This Is AuburnElectronic Theses and Dissertations

Browsing Auburn University Graduate School by Department "Computer Science and Software Engineering"

Now showing items 1-20 of 228

Academic Virtual Advisor 

Nobles, Kathryn (2007-05-15)
With the increasing aptitude of artificial intelligence and expert systems, new and innovative uses are being discovered. The objective of this research was to examine the use of an expert system to solve the problem of ...

Accessible Computer Science for K-12 Students with Disabilities. 

Das, Meenakshi (2021-04-13)
Disability Inclusion and Accessibility in technology and education have today emerged as a necessity of national importance. National Science Foundation(NSF) funded projects like AccessCSforALL, Bootstrap, and CSforAll, ...

The Activity Metric for Low Resource, On-line Character Recognition 

Confer, William (2005-12-15)
This work presents an algorithm for on-line character recognition that is fast, portable, and consumes very little memory for code or data. The algorithm is alphabet-independent, and does not require training beyond ...

Adaptation Service Framework for Wireless Sensor Networks with Balanced Energy Aggregation 

Kim, Eun (2006-05-15)
Wireless sensor networks consist of tiny, energy-constrained sensor nodes that may be deployed in large numbers. Considering these unique characteristics, our adaptation service framework is designed to deliver distributed ...

Advancing Online Hate Speech Detection Using External Features and Large Language Models 

Das, Amit (2024-07-24)  ETD File Embargoed
Social media is a concept developed to link people and make the globe smaller. But it has recently developed into a center for hateful posts that target different people and communities. As a result, there are more events ...

Agent-Based Simulation of Behavioral Anticipation in Computer Networks: A Comparative Study of Anticipatory Fault Management 

Saple, Avdhootkishore (2006-05-15)
Network fault management is concerned with the detection, isolation and correction of anomalous conditions that occur in a computer network. Present state of art in fault management classifies existing methodologies into ...

Agent-mediated brokering and matchmaking for simulation model reuse on the semantic grid 

Paspuleti, Swetha (2005-12-15)
The need for simulation in military is increasing significantly due to high costs and safety limitations. Simulation in military is employed for training individuals in real-operating scenarios. The virtual, simulated ...

AI Innovations: Ensemble Learning and Energy-Efficient Knowledge Injection 

Zhang, Zheng (2024-08-13)  ETD File Embargoed
This research expands on the recent rapid advancements in Artificial Intelligence (AI) by focusing on its practical applications and environmental impact. It introduces a novel ensemble learning system for Network Intrusion ...

Algorithms for Task Scheduling in Heterogeneous Computing Environments 

Sai, Ranga (2006-12-15)
Current heterogeneous meta-computing systems, such as computational clusters and grids offer a low cost alternative to supercomputers. In addition they are highly scalable and flexible. They consist of a host of diverse ...

All You Need is Tensor Decomposition: A Better Understanding of Sparse Tensors 

Hui, Bo (2023-04-26)  ETD File Embargoed
Tensor is widely employed in data sciences to represent multi-dimensional information. Due to the low-rank nature of many tensors in the real world, predicting the unobserved entries of a partially observed tensor has ...

Alleviating Escape Panic Using Evolutionary Intelligence 

Darnell, Shelby (2006-05-15)
Reducing damage, danger, and panic by evolving room designs is possible with artificial intelligence. Escape panic, brought on by groups of people being in a life-threatening situation, increases the fatality rate and ...

Analysis of Video Latency in UAV Wired and Wireless Networks 

Works, Gloice (2008-05-15)
The ability to utilize wireless networks to transmit information offers many benefits as compared to wired networks. For example, in Unmanned Aerial Vehicle (UAV) military applications current technology relies on a wired ...

Analyzing the E ects of Sequencer Discrepancies on Next-Generation Genome Assembly Tools 

Pritchard, Michael Jr (2016-08-04)
The advent of Next-Generation Sequencing (NGS) techniques in the early 21st century massively increased genetic sequencing throughput while dramatically reducing associated costs. This is turn lowered barriers of entry ...

Android Malware Detection through Machine Learning on Kernel Task Structure 

Xinning, Wang (2017-12-11)
The popularity of free Android applications has risen rapidly along with the advent of smart phones. This has led to malicious Android apps being involuntarily installed, which violate the user privacy or conduct attack. ...

Android Malware Detection Using Data Mining Techniques on Process Control Block Information 

Alawneh, Heba (2020-07-24)
Because smartphones are increasingly becoming the mobile computing device of choice, we are experiencing an increase in the number and sophistication of mobile-computing-based malware attacks. A lot of these attacks target ...

The Application of Data Mining and Machine Learning in the Diagnosis of Mental Disorders 

Syed, Mohammed (2017-07-28)
Autism is a developmental disorder that is currently diagnosed using behavioral tests which can be subjective. Consequently, objective non-invasive imaging biomarkers of Autism are being actively researched. The common ...

Application Of Neural Network On PLC-based Automation Systems For Better Fault Tolerance And Error Detection 

Joshi, Bhargav (2019-07-18)
Neural networks have a wide range of applications such as building complex equations using the input and output characteristics of functions, predictions of outputs, error detections, monitoring complex systems, etc. Neural ...

Applications of Augmented and Virtual Reality at Museums and Archaeological Parks to Improve Sustainability 

Sargsyan, Nikolay (2022-05-24)
Augmented and Virtual Reality are relatively novel technologies that have gained popularity during the past decade. Virtual Reality allows one to be immersed in virtual worlds, while Augmented Reality combines virtual and ...

Applications of Computer Vision for the Improvement of Autonomous Vehicle Design 

Kauten, James (2021-07-28)
This dissertation approaches methods of improving autonomous vehicle design through two separate lenses. In the first study, we investigate how technological transparency can improve driver trust in artificial intelligence ...

Applications of GUI Usage Analysis 

Imsand, Eric (2008-05-15)
In the realm of computer security, a masquerade attack is a form of attack wherein the attacker deceives the victim, causing them to believe they are someone other than who they are. One particularly dangerous form of ...