Now showing items 68-87 of 606

    • Big Data In Single Player Games 

      Aldaboubi, Mohammad Khaldoun Farhan; 0000-0002-2308-5137 (2020-05-28)
      Improving video games can be exponentially more efficient by utilizing big data. Big data plays a big part in modern gaming, especially for multiplayer games like poker, first person shooter games. Utilizing the data ...
    • Biomedical Parameter Measurements Using Video Processing 

      Ziaee Nasrabadi, Negar
      For quite some time, patients’ cardiovascular parameters have been measured by sensors connected to their body. One way of measuring these parameters is pulse oximetry by using an optical technique. It uses a photodetector ...
    • BLOCKCHAIN: RESOURCE UTILISATION ANALYSIS WITH A GAME THEORY PERSPECTIVE 

      Soni, Vaibhav (2019-05-10)
      Major blockchain networks are using proof-of-work based consensus protocols to establish trust and decentralize resource management with different incentive mechanisms for the participants or nodes in the network. We ...
    • Branch-and-Bound for Model Selection and its Computational Complexity 

      Thakoor, Ninad Shashikant; Gao, Jean (IEEE XploreUniversity of Texas at Arlington, Department of Computer Science Engineering, 2010-09-02)
      Branch-and-bound methods are used in various data analysis problems such as clustering, seriation and feature selection. Classical approaches of branch-and-bound based clustering search through combinations of various ...
    • Bridging Two Grids: The SAM-grid/LCG Integration Project 

      Reddy, Tummalapalli Sudhamsh (Computer Science & Engineering, 2007-08-23)
      SAM-Grid is an integrated data, job, and information management system. SAM-Grid addresses the distributed computing needs of the Dzero experiment at Fermi National Accelerator Laboratory, Batavia, IL. The system typically ...
    • BUILDING 3D SHAPE PRIMITIVE BASED OBJECT MODELS FROM RANGE IMAGES 

      Gopikrishna, Vamsikrishna; 0000-0002-7079-0146 (2016-09-16)
      Most pattern recognition approaches to object identification work in the image domain. However this is ignoring potential information that can be provided by depth information. Using range images, ...
    • Building a Versatile Deduplication System 

      Yan, Zhichao; 0000-0002-2806-9312 (2018-12-05)
      With the development of the Internet and information technology, a large amount of unstructured data is generated and stored in various storage systems. In particular, data reduction techniques such as compression and ...
    • Building Bayesian Network Based Expert Systems From Rules 

      Thirumuruganathan, Saravanan (Computer Science & Engineering, 2010-11-01)
      Combining expert knowledge and user explanation with automated reasoning in domains with uncertain information poses significant challenges in terms of representation and reasoning mechanisms. In particular, reasoning ...
    • Building Energy-efficient Broadcast Trees Using A Genetic Algorithm In Wireless Sensor Networks 

      An, Min Kyung (Computer Science & Engineering, 2007-10-08)
      In wireless broadcast environment, data can be transmitted to several nodes by a single transmission. The nodes in that environment have limited energy resources; therefore we need to reduce the energy consumption when ...
    • CA-OLE- A Collaborative And Adaptive Online Learning Environment 

      Gomez, Paola (Computer Science & Engineering, 2007-08-23)
      Demand for online learning environments has grown in the past few years, and schools have been offering more distance courses to their students. Designing adequate online learning environments is considerably more challenging ...
    • CAP: A Context-aware Privacy Protection System For Location-based Services 

      Pingley, Aniket (Computer Science & Engineering, 2008-09-17)
      Location Based Services (LBS) are information services that provide users with customized contents, such as the nearest restaurants/hotels/clinics, retrieved from a dedicated spatial database. They make use of technologies ...
    • CELL SEGMENTATION IN CANCER HISTOPATHOLOGY IMAGES USING CONVOLUTIONAL NEURAL NETWORKS 

      Kavassery Rajalingam, Viswanathan; 0000-0002-4274-8696 (2016-12-07)
      Cancer, the second most dreadful disease causing large scale deaths in humans is characterized by uncontrolled growth of cells in the human body and the ability of those cells to migrate from the original site and spread ...
    • Characterizing and Optimizing the Performance of Virtualized Network Systems in the Cloud 

      Suo, Kun (2019-06-17)
      To leverage the elastic resource allocation of cloud computing and enhance the service availability and productivity, numerous applications and businesses have been moved from the traditional data centers into the cloud ...
    • Choices And Consequences: A Game-based Risky Behavior Prevention Program 

      Vines, Amanda Michelle (Computer Science & Engineering, 2012-07-25)
      Serious games have been defined as a mental contest played with a computer in accordance to specific rules that use entertainment to further government or corporate training, education, health, public policy and strategic ...
    • ClaimPortal: Building a Social Media Analytics System for Assisting Fact-Checking 

      Majithia, Sarthak; 0000-0002-9295-9491 (2019-05-14)
      We are in a digital era where claims made by people can attract attention and spread like wildfire. Misinformation and disinformation about important social and political issues can be intentional and motive can be malicious. ...
    • CLASSIFICATION OF CLINICAL NARRATIVES USING CONVOLUTIONAL NEURAL NETWORK 

      Lonari, Nikit Rajiv; 0000-0003-2747-4874 (2018-12-10)
      Patient safety is a key aspect for good consumer care. When an individual is hospitalized or receives medication the family wants the patient safety to be above all factors. For instance, a drug can do both either cure the ...
    • Classification of Factual and Non-Factual Statements Using Adversarially Trained LSTM Networks 

      Obembe, Daniel; 0000-0001-9890-4208 (2020-06-08)
      Being able to determine which statements are factual and therefore likely candidates for further verification is a key value-add in any automated fact-checking system. For this task, it has been shown that LSTMs outperform ...
    • A Cloud Based Automated Anomaly Detection Framework 

      Datta Kumar, Prathibha (Computer Science & Engineering, 2014-12)
      A machine-to-machine (M2M) communications network hosts millions of heterogeneous devices such as for vehicle tracking, medical services, and home automation and security services. These devices exchange thousands of ...
    • Cloud Hopper: A Unified Cloud Solution to Manage Heterogeneous Clouds 

      Jain, Shraddha; 0000-0003-2311-0272 (2016-12-09)
      Cloud environments are built on virtualization platforms which offer scalability, on-demand pricing, high performance, elasticity, easy accessibility of the resources and cost efficient services. Most of the small and large ...
    • CLOUD MERGE: HETEROGENEOUS CLOUD APPLICATION MIGRATION USING PLATFORM AS A SERVICE 

      Jain, Mayank; 0000-0002-5440-118X (2016-12-16)
      With the evolution of cloud service providers offering numerous services such as SaaS, IaaS, PaaS, options for enterprises to choose the best set of services under optimal costs have also increased. The migration of web ...