Browsing MS Theses - DO NOT EDIT by Title
Now showing items 304-323 of 355
-
Shaping Network Topology For Privacy And Performance
(Computer Science & Engineering, 2013-03-20)Anonymity systems provide privacy for Internet communication and are becoming popular. Unfortunately, users experience slow Internet connection through existing systems because paths used to route traffic are selected ... -
Sign Gesture Spotting In American Sign Language Using Dynamic Space Time Warping
(Computer Science & Engineering, 2013-07-22)American Sign Language (ASL) is the primary sign language used by approximately 500,000 deaf and hearing-impaired people in the United States and Canada. ASL is a visually perceived, gesture-based language that employs ... -
Simulation Of Sensor Responses Of Advanced Security Systems
(Computer Science & Engineering, 2007-08-23)Security systems are becoming an increasingly important area of research. Advanced security detection and surveillance systems that integrates a variety of detection mechanisms, like signals from different kinds of sensors, ... -
SLICING ALGORITHM FOR COMPLEX CONTOUR GENERATION FROM COARSE MESHED ISO-SURFACE DATA
(2016-12-20)Finite element based topology optimization is used to develop complex geometric configurations for additive manufacturing. Complex coarse-meshed Iso-surface data is extracted from topology optimization results and smooth ... -
Social Coding Standards on TouchDevelop: An Empirical Study
(2017-12-20)This study compares and contrasts the application development pattern on Microsoft’s mobile application development platform with leading version control and social coding sites like Github. TouchDevelop is an in-browser ... -
Social Media Text Analysis using Multi-kernel Convolutional Neural Network
(2019-12-11)Transportation planners and ride hailing platforms such as Uber and Lyft use their riders feedback to assess their services and monitor customer satisfaction. Social media websites such as Facebook, Instagram, LinkedIn and ... -
SOFTWARE DEFINED LOAD BALANCING OVER AN OPENFLOW-ENABLED NETWORK
(2017-05-15)In this modern age of the Internet, the amount of data flowing through networking channels has exploded exponentially. The network services and routing mechanism affect the scalability and performance of such networks. ... -
Solving The Rubik's Cube With Parallel Processing
(Computer Science & Engineering, 2007-08-23)This thesis investigates parallel processing techniques for solving the 3 x 3 x 3 Rubik's Cube. We explore various state-space search based algorithmic approaches to optimally solve the Cube. The parallel processing approach ... -
A Source Code Search Engine For Keyword Based Structural Relationship Search
(Computer Science & Engineering, 2013-07-22)In an Object Oriented Program, we often see that a package contains several classes, a class contains several methods, a method calls other methods. We may say, there is a contains relationship between a package and a class ... -
Spatio-Temporal Patterns of GPS Trajectories Using Association Rule Mining
(2016-05-13)The availability of location-tracking devices such as GPS, Cellular Networks and other devices provides the facility to log a person or device locations automatically. This creates spatio-temporal datasets of user's movement ... -
Speaker Identification in Live Events using Twitter
(2015-12-09)The prevalence of social media has given rise to a new research area. Data from social media is now being used in research to gather deeper insights into many different fields. Twitter is one of the most popular microblogging ... -
SQL-based Approach To Significant Interval Discovery In Time-Series Data
(Computer Science & Engineering, 2007-08-23)With time-series data, events (like turning off a light, opening garage door, turning on TV) occur with a high degree of certainty not at specific time points but within time intervals (sequence of time points). So, it is ... -
Stepping-stone Network Attack Kit (SNEAK) For Evading Timing-based Detection Methods Under The Cloak Of Constant Rate Multimedia Streams
(Computer Science & Engineering, 2008-09-17)With the advent of the Internet, network-based security threats have been constantly on the rise. The source of an attack could be traced by studying the system logs and the source IP address of the attack can be used to ... -
“Strict Moderation?” The Impact of Increased Moderation on Parler Content and User Behavior
(2022-05-18)Social media platforms have brought people from different backgrounds, ethnicity, race, gender, etc together to form a platform to share ideas and opinions and discuss news events among other social events. Unfortunately, ... -
STRUCTURE AWARE HUMAN POSE ESTIMATION USING ADVERSARIAL LEARNING
(2021-05-10)Pose estimation using Deep Neural Networks (DNNs) has shown outstanding performance in recent years, due to the availability of powerful GPUs and larger training datasets. However, there are still many challenges due to ... -
Structure Based XML Indexing
(Computer Science & Engineering, 2007-08-23)The increase in the usage and popularity of semi-structured data has received considerable attention, and a lot of research is going on for the efficient retrieval and storage of semi-structured data. A popular model and ... -
SubRosa 2 : An Experimental Evaluation Of Timing Analysis Attacks And Defenses In Anonymity Systems
(Computer Science & Engineering, 2013-03-20)A circuit-based low-latency anonymous communication service such as Tor helps Internet users hide their IP addresses and thereby conceal their identities when communicating online. However, this kind of service is vulnerable ... -
Subrosa: An Experimental Platform For Studying Timing Analysis Of Real Time Anonymity Systems
(Computer Science & Engineering, 2008-08-08)Timing analysis poses a significant challenge for the mix based anonymous systems that wish to support low-latency applications like web browsing, instant messaging and Voice over IP (VOIP). Research in this area so far ... -
Sybil Defense For Online Social Networks Using Partial Graph Information
(Computer Science & Engineering, 2012-04-11)Online social networks (OSNs) today are proprietary, in the sense that communication between users requires the users to be part of the same OSN. This raises privacy issues and reliability concerns among users, and calls ... -
System For Interpretation Of Reviewer Feedback On Social Web
(Computer Science & Engineering, 2013-03-20)The increasing popularity of social media web sites such as Amazon, Yelp and others has influenced our online decision making. Before making selection decisions on movies and restaurants, we investigate its reviewer ...