Search
Now showing items 21-26 of 26
Graph Embedding Discriminative Unsupervised Dimensionality Reduction
(Computer Science & Engineering, 2014-12)
In this thesis, a novel graph embedding unsupervised dimensionality reduction method was proposed. Simultaneously, we assigned the adaptive and optimal neighbors on the basis of the projected local distances, thus we ...
A Method To Evade Keyword Based Censorship
(Computer Science & Engineering, 2014-12)
Many countries block the content of web pages which are deemed against the morals, religious rules or policies set by government or organization. Countries like China block the post which is against their government interest. ...
Estimation Myopia: Tinkering With Perception In Software Estimation And Placebo Estimation In Edw
(Computer Science & Engineering, 2014-12)
The goal of this study is to explore an effective way to provide timely and accurate size estimates for software and for an enterprise data warehouse (EDW). Several research papers attempt to adapt function point (FP) ...
A Cloud Based Automated Anomaly Detection Framework
(Computer Science & Engineering, 2014-12)
A machine-to-machine (M2M) communications network hosts millions of heterogeneous devices such as for vehicle tracking, medical services, and home automation and security services. These devices exchange thousands of ...
A Hmm-based Prediction Model For Spatio-temporal Trajectories
(Computer Science & Engineering, 2014-12)
Spatio-temporal trajectories are time series data that represent movement of an object over the time. Hidden Markov Models (HMM), a variant of Markov Models (MM), were first applied at a large scale to speech recognition ...
Social Data Analytics Using Tensors And Sparse Techniques
(Computer Science & Engineering, 2014-07-14)
The development of internet and mobile technologies is driving an earthshaking social media revolution. They bring the internet world a huge amount of social media content, such as images, videos, comments, etc. Those ...