Browsing MS Theses - DO NOT EDIT by Title
Now showing items 155-174 of 355
-
Gait Analysis On A Smart Floor For Health Monitoring
Gait analysis is the investigation of an individual pattern of walking. Based on studies in Psychophysics, it has been shown that the human gait contains unique information that is useful for the evaluation of foot and ... -
GENERATING ADVERSARIAL EXAMPLES FOR RECRUITMENT RANKING ALGORITHMS
(2020-12-16)There is no doubt that recruitment process plays an important role for both employers and applicants. Based on huge number of job candidates and open vacancies, recruitment process is expensive, time consuming and stressful ... -
GENERATING AN ADAPTIVE PATH USING RRT SAMPLING AND POTENTIAL FUNCTIONS WITH DIRECTIONAL NEAREST NEIGHBORS
(2018-12-13)Planning algorithms have attained omnipresent successes in several fields including robotics, animation, manufacturing, drug design, computational biology and aerospace applications. Path Planning is an essential component ... -
GLAZE EPOCHS: EXTERNALIZING MATERIAL KNOWLEDGE THROUGH TANGIBLE DATA RECORDS IN A CERAMICS STUDIO
(2021-05-11)The "material turn" in HCI has placed a renewed focus on informing design from the relationships found in material-based interactions. While several ethnographic works provide insight into how practitioners converse with ... -
GPU Parallel Collections For Scala
(Computer Science & Engineering, 2011-07-14)A decade ago, graphics processing units have been used specifically for high-speed graphics. Of late, they are becoming more popular as general purpose parallel processors. With the release of CUDA, ATI Stream and OpenCL, ... -
Graph Embedding Discriminative Unsupervised Dimensionality Reduction
(Computer Science & Engineering, 2014-12)In this thesis, a novel graph embedding unsupervised dimensionality reduction method was proposed. Simultaneously, we assigned the adaptive and optimal neighbors on the basis of the projected local distances, thus we ... -
Graph-based Learning Using A Naive Bayesian Classifier
(Computer Science & Engineering, 2007-08-23)Graph-based data representation is becoming increasingly more commonplace, as graphs can represent some kinds of data more efficiently than relational tables. As such, interesting patterns in the form of subgraphs can be ... -
Graphical Event-Directed Scenario Behavioral Specifications for the Scenario-Based Engineering Process (SEP) Using A Domain Specific Software Architecture (ASSA) Philosophy
(Computer Science, 2014-06-17)This thesis extends scenarios of a system into real-time event digraphs. A scenario is an event trace resulting from a particular thread of system execution. An event digraph is an event network. Multiple external stimuli ... -
Group Key Distribution Via Local Collaboration In Wireless Sensor Networks
(Computer Science & Engineering, 2007-08-23)Wireless sensor networks have been recognized as one of the most important technologies in the networking world. Security of sensor networks is one of the major concerns today. To this end, a whole suite of protocols have ... -
Handling Periodic Signs In American Sign Language Using Synthetic Generation Of Periods
(Computer Science & Engineering, 2011-03-03)American Sign Language (or ASL) is the dominant sign language of deaf people in United States and parts of Canada. 500,000 to 2 million people use ASL as their primary language in United States. ASL uses hands, face and ... -
HDB-subdue, A Relational Database Approach To Graph Mining And Hierarchical Reduction
(Computer Science & Engineering, 2007-08-23)Data mining aims at discovering interesting and previously unknown patterns from data sets. Transactional mining (association rules, decision trees etc.) can be effectively used to find non-trivial patterns in categorical ... -
HEALTH MONITORING OF ATLAS DATA CENTER CLUSTERS AND FAILURE ANALYSIS
(2018-12-06)Monitoring the health of data center clusters is an integral part of any industrial facility. ATLAS is one of the High Energy Physics experiments at the Large Hadron Collider (LHC) at CERN. ATLAS DDM (Distributed Data ... -
HEROS: A Patient-centered Goal-directed Electronic Medical Record System For The Homeless
(Computer Science & Engineering, 2007-08-23)Homelessness is a growing problem in the United States. Numerous barriers keep the street homeless from obtaining healthcare. Medical Street Outreach (MSO) programs are designed to reach out to the homeless. Gathering ... -
HIDING IN PLAIN SIGHT? THE IMPACT OF FACE RECOGNITION SERVICES ON PRIVACY
(2019-12-12)The public at large is increasingly concerned with privacy online. While the focus is on the data privately collected by platforms, there are also privacy concerns in the realm of public data. Seemingly innocuous information ... -
Hiearchical Overlay For Service Composition In Pervasive Environments
(Computer Science & Engineering, 2007-09-17)The objective of pervasive computing is to allow users to perform their tasks in a transparent way regardless of device features. Resources on devices should be exploited to provide services in order to perform user tasks. ... -
Hierarchical Reinforcement Learning Using Automatic Task Decomposition And Exploration Shaping
(Computer Science & Engineering, 2008-08-08)Reinforcement learning agents situated in real world environments have to be able to address a number of challenges in order to succeed at accomplishing a wide range of tasks over their lifetime. Among these, such systems ... -
High Performance Cluster And Grid Computing Solutions For Science
(Computer Science & Engineering, 2008-09-17)Computing for science has very peculiar requirements. There is an enormous amount of data to analyze to get useful information. This requires greater computing power, huge data storage and high-capacity network. High ... -
High-level Constraint Support For Combinatorial Testing
(Computer Science & Engineering, 2008-09-17)Combinatorial testing constructs test cases by combining different input parameter values based on some effective combinatorial strategy. This software testing approach has displayed very promising attributes and ... -
A Hmm-based Prediction Model For Spatio-temporal Trajectories
(Computer Science & Engineering, 2014-12)Spatio-temporal trajectories are time series data that represent movement of an object over the time. Hidden Markov Models (HMM), a variant of Markov Models (MM), were first applied at a large scale to speech recognition ... -
"How Good are They?" - A State of the Effectiveness of Anti-Phishing Tools on Twitter
(2020-07-02)Phishing websites are one of the most pervasive online attack vectors, with nearly 1.5 million such attacks created every month. Social media is the primary ground for phishing attacks, with 86% of these attacks originating ...