Browsing Dissertations & Theses by Title
Now showing items 390-409 of 596
-
A Method To Evade Keyword Based Censorship
(Computer Science & Engineering, 2014-12)Many countries block the content of web pages which are deemed against the morals, religious rules or policies set by government or organization. Countries like China block the post which is against their government interest. ... -
Methods For Human Motion Analysis For American Sign Language Recognition And Assistive Environments
The broad application domain of the work presented in this thesis is human motion analysis with a focus on hand detection for American Sign Language recognition and fall detection for assistive environments.One of the ... -
Methods For Large-scale Machine Learning And Computer Vision
(Computer Science & Engineering, 2015)With the advance of the Internet and information technology, nowadays people can easily collect and store tremendous amounts of data such as images and videos. Developing machine learning and computer vision to analysis ... -
Microblog Analyzer Aggregate Estimation Over A Micro Blog Platform
Microblogging is a new mode of communication in which users can share their current status in brief and agile way in the form of text, image, video etc over smart phones, email or web. Recently, Microblogs such as Twitter, ... -
Mimic: An Active Covert Channel That Evades Regularity-based Detection
(Computer Science & Engineering, 2010-07-19)A covert timing channel is a hidden communication channel based on network timing that an attacker can use to sneak secrets out of a secure system. Active covert channels, in which the attacker uses a program to automatically ... -
MLN-Subdue: Decoupling Approach-Based Substructure Discovery In Multilayer Networks (MLNs)
(2020-06-03)Substructure discovery is well-researched for single graphs (both simple and attribute) as it is an important component of knowledge discovery for many applications such as finding the core substructure in a protein, ... -
Modeling An Intelligent Intruder In A Region Monitored By A Wireless Sensor Network
(Computer Science & Engineering, 2014-03-12)Monitoring to detect unauthorized border crossing is very important for protecting national security. To accomplish this by continuous physical monitoring by border patrol agents is impractical. Networks of low-cost wireless ... -
Modeling And Simulation Of A General Motors Conveyor System Using A Custom Decision Optimizer
(Computer Science & Engineering, 2009-09-16)The temporal behavior of conveyor systems can be modeled using discrete event (DE) simulations. DE modeling provides a quick and cost effective method for analyzing complex problems as different scenarios can be tested ... -
MODELING FACTUAL CLAIMS WITH SEMANTIC FRAMES: DEFINITIONS, DATASETS, TOOLS, AND FACT-CHECKING APPLICATIONS
(2021-08-26)As social media sites have become major channels for the quick dissemination of news, misinformation has become a significant challenge for our society to tackle. Today fact-checking rests primarily on the shoulders of ... -
Monitorexplorer: A State-space Exploration Based Tool To Test Java Monitors Implementations
(Computer Science & Engineering, 2007-08-23)A monitor is a concurrency construct that encapsulates data. There are many application classes which are written using the Java Monitors and these are difficult to test due to the inherent complexities of the concurrent ... -
Monitoring And Analyzing Distributed Cluster Performance And Statistics Of Atlas Job Flow
(Computer Science & Engineering, 2007-08-23)Grid3 is a Grid facility used by many High Energy Physics experiments to enable physicists to process data intensive and CPU intensive jobs more effectively as well as more efficiently. Amongst other things, the highlights ... -
Monitoring Health By Detecting Drifts And Outliers In Patterns Of An Inhabitant In A Smart Home
(Computer Science & Engineering, 2007-08-23)The elderly, along with people with disabilities or chronic illness, are most often dependent on some kind of formal or informal care. They are forced to move to a place where they can be cared for. Automatic health ... -
MONITORING OF SWT2 DATA CLUSTERS FOR THE ATLAS EXPERIMENT
(2018-12-06)Monitoring of the South West Tier 2 RSEs is done by CERN with the help of Rucio. The challenge faced by the team monitoring the servers at the University of Texas site was that the monitoring data is pictorially represented ... -
MR_QP: A Scalable Approach To Query Processing on Arbitrary-Size Graphs Using The Map/Reduce Framework
(2020-06-03)The utility and widespread use of Relational Database Management Systems(RDBMSs) comes not only from its simple, easy-to-understand data model (a relation or a set) but mainly from the ability to write non-procedural queries ... -
Multi Person Tracking And Querying With Heterogeneous Sensors
(Computer Science & Engineering, 2013-03-20)Tracking the location of a user is considered to be the most fundamental step for creating a context aware application, such as activity monitoring in an assistive environment. This problem becomes very challenging if there ... -
Multi-dimensional Indexing For XML Data
(Computer Science & Engineering, 2007-08-23)The Extensible Markup Language (XML) is becoming a dominant standard for exchanging and retrieving data over the internet. As XML in data exchanging grows, various XML indexing techniques have been proposed for fast and ... -
A Multi-level Biomedical Ontology-enabled Broker: Dynamic Service-based Data Source Integration
(Computer Science & Engineering, 2008-09-17)Web services have recently become a new trend for gathering biomedical information. However, it is not easy to integrate and obtain a concise/complete query result among thousands of service operations. In this dissertation, ... -
Multimodal Interaction In Ambient Intelligence Environments Using Speech, Localization And Robotics
(Computer Science & Engineering, 2014-09-17)An Ambient Intelligence Environment is meant to sense and respond to the presence of people, using its embedded technology. In order to effectively sense the activities and intentions of its inhabitants, such an environment ... -
Multiple Object Tracking Using Particle Filters
(Computer Science & Engineering, 2007-08-23)We describe a novel extension to the Particle filter algorithm for tracking multiple objects. The recently proposed algorithms and the variants for multiple object tacking algorithms estimate multi-modal posterior distributions ... -
Mutual Information Based Non-rigid Image Registration Using Adaptive Grid Generation: GPU Implementation And Application To Breast MRI
(Computer Science & Engineering, 2008-09-17)In this dissertation a new approach for non-rigid image registration using mutual information is introduced. A fast method for non-rigid registration is developed by adjusting divergence and curl of an intermediate vector ...