Browsing Dissertations & Theses by Title
Now showing items 76-95 of 596
-
CA-OLE- A Collaborative And Adaptive Online Learning Environment
(Computer Science & Engineering, 2007-08-23)Demand for online learning environments has grown in the past few years, and schools have been offering more distance courses to their students. Designing adequate online learning environments is considerably more challenging ... -
CAP: A Context-aware Privacy Protection System For Location-based Services
(Computer Science & Engineering, 2008-09-17)Location Based Services (LBS) are information services that provide users with customized contents, such as the nearest restaurants/hotels/clinics, retrieved from a dedicated spatial database. They make use of technologies ... -
CELL SEGMENTATION IN CANCER HISTOPATHOLOGY IMAGES USING CONVOLUTIONAL NEURAL NETWORKS
(2016-12-07)Cancer, the second most dreadful disease causing large scale deaths in humans is characterized by uncontrolled growth of cells in the human body and the ability of those cells to migrate from the original site and spread ... -
Characterizing and Optimizing the Performance of Virtualized Network Systems in the Cloud
(2019-06-17)To leverage the elastic resource allocation of cloud computing and enhance the service availability and productivity, numerous applications and businesses have been moved from the traditional data centers into the cloud ... -
Choices And Consequences: A Game-based Risky Behavior Prevention Program
(Computer Science & Engineering, 2012-07-25)Serious games have been defined as a mental contest played with a computer in accordance to specific rules that use entertainment to further government or corporate training, education, health, public policy and strategic ... -
ClaimPortal: Building a Social Media Analytics System for Assisting Fact-Checking
(2019-05-14)We are in a digital era where claims made by people can attract attention and spread like wildfire. Misinformation and disinformation about important social and political issues can be intentional and motive can be malicious. ... -
CLASSIFICATION OF CLINICAL NARRATIVES USING CONVOLUTIONAL NEURAL NETWORK
(2018-12-10)Patient safety is a key aspect for good consumer care. When an individual is hospitalized or receives medication the family wants the patient safety to be above all factors. For instance, a drug can do both either cure the ... -
Classification of Factual and Non-Factual Statements Using Adversarially Trained LSTM Networks
(2020-06-08)Being able to determine which statements are factual and therefore likely candidates for further verification is a key value-add in any automated fact-checking system. For this task, it has been shown that LSTMs outperform ... -
A Cloud Based Automated Anomaly Detection Framework
(Computer Science & Engineering, 2014-12)A machine-to-machine (M2M) communications network hosts millions of heterogeneous devices such as for vehicle tracking, medical services, and home automation and security services. These devices exchange thousands of ... -
Cloud Hopper: A Unified Cloud Solution to Manage Heterogeneous Clouds
(2016-12-09)Cloud environments are built on virtualization platforms which offer scalability, on-demand pricing, high performance, elasticity, easy accessibility of the resources and cost efficient services. Most of the small and large ... -
CLOUD MERGE: HETEROGENEOUS CLOUD APPLICATION MIGRATION USING PLATFORM AS A SERVICE
(2016-12-16)With the evolution of cloud service providers offering numerous services such as SaaS, IaaS, PaaS, options for enterprises to choose the best set of services under optimal costs have also increased. The migration of web ... -
Combating DoS Attacks In Wireless Networks Using Lightweight Key Mangement Schemes
(Computer Science & Engineering, 2010-11-01)The unique features of wireless networks lead to many attractive applications in both military and civilian operations. Wireles networking devices usually use batteries as power supply, which requires all the operations ... -
COMPACT REPRESENTATIVES OF DATABASES AND RESPONSIBLE DATA MANAGEMENT
(2023-08-08)With the advent of advanced computational models, we are being constantly judged by AI systems, complex algorithmic systems based on data that has been collected about us. These analysis are critical as they span many wide ... -
Comparing Web Application Scanners For XSS Attacks
(Computer Science & Engineering, 2013-03-20)As software industry is paying increasing attention to web application security, various testing tools with black box testing feature have been developed. To better evaluate their performance, researchers have made efforts ... -
A Comparison And Evaluation Of Motion Indexing Techniques
(Computer Science & Engineering, 2010-11-01)Motion capture (mocap) is a way to digitally represent the spatio-temporalstructure of human movement. Human motion is generally captured in long sequences to record the natural and complex aspects of human actions, its ... -
COMPARISON OF MACHINE LEARNING ALGORITHMS IN SUGGESTING CANDIDATE EDGES TO CONSTRUCT A QUERY ON HETEROGENEOUS GRAPHS
(2016-05-11)Querying graph data can be difficult as it requires the user to have knowledge of the underlying schema and the query language. Visual query builders allow users to formulate the intended query by drawing nodes and edges ... -
Comparison Of Search-based And Kernel-based Methods For Graph-based Relational Learning
(Computer Science & Engineering, 2007-08-23)Graph-based relational learning has been the focus of relational learning for quite some time. As most of the real-world data is structured, and hence cannot be represented in a single table, various logic-based and ... -
Compensation Of Photobleached Images For A Cell Dynamics System
(Computer Science & Engineering, 2007-08-23)Progress in the field of medicine attributes to the discoveries in biology that require an extensive knowledge of cell dynamics. Intracellular Cell Dynamics Analysis System (ICellDAS) is a web based tool aimed at automating ... -
Complementing Current Active Queue Management Schemes With RECHOKe And Receiver-window Modification (RWM)
(Computer Science & Engineering, 2007-08-23)Explicit Congestion Notification (ECN) and Active Queue Management (AQM) schemes have been proposed for present-day TCP/IP networks to better manage network congestion. ECN enabled AQMs were shown to have a promising ... -
Comprehensive Data Analysis For Biomarker Pattern Discovery Using DNA/protein Microarrays
(Computer Science & Engineering, 2008-09-17)During the last decade, the advent of microarray technology has stimulated rapid research advances in bioinformatics. Microarray data pose great challenges for computational data analysis, because of their large dimensionality ...