Browsing MS Theses - DO NOT EDIT by Title
Now showing items 324-343 of 355
-
TaPIN: A Two-Factor User Authentication Scheme for Smartwatches through Secret Finger Tapping
(2020-05-11)Nowadays, smartwatches have become one of the most common wearable gadgets as they are small and portable. As more and more personal information is managed and processed inside smartwatches, it is important to have a secure ... -
Target Tracking With Lucas-kanade Optical Flow And Particle Filters Through Affine Transforms And Occlusion
(Computer Science & Engineering, 2011-03-03)This paper investigates a hybrid approach derived from Lucas-Kanade optical flow tracking and particle filters that is capable of tracking objects through occlusion and affine transformations. This approach is inspired ... -
Temporal Potential Function Approach For Path Planning In Dynamic Environments
(Computer Science & Engineering, 2009-09-16)A Dynamic environment is one in which either the obstacles or the goal or both are in motion. In most of the current research, robots attempting to navigate in dynamic environments use reactive systems. Although reactive ... -
Testing Java Monitors By State Space Exploration
(Computer Science & Engineering, 2007-08-23)Java monitors are classes that are intended to be accessed by multiple threads at the same time. Detecting synchronization faults in Java Monitors is considerably more challenging than testing regular classes, due to the ... -
TEXT MINING ON TWITTER DATA TO EVALUATE SENTIMENT
(2018-12-06)Social media platforms have been a major part of our daily lives. But with the freedom of expression there is no way one can check whether the posts/tweets/expressions are classified on which polarity. Since Twitter is one ... -
Texture Measurement And Skid Number Prediction Using Laser Data Acquisition, Digital Signal Processing, And Neural Networks
(Computer Science & Engineering, 2008-08-08)Real-time estimation of the skid number of pavement is difficult. Traditional methods of volumetric measurement are cumbersome and time consuming. It is desired to enable prediction of the skid number of pavement using ... -
The Impact of Toxic Replies on Twitter Conversations
(2019-12-11)Social media has become an empowering agent for individual voices and freedom of expression. Yet, it can also serve as a breeding ground for hate speech. According to a Pew Research Center study, 41% of Americans have been ... -
“Tie the Flags Together”: Migration, Nativism, and the Orange Order in the United States, 1840-1930
(2018-12-07)“Tie the Flags Together”: Migration, Nativism, and the Orange Order in the United States, 1840-1930 Cory Wells Throughout the nineteenth century, tens of thousands of Irish Protestants who migrated to the United States ... -
Top K Query Processing In Distributed Database
(Computer Science & Engineering, 2007-09-19)Today's data is rarely stored in centralized location due to the enormous amount of information that needs to be stored and also to increase reliability, availability and performance of the system. Same data is stored in ... -
TOPOLOGICAL AND FEATURE BASED IDENTIFICATION OF HOLE BOUNDARIES IN POINT CLOUD DATA AND DIFFERENTIATION BETWEEN SURFACE AND PHYSICAL HOLES
(2018-12-13)With the advent of autonomous agents becoming prominent in everyday lives, the importance of processing the surroundings into understandable features becomes more and more important. 3D point clouds play a major role in ... -
Towards A Stronger Peer-to-peer Anonymous System
(Computer Science & Engineering, 2007-08-23)Anonymous communications systems on the Internet provides protection against eavesdroppers and others that seek to link users with their communications. These systems have many important applications in areas such as law ... -
Towards An Implementation Of Avoip: Anonymous Voice-over-ip
(Computer Science & Engineering, 2009-09-16)Voice over IP (VoIP) is one of the fastest growing telecommunicaiton market today. However with great popularity comes greater security risk. When we communicate over the Internet we expose our identity to all the prying ... -
TOWARDS END-TO-END SEMI-SUPERVISED DEEP LEARNING FOR DRUG DISCOVERY
(2018-11-26)Observing the recent progress in Deep Learning, the employment of AI is surging to accelerate drug discovery and cut R&D costs in the last few years. However, the success of deep learning is attributed to large-scale clean ... -
Towards Location Free Movement Recognition with Channel State Information
(2019-12-03)Channel state information based movement recognition has gathered immense attention over recent years. Different from traditional systems which usually require wearable sensors or surveillance cameras, many existing works ... -
Towards Modeling The Behavior Of Physical Intruders In A Region Monitored By A Wireless Sensor Network
(Computer Science & Engineering, 2010-07-19)A priority task for homeland security is the coverage of large spans of open border that cannot be continuously physically monitored for intrusion. Low-cost monitoring solutions based on wireless sensor networks have been ... -
Towards Optimum Play-out Buffering Delay In Voice over IP
(Computer Science & Engineering, 2007-08-23)Voice over Internet Protocol (VoIP) or transmission of real-time voice packets over the Internet is slowly emerging as a cost-effective alternative to the traditional Public Switched Telephone Network (PSTN). However, ... -
Tracing And Replay Of Real-time Concurrent Programs In Vxworks
(Computer Science & Engineering, 2007-08-23)Real-time concurrent programs are difficult to analyze, debug and test because of the existence of race conditions. In particular, cyclic debugging requires the ability to reproduce a failed execution. That is, when a ... -
Typifying Wikipedia Articles
(Computer Science & Engineering, 2011-03-03)In Wikipedia, each article represents an entity. Entity can have different types like person, country, school, science etc. Although Wikipedia encapsulates category information for each page, sometimes it is not sufficient ... -
UBCA: A Utility Based Clustering Architecture For Peer-to-peer Networks
(Computer Science & Engineering, 2007-08-23)Use of the Peer-to-Peer (P2P) architecture has recently spread in popularity. File sharing and ad hoc networks have contributed to the architecture's usage. P2P generates new challenges in scalability, fairness, and ... -
ULTRA-CONTEXT: MAXIMIZING THE CONTEXT FOR BETTER IMAGE CAPTION GENERATION
(2019-05-07)Several combinations of visual and semantic attention have been geared towards developing better image captioning architectures. In this work we introduce a novel combination of word-level semantic context with image ...