Browsing MS Theses - DO NOT EDIT by Title
Now showing items 135-154 of 355
-
Evaluation Of Ferry Based Opportunistic Message Dissemination With Deterministic Inter Contact Times
(Computer Science & Engineering, 2010-07-19)Opportunistic Networks are characterized by intermittent connectivity and volatile topology. In such a network scenario, traditional Mobile Ad hoc Network (MANET) routing protocols cannot work efficiently. Hence, a novel ... -
EVALUATION OF HTML TAG SUSCEPTIBILITY TO STATISTICAL FINGERPRINTING FOR USE IN CENSORSHIP EVASION
(2016-12-08)The ability to speak freely has always been a source of conflict between rulers and the people over which they exert power. This conflict usually takes the form of State-sponsored censorship with occasional instances of ... -
Evolving Modular Programs By Extracting Reusable Functions Using Significance Testing
(Computer Science & Engineering, 2007-08-23)Genetic programming is an automatic programming method that uses biologically inspired methods to evolve programs. Genetic programming, and evolutionary methods in general, are useful for problem domains in which a method ... -
Exception Handling Using Class Diversity
(Computer Science & Engineering, 2007-08-23)Software reliability has been received more and more attention not only in mission critical system but also in commercial software system. Developing robust software must consider faults caused by abnormal situations or ... -
An Experiment In Developing Small Mobile Phone Applications Comparing On-phone To Off-phone Development
(Computer Science & Engineering, 2013-03-20)TouchDevelop represents a radically new mobile application development model, as TouchDevelop enables mobile application development on a mobile device. I.e., with TouchDevelop, the task of programming say a Windows Phone ... -
EXPERIMENTAL EVALUATION OF N-MODEL METHODOLOGY
(2019-05-13)Software maintenance is an essential part of the software development life cycle. Usually software engineers use ad hoc approaches to enhance legacy systems in the absence of a systematic methodology. However, there exists ... -
Extracting and Modeling Useful Information from Videos for Supporting Continuous Queries
(2016-12-20)Automating video stream processing for inferring situations of interest has been an ongoing challenge. This problem is currently exacerbated by the volume of surveillance/monitoring videos generated. Currently, manual or ... -
Extractive Summarization and Simplification of Scholarly Literature
(2020-05-14)Research papers and journals have always played a crucial role in the field of research and development. However, these research papers usually have a complex usage of language which limits the range of target readers. The ... -
FACE DETECTION AND RECOGNITION USING MOVING WINDOW ACCUMULATOR WITH VARIOUS DEEP LEARNING ARCHITECTURE
(2018-05-04)Recent advancement in the field of Computer Vision and Deep Learning is making object detection and recognition easier. Hence, growing research activities in the field of deep learning are enabling researchers to find new ... -
Fast And Energy-efficient Technique For Jammed Region Mapping In Wireless Sensor Networks
(Computer Science & Engineering, 2010-11-01)Wireless sensor networks (WSNs) have great practical importance for surveillance systems to perform monitoring by acquiring and sending information about intrusions into a secured area. Very little human intervention is ... -
Fast Jamming Detection In Wireless Sensor Networks
(Computer Science & Engineering, 2011-03-03)Non-dedicated medium of communication for Wireless Sensor Networks (WSN) makes them vulnerable to jamming attack where an adversary injects strong signal or noises to interfere with the transmission and thus block the ... -
Faster Sampling Over Theoritical And Online Social Networks
Online social networks have become very popular recently and are used bymillions of users. Researchers increasingly want to leverage the rich variety ofinformation available. However, social networks often feature a web ... -
Finding Blood In Capsule Endoscopy Video
(Computer Science & Engineering, 2007-08-23)Capsule Endoscopy (CE) is a new procedure where endoscopists can visualize and discriminate anomalies of the human gastrointestinal track by allowing the patient to swallow a camera pill. The digital video obtained from ... -
Finding Representative Entities From Entity Graph By Using Neighborhood Based Entity Similarity
(2018-09-17)Several applications deploy the use of large entity graphs. Given the entirety of its application scope, it is challenging to select a single entity graph for a particular need from numerous data sources. For a comprehensible ... -
Flash Crowd Mitigation System
(Computer Science & Engineering, 2007-09-17)Flash crowd means that a web server suffers a sudden surge of traffic since a large number of Internet users access the web server simultaneously. Once a flash crowd occurs in a web server, the response rate for the HTTP ... -
FrameAnnotator - A Web-Based Frame Semantic Annotation Tool
(2019-05-14)News headlines around the world are alarming. They aim to trigger emotional responses from the consumer. In an era where news and social media posts spread so quickly, it is often difficult to distinguish between what is ... -
A Framework For A Dynamic Invocation Interface And High-level Interoperability For Mobile Agent Platforms
(Computer Science & Engineering, 2007-08-23)The mobile agent paradigm for distributed systems is inherently suitable for many applications ranging from network management to e-commerce. One inherent problem to its wide spread use is communication between disparate ... -
A Framework For Model Checking Object Oriented Security Protocol Implementations
(Computer Science & Engineering, 2007-08-23)With the rapid growth of the Internet, more and more vendors see the Internet as a viable marketplace. Since the Internet is public, providing security in the presence of malicious intruders has become paramount. Security ... -
A Framework For Real-time Fault Detection And Response In Multi-agent Teams
(Computer Science & Engineering, 2011-03-03)This thesis details the creation of a fault detection and response framework that can be applied to mobile multi-agent teams. This framework unites existing concepts of conditioned based maintenance and real-time machine ... -
FROM TEXT CLASSIFICATION TO IMAGE CLUSTERING, PROBLEMS LESS OPTIMIZED
(2018-06-11)Machine Learning is thriving. Every industry is using its techniques in some way to improve their efficiency and revenue. However, the focus on research is not divided equally between all of the different areas and problems ...