Now showing items 33-40 of 40

    • A Self-Organized Approach For Detecting Communities in Networks 

      Collingsworth, Bennett C (2016-12)
      The community structure of networks reveals hidden information about the whole network structure that cannot be discerned using other topological properties. Yet, the importance of identifying community structure in ...
    • Soteria: A Persuasive eSecurity Assistant 

      Bhardwaj, Punica (2016-12)
      “…security is only as good as the weakest link, and people are the weakest link in the chain.” – B Schneier, 2002 Humans are often referred to as the “weakest link” in the security chain because of the poor security ...
    • Standardizing the Requirements Specification of Multi-Agent Systems 

      Slhoub, Khaled Ali M (2018-07)
      Development of multi-agent systems is negatively impacted by the lack of process standardization across the major development phases, such as the requirements analysis phase. This issue creates a key ...
    • Studies with Dynamic Nuclear Imaging Image Reconstruction Algorithm 

      Chang, Haoran (2016-12)
      Non-negative matrix factorization (NMF) is a useful method for those non-negative multivariate data. In nuclear imaging, NMF, which is also called factor analysis, is used to analyze the 4D image of positron emission ...
    • A Study of Cloud Haskell With Applications to MapReduce 

      Ramnath, Shreyas (2018-07)
      In this thesis, we developed a MapReduce application for performing word count in files. We compared the performance of the implementations done using Control.Parallel - built-in Haskell library for parallel/concurrent ...
    • A Survey of Impact Analysis Tools for Effective Code Evolution 

      Galbo, Stephanie Perez Day (2017-04)
      Background: Software maintenance and evolution are becoming noticeably more important activities in the software development process, with the growing popularity of Agile/SCRUM and continuous integration. Impact analysis, ...
    • Towards Intelligent Intrusion Detection Systems for Cloud Computing 

      Aljebreen, Mohammed J (2018-07)
      Statistics presented in the background chapter show the tremendous number of security breaches that occurred in recent years. Furthermore, securing the new advanced technologies has become more challenging. Cloud computing ...
    • Transfer Learning with Convolutional Neural Networks Applied to Periocular Biometrics 

      Vangara, Kushal (2018-01)
      Biometrics technologies are designed for recognition of the unique physiological and behavioral features of an individual for identification and verification applications. There have been noteworthy advances in this field ...