This Is AuburnElectronic Theses and Dissertations

Browsing Auburn Theses and Dissertations by Department "Computer Science and Software Engineering"

Now showing items 1-20 of 172

Academic Virtual Advisor 

Nobles, Kathryn (2007-05-15)
With the increasing aptitude of artificial intelligence and expert systems, new and innovative uses are being discovered. The objective of this research was to examine the use of an expert system to solve the problem of ...

Accessible Computer Science for K-12 Students with Disabilities. 

Das, Meenakshi (2021-04-13)
Disability Inclusion and Accessibility in technology and education have today emerged as a necessity of national importance. National Science Foundation(NSF) funded projects like AccessCSforALL, Bootstrap, and CSforAll, ...

The Activity Metric for Low Resource, On-line Character Recognition 

Confer, William (2005-12-15)
This work presents an algorithm for on-line character recognition that is fast, portable, and consumes very little memory for code or data. The algorithm is alphabet-independent, and does not require training beyond ...

Adaptation Service Framework for Wireless Sensor Networks with Balanced Energy Aggregation 

Kim, Eun (2006-05-15)
Wireless sensor networks consist of tiny, energy-constrained sensor nodes that may be deployed in large numbers. Considering these unique characteristics, our adaptation service framework is designed to deliver distributed ...

Agent-Based Simulation of Behavioral Anticipation in Computer Networks: A Comparative Study of Anticipatory Fault Management 

Saple, Avdhootkishore (2006-05-15)
Network fault management is concerned with the detection, isolation and correction of anomalous conditions that occur in a computer network. Present state of art in fault management classifies existing methodologies into ...

Agent-mediated brokering and matchmaking for simulation model reuse on the semantic grid 

Paspuleti, Swetha (2005-12-15)
The need for simulation in military is increasing significantly due to high costs and safety limitations. Simulation in military is employed for training individuals in real-operating scenarios. The virtual, simulated ...

Algorithms for Task Scheduling in Heterogeneous Computing Environments 

Sai, Ranga (2006-12-15)
Current heterogeneous meta-computing systems, such as computational clusters and grids offer a low cost alternative to supercomputers. In addition they are highly scalable and flexible. They consist of a host of diverse ...

Alleviating Escape Panic Using Evolutionary Intelligence 

Darnell, Shelby (2006-05-15)
Reducing damage, danger, and panic by evolving room designs is possible with artificial intelligence. Escape panic, brought on by groups of people being in a life-threatening situation, increases the fatality rate and ...

Analysis of Video Latency in UAV Wired and Wireless Networks 

Works, Gloice (2008-05-15)
The ability to utilize wireless networks to transmit information offers many benefits as compared to wired networks. For example, in Unmanned Aerial Vehicle (UAV) military applications current technology relies on a wired ...

Analyzing the E ects of Sequencer Discrepancies on Next-Generation Genome Assembly Tools 

Pritchard, Michael Jr (2016-08-04)
The advent of Next-Generation Sequencing (NGS) techniques in the early 21st century massively increased genetic sequencing throughput while dramatically reducing associated costs. This is turn lowered barriers of entry ...

Android Malware Detection through Machine Learning on Kernel Task Structure 

Xinning, Wang (2017-12-11)
The popularity of free Android applications has risen rapidly along with the advent of smart phones. This has led to malicious Android apps being involuntarily installed, which violate the user privacy or conduct attack. ...

Android Malware Detection Using Data Mining Techniques on Process Control Block Information 

Alawneh, Heba (2020-07-24)
Because smartphones are increasingly becoming the mobile computing device of choice, we are experiencing an increase in the number and sophistication of mobile-computing-based malware attacks. A lot of these attacks target ...

The Application of Data Mining and Machine Learning in the Diagnosis of Mental Disorders 

Syed, Mohammed (2017-07-28)
Autism is a developmental disorder that is currently diagnosed using behavioral tests which can be subjective. Consequently, objective non-invasive imaging biomarkers of Autism are being actively researched. The common ...

Application Of Neural Network On PLC-based Automation Systems For Better Fault Tolerance And Error Detection 

Joshi, Bhargav (2019-07-18)
Neural networks have a wide range of applications such as building complex equations using the input and output characteristics of functions, predictions of outputs, error detections, monitoring complex systems, etc. Neural ...

Applications of Augmented and Virtual Reality at Museums and Archaeological Parks to Improve Sustainability 

Sargsyan, Nikolay (2022-05-24)
Augmented and Virtual Reality are relatively novel technologies that have gained popularity during the past decade. Virtual Reality allows one to be immersed in virtual worlds, while Augmented Reality combines virtual and ...

Applications of Computer Vision for the Improvement of Autonomous Vehicle Design 

Kauten, James (2021-07-28)  ETD File Embargoed
This dissertation approaches methods of improving autonomous vehicle design through two separate lenses. In the first study, we investigate how technological transparency can improve driver trust in artificial intelligence ...

Applications of GUI Usage Analysis 

Imsand, Eric (2008-05-15)
In the realm of computer security, a masquerade attack is a form of attack wherein the attacker deceives the victim, causing them to believe they are someone other than who they are. One particularly dangerous form of ...

APT-GT Project: Design and Development of an E-learning System 

Qitong, Zhang (2018-04-30)
Over the years, the availability and sophistication of e-learning tools has developed rapidly. Compared with the traditional education, the E-learning platform saves workforce and financial resources, and people no longer ...

Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Model Features 

Gaston, Joshua (2018-11-05)
Authorship Attribution is a well-studied topic with deep roots in the field of Stylometry. This thesis examines three less traditional feature sets for the purpose of Authorship Attribution. Each feature set is examined ...

The Automated Design of Network Graph Algorithms with Applications in Cybersecurity 

Pope, Aaron (2020-01-06)  ETD File Embargoed
Graph representations and graph algorithms are commonplace in a wide variety of research domains, including computer and network security. Many problems can be expressed in terms of graphs in order to leverage the strengths ...