intelligence for clustering dynamic data sets for web usage mining and personalization., Esin Saka
Click fraud : how to spot it, how to stop it?, Chamila Kumara Walgampaya
Low-time-resolution structures in music and its computer applications., Yindong Yu
Theses/Dissertations from 2010
A generic framework for context-dependent fusion with application to landmine detection., Ahmed Chamseddine Ben Abdallah
Assessment and performance of VSN-INV normalization on the NCI-60 microRNA expression profiles., Martin T. Disibio
Generalized quantifiers in distributed databases., Michael Dobbs
Enhanced cryptographic approaches for SCADA network security., Waleed H. ElSaid
Enhancing reliability with Latin Square redundancy on desktop grids., Nathan Patrick Johnson
Implementation of a Microsoft Windows embedded standard system., Kristopher L. Kumler
Application of temporal difference learning to the game of Snake., Christopher Lockhart
Reduced hyperBF networks : practical optimization, regularization, and applications in bioinformatics., Rami Nezar Mahdi 1982-
Adaptive constrained clustering with application to dynamic image database categorization and visualization., Jason Daron Meredith 1982-
Architecture analysis of peer-to-peer network structure and data exhanges for distribution of contraband material., Nicholas Miles
Generalized multi-stream hidden Markov models., Oualid Missaoui
Dynamic probe positioning within peer-to-peer networks for mining contraband file exchanges., Derek Reese
Features extraction using random matrix theory., Viktoria Borisovna Rojkova
Theses/Dissertations from 2009
Bridging the semantic gap in content-based image retrieval., Joshua David Caudill
Increasing performance of blowfish encryption using CUDA., Joseph Anthony Feist
A hybrid genetic-greedy approach to the skills management problem., Daniel Grieshaber 1986-
Secure messaging with Apple's iPhone., Todd Randal Grooms
An analysis pipeline for the processing, annotation, and dissemination of Expressed Sequence Tags., Joseph P. Morris
Context-dependent fusion with application to landmine detection., Lijun Zhang
Theses/Dissertations from 2008
Computational analysis of expressed sequence tags for understanding gene regulation., I. Elizabeth Cha 1973-
Architecture for intelligent power systems management, optimization, and storage., J. Chris Foreman
Mining and tracking evolving web user trends from very large web server logs., Basheer Hawwash 1984-
Security hardened remote terminal units for SCADA networks., Jeff Hieb
Re-engineering the Enigma cipher., Max Samuel Stoler
Focused image search in the social Web., Zhiyong Zhang
Theses/Dissertations from 2007
Intrusion detection and response model for mobile ad hoc networks., Sathishkumar Alampalayam 1974-
Automatic pure anchor-based taxonomy generation from the world wide web., Joseph Paul Elliott
Monitoring frequent items over distributed data streams., Robert Harrison Fuller 1984-
Cellular automata for dynamic S-boxes in cryptography., William Matthew Luckett
Deploying a secure Windows operating system and applications., Russell Slater Miles 1982-
Selfish node isolation in Mobile Ad-Hoc Networks., Michael Probus
Evaluation of using Swarm intelligence to produce facility layout solutions., Andrew Bao Thai 1984-
Methods for detecting kernel rootkits., Douglas Ray Wampler
YMAGE : a resource for real-time sharing of high resolution digital images., Yetu A. Yachim
Theses/Dissertations from 2006
Multivariate discretization of continuous valued attributes., Ehab Ahmed El Sayed Ahmed 1978-
Advancements in frameworks for educational games through sound software engineering principles., Christy M. Bogard
Mining sequences in distributed sensors data for energy production., John Damon Gant 1977-
Analysis of NMR spectra using digital signal processing techniques., Jason Aaron Gearheart
ARF : an Automated Real-Time Fuzzy Logic Threat Evaluation System., Jeremy D. Gray
Evaluation of MILS and reduced kernel security concepts for SCADA remote terminal units., Brent L. Guffey 1982-
Software based deployment of encryption keys in wireless sensor networks., Timothy William Hnat
Service oriented architecture for real time data fusion., Derek Ray Massey
Computer forensics methodology and praxis., Robin Cincinnatis Morrison 1975-
Mobility-based predictive call admission control and resource reservation for next-generation mobile communications networks., Sherif Said Rashad 1974-
On secure communication in integrated internet and heterogeneous multi-hop wireless networks., Bin Xie 1970-
Theses/Dissertations from 2005
Website optimization, design, and restructuring., Christopher Thomas Gibson
Towards a scalable and efficient data classification technique., Fadi Samih Omar Mehanna
New families of voltage-mode and current-mode filter circuits., Tongfeng Qian
Toward autonomic distributed data mining using intelligent web services., Padmanabhan Ramaswamy 1976-
Theses/Dissertations from 2004
Software integrity management system., Joseph H. Brown 1980-
Anomaly based intrusion detection for network monitoring using a dynamic honeypot., Jeff Hieb
Developing a database for Genbank information., Nathan Mann
Distributed data mining using web services., Vivek Mongolu 1977-
The Java CoG kit grid desktop : a simple and central approach to grid computing using the graphical desktop paradigm., Pankaj R. Sahasrabudhe 1980-
Theses/Dissertations from 1995
Preprocessing of microcirculatory images., Mohamed S. Mansour