Browsing MS Theses - DO NOT EDIT by Title
Now showing items 164-183 of 355
-
Handling Periodic Signs In American Sign Language Using Synthetic Generation Of Periods
(Computer Science & Engineering, 2011-03-03)American Sign Language (or ASL) is the dominant sign language of deaf people in United States and parts of Canada. 500,000 to 2 million people use ASL as their primary language in United States. ASL uses hands, face and ... -
HDB-subdue, A Relational Database Approach To Graph Mining And Hierarchical Reduction
(Computer Science & Engineering, 2007-08-23)Data mining aims at discovering interesting and previously unknown patterns from data sets. Transactional mining (association rules, decision trees etc.) can be effectively used to find non-trivial patterns in categorical ... -
HEALTH MONITORING OF ATLAS DATA CENTER CLUSTERS AND FAILURE ANALYSIS
(2018-12-06)Monitoring the health of data center clusters is an integral part of any industrial facility. ATLAS is one of the High Energy Physics experiments at the Large Hadron Collider (LHC) at CERN. ATLAS DDM (Distributed Data ... -
HEROS: A Patient-centered Goal-directed Electronic Medical Record System For The Homeless
(Computer Science & Engineering, 2007-08-23)Homelessness is a growing problem in the United States. Numerous barriers keep the street homeless from obtaining healthcare. Medical Street Outreach (MSO) programs are designed to reach out to the homeless. Gathering ... -
HIDING IN PLAIN SIGHT? THE IMPACT OF FACE RECOGNITION SERVICES ON PRIVACY
(2019-12-12)The public at large is increasingly concerned with privacy online. While the focus is on the data privately collected by platforms, there are also privacy concerns in the realm of public data. Seemingly innocuous information ... -
Hiearchical Overlay For Service Composition In Pervasive Environments
(Computer Science & Engineering, 2007-09-17)The objective of pervasive computing is to allow users to perform their tasks in a transparent way regardless of device features. Resources on devices should be exploited to provide services in order to perform user tasks. ... -
Hierarchical Reinforcement Learning Using Automatic Task Decomposition And Exploration Shaping
(Computer Science & Engineering, 2008-08-08)Reinforcement learning agents situated in real world environments have to be able to address a number of challenges in order to succeed at accomplishing a wide range of tasks over their lifetime. Among these, such systems ... -
High Performance Cluster And Grid Computing Solutions For Science
(Computer Science & Engineering, 2008-09-17)Computing for science has very peculiar requirements. There is an enormous amount of data to analyze to get useful information. This requires greater computing power, huge data storage and high-capacity network. High ... -
High-level Constraint Support For Combinatorial Testing
(Computer Science & Engineering, 2008-09-17)Combinatorial testing constructs test cases by combining different input parameter values based on some effective combinatorial strategy. This software testing approach has displayed very promising attributes and ... -
A Hmm-based Prediction Model For Spatio-temporal Trajectories
(Computer Science & Engineering, 2014-12)Spatio-temporal trajectories are time series data that represent movement of an object over the time. Hidden Markov Models (HMM), a variant of Markov Models (MM), were first applied at a large scale to speech recognition ... -
"How Good are They?" - A State of the Effectiveness of Anti-Phishing Tools on Twitter
(2020-07-02)Phishing websites are one of the most pervasive online attack vectors, with nearly 1.5 million such attacks created every month. Social media is the primary ground for phishing attacks, with 86% of these attacks originating ... -
A Human Motion Database: The Cognitive And Parametric Sampling Of Human Motion
(Computer Science & Engineering, 2011-03-03)Motion databases have a strong potential to guide progress in the field of machine recognition and motion-based animation. Existing databases either have a very loose structure that do not sample the domain according to ... -
Hydrological Visualization And Analysis System And Drought Related Feature Selection Based On Sectional Correlation Measurement
(Computer Science & Engineering, 2013-03-20)Because of the larger data storage and the faster computational power, computer can process and store much finer resolution data. Aside from data analysis, data visualization is also an important task to understand the ... -
iGait: Vision-based Low-Cost, Reliable Machine Learning Framework for Gait Abnormality Detection
(2017-12-20)Human gait has shown to be a strong indicator of health issues under a wide variety of conditions. For that reason, gait analysis has become a powerful tool for clinicians to assess functional limitations due to neurological ... -
The Impact Of Different Cues on the Memorability Of System-assigned Recognition-based Textual Passwords
To ensure memorability, users employ predictable patterns when creating new passwords. These patterns make passwords easy to guess, which not only increases risks to users but also for the entire system. In contrast, ... -
IMPLEMENTATION AND ANALYSIS OF XCACHE ON SOUTHWEST TIER 2 CLOUD CLUSTER FOR LARGE HADRON COLLIDER ATLAS EXPERIMENT
(2019-05-07)The ATLAS Experiment is one of the four major particle-detector experiments at the Large Hadron Collider at CERN (birthplace of the World Wide Web). The ATLAS was one of the LHC experiments that successfully demonstrated ... -
Implementation Of A Middleware Architecture For Collaboration Among Mobile Devices In Opportunistic Networks.
(Computer Science & Engineering, 2013-03-20)Opportunistic networks provide a viable platform for mobile communications due to the ubiquity of smart phones. These networks are characterized by lack of end to-end reliable connections. In such networks, establishing ... -
Improving Gesture Recognition Performance Using The Dynamic Space-time Warp Algorithm
(Computer Science & Engineering, 2013-07-22)The DSTW algorithm was originally used as the fundamental algorithm for a gesture recognition software. When the need arose for implementing gesture recognition on-board a robotic vehicle, the original recognition software ... -
Improving Memorization and Long Term Recall of System Assigned Passwords
(2016-12-20)Systems assigned password have guaranteed robustness against guessing attacks, but they are hard to memorize. To make system assigned passwords more usable, it is of prime importance that systems that assign random password ... -
Improving time and space efficiency of trie data structure
(2018-08-15)Trie or prefix tree is a data structure that has been used widely in some applications such as prefix-matching, auto-complete suggestions, and IP routing tables for a long time. What makes tries even more interesting is ...