Now showing items 40-59 of 355

    • Big Data In Single Player Games 

      Aldaboubi, Mohammad Khaldoun Farhan; 0000-0002-2308-5137 (2020-05-28)
      Improving video games can be exponentially more efficient by utilizing big data. Big data plays a big part in modern gaming, especially for multiplayer games like poker, first person shooter games. Utilizing the data ...
    • Biomedical Parameter Measurements Using Video Processing 

      Ziaee Nasrabadi, Negar
      For quite some time, patients’ cardiovascular parameters have been measured by sensors connected to their body. One way of measuring these parameters is pulse oximetry by using an optical technique. It uses a photodetector ...
    • BLOCKCHAIN: RESOURCE UTILISATION ANALYSIS WITH A GAME THEORY PERSPECTIVE 

      Soni, Vaibhav (2019-05-10)
      Major blockchain networks are using proof-of-work based consensus protocols to establish trust and decentralize resource management with different incentive mechanisms for the participants or nodes in the network. We ...
    • Bridging Two Grids: The SAM-grid/LCG Integration Project 

      Reddy, Tummalapalli Sudhamsh (Computer Science & Engineering, 2007-08-23)
      SAM-Grid is an integrated data, job, and information management system. SAM-Grid addresses the distributed computing needs of the Dzero experiment at Fermi National Accelerator Laboratory, Batavia, IL. The system typically ...
    • Building Bayesian Network Based Expert Systems From Rules 

      Thirumuruganathan, Saravanan (Computer Science & Engineering, 2010-11-01)
      Combining expert knowledge and user explanation with automated reasoning in domains with uncertain information poses significant challenges in terms of representation and reasoning mechanisms. In particular, reasoning ...
    • Building Energy-efficient Broadcast Trees Using A Genetic Algorithm In Wireless Sensor Networks 

      An, Min Kyung (Computer Science & Engineering, 2007-10-08)
      In wireless broadcast environment, data can be transmitted to several nodes by a single transmission. The nodes in that environment have limited energy resources; therefore we need to reduce the energy consumption when ...
    • CA-OLE- A Collaborative And Adaptive Online Learning Environment 

      Gomez, Paola (Computer Science & Engineering, 2007-08-23)
      Demand for online learning environments has grown in the past few years, and schools have been offering more distance courses to their students. Designing adequate online learning environments is considerably more challenging ...
    • CAP: A Context-aware Privacy Protection System For Location-based Services 

      Pingley, Aniket (Computer Science & Engineering, 2008-09-17)
      Location Based Services (LBS) are information services that provide users with customized contents, such as the nearest restaurants/hotels/clinics, retrieved from a dedicated spatial database. They make use of technologies ...
    • CELL SEGMENTATION IN CANCER HISTOPATHOLOGY IMAGES USING CONVOLUTIONAL NEURAL NETWORKS 

      Kavassery Rajalingam, Viswanathan; 0000-0002-4274-8696 (2016-12-07)
      Cancer, the second most dreadful disease causing large scale deaths in humans is characterized by uncontrolled growth of cells in the human body and the ability of those cells to migrate from the original site and spread ...
    • Choices And Consequences: A Game-based Risky Behavior Prevention Program 

      Vines, Amanda Michelle (Computer Science & Engineering, 2012-07-25)
      Serious games have been defined as a mental contest played with a computer in accordance to specific rules that use entertainment to further government or corporate training, education, health, public policy and strategic ...
    • ClaimPortal: Building a Social Media Analytics System for Assisting Fact-Checking 

      Majithia, Sarthak; 0000-0002-9295-9491 (2019-05-14)
      We are in a digital era where claims made by people can attract attention and spread like wildfire. Misinformation and disinformation about important social and political issues can be intentional and motive can be malicious. ...
    • CLASSIFICATION OF CLINICAL NARRATIVES USING CONVOLUTIONAL NEURAL NETWORK 

      Lonari, Nikit Rajiv; 0000-0003-2747-4874 (2018-12-10)
      Patient safety is a key aspect for good consumer care. When an individual is hospitalized or receives medication the family wants the patient safety to be above all factors. For instance, a drug can do both either cure the ...
    • Classification of Factual and Non-Factual Statements Using Adversarially Trained LSTM Networks 

      Obembe, Daniel; 0000-0001-9890-4208 (2020-06-08)
      Being able to determine which statements are factual and therefore likely candidates for further verification is a key value-add in any automated fact-checking system. For this task, it has been shown that LSTMs outperform ...
    • A Cloud Based Automated Anomaly Detection Framework 

      Datta Kumar, Prathibha (Computer Science & Engineering, 2014-12)
      A machine-to-machine (M2M) communications network hosts millions of heterogeneous devices such as for vehicle tracking, medical services, and home automation and security services. These devices exchange thousands of ...
    • Cloud Hopper: A Unified Cloud Solution to Manage Heterogeneous Clouds 

      Jain, Shraddha; 0000-0003-2311-0272 (2016-12-09)
      Cloud environments are built on virtualization platforms which offer scalability, on-demand pricing, high performance, elasticity, easy accessibility of the resources and cost efficient services. Most of the small and large ...
    • CLOUD MERGE: HETEROGENEOUS CLOUD APPLICATION MIGRATION USING PLATFORM AS A SERVICE 

      Jain, Mayank; 0000-0002-5440-118X (2016-12-16)
      With the evolution of cloud service providers offering numerous services such as SaaS, IaaS, PaaS, options for enterprises to choose the best set of services under optimal costs have also increased. The migration of web ...
    • Comparing Web Application Scanners For XSS Attacks 

      Xia, Dengfeng (Computer Science & Engineering, 2013-03-20)
      As software industry is paying increasing attention to web application security, various testing tools with black box testing feature have been developed. To better evaluate their performance, researchers have made efforts ...
    • A Comparison And Evaluation Of Motion Indexing Techniques 

      Bhatia, Harnish (Computer Science & Engineering, 2010-11-01)
      Motion capture (mocap) is a way to digitally represent the spatio-temporalstructure of human movement. Human motion is generally captured in long sequences to record the natural and complex aspects of human actions, its ...
    • COMPARISON OF MACHINE LEARNING ALGORITHMS IN SUGGESTING CANDIDATE EDGES TO CONSTRUCT A QUERY ON HETEROGENEOUS GRAPHS 

      Bhoopalam, Rohit Ravi Kumar; 0000-0003-4561-6557 (2016-05-11)
      Querying graph data can be difficult as it requires the user to have knowledge of the underlying schema and the query language. Visual query builders allow users to formulate the intended query by drawing nodes and edges ...
    • Comparison Of Search-based And Kernel-based Methods For Graph-based Relational Learning 

      Gonsalves, Chris Manuel (Computer Science & Engineering, 2007-08-23)
      Graph-based relational learning has been the focus of relational learning for quite some time. As most of the real-world data is structured, and hence cannot be represented in a single table, various logic-based and ...