Browsing Auburn University Graduate School by Department "Computer Science and Software Engineering"
Now showing items 1-20 of 228
Academic Virtual Advisor
(2007-05-15)
With the increasing aptitude of artificial intelligence and expert systems, new and
innovative uses are being discovered. The objective of this research was to examine the use
of an expert system to solve the problem of ...
Accessible Computer Science for K-12 Students with Disabilities.
(2021-04-13)
Disability Inclusion and Accessibility in technology and education have today emerged as a necessity of national importance. National Science Foundation(NSF) funded projects like AccessCSforALL, Bootstrap, and CSforAll, ...
The Activity Metric for Low Resource, On-line Character Recognition
(2005-12-15)
This work presents an algorithm for on-line character recognition that is fast, portable, and consumes very little memory for code or data. The algorithm is alphabet-independent, and does not require training beyond ...
Adaptation Service Framework for Wireless Sensor Networks with Balanced Energy Aggregation
(2006-05-15)
Wireless sensor networks consist of tiny, energy-constrained sensor nodes that may
be deployed in large numbers. Considering these unique characteristics, our adaptation
service framework is designed to deliver distributed ...
Advancing Online Hate Speech Detection Using External Features and Large Language Models
(2024-07-24)
Social media is a concept developed to link people and make the globe smaller. But it has recently developed into a center for hateful posts that target different people and communities. As a result, there are more events ...
Agent-Based Simulation of Behavioral Anticipation in Computer Networks: A Comparative Study of Anticipatory Fault Management
(2006-05-15)
Network fault management is concerned with the detection, isolation and correction of anomalous conditions that occur in a computer network. Present state of art in fault management classifies existing methodologies into ...
Agent-mediated brokering and matchmaking for simulation model reuse on the semantic grid
(2005-12-15)
The need for simulation in military is increasing significantly due to high costs and safety limitations. Simulation in military is employed for training individuals in real-operating scenarios. The virtual, simulated ...
AI Innovations: Ensemble Learning and Energy-Efficient Knowledge Injection
(2024-08-13)
This research expands on the recent rapid advancements in Artificial Intelligence (AI) by focusing on its practical applications and environmental impact. It introduces a novel ensemble learning system for Network Intrusion ...
Algorithms for Task Scheduling in Heterogeneous Computing Environments
(2006-12-15)
Current heterogeneous meta-computing systems, such as computational clusters and grids offer a low cost alternative to supercomputers. In addition they are highly scalable and flexible. They consist of a host of diverse ...
All You Need is Tensor Decomposition: A Better Understanding of Sparse Tensors
(2023-04-26)
Tensor is widely employed in data sciences to represent multi-dimensional information. Due to the low-rank nature of many tensors in the real world, predicting the unobserved entries of a partially observed tensor has ...
Alleviating Escape Panic Using Evolutionary Intelligence
(2006-05-15)
Reducing damage, danger, and panic by evolving room designs is possible with artificial intelligence. Escape panic, brought on by groups of people being in a life-threatening situation, increases the fatality rate and ...
Analysis of Video Latency in UAV Wired and Wireless Networks
(2008-05-15)
The ability to utilize wireless networks to transmit information offers many benefits as compared to wired networks. For example, in Unmanned Aerial Vehicle (UAV) military applications current technology relies on a wired ...
Analyzing the E ects of Sequencer Discrepancies on Next-Generation Genome Assembly Tools
(2016-08-04)
The advent of Next-Generation Sequencing (NGS) techniques in the early 21st century massively increased genetic sequencing throughput while dramatically reducing associated costs. This is turn lowered barriers of entry ...
Android Malware Detection through Machine Learning on Kernel Task Structure
(2017-12-11)
The popularity of free Android applications has risen rapidly along with the advent of smart phones. This has led to malicious Android apps being involuntarily installed, which violate the user privacy or conduct attack. ...
Android Malware Detection Using Data Mining Techniques on Process Control Block Information
(2020-07-24)
Because smartphones are increasingly becoming the mobile computing device of choice, we are experiencing an increase in the number and sophistication of mobile-computing-based malware attacks. A lot of these attacks target ...
The Application of Data Mining and Machine Learning in the Diagnosis of Mental Disorders
(2017-07-28)
Autism is a developmental disorder that is currently diagnosed using behavioral tests which can be subjective. Consequently, objective non-invasive imaging biomarkers of Autism are being actively researched. The common ...
Application Of Neural Network On PLC-based Automation Systems For Better Fault Tolerance And Error Detection
(2019-07-18)
Neural networks have a wide range of applications such as building complex equations using the input and output characteristics of functions, predictions of outputs, error detections, monitoring complex systems, etc. Neural ...
Applications of Augmented and Virtual Reality at Museums and Archaeological Parks to Improve Sustainability
(2022-05-24)
Augmented and Virtual Reality are relatively novel technologies that have gained popularity during the past decade. Virtual Reality allows one to be immersed in virtual worlds, while Augmented Reality combines virtual and ...
Applications of Computer Vision for the Improvement of Autonomous Vehicle Design
(2021-07-28)
This dissertation approaches methods of improving autonomous vehicle design through two separate lenses. In the first study, we investigate how technological transparency can improve driver trust in artificial intelligence ...
Applications of GUI Usage Analysis
(2008-05-15)
In the realm of computer security, a masquerade attack is a form of attack wherein the attacker deceives the victim, causing them to believe they are someone other than who they are. One particularly dangerous form of ...