Search
Now showing items 31-40 of 48
Extractive Summarization and Simplification of Scholarly Literature
(2020-05-14)
Research papers and journals have always played a crucial role in the field of research and development. However, these research papers usually have a complex usage of language which limits the range of target readers. The ...
Development of Text Analytics for Debriefing Reflection Essays
(2020-06-01)
Evaluating and providing feedback to hundreds of free text assignments in
an online environment is a challenging task for an instructor where he has to scan through essays to identify perspectives that are expected to ...
Semi-supervised Learning using Triple-Siamese Network
(2020-06-04)
Missing data problem is inevitable in mostly all research areas including Artificial Intelligence, Machine Learning and Computer Vision where we have modicum knowledge about the complete dataset. One of the key reasons of ...
DAS page replacement algorithm
(2020-06-04)
There are different page replacement algorithms and yet there seems to be some drawbacks in them, making no page replacement algorithm ideal. To be one step closer to achieving the ideal algorithm it is vital to have a ...
PERSON IDENTIFICATION AND TINETTI SCORE ASSESSMENT USING BALANCE PARAMETERS TO DETERMINE FALL RISK
(2020-09-03)
This thesis is aimed at a substantial health problem among the elderly population that is “Fall”, a major cause of accidental home deaths. Studies show approximately one-third of community-dwelling people over 65 years of ...
ACTIVITY RECOGNITION TO MIMIC HUMAN PERCEPTION
(2020-09-03)
The recognition of activities from video is a capability that is important for a wide range of applications, ranging from basic scene understanding to the successful prediction of behavior in autonomous vehicle applications. ...
"How Good are They?" - A State of the Effectiveness of Anti-Phishing Tools on Twitter
(2020-07-02)
Phishing websites are one of the most pervasive online attack vectors, with nearly 1.5 million such attacks created every month. Social media is the primary ground for phishing attacks, with 86% of these attacks originating ...
In Situ Sensor Calibration Using Noise Consistency
(2020-09-08)
Robots rely on sensors to map their surroundings. As a result, the accuracy of the map depends heavily on the sensor noise and in particular on accurate knowledge of it. The common way to ...
A Survey on DDoS Attacks in Edge Servers
(2020-12-09)
In modern times, the need for latency sensitive applications is growing rapidly. Cloud computing
infrastructure is unable to provide support to such delay sensitive applications. Therefore, a new
paradigm called edge ...
Big Data In Single Player Games
(2020-05-28)
Improving video games can be exponentially more efficient by utilizing big data. Big data plays a big part in modern gaming, especially for multiplayer games like poker, first person shooter games. Utilizing the data ...