Browsing MS Theses - DO NOT EDIT by Title
Now showing items 111-130 of 355
-
EARLY DETECTION OF GLAUCOMA USING MODIFIED RESIDUAL U-NET CONVOLUTIONAL NEURAL NETWORK
(2020-12-07)Glaucoma is the second leading cause of blindness all over the world, with apparently 75 million cases reported worldwide in 2018. If it’s not diagnosed at an early stage, glaucoma may cause irreversible damage to the optic ... -
Effective Crypto Ransomware Detection Using Hardware Performance Counters
(2019-05-16)Systems affected by malware in the past 10 years has risen from 29 million to 780 million, which tells us it is a rapidly growing threat. Viruses, ransomware, worms, backdoors, botnets, etc. all come under malware. Ransomware ... -
Efficient Main Memory Algorithms For Significant Interval And Frequent Episode Discovery
(Computer Science & Engineering, 2007-08-23)There is a considerable research on sequential mining of time-series data. Sensor-based applications such as MavHome require prediction of events for automating the environment using time-series data collected over a period ... -
Efficient Processing Of Set Queries Using Bitmap Index
(Computer Science & Engineering, 2008-09-17)Growing complexity of enterprise-wide data and business processes necessitates the efficiency of complex decision support set queries. However, contemporary DBMS remain unsuccessful in handling set queries efficiently. In ... -
Efficient Visualization Of Streaming Sensor Network Data Using Approximation Technique
(Computer Science & Engineering, 2007-08-23)By commanding a large number of wireless sensor nodes capable of sensing, communicating, and computing, wireless sensor networks have revealed their vast potential in a plethora of applications. However, due to the stringent ... -
Efficient XQuery Processing Of Streamed XML Fragments
(Computer Science & Engineering, 2007-08-23)XStreamCast is a push-based streamed XML query processing system that supports multiple servers and clients. The servers broadcast streamed XML data while the clients register to these servers for a specific service and ... -
EMAuth: A USABLE CONTINUOUS AUTHENTICATION SCHEME
(2023-05-18)**Please note that the full text is embargoed until 05/12/2025** ABSTRACT: In recent years, wearables have become an integral part of daily life for most users. Wearables provide a seamless supplement to their main ... -
Embedded Sparse Representation For Image Classification
(Computer Science & Engineering, 2011-03-03)Image classification, such as face recognition and scene categorization, is an important research area in computer vision over the last decade. It has been successfully applied to many image analysis applications. Images ... -
An Emperical Evaluation Of Adequacy Criteria For Testing Concurrent Programs
(Computer Science & Engineering, 2007-08-23)A concurrent program contains two or more threads that execute concurrently and work together to perform some task. Concurrency increases the efficiency of a program. Testing of concurrent programs has been a challenging ... -
Enabling Context-aware Applications In Smart Environments
(Computer Science & Engineering, 2010-07-19)Recognizing human activities is an important feature for the development of contextaware applications that are so fundamental to enabling assistive environments. Only once these applications are able to determine the ... -
ENABLING THIRD PARTY SERVICES OVER DEEP WEB DATABASES AND LOCATION BASED SERVICES
(2018-05-08)Deep web databases are pillars of today’s internet services hidden behind HTML forms and Top-K search interfaces. While Top-K search interfaces provide a good way to retrieve information, it still lacks in addressing the ... -
End-to-end Optimal Algorithms For Traffic Engineering, Failure Detection And Recovery In Connectionless Networks
(Computer Science & Engineering, 2007-08-23)In this thesis we propose a novel scheme to achieve intra-domain Traffic Engineering (TE), Failure Detection and Recovery (FR) in connectionless networks. This scheme addresses rate adaptation, load balancing and stability ... -
END-USER FRAMEWORK FOR ROBOT CONTROL
(2021-05-10)This thesis describes in detail a developed end-user framework for a humanrobot collaborative system for common tasks, such as pick and place. The system is designed for semi-automated pick and place tasks as well as manual ... -
Enhancements To The SAM-grid Infrastructure
(Computer Science & Engineering, 2007-08-23)SAM-Grid is a grid computing infrastructure for high energy physics (HEP) experiments in Fermilab. It is composed of data handling, job management and information management components. There are several challenges when ... -
Enhancing Health Tweet Classification: An evaluation of Transformer-based models for Comprehensive Analysis
(2023-05-10)The task of health tweet classification entails identifying whether a given tweet is health-related or not. While existing research in this area has made significant progress in classifying tweets into specific sub-domains ... -
Enhancing JSWAT For Monitor-based Executions
(Computer Science & Engineering, 2008-08-08)Concurrent programs contain more than one thread that executes concurrently to accomplish a particular task. Since the threads in a concurrent program work together to accomplish a common goal, they share the data, code, ... -
Estimation Myopia: Tinkering With Perception In Software Estimation And Placebo Estimation In Edw
(Computer Science & Engineering, 2014-12)The goal of this study is to explore an effective way to provide timely and accurate size estimates for software and for an enterprise data warehouse (EDW). Several research papers attempt to adapt function point (FP) ... -
EStream: An Integration Of Event And Stream Processing
(Computer Science & Engineering, 2007-08-23)Event and stream data processing models have been researched extensively and are utilized in diverse application domains. Advanced applications require both event and stream processing, which is currently not supported. ... -
Evading Existing Stepping Stone Detection Methods Using Buffering
(Computer Science & Engineering, 2007-08-23)To gain anonymity and complicate their apprehension, attackers launch attacks not from their own systems but from previously compromised systems called stepping stones. An effective way to detect stepping stones is by ... -
EVALUATE THE USE OF FPGA SoC FOR REAL TIME DATA ACQUISITION AND AGGREGATE MICRO-TEXTURE MEASUREMENT USING LASER SENSORS
(2016-08-22)Aggregate texture has been found to play an important role in improving the longevity of highways and pavements. Aggregates with appropriate surface roughness level have an improved bonding with asphalt binder and concrete ...