Browsing MS Theses - DO NOT EDIT by Title
Now showing items 123-142 of 355
-
END-USER FRAMEWORK FOR ROBOT CONTROL
(2021-05-10)This thesis describes in detail a developed end-user framework for a humanrobot collaborative system for common tasks, such as pick and place. The system is designed for semi-automated pick and place tasks as well as manual ... -
Enhancements To The SAM-grid Infrastructure
(Computer Science & Engineering, 2007-08-23)SAM-Grid is a grid computing infrastructure for high energy physics (HEP) experiments in Fermilab. It is composed of data handling, job management and information management components. There are several challenges when ... -
Enhancing Health Tweet Classification: An evaluation of Transformer-based models for Comprehensive Analysis
(2023-05-10)The task of health tweet classification entails identifying whether a given tweet is health-related or not. While existing research in this area has made significant progress in classifying tweets into specific sub-domains ... -
Enhancing JSWAT For Monitor-based Executions
(Computer Science & Engineering, 2008-08-08)Concurrent programs contain more than one thread that executes concurrently to accomplish a particular task. Since the threads in a concurrent program work together to accomplish a common goal, they share the data, code, ... -
Estimation Myopia: Tinkering With Perception In Software Estimation And Placebo Estimation In Edw
(Computer Science & Engineering, 2014-12)The goal of this study is to explore an effective way to provide timely and accurate size estimates for software and for an enterprise data warehouse (EDW). Several research papers attempt to adapt function point (FP) ... -
EStream: An Integration Of Event And Stream Processing
(Computer Science & Engineering, 2007-08-23)Event and stream data processing models have been researched extensively and are utilized in diverse application domains. Advanced applications require both event and stream processing, which is currently not supported. ... -
Evading Existing Stepping Stone Detection Methods Using Buffering
(Computer Science & Engineering, 2007-08-23)To gain anonymity and complicate their apprehension, attackers launch attacks not from their own systems but from previously compromised systems called stepping stones. An effective way to detect stepping stones is by ... -
EVALUATE THE USE OF FPGA SoC FOR REAL TIME DATA ACQUISITION AND AGGREGATE MICRO-TEXTURE MEASUREMENT USING LASER SENSORS
(2016-08-22)Aggregate texture has been found to play an important role in improving the longevity of highways and pavements. Aggregates with appropriate surface roughness level have an improved bonding with asphalt binder and concrete ... -
Evaluating Indexing And Routing Schemes For Spatial Queries In Sensor Networks
(Computer Science & Engineering, 2007-08-23)Recent advances in low-power sensing devices coupled with widespread availability of wireless ad-hoc networks, has fueled the development of sensor networks. These senor networks have various applications such as to monitor ... -
Evaluating the Accuracy of Gaze Detection for Moving Character
(2020-08-03)Joint attention, where a caregiver and an infant follow each other’s eye gaze plays an important role in the learning of language for new-born infants. To study joint attention, it is required to record and analyze the ... -
Evaluating The Effectiveness Of BEN In Localizing Different Types Of Software Fault
Debugging refers to the activity of locating software faults in a program and is considered to be one of the most challenging tasks during software development. Automated fault localization tools have been developed to ... -
EVALUATION OF A FACTUAL CLAIM CLASSIFIER WITH AND WITHOUT USING ENTITIES AS FEATURES
(2017-08-14)Fact-checking in real-time for events such as presidential debates is a challenging task. These fact-checking processes have a difficult and rigorous task in having the best accuracy in classifying facts, finding topics, ... -
Evaluation Of Ferry Based Opportunistic Message Dissemination With Deterministic Inter Contact Times
(Computer Science & Engineering, 2010-07-19)Opportunistic Networks are characterized by intermittent connectivity and volatile topology. In such a network scenario, traditional Mobile Ad hoc Network (MANET) routing protocols cannot work efficiently. Hence, a novel ... -
EVALUATION OF HTML TAG SUSCEPTIBILITY TO STATISTICAL FINGERPRINTING FOR USE IN CENSORSHIP EVASION
(2016-12-08)The ability to speak freely has always been a source of conflict between rulers and the people over which they exert power. This conflict usually takes the form of State-sponsored censorship with occasional instances of ... -
Evolving Modular Programs By Extracting Reusable Functions Using Significance Testing
(Computer Science & Engineering, 2007-08-23)Genetic programming is an automatic programming method that uses biologically inspired methods to evolve programs. Genetic programming, and evolutionary methods in general, are useful for problem domains in which a method ... -
Exception Handling Using Class Diversity
(Computer Science & Engineering, 2007-08-23)Software reliability has been received more and more attention not only in mission critical system but also in commercial software system. Developing robust software must consider faults caused by abnormal situations or ... -
An Experiment In Developing Small Mobile Phone Applications Comparing On-phone To Off-phone Development
(Computer Science & Engineering, 2013-03-20)TouchDevelop represents a radically new mobile application development model, as TouchDevelop enables mobile application development on a mobile device. I.e., with TouchDevelop, the task of programming say a Windows Phone ... -
EXPERIMENTAL EVALUATION OF N-MODEL METHODOLOGY
(2019-05-13)Software maintenance is an essential part of the software development life cycle. Usually software engineers use ad hoc approaches to enhance legacy systems in the absence of a systematic methodology. However, there exists ... -
Extracting and Modeling Useful Information from Videos for Supporting Continuous Queries
(2016-12-20)Automating video stream processing for inferring situations of interest has been an ongoing challenge. This problem is currently exacerbated by the volume of surveillance/monitoring videos generated. Currently, manual or ... -
Extractive Summarization and Simplification of Scholarly Literature
(2020-05-14)Research papers and journals have always played a crucial role in the field of research and development. However, these research papers usually have a complex usage of language which limits the range of target readers. The ...