Browsing MS Theses - DO NOT EDIT by Title
Now showing items 294-313 of 355
-
SCALABLE CONVERSION OF TEXTUAL UNSTRUCTURED DATA TO NoSQL GRAPH REPRESENTATION USING BERKELEY DB KEY-VALUE STORE FOR EFFICIENT QUERYING
(2017-12-13)Graph database is a popular choice for representing data with relationships. It facilitates easy modifications to the relational information without the need for structural redefinition, as in case of relational databases. ... -
Searching and Classifying Mobile Application Screenshots
(2016-12-16)Searching for a particular application layout image is a challenging task. No search provider gives an adequate method to filter the query results to the look of a mobile application. Searching for a particular style of ... -
SEES - An Adaptive Multimodal User Interface For The Visually Impaired
(Computer Science & Engineering, 2007-08-23)The enormous amount of electronic data present today can be a daunting task to access and process for a regular person, let alone someone with a disability. The World Wide Web and Electronic Mail have transformed the way ... -
Selective Cross Correlation In Passive Timing Analysis Attacks Against Low-latency Mixes
(Computer Science & Engineering, 2010-07-19)A mix is a communication proxy that hides the relationship between incoming and outgoing messages. Routing traffic through a path of mixes is a powerful tool for providing privacy. When mixes are used for interactive ... -
Selective Grouping Algorithm For Low Latency Anonymous Systems
(Computer Science & Engineering, 2013-03-20)Low latency anonymous communications are prone to timing analysis attacks. It is a technique by which the adversary can de-anonymize the user by correlating packet timing patterns. A recent proposal to stop these attacks ... -
SEMI-AUTOMATIC HAND POSE ESTIMATION USING A SINGLE DEPTH CAMERA
(2020-11-30)This paper addresses the problem of 3D hand pose annotations using a single depth camera. Although hand pose estimation methods rely critically on accurate 3D training data, creating such reliable training data is challenging ... -
Semi-supervised Learning using Triple-Siamese Network
(2020-06-04)Missing data problem is inevitable in mostly all research areas including Artificial Intelligence, Machine Learning and Computer Vision where we have modicum knowledge about the complete dataset. One of the key reasons of ... -
Sequence Alignment Editor - A New Tool To Assist With Inferring Phylogenetic And Functional Relationships In Biological Data
(Computer Science & Engineering, 2007-09-17)Biologists study evolution, discover functional and structural information in genomic or protein data through the extensive use of sequence alignments. It is very difficult to manually align long regions, so development ... -
Service Discovery By Automated Structural And Semantic Matching
(Computer Science & Engineering, 2007-08-23)Pervasive computing systems need to locate and use services dynamically. Current models of service location and interaction rely on a fixed contract, or service description, located by name and/or a combination of keywords. ... -
Shaping And Maintenance Of Low-latency Anonymity Systems
(Computer Science & Engineering, 2013-03-20)Surveillance of users on the Internet is growing. This makes it increasingly important to protect users' identity when they communicate online, especially for users like journalists, whistleblowers, and military officials. ... -
Shaping Network Topology For Privacy And Performance
(Computer Science & Engineering, 2013-03-20)Anonymity systems provide privacy for Internet communication and are becoming popular. Unfortunately, users experience slow Internet connection through existing systems because paths used to route traffic are selected ... -
Sign Gesture Spotting In American Sign Language Using Dynamic Space Time Warping
(Computer Science & Engineering, 2013-07-22)American Sign Language (ASL) is the primary sign language used by approximately 500,000 deaf and hearing-impaired people in the United States and Canada. ASL is a visually perceived, gesture-based language that employs ... -
Simulation Of Sensor Responses Of Advanced Security Systems
(Computer Science & Engineering, 2007-08-23)Security systems are becoming an increasingly important area of research. Advanced security detection and surveillance systems that integrates a variety of detection mechanisms, like signals from different kinds of sensors, ... -
SLICING ALGORITHM FOR COMPLEX CONTOUR GENERATION FROM COARSE MESHED ISO-SURFACE DATA
(2016-12-20)Finite element based topology optimization is used to develop complex geometric configurations for additive manufacturing. Complex coarse-meshed Iso-surface data is extracted from topology optimization results and smooth ... -
Social Coding Standards on TouchDevelop: An Empirical Study
(2017-12-20)This study compares and contrasts the application development pattern on Microsoft’s mobile application development platform with leading version control and social coding sites like Github. TouchDevelop is an in-browser ... -
Social Media Text Analysis using Multi-kernel Convolutional Neural Network
(2019-12-11)Transportation planners and ride hailing platforms such as Uber and Lyft use their riders feedback to assess their services and monitor customer satisfaction. Social media websites such as Facebook, Instagram, LinkedIn and ... -
SOFTWARE DEFINED LOAD BALANCING OVER AN OPENFLOW-ENABLED NETWORK
(2017-05-15)In this modern age of the Internet, the amount of data flowing through networking channels has exploded exponentially. The network services and routing mechanism affect the scalability and performance of such networks. ... -
Solving The Rubik's Cube With Parallel Processing
(Computer Science & Engineering, 2007-08-23)This thesis investigates parallel processing techniques for solving the 3 x 3 x 3 Rubik's Cube. We explore various state-space search based algorithmic approaches to optimally solve the Cube. The parallel processing approach ... -
A Source Code Search Engine For Keyword Based Structural Relationship Search
(Computer Science & Engineering, 2013-07-22)In an Object Oriented Program, we often see that a package contains several classes, a class contains several methods, a method calls other methods. We may say, there is a contains relationship between a package and a class ... -
Spatio-Temporal Patterns of GPS Trajectories Using Association Rule Mining
(2016-05-13)The availability of location-tracking devices such as GPS, Cellular Networks and other devices provides the facility to log a person or device locations automatically. This creates spatio-temporal datasets of user's movement ...