Computer Science and Engineering, Department of
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
1) it is optional, not required (the ProQuest deposit is required); and
2) it will be available to everyone online; there is no embargo for dissertations in the UNL Digital Commons.
Master's candidates: Deposit of your thesis or project is required. (If an embargo [restricted access] is necessary, you may deposit it at http://digitalcommons.unl.edu/embargotheses/ only after getting approval from your department and the Graduate Office; contact Terri Eastin).
TO DEPOSIT YOUR DISSERTATION OR THESIS
1. Create or log in to your Digital Commons account
To create an account: click on My Account at http://digitalcommons.unl.edu then Sign up.
Fill in your names, email address, create a password, and click on Create Account.
Reply to the confirming email from the system, if you get one (check your spam folder).
Your email address will not be published or shared.
2. Find the right series to deposit in
Go to the correct series in the UNL Digital Commons [series links are in the file linked here].
On the correct series page, click the Submit your paper or article link at the bottom of the gray box at left.
3. Instructions for deposit
You should be able to copy (Ctrl-C) and paste (Ctrl-V) most fields.
TITLE: Fill it in using title case (that is, capitals for the first letter of all words except articles and prepositions).
AUTHOR: In each respective box, enter your names (and/or initials) as they appear on the title page of your dissertation or thesis. You are the sole author; your advisor is not considered a co-author. Institution is University of Nebraska-Lincoln (not "at Lincoln" or ", Lincoln"). Do not leave this field blank.
FIRST ADVISOR: Enter your advisor’s name. Add a second and third, if needed (advisors only, not committee members).
DATE OF THIS VERSION: Month and Year only.
CITATION: Copy and paste the rest of whatever appears on the title page of your work. It usually starts with something like “A THESIS Presented to the Faculty …” and ends with “Lincoln, Nebraska [month] [year].”
ABSTRACT: Just include the body of the abstract, not the title or your name, but DO add your advisor’s name at the end of the abstract after the word Advisor and a colon, like this: Advisor: ….
Skip the ORCID IDs, Keywords, Disciplines, and Comments fields, and DO NOT check a bubble for the Publication Status field.
Click UPLOAD FILE FROM YOUR COMPUTER. Select the file of your work from your device (should be in Portable Document Format, PDF).
Click the SUBMIT button at the bottom.
YOU DID IT; your work is submitted!
CONGRATULATIONS on reaching this amazing milestone in your academic career!
4. After your initial deposit
Upon deposit, you will receive an email that your submission has been received; you need to show the Graduate Office this message.
Before we complete your upload, we usually wait a day or two to give you an opportunity to correct those oops issues that seem to emerge just after deposit. Before it’s been posted, you can still log back in and select Revise and upload a new version so you can upload a version with your advisor's name spelled right or whatever else needs to be fixed.
It is important that you DO NOT resubmit another file after it’s been posted online. This causes lots of problems.
But have no fear: If further changes are needed after it’s been posted, you can send a revised file to the series administrator (Sue Gardner) requesting to replace it.
2017
Deep Learning and Transfer Learning in the Classification of EEG Signals, Jacob M. Williams
Querying and Visualization of Moving Objects Using Constraint Databases, Semere M. Woldemariam
Study of comparison of OCS and Hybrid switching in FSO data centers, Suraj Yadav
Feature Extraction and Parallel Visualization for Large-Scale Scientific Data, Lina Yu
2016
Autonomous UAVs for Near Earth Environmental Sensing, David J. Anthony
TOWARDS BUILDING AN INTELLIGENT INTEGRATED MULTI-MODE TIME DIARY SURVEY FRAMEWORK, Hariharan Arunachalam
Determination of Plant Architecture and Component Phenotyping Based on Time-lapse Image Analysis, Srinidhi Bashyam
Using Software Testing Techniques to Infer Biological Models, Mikaela Cashman
A ROADMAP TO SAFE AND RELIABLE ENGINEERED BIOLOGICAL NANO-COMMUNICATION NETWORKS, Justin W. Firestone
Why Do Record/Replay Tests of Web Applications Break?, Mouna Hammoudi
A New System for Human MicroRNA functional Evaluation and Network, Jiachun Han
SEMEO: A SEMANTIC EQUIVALENCE ANALYSIS FRAMEWORK FOR OBFUSCATED ANDROID APPLICATIONS, Zhen Hu
Towards building a review recommendation system that trains novices by leveraging the actions of experts, Shilpa Khanal
Exploring Dynamic Memory Allocations for Bioinformatics Applications, Nitya Kovur
Finding DNA Motifs: A Probabilistic Suffix Tree Approach, Abhishek Majumdar
Sonifying Git History, Kevin J. North
OPTIMIZATION OF IRRIGATION DECISION IN CORNSOYWATER, Dharmic Payyala
TESTING THE INDEPENDENCE HYPOTHESIS OF ACCEPTED MUTATIONS FOR PAIRS OF ADJACENT AMINO ACIDS IN PROTEIN SEQUENCES, Jyotsna Ramanan
On Path Consistency for Binary Constraint Satisfaction Problems, Christopher G. Reeson
USE OF CLUSTERING TECHNIQUES FOR PROTEIN DOMAIN ANALYSIS, Eric Rodene
The Effect of Frequency Resolution on Intelligibility Sentence and its Relevance to Cochlear Implant Design, Seth H. Roy
EventFlowSlicer: A Goal-based Test Case Generation Strategy for Graphical User Interfaces, Jonathan Saddler
Characterization of Molecular Communication Based on Cell Metabolism Through Mutual Information and Flux Balance Analysis, Zahmeeth Sayed Sakkaff
Significant Permission Identification for Android Malware Detection, Lichao Sun
Power Management in Heterogeneous MapReduce Cluster, Rojee Sunuwar
ACTIVITY ANALYSIS OF SPECTATOR PERFORMER VIDEOS USING MOTION TRAJECTORIES, Anish Timsina
Improving the Efficiency of CI with Uber-commits, Matias Waterloo
ON OPTIMIZATIONS OF VIRTUAL MACHINE LIVE STORAGE MIGRATION FOR THE CLOUD, Yaodong Yang
Joint Resource Provisioning in Optical Cloud Networks, Pan Yi
SECURE AND LIGHTWEIGHT HARDWARE AUTHENTICATION USING ISOLATED PHYSICAL UNCLONABLE FUNCTION, Mehrdad Zaker Shahrak
Rectilinear Steiner Tree Construction, Zhiliu Zhang
AN EXTENDABLE VISUALIZATION AND USER INTERFACE DESIGN FOR TIME-VARYING MULTIVARIATE GEOSCIENCE DATA, Yanfu Zhou
2015
Dynamic Data Management In A Data Grid Environment, Björn Barrefors
A Visual Analysis of Articulated Motion Complexity Based on Optical Flow and Spatial-Temporal Features, Beau Michael Christ
Reflective, Deliberative Agent-Based Information Gathering, Adam D. Eck
Routing Optimization in Interplanetary Networks, Sara El Alaoui
REMOTE MOBILE SCREEN (RMS): AN APPROACH FOR SECURE BYOD ENVIRONMENTS, Santiago Manuel Gimenez Ocano
Model-Based Condition Monitoring and Power Management for Rechargeable Electrochemical Batteries, Taesic Kim
Using Software-Defined Networking to Improve Campus, Transport and Future Internet Architectures, Adrian Lara
Discovery Over Application: A Case Study of Misaligned Incentives in Software Engineering, Eric F. Rizzi
Transforming C OpenMP Programs for Verification in CIVL, Michael Rogers
On Problematic Robotic Thresholds, Adam K. Taylor
Enabling Distributed Scientific Computing on the Campus, Derek J. Weitzel
Visual Analytics for Large Communication Trace Data, Jieting Wu
Bandwidth Estimation for Virtual Networks, Ertong Zhang
2014
A COMPARATIVE STUDY OF GENERALIZED ARC-CONSISTENCY ALGORITHMS, Olufikayo S. Adetunji
A COMPARATIVE STUDY OF UNDERWATER ROBOT PATH PLANNING ALGORITHMS FOR ADAPTIVE SAMPLING IN A NETWORK OF SENSORS, Sreeja Banerjee
DECAF: A New Event Detection Logic For The Purpose Of Fusing Delineated-Continuous Spatial Information, Kerry Q. Hart
DNN: A Distributed NameNode Filesystem for Hadoop, Ziling Huang
INVARIANT INFERRING AND MONITORING IN ROBOTIC SYSTEMS, Hengle Jiang
IMPROVING PREFERENCE RECOMMENDATION AND CUSTOMIZATION IN REAL WORLD HIGHLY CONFIGURABLE SOFTWARE SYSTEMS, Dongpu Jin
Using a UAV to Effectively Prolong Wireless Sensor Network Lifetime with Wireless Power Transfer, Jinfu Leng
ANALYSIS, OPTIMIZATION, AND IMPLEMENTATION OF A UAV-BASED WIRELESS POWER TRANSFER SYSTEM, Andrew Mittleider
A New Spatio-Temporal Data Mining Method and its Application to Reservoir System Operation, Abhinaya Mohan
Autonomous Aerial Water Sampling, John-Paul W. Ore
Measuring Autonomy And Solving General Stabilization Problems With Multi-Agent Systems, Rasheed A. Rajabzadeh
A Self-Adaptive Framework for Failure Avoidance in Configurable Software, Jacob Swanson
POWER MANAGEMENT IN THE CLUSTER SYSTEM, Leping Wang
SimExplorer: A Testing Framework to Detect Elusive Software Faults, Tingting Yu
A Methodology and Tool for Concurrent Fault Injection, ZhongYin Zhang
2013
Understanding Human Learning Using a Multiagent Based Unified Learning Model Simulation, Vlad T. Chiriacescu
Decentralized Collision Avoidance, Jayasri K. Janardanan
Online Ecosystems in Software Development, Corey J. Jergensen
Practical Tractability of CSPS by Higher Level Consistency and Tree Decomposition, Shant Karakashian
Improving Virtual Collaboration: Modeling for Recommendation Systems in a Classroom Wiki Environment, Derrick A. Lam
Discovering Divergence: A Framework for Finding Unexpected Behavior Using Directed Exploration, Heath G. Roehr
FastLane: Flow-Based Channel Assignment in Dense Wireless Networks, Dane N. Seaberg
Clustering and Classification of Multi-domain Proteins, Neethu Shah
Algorithms for Grid Graphs in the MapReduce Model, Taylor P. Spangler
Solving the Search for Source Code, Kathryn T. Stolee
User Modeling via Machine Learning and Rule-Based Reasoning to Understand and Predict Errors in Survey Systems, Leonard Cleve Stuart
Test Advising Framework, Yurong Wang
Energy-efficient Failure Recovery in Hadoop Cluster, Weiyue Xu
Directed Test Suite Augmentation, Zhihong Xu
Automated Test Case Generation to Validate Non-functional Software Requirements, Pingyu Zhang
2012
Data Mining of Protein Databases, Christopher Assi
SIMULATION, DEVELOPMENT AND DEPLOYMENT OF MOBILE WIRELESS SENSOR NETWORKS FOR MIGRATORY BIRD TRACKING, William P. Bennett Jr
Statistical Software Properties: Definition, Inference and Monitoring, Javier A. Darsie
Improving Performance of Solid State Drives in Enterprise Environment, Jian Hu
A WLAN Fingerprinting Based Indoor Localization Technique, Landu Jiang
Dynamic Data Race Detection and Healing, Du Li
Modeling of Yeast Pheromone Pathway using Petri Nets, Abhishek Majumdar
Improving Backup and Restore Performance for Deduplication-based Cloud Backup Services, Stephen Mkandawire
Routing over the Interplanetary Internet, Joyeeta Mukherjee
On heterogeneous user demands in peer-to-peer video streaming systems, Zhipeng Ouyang
AUTOMATION OF LANDMARK SELECTION FOR RODENT BRAIN MRI-HISTOLOGY REGISTRATION USING THIN-PLATE SPLINES, Ayan Sengupta
Identification of TCP Protocols, Juan Shao
A Unifying Approach to Behavioral Coverage, Elena Sherman
AN ENHANCED SELF-ADAPTIVE MAPREDUCE SCHEDULING ALGORITHM, Xiaoyu Sun
CogTool-Helper: Leveraging GUI Functional Testing Tools to Generate Predictive Human Performance Models, Amanda Swearngin
Supporting developer-onboarding with enhanced resource finding and visual exploration, Jianguo Wang
Probabilistic QoS Analysis in Wireless Sensor Networks, Yunbo Wang
Spatiotemporal Capacity Management for the Last Level Caches of Chip Multiprocessors, Dongyuan Zhan
2011
OFFLINE OPTIMIZATION OF ADVANCE RESERVATION OF BANDWIDTH OVER DYNAMIC CIRCUIT NETWORKS, Pragatheeswaran Angu
Protein Structure – Based Method for Identification of Horizontal Gene Transfer in Bacteria, Swetha Billa
MOLECULAR DYNAMICS SIMULATION BASED ON HADOOP MAPREDUCE, Chen He
Polygonal Spatial Clustering, Deepti Joshi
MULTIAGENT COALITION FORMATION IN UNCERTAIN ENVIRONMENTS WITH TYPE-CHANGING INFLUENCES AND ITS APPLICATION TOWARDS FORMING HUMAN COALITIONS, Nobel A. Khandaker
Distributed Algorithms for Energy Savings in the Core Network, Lin Liu
REAL-TIME DIVISIBLE LOAD SCHEDULING FOR CLUSTER COMPUTING, Anwar Mamat