Browsing MS Theses - DO NOT EDIT by Title
Now showing items 332-351 of 355
-
Top K Query Processing In Distributed Database
(Computer Science & Engineering, 2007-09-19)Today's data is rarely stored in centralized location due to the enormous amount of information that needs to be stored and also to increase reliability, availability and performance of the system. Same data is stored in ... -
TOPOLOGICAL AND FEATURE BASED IDENTIFICATION OF HOLE BOUNDARIES IN POINT CLOUD DATA AND DIFFERENTIATION BETWEEN SURFACE AND PHYSICAL HOLES
(2018-12-13)With the advent of autonomous agents becoming prominent in everyday lives, the importance of processing the surroundings into understandable features becomes more and more important. 3D point clouds play a major role in ... -
Towards A Stronger Peer-to-peer Anonymous System
(Computer Science & Engineering, 2007-08-23)Anonymous communications systems on the Internet provides protection against eavesdroppers and others that seek to link users with their communications. These systems have many important applications in areas such as law ... -
Towards An Implementation Of Avoip: Anonymous Voice-over-ip
(Computer Science & Engineering, 2009-09-16)Voice over IP (VoIP) is one of the fastest growing telecommunicaiton market today. However with great popularity comes greater security risk. When we communicate over the Internet we expose our identity to all the prying ... -
TOWARDS END-TO-END SEMI-SUPERVISED DEEP LEARNING FOR DRUG DISCOVERY
(2018-11-26)Observing the recent progress in Deep Learning, the employment of AI is surging to accelerate drug discovery and cut R&D costs in the last few years. However, the success of deep learning is attributed to large-scale clean ... -
Towards Location Free Movement Recognition with Channel State Information
(2019-12-03)Channel state information based movement recognition has gathered immense attention over recent years. Different from traditional systems which usually require wearable sensors or surveillance cameras, many existing works ... -
Towards Modeling The Behavior Of Physical Intruders In A Region Monitored By A Wireless Sensor Network
(Computer Science & Engineering, 2010-07-19)A priority task for homeland security is the coverage of large spans of open border that cannot be continuously physically monitored for intrusion. Low-cost monitoring solutions based on wireless sensor networks have been ... -
Towards Optimum Play-out Buffering Delay In Voice over IP
(Computer Science & Engineering, 2007-08-23)Voice over Internet Protocol (VoIP) or transmission of real-time voice packets over the Internet is slowly emerging as a cost-effective alternative to the traditional Public Switched Telephone Network (PSTN). However, ... -
Tracing And Replay Of Real-time Concurrent Programs In Vxworks
(Computer Science & Engineering, 2007-08-23)Real-time concurrent programs are difficult to analyze, debug and test because of the existence of race conditions. In particular, cyclic debugging requires the ability to reproduce a failed execution. That is, when a ... -
Typifying Wikipedia Articles
(Computer Science & Engineering, 2011-03-03)In Wikipedia, each article represents an entity. Entity can have different types like person, country, school, science etc. Although Wikipedia encapsulates category information for each page, sometimes it is not sufficient ... -
UBCA: A Utility Based Clustering Architecture For Peer-to-peer Networks
(Computer Science & Engineering, 2007-08-23)Use of the Peer-to-Peer (P2P) architecture has recently spread in popularity. File sharing and ad hoc networks have contributed to the architecture's usage. P2P generates new challenges in scalability, fairness, and ... -
ULTRA-CONTEXT: MAXIMIZING THE CONTEXT FOR BETTER IMAGE CAPTION GENERATION
(2019-05-07)Several combinations of visual and semantic attention have been geared towards developing better image captioning architectures. In this work we introduce a novel combination of word-level semantic context with image ... -
Use Of Wireless Signal Characteristics For Mobile Robotics Localization And Access Point Mapping
(Computer Science & Engineering, 2009-09-16)Mobile robotics is an interesting and challenging emerging field in computer science.To properly achieve true autonomy, a robot must be able to determine where it is in relationshipto a global frame of reference and it ... -
USE OF WORD EMBEDDING TO GENERATE SIMILAR WORDS AND MISSPELLINGS FOR TRAINING PURPOSE IN CHATBOT DEVELOPMENT
(2019-12-06)The advancement in the field of Natural Language Processing and Machine Learning has played a significant role in the huge improvement of conversational Artificial Intelligence (AI). The use of text-based conversation AI ... -
User Syndication Using Speech Rhythm
(2019-08-08)In recent years we have seen a variety of approaches to increase security on computers and mobile devices including fingerprint, and facial recognition. Such techniques while effective are very expensive. Voice biometrics, ... -
Using ChebConv and B-Spline GNN models for Solving Unit Commitment and Economic Dispatch in a day ahead Energy Trading Market based on ERCOT Nodal Model
(2020-05-22)Spectral Convolutions and B-Spline Graph Neural Network techniques have been used in past to learn embeddings in various complex, multidimensional structured knowledge graphs like genetics, social networks, geometric shapes ... -
Using Graph Convolutional Network and Message Passing Neural Networks for Solving Unit Commitment and Economic Dispatch in a day ahead Energy Trading Market based on ERCOT Nodal Model.
(2020-05-22)Various machine learning applications will pre-process graphical representations into a vector of real values which in turn loses information regarding graph structure. Graph Neural Networks (GNNs) are a combination of an ... -
Using Part Of Speech Structure Of Text In The Prediction Of Its Readability
(Computer Science & Engineering, 2007-08-23)Readability formulas predict the reading difficulty associated with text. They typically output a U.S. school grade level that indicates the reading ability required of a person in order for him to comprehend that text. ... -
Using Property-Based Testing, Weighted Grammar-Based Generators, and a Consensus Oracle to Test Browser Rendering Engines and to Reproduce Minimized Versions of Existing Test Cases
(2019-12-10)Verifying that a web browser rendering engine correctly renders all valid web pages is challenging due to the size of the input space (valid web pages), the difficulty of determining correct rendering for any given web ... -
USING SENTIMENT AND EMOTION ANALYSIS OF NEWS ARTICLES TO ANALYZE THE EFFECTS OF LEADER’S STATEMENTS ON COVID-19 SPREAD
(2021-05-09)Leaders generally include government officials, politicians, etc. Their statements can highly affect people’s decisions in many ways. Currently, in the pandemic situation, many statements were being passed every hour and ...