Browsing Theses/Dissertations by Title
Now showing items 28-40 of 40
-
Privus: Take Back Your Privacy The Effect of a User-Centered Approach on Privacy Management
(2018-04)Rapid innovations in science and engineering have created a greater opportunity for disruptive technologies to be established at a faster rate. Less than a decade ago mobile, phones were a mere tool for communication, ... -
Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments
(2016-12)Contemporary security systems attempt to provide protection against distributed denial-of-service (DDoS) attacks; however, they mostly use a variety of computing and hardware resources for load distribution and request ... -
A Recommender System for Improving Program Security Through Source Code Mining and Knowledge Extraction
(2018-07)The security of computer programs and systems is a very critical issue. Threats against computer networks and software are on the rise. Therefore, businesses and IT professionals should take steps to ... -
A Reinforcement Learning Approach to Autonomous Speed Control in Robotic Systems
(2017-05)Model-free reinforcement learning techniques have been successfully used in diverse robotic applications. In this thesis, we Implement the Q-learning algorithm as one of the most used model-free algorithms to find an ... -
Robotic Arm Tracing Curves Recognized by Camera
(2016-12)Applications such like soldering require robot arms to follow the soldering line as present on a surface. We assume here that the surface to be soldered is remote from the robotic arm, that the soldering is performed via ... -
A Self-Organized Approach For Detecting Communities in Networks
(2016-12)The community structure of networks reveals hidden information about the whole network structure that cannot be discerned using other topological properties. Yet, the importance of identifying community structure in ... -
Soteria: A Persuasive eSecurity Assistant
(2016-12)“…security is only as good as the weakest link, and people are the weakest link in the chain.” – B Schneier, 2002 Humans are often referred to as the “weakest link” in the security chain because of the poor security ... -
Standardizing the Requirements Specification of Multi-Agent Systems
(2018-07)Development of multi-agent systems is negatively impacted by the lack of process standardization across the major development phases, such as the requirements analysis phase. This issue creates a key ... -
Studies with Dynamic Nuclear Imaging Image Reconstruction Algorithm
(2016-12)Non-negative matrix factorization (NMF) is a useful method for those non-negative multivariate data. In nuclear imaging, NMF, which is also called factor analysis, is used to analyze the 4D image of positron emission ... -
A Study of Cloud Haskell With Applications to MapReduce
(2018-07)In this thesis, we developed a MapReduce application for performing word count in files. We compared the performance of the implementations done using Control.Parallel - built-in Haskell library for parallel/concurrent ... -
A Survey of Impact Analysis Tools for Effective Code Evolution
(2017-04)Background: Software maintenance and evolution are becoming noticeably more important activities in the software development process, with the growing popularity of Agile/SCRUM and continuous integration. Impact analysis, ... -
Towards Intelligent Intrusion Detection Systems for Cloud Computing
(2018-07)Statistics presented in the background chapter show the tremendous number of security breaches that occurred in recent years. Furthermore, securing the new advanced technologies has become more challenging. Cloud computing ... -
Transfer Learning with Convolutional Neural Networks Applied to Periocular Biometrics
(2018-01)Biometrics technologies are designed for recognition of the unique physiological and behavioral features of an individual for identification and verification applications. There have been noteworthy advances in this field ...