Browsing Department of Computer Science and Engineering by Title
Now showing items 142-161 of 606
-
Design And Analysis Of Location Centered Large-scale Opportunistic Networks
(Computer Science & Engineering, 2014-03-12)With the high penetration of mobile devices and their equipments of wireless interfaces in people's lives, the development of the scenario of Opportunistic Networks(OppNets) has become available. OppNets enable transmissions ... -
Design And Analysis Of Place-based Opportunistic Networks
The swift growth and popularization of wireless technology and mobile smart phones have unfolded various opportunities and challenges before researchers' eyes. Opportunistic networks is one of the interesting and challenging ... -
Design And Implementation Of An Open Beaconing Architecture For Internet Of Things
The power of the Internet is penetrating into the physical world with ever increasing speed and expanding reach under the general concept of Internet of Things. Extensive sets of efforts have been devoted toward establishing ... -
DESIGN OF HAPTICALLY ENABLED WHEELCHAIR FOR ASSISTIVE AUTONOMY
(2018-05-14)The first records of wheeled seats being used for transporting disabled people date to 8th century in China, however the wheelchair has evolved tremendously since its inception. An electric-powered wheelchair, commonly ... -
DESIGNING HIGHLY-EFFICIENT DEDUPLICATION SYSTEMS WITH OPTIMIZED COMPUTATION AND I/O OPERATIONS
(2019-05-10)Data deduplication has been widely used in various storage systems for saving storage space, I/O bandwidth, and network traffic. However, existing deduplication techniques are inadequate as they introduce significant ... -
Designing Large-scale Key-value Systems on High-Speed Storage Devices
(2022-05-09)With the evolution of new technologies, such as edge computing, full self-driving, virtual reality, and multi-media streaming, the volume of data is growing at an accelerated speed. The global data volume could achieve ... -
Detect Program Vulnerabilities Using Trace-based Security Testing
(Computer Science & Engineering, 2011-10-11)Software vulnerabilities are program flaws that can be exploited by attackers to compromise the security of a software system. Although many approaches have been proposed to detect or prevent software attacks, software ... -
DETECT TRAFFIC SIGNS FROM LARGE STREET VIEW IMAGES WITH DEEP LEARNING
(2019-12-10)Autonomous driving is about to shaping the future of our life. Self-driving vehicles produced by Waymo or many other companies have demonstrated excellent driving capabilities on the road. However, accidents still happen. ... -
Detecting Cognitive Fatigue in Subjects with Traumatic Brain Injury from FMRI Scans Using Self-Supervised Learning
(ACM, 2023-07)Understanding cognitive states from fMRI data have yet to be investigated to its full extent due to its complex nature. In this work, the problem of understanding cognitive fatigue among TBI patients has been formulated ... -
Detecting Medication Consumption Patterns In Assistive Environments
(Computer Science & Engineering, 2010-11-01)One of the issues in healthcare systems or medical information systems is the reduction of medical errors to ensure patient safety. Our approach is to develop a cyber physical system which applies different RFID tags to ... -
Detecting Real-time Check-worthy Factual Claims in Tweets Related to U.S. Politics
(2015-12-07)In increasing democracy and improving political discourse, political fact-checking has come to be a necessity. While politicians make claims about facts all the time, journalists and fact-checkers oftentimes reveal them ... -
Detection and classification of object presence and characteristics in a water container using high frequency ultrasound
(2022-05-17)Detection and characterization of soluble, diffuse, and solid objects and their characteristics in water has important implications in various applications, including water quality assessment and incontinence monitoring ... -
Detection Of Fingers With A Depth Based Hand-detector In Static Frames
(Computer Science & Engineering, 2013-10-23)This thesis presents a method for a finger detection system. It is assumed that the user taps their fingers on a table, and that the camera is placed on the same table in front of their fingers. This setup is motivated by ... -
Development And Simulation Of Focus Of Attention Using Reinforcement Learning And Function Approximation
(Computer Science & Engineering, 2013-10-22)Without short-term memory, people would have little hope to learn and accomplish tasks. The same can be said for artificially intelligent agents. Often referred as Miller's Law, the number of working objects that a human ... -
Development Of A Detached Vital Sign Home Monitoring Management System
(Computer Science & Engineering, 2013-03-20)Patients coping with chronic illnesses are often inconvenienced with routine doctor visits for the sole purpose of conducting basic vital sign monitoring. Such visits tend to be disruptive, and are more so when the patient ... -
Development of Text Analytics for Debriefing Reflection Essays
(2020-06-01)Evaluating and providing feedback to hundreds of free text assignments in an online environment is a challenging task for an instructor where he has to scan through essays to identify perspectives that are expected to ... -
DIMENSIONS OF DISSENT: THE URBAN LANDSCAPES OF THE 2017 WOMEN’S MARCH IN THE UNITED STATES
(2019-01-02)In considering the design of protest events, one might assume a certain set of conditions, for example the focus of civic monuments and buildings within an appropriated public civic space. However, are these conditions ... -
Discovery Of Anomalous Patterns Within Multidimensional, Asynchronous Time-series With An Emphasis On The "internet Of Things"
(Computer Science & Engineering, 2014-12)In this dissertation we examine ``Internet-scale'' systems that present us with multidimensional time-series data characterized by many sources sending symbols at irregular intervals over a common channel. We explore a ... -
A Discrete Event Based Stochastic Simulation Approach For Studying The Dynamics Of Biological Networks
(Computer Science & Engineering, 2008-04-22)With increasing availability of data resources on the molecular parts of a living cell, biologists are focusing on holistic understanding of cellular mechanisms and the emergent dynamics arising out of their complex ... -
Distinct Value Estimation By Sampling On Unstructured Peer To Peer Networks
(Computer Science & Engineering, 2008-04-22)Peer-to-Peer networks have become very popular on the Internet, with millions of peers all over the world sharing large volumes of data. The sheer scale of these networks has made it difficult to gather statistics that ...