Browsing MS Theses - DO NOT EDIT by Title
Now showing items 66-85 of 355
-
Context Aware Energy Conservation In Pervasive Computing Environments
(Computer Science & Engineering, 2007-08-23)Extending battery lifetime is one of the most critical and challenging problems in mobile systems. When the mobile device sounds a low battery alarm, the user is given an ultimatum to quickly find a power source or suspend ... -
Context-Aware Gaze-Based Interface for Smart Wheelchair
(2023-05-22)Human-Computer Interfaces (HCI) is an essential aspect of modern technology that has revolutionized the way we interact with machines. With the revolution of computers and smart devices and the advent of autonomous vehicles ... -
CONTINUOUS AMERICAN SIGN LANGUAGE TRANSLATION WITH ENGLISH SPEECH SYNTHESIS USING ENCODER-DECODER APPROACH
(2021-05-09)Interaction between human beings brings about improvements in science and technology. However, the interaction is limited for people who are deaf or hard-of-hearing, as they can only communicate with others who also know ... -
Control Framework Dynamic Walking Of A Bipedal Robot
(Computer Science & Engineering, 2013-03-20)Despite significant progress in recent years, the capabilities of today's Humanoid robots still lack behind the walking abilities of humans in terms of competence, robustness, flexibility, and speed. Furthermore, unknown ... -
CONVOLUTIONAL AND RECURRENT NEURAL NETWORKS FOR PEDESTRIAN DETECTION
(2016-12-06)Pedestrian Detection in real time has become an interesting and a challenging problem lately. With the advent of autonomous vehicles and intelligent traffic monitoring systems, more time and money are being invested into ... -
Crowdsourcing for Decision Making with Analytic Hierarchy Process
Analytic Hierarchy Process (AHP) is a Multiple-Criteria Decision-Making MCDM) technique devised by Thomas L. Saaty. In AHP, all the pairwise comparisons between criteria and alternatives in terms of each criterion are used ... -
CRYPTO RANSOMWARE ANALYSIS AND DETECTION USING PROCESS MONITOR
(2017-12-07)Ransomware is a faster growing threat that encrypts user’s files and locks the computer and holds the key required to decrypt the files for ransom. Over the past few years, the impact of ransomware has increased exponentially. ... -
CSEgrid Portal: A Secure Web-based Solution For Providing Ubiquitious Access To Grid Services (Design, Development And Implementation Of A Prototype)
(Computer Science & Engineering, 2007-08-23)Grid computing is emerging as a revolutionary concept for performing high performance computations on the grid. The grid infrastructure comprises of a large set of distributed computing resources that are shared across ... -
Customization Of A Generic Search Engine By Adding User Categories
(Computer Science & Engineering, 2007-08-23)The current search engines available on the Net are generic in nature. They do not consider user preferences and treat all users information needs in the same way. As a result they frequently return a large number of ... -
CXLEngine - A Comprehensive XML Loosely Structured Search Engine
(Computer Science & Engineering, 2008-04-22)XML keyword search has been a widely researched area. [15] has proposed an XML semantic search engine called OOXSearch, which answers loosely structured queries. The framework of OOXSearch takes into account the semantic ... -
DAS page replacement algorithm
(2020-06-04)There are different page replacement algorithms and yet there seems to be some drawbacks in them, making no page replacement algorithm ideal. To be one step closer to achieving the ideal algorithm it is vital to have a ... -
Data Discovery Analysis on Complex Time Series Data
(2022-12-20)Complex time series are a ubiquitous form of data in the modern world. They have wide application across many different fields of scientific inquiry and business endeavor. Time series are used to understand and forecast ... -
Data-Driven Modeling of Heterogeneous Multilayer Networks For Computing Communities Using Bipartite Graphs
(2019-08-12)Today, more than ever, data modeling and analysis play a vital role for enterprises in terms of finding actionable business intelligence. Data is being collected on a large scale from multiple sources hoping they can be ... -
DECOUPLING-BASED APPROACH TO CENTRALITY DETECTION IN HETEROGENEOUS MULTILAYER NETWORKS
(2021-08-13)Graph analysis is one of the techniques widely used for data analysis. It is used extensively on single graphs. Its ability to capture entities and relationships makes it an attractive data model. Search on graphs, such ... -
DEDUPLICATION-AWARE PAGE CACHE IN LINUX KERNEL FOR IMPROVED READ PERFORMANCE
(2019-12-16)The amount of data being produced and consumed is increasing every day. As a result, there can be a large amount of redundant data in the storage system. Storing and accessing these duplicate data unnecessarily consumes ... -
Deep Learning Based Multi-Label Classification for Surgical Tool Presence Detection in Laparoscopic Videos
(2017-08-07)Laparoscopic surgery, Modern surgery, where the surgery is performed far away from the patient by inserting small incisions on the patient's body and the surgery is performed with a help of a video recorder and through ... -
Deep Reinforcement Learning-based Portfolio Management
(2019-05-16)Machine Learning is at the forefront of every field today. The subfields of Machine Learning called Reinforcement Learning and Deep Learning, when combined have given rise to advanced algorithms which have been successful ... -
Deep Representation Learning for Clustering and Domain Adaptation
(2019-12-05)Representation learning is a fundamental task in the area of machine learning which can significantly influence the performance of the algorithms used in various applications. The main goal of this task is to capture the ... -
DEEPSIGN: A DEEP-LEARNING ARCHITECTURE FOR SIGN LANGUAGE
(2018-11-13)Sign languages are used by deaf people for communication. In sign languages, humans use hand gestures, body, facial expressions and movements to convey meaning. Humans can easily learn and understand sign languages, but ... -
Delay Tolerant Lazy Release Consistency For Distributed Shared Memory In Opportunistic Networks
(Computer Science & Engineering, 2011-10-11)Opportunistic networking (ON), a concept which allows a mobile wireless device to dynamically interact with other wireless devices in its immediate vicinity, is a field with great potential to improve the utility of itinerant ...