Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Arkansas" +contributor:("Qinghua Li"). Showing records 1 – 13 of 13 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Arkansas

1. Wu, Yongkai. Achieving Causal Fairness in Machine Learning.

Degree: PhD, 2020, University of Arkansas

  Fairness is a social norm and a legal requirement in today's society. Many laws and regulations (e.g., the Equal Credit Opportunity Act of 1974)… (more)

Subjects/Keywords: Algorithmic Bias; Causal Inference; Fairness; Machine Learning; Artificial Intelligence and Robotics; Theory and Algorithms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, Y. (2020). Achieving Causal Fairness in Machine Learning. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/3632

Chicago Manual of Style (16th Edition):

Wu, Yongkai. “Achieving Causal Fairness in Machine Learning.” 2020. Doctoral Dissertation, University of Arkansas. Accessed October 25, 2020. https://scholarworks.uark.edu/etd/3632.

MLA Handbook (7th Edition):

Wu, Yongkai. “Achieving Causal Fairness in Machine Learning.” 2020. Web. 25 Oct 2020.

Vancouver:

Wu Y. Achieving Causal Fairness in Machine Learning. [Internet] [Doctoral dissertation]. University of Arkansas; 2020. [cited 2020 Oct 25]. Available from: https://scholarworks.uark.edu/etd/3632.

Council of Science Editors:

Wu Y. Achieving Causal Fairness in Machine Learning. [Doctoral Dissertation]. University of Arkansas; 2020. Available from: https://scholarworks.uark.edu/etd/3632


University of Arkansas

2. Zheng, Panpan. Dynamic Fraud Detection via Sequential Modeling.

Degree: PhD, 2020, University of Arkansas

  The impacts of information revolution are omnipresent from life to work. The web services have signicantly changed our living styles in daily life, such… (more)

Subjects/Keywords: Dirichlet process; Fraud Detection; Machine Learning; Mixture Model; Sequential Model; Survival Analysis; Databases and Information Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zheng, P. (2020). Dynamic Fraud Detection via Sequential Modeling. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/3633

Chicago Manual of Style (16th Edition):

Zheng, Panpan. “Dynamic Fraud Detection via Sequential Modeling.” 2020. Doctoral Dissertation, University of Arkansas. Accessed October 25, 2020. https://scholarworks.uark.edu/etd/3633.

MLA Handbook (7th Edition):

Zheng, Panpan. “Dynamic Fraud Detection via Sequential Modeling.” 2020. Web. 25 Oct 2020.

Vancouver:

Zheng P. Dynamic Fraud Detection via Sequential Modeling. [Internet] [Doctoral dissertation]. University of Arkansas; 2020. [cited 2020 Oct 25]. Available from: https://scholarworks.uark.edu/etd/3633.

Council of Science Editors:

Zheng P. Dynamic Fraud Detection via Sequential Modeling. [Doctoral Dissertation]. University of Arkansas; 2020. Available from: https://scholarworks.uark.edu/etd/3633


University of Arkansas

3. Shahriar, Md Rakib. Towards a Cyber-Physical Manufacturing Cloud through Operable Digital Twins and Virtual Production Lines.

Degree: PhD, 2020, University of Arkansas

  In last decade, the paradigm of Cyber-Physical Systems (CPS) has integrated industrial manufacturing systems with Cloud Computing technologies for Cloud Manufacturing. Up to 2015,… (more)

Subjects/Keywords: Cloud Computing; Cyber-Manufacturing; Cyber-Physical Manufacturing Cloud; Digital Twins; Service Computing; Virtual Production Lines; Electro-Mechanical Systems; Industrial Technology; Systems Architecture; Systems Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shahriar, M. R. (2020). Towards a Cyber-Physical Manufacturing Cloud through Operable Digital Twins and Virtual Production Lines. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/3739

Chicago Manual of Style (16th Edition):

Shahriar, Md Rakib. “Towards a Cyber-Physical Manufacturing Cloud through Operable Digital Twins and Virtual Production Lines.” 2020. Doctoral Dissertation, University of Arkansas. Accessed October 25, 2020. https://scholarworks.uark.edu/etd/3739.

MLA Handbook (7th Edition):

Shahriar, Md Rakib. “Towards a Cyber-Physical Manufacturing Cloud through Operable Digital Twins and Virtual Production Lines.” 2020. Web. 25 Oct 2020.

Vancouver:

Shahriar MR. Towards a Cyber-Physical Manufacturing Cloud through Operable Digital Twins and Virtual Production Lines. [Internet] [Doctoral dissertation]. University of Arkansas; 2020. [cited 2020 Oct 25]. Available from: https://scholarworks.uark.edu/etd/3739.

Council of Science Editors:

Shahriar MR. Towards a Cyber-Physical Manufacturing Cloud through Operable Digital Twins and Virtual Production Lines. [Doctoral Dissertation]. University of Arkansas; 2020. Available from: https://scholarworks.uark.edu/etd/3739


University of Arkansas

4. Chiariglione, Marion Pauline. Shakespeare in the Eighteenth Century: Algorithm for Quotation Identification.

Degree: MS, 2020, University of Arkansas

  Quoting a borrowed excerpt of text within another literary work was infrequently done prior to the beginning of the eighteenth century. However, quoting other… (more)

Subjects/Keywords: Edit Distance; Information Retrieval; Quote Identification; String matching; Numerical Analysis and Scientific Computing; Theory and Algorithms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chiariglione, M. P. (2020). Shakespeare in the Eighteenth Century: Algorithm for Quotation Identification. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/3580

Chicago Manual of Style (16th Edition):

Chiariglione, Marion Pauline. “Shakespeare in the Eighteenth Century: Algorithm for Quotation Identification.” 2020. Masters Thesis, University of Arkansas. Accessed October 25, 2020. https://scholarworks.uark.edu/etd/3580.

MLA Handbook (7th Edition):

Chiariglione, Marion Pauline. “Shakespeare in the Eighteenth Century: Algorithm for Quotation Identification.” 2020. Web. 25 Oct 2020.

Vancouver:

Chiariglione MP. Shakespeare in the Eighteenth Century: Algorithm for Quotation Identification. [Internet] [Masters thesis]. University of Arkansas; 2020. [cited 2020 Oct 25]. Available from: https://scholarworks.uark.edu/etd/3580.

Council of Science Editors:

Chiariglione MP. Shakespeare in the Eighteenth Century: Algorithm for Quotation Identification. [Masters Thesis]. University of Arkansas; 2020. Available from: https://scholarworks.uark.edu/etd/3580


University of Arkansas

5. Li, Ang. Privacy-Preserving Photo Taking and Accessing for Mobile Phones.

Degree: PhD, 2018, University of Arkansas

  Today, we are living in environments that are full of cameras embedded in devices such as smart phones and wearables. These mobile devices and… (more)

Subjects/Keywords: Mobile Phone; Photo; Privacy; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, A. (2018). Privacy-Preserving Photo Taking and Accessing for Mobile Phones. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2915

Chicago Manual of Style (16th Edition):

Li, Ang. “Privacy-Preserving Photo Taking and Accessing for Mobile Phones.” 2018. Doctoral Dissertation, University of Arkansas. Accessed October 25, 2020. https://scholarworks.uark.edu/etd/2915.

MLA Handbook (7th Edition):

Li, Ang. “Privacy-Preserving Photo Taking and Accessing for Mobile Phones.” 2018. Web. 25 Oct 2020.

Vancouver:

Li A. Privacy-Preserving Photo Taking and Accessing for Mobile Phones. [Internet] [Doctoral dissertation]. University of Arkansas; 2018. [cited 2020 Oct 25]. Available from: https://scholarworks.uark.edu/etd/2915.

Council of Science Editors:

Li A. Privacy-Preserving Photo Taking and Accessing for Mobile Phones. [Doctoral Dissertation]. University of Arkansas; 2018. Available from: https://scholarworks.uark.edu/etd/2915


University of Arkansas

6. Akingeneye, Israel Zairi. Low Latency Intrusion Detection in Smart Grids.

Degree: PhD, 2018, University of Arkansas

  The transformation of traditional power grids into smart grids has seen more new technologies such as communication networks and smart meters (sensors) being integrated… (more)

Subjects/Keywords: Cybersecurity; Low Latency Detection; Power System; Smart Grid; Information Security; VLSI and Circuits, Embedded and Hardware Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Akingeneye, I. Z. (2018). Low Latency Intrusion Detection in Smart Grids. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2740

Chicago Manual of Style (16th Edition):

Akingeneye, Israel Zairi. “Low Latency Intrusion Detection in Smart Grids.” 2018. Doctoral Dissertation, University of Arkansas. Accessed October 25, 2020. https://scholarworks.uark.edu/etd/2740.

MLA Handbook (7th Edition):

Akingeneye, Israel Zairi. “Low Latency Intrusion Detection in Smart Grids.” 2018. Web. 25 Oct 2020.

Vancouver:

Akingeneye IZ. Low Latency Intrusion Detection in Smart Grids. [Internet] [Doctoral dissertation]. University of Arkansas; 2018. [cited 2020 Oct 25]. Available from: https://scholarworks.uark.edu/etd/2740.

Council of Science Editors:

Akingeneye IZ. Low Latency Intrusion Detection in Smart Grids. [Doctoral Dissertation]. University of Arkansas; 2018. Available from: https://scholarworks.uark.edu/etd/2740


University of Arkansas

7. Bipasha, Tarana Tasmin. Extracting Social Network from Literary Prose.

Degree: MS, 2019, University of Arkansas

  This thesis develops an approach to extract social networks from literary prose, namely, Jane Austen’s published novels from eighteenth- and nineteenth- century. Dialogue interaction… (more)

Subjects/Keywords: Graph Matching; Graph Similarity; NLP; Social network; Social network analysis; Databases and Information Systems; Digital Communications and Networking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bipasha, T. T. (2019). Extracting Social Network from Literary Prose. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/3415

Chicago Manual of Style (16th Edition):

Bipasha, Tarana Tasmin. “Extracting Social Network from Literary Prose.” 2019. Masters Thesis, University of Arkansas. Accessed October 25, 2020. https://scholarworks.uark.edu/etd/3415.

MLA Handbook (7th Edition):

Bipasha, Tarana Tasmin. “Extracting Social Network from Literary Prose.” 2019. Web. 25 Oct 2020.

Vancouver:

Bipasha TT. Extracting Social Network from Literary Prose. [Internet] [Masters thesis]. University of Arkansas; 2019. [cited 2020 Oct 25]. Available from: https://scholarworks.uark.edu/etd/3415.

Council of Science Editors:

Bipasha TT. Extracting Social Network from Literary Prose. [Masters Thesis]. University of Arkansas; 2019. Available from: https://scholarworks.uark.edu/etd/3415


University of Arkansas

8. Katla, Srinidhi. DPWeka: Achieving Differential Privacy in WEKA.

Degree: MS, 2017, University of Arkansas

  Organizations belonging to the government, commercial, and non-profit industries collect and store large amounts of sensitive data, which include medical, financial, and personal information.… (more)

Subjects/Keywords: Pure sciences; Communication and the arts; Applied sciences; Data mining; Data privacy; Differential privacy; Databases and Information Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Katla, S. (2017). DPWeka: Achieving Differential Privacy in WEKA. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/1934

Chicago Manual of Style (16th Edition):

Katla, Srinidhi. “DPWeka: Achieving Differential Privacy in WEKA.” 2017. Masters Thesis, University of Arkansas. Accessed October 25, 2020. https://scholarworks.uark.edu/etd/1934.

MLA Handbook (7th Edition):

Katla, Srinidhi. “DPWeka: Achieving Differential Privacy in WEKA.” 2017. Web. 25 Oct 2020.

Vancouver:

Katla S. DPWeka: Achieving Differential Privacy in WEKA. [Internet] [Masters thesis]. University of Arkansas; 2017. [cited 2020 Oct 25]. Available from: https://scholarworks.uark.edu/etd/1934.

Council of Science Editors:

Katla S. DPWeka: Achieving Differential Privacy in WEKA. [Masters Thesis]. University of Arkansas; 2017. Available from: https://scholarworks.uark.edu/etd/1934


University of Arkansas

9. Ordorica, Adrian. Operating System Identification by IPv6 Communication using Machine Learning Ensembles.

Degree: MS, 2017, University of Arkansas

  Operating system (OS) identification tools, sometimes called fingerprinting tools, are essential for the reconnaissance phase of penetration testing. While OS identification is traditionally performed… (more)

Subjects/Keywords: Decision Trees; Internet Protocol Version 6 (IPV6); Machine Learning; Neural Networks; Operating System Identification; Random Forests; Digital Communications and Networking; OS and Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ordorica, A. (2017). Operating System Identification by IPv6 Communication using Machine Learning Ensembles. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2413

Chicago Manual of Style (16th Edition):

Ordorica, Adrian. “Operating System Identification by IPv6 Communication using Machine Learning Ensembles.” 2017. Masters Thesis, University of Arkansas. Accessed October 25, 2020. https://scholarworks.uark.edu/etd/2413.

MLA Handbook (7th Edition):

Ordorica, Adrian. “Operating System Identification by IPv6 Communication using Machine Learning Ensembles.” 2017. Web. 25 Oct 2020.

Vancouver:

Ordorica A. Operating System Identification by IPv6 Communication using Machine Learning Ensembles. [Internet] [Masters thesis]. University of Arkansas; 2017. [cited 2020 Oct 25]. Available from: https://scholarworks.uark.edu/etd/2413.

Council of Science Editors:

Ordorica A. Operating System Identification by IPv6 Communication using Machine Learning Ensembles. [Masters Thesis]. University of Arkansas; 2017. Available from: https://scholarworks.uark.edu/etd/2413


University of Arkansas

10. Nugroho, Amin Rois Sinung. Exploring Privacy Leakage from the Resource Usage Patterns of Mobile Apps.

Degree: MS, 2016, University of Arkansas

  Due to the popularity of smart phones and mobile apps, a potential privacy risk with the usage of mobile apps is that, from the… (more)

Subjects/Keywords: Applied sciences; CPU usage; Cloud; Machine learning; Mobile; Mobile app; Privacy; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nugroho, A. R. S. (2016). Exploring Privacy Leakage from the Resource Usage Patterns of Mobile Apps. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/1599

Chicago Manual of Style (16th Edition):

Nugroho, Amin Rois Sinung. “Exploring Privacy Leakage from the Resource Usage Patterns of Mobile Apps.” 2016. Masters Thesis, University of Arkansas. Accessed October 25, 2020. https://scholarworks.uark.edu/etd/1599.

MLA Handbook (7th Edition):

Nugroho, Amin Rois Sinung. “Exploring Privacy Leakage from the Resource Usage Patterns of Mobile Apps.” 2016. Web. 25 Oct 2020.

Vancouver:

Nugroho ARS. Exploring Privacy Leakage from the Resource Usage Patterns of Mobile Apps. [Internet] [Masters thesis]. University of Arkansas; 2016. [cited 2020 Oct 25]. Available from: https://scholarworks.uark.edu/etd/1599.

Council of Science Editors:

Nugroho ARS. Exploring Privacy Leakage from the Resource Usage Patterns of Mobile Apps. [Masters Thesis]. University of Arkansas; 2016. Available from: https://scholarworks.uark.edu/etd/1599


University of Arkansas

11. Mead, Joshua. Prevention of Drone Jamming Using Hardware Sandboxing.

Degree: MSCmpE, 2016, University of Arkansas

  In this thesis, we concern ourselves with the security of drone systems under jamming-based attacks. We explore a relatively new concept we previously devised,… (more)

Subjects/Keywords: Drone Security; FPGA Development; Hardware Sandboxing; RF Jamming; Hardware Systems; VLSI and Circuits, Embedded and Hardware Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mead, J. (2016). Prevention of Drone Jamming Using Hardware Sandboxing. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2643

Chicago Manual of Style (16th Edition):

Mead, Joshua. “Prevention of Drone Jamming Using Hardware Sandboxing.” 2016. Masters Thesis, University of Arkansas. Accessed October 25, 2020. https://scholarworks.uark.edu/etd/2643.

MLA Handbook (7th Edition):

Mead, Joshua. “Prevention of Drone Jamming Using Hardware Sandboxing.” 2016. Web. 25 Oct 2020.

Vancouver:

Mead J. Prevention of Drone Jamming Using Hardware Sandboxing. [Internet] [Masters thesis]. University of Arkansas; 2016. [cited 2020 Oct 25]. Available from: https://scholarworks.uark.edu/etd/2643.

Council of Science Editors:

Mead J. Prevention of Drone Jamming Using Hardware Sandboxing. [Masters Thesis]. University of Arkansas; 2016. Available from: https://scholarworks.uark.edu/etd/2643


University of Arkansas

12. Pan, Qiuping. Bayesian Network Modeling and Inference of GWAS Catalog.

Degree: MS, 2018, University of Arkansas

  Genome-wide association studies (GWASs) have received an increasing attention to understand genotype-phenotype relationships. The Bayesian network has been proposed as a powerful tool for… (more)

Subjects/Keywords: Bayesian Network; GWAS; GWAS Catalog; STIP; Bioinformatics; Genomics; OS and Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pan, Q. (2018). Bayesian Network Modeling and Inference of GWAS Catalog. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2709

Chicago Manual of Style (16th Edition):

Pan, Qiuping. “Bayesian Network Modeling and Inference of GWAS Catalog.” 2018. Masters Thesis, University of Arkansas. Accessed October 25, 2020. https://scholarworks.uark.edu/etd/2709.

MLA Handbook (7th Edition):

Pan, Qiuping. “Bayesian Network Modeling and Inference of GWAS Catalog.” 2018. Web. 25 Oct 2020.

Vancouver:

Pan Q. Bayesian Network Modeling and Inference of GWAS Catalog. [Internet] [Masters thesis]. University of Arkansas; 2018. [cited 2020 Oct 25]. Available from: https://scholarworks.uark.edu/etd/2709.

Council of Science Editors:

Pan Q. Bayesian Network Modeling and Inference of GWAS Catalog. [Masters Thesis]. University of Arkansas; 2018. Available from: https://scholarworks.uark.edu/etd/2709


University of Arkansas

13. Mahler, Michael. A Home Security System Based on Smartphone Sensors.

Degree: MS, 2018, University of Arkansas

  Several new smartphones are released every year. Many people upgrade to new phones, and their old phones are not put to any further use.… (more)

Subjects/Keywords: Accelerometer; Home Security; iPhone; Machine Learning; Sensors; Spectrogram; Graphics and Human Computer Interfaces; Information Security; Software Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mahler, M. (2018). A Home Security System Based on Smartphone Sensors. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2816

Chicago Manual of Style (16th Edition):

Mahler, Michael. “A Home Security System Based on Smartphone Sensors.” 2018. Masters Thesis, University of Arkansas. Accessed October 25, 2020. https://scholarworks.uark.edu/etd/2816.

MLA Handbook (7th Edition):

Mahler, Michael. “A Home Security System Based on Smartphone Sensors.” 2018. Web. 25 Oct 2020.

Vancouver:

Mahler M. A Home Security System Based on Smartphone Sensors. [Internet] [Masters thesis]. University of Arkansas; 2018. [cited 2020 Oct 25]. Available from: https://scholarworks.uark.edu/etd/2816.

Council of Science Editors:

Mahler M. A Home Security System Based on Smartphone Sensors. [Masters Thesis]. University of Arkansas; 2018. Available from: https://scholarworks.uark.edu/etd/2816

.