Browsing by Department "Computer Science and Software Engineering"
Now showing items 21-40 of 214
Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Model Features
(2018-11-05)
Authorship Attribution is a well-studied topic with deep roots in the field of Stylometry. This thesis examines three less traditional feature sets for the purpose of Authorship Attribution. Each feature set is examined ...
The Automated Design of Network Graph Algorithms with Applications in Cybersecurity
(2020-01-06)
Graph representations and graph algorithms are commonplace in a wide variety of research domains, including computer and network security. Many problems can be expressed in terms of graphs in order to leverage the strengths ...
Automated Source Code Measurement Environment For Software Quality
(2007-12-15)
Measuring how well software component can be reused and maintained helps programmers not only write reusable and maintainable software, but also identifies reusable or maintainable components. We develop an automated ...
Automatic Detection of Software Security Vulnerabilities in Executable Program Files
(2005-08-15)
Secure programming describes those techniques that software developers use to provide security features in their applications. In addition to these techniques, software practitioners use static code security checkers to ...
Bandwidth-Aware Routing Tree (BART) for Underwater 3-D Geographic Routing
(2008-08-15)
The limited bandwidth and power resources in underwater sensor networks have made geographic routing a favorite choice. While many detouring strategies in geographic routing do not work for 3-D underwater network topology, ...
Behavior Analysis and Enhancement of Robustness for Deep Neural Networks
(2022-08-01)
Apart from the remarkable success of machine learning models utilizing deep neural networks in solving a variety of problems including image classifications, these models are highly vulnerable to small and carefully chosen ...
Beyond The Accuracy In Deep Learning: Robustness, Privacy and Fairness
(2023-11-15)
While Deep Learning (DL) has achieved great success across various domains, its trustworthiness
remains a concern. This dissertation delves into threats associated with robustness,
privacy, and fairness, offering novel ...
Boosting Cloud Computing Frameworks with High Performance Computing Features
(2016-10-26)
High Performance Computing (HPC) often employs a set of networked and/or distributed computers working together to solve extremely large problems. Since the early 1990's, HPC has made use of technologies such as the Message ...
Building a High-resolution Scalable Visualization Wall
(2006-12-15)
High-resolution and scalable displays are increasingly being used for interactive 3D
graphics applications, including large-scale data visualization, immersive virtual
environments, and scalable 3D rendering subsystems. ...
Business Rules Discovery in Web Application through Process Mining
(2020-07-20)
Advances in information technologies have allowed businesses to deliver their services to new markets that did not exist before, especially in fields such as e-commerce, healthcare, e-education, and cloud services. Web ...
Clustering and Predictive Modeling: An Ensemble Approach
(2008-08-15)
Today’s data storage and collection abilities have allowed the accumulation of enormous amounts of data. Data mining can be a useful tool in transforming these large amounts of raw data into useful information. Predictive ...
Cogent: A Coherence-Driven Cognitive Agent Modeling and Simulation Framework
(2018-04-16)
Agent based modeling is an effective methodology for understanding complex cognitive systems through generative mechanisms that explain emergent behavior. However, most agent modeling languages use general-purpose imperative ...
Collaboration and Competition in Interest-Driven Cyber Ecosystems
(2021-12-08)
The next-generation cyber ecosystems are characterized by novel distributed paradigms composed of various network entities, such as individuals, devices, and software. The efficiency, scalability, and security of the systems ...
A Collaborative, Adaptive-Based Approach to Informal E-Learning Technology Design
(2017-04-25)
Significant innovations in learning technologies are encouraging individuals, especially high school students, to seek enrichment learning opportunities that they normally are not able to take advantage of due to the ...
Comparison of IoT Application Layer Protocols
(2017-04-25)
It has been almost 20 years since the concept of the Internet of Things was first proposed. Now, IoT has become a leading technology that is becoming pervasive in our lives. However, behind the wide deployment of IoT ...
Computational Methods for Evaluation of Protein Structural Models
(2019-04-23)
Proteins are essential parts of organisms and participate in virtually every process within the cells. The function of a protein is closely related to its structure than to its amino acid sequence. Hence, the study of the ...
Computer Vision Based Cooperative Navigation for UAVs and Ground Vehicles
(2022-06-30)
This thesis is not approved for public release.
Continuous TCP Connection to the Internet on Fast-changing Mobile Ad-hoc Network
(2019-05-01)
As more and more sensors are being used in all industries, especially the Internet of Things, Mobile Ad-hoc Networks (MANET) are also becoming more popular as good ways to organize wireless devices in the same area. Since ...
COURSEBUILDER: Design and Development of an eLearning System
(2017-11-28)
Web-based learning environments have the potential to support collaboration among teachers and students and encourage interaction in the classroom by providing quality Internet resources for learning. By incorporating these ...
CSSE Document Management System: Implementation and Usability Evaluation
(2006-08-15)
The design and implementation of an application like CSSE Document Management System (CSSEDMS) involves many considerations. Among all these considerations, usability is the key for success. “If you could build a system ...