Now showing items 1-10 of 10

    • Cloud Forecasting: Legal Visibility Issues in Saturated Environments 

      Brown, Adam J.; Glisson, William Bradley; Andel, Todd R.; Choo, Kim-Kwang Raymond (Computer Law & Security Review, 2018)
      The advent of cloud computing has brought the computing power of corporate data pro- cessing and storage centers to lightweight devices. Software-as-a-service cloud subscribers enjoy the convenience of personal devices ...
    • Data Collection Scheduling in Directional Wireless Sensor Networks 

      Simsek, Ecem; 0000-0001-9992-7524 (2019-04-17)
      This thesis studies Minimum Latency Collection Scheduling (MLCS) problem in Wireless Sensor Networks (WSNs) whose objective is to obtain collision-free data collection schedules with minimum latencies. Unlike most existing ...
    • Detect forgery video by performing transfer learning on Deep Neural Network 

      Zhang, Zhaohe; 0000-0002-6542-0319 (2019-04-17)
      Nowadays, the authenticity of digital image and videos becomes hard while the forgery techniques are more advanced. Given the recent progress on Generative Neural Network (GNN) development that may generate realistic images ...
    • HEAT-MAP BASED EMOTION AND FACE RECOGNITION FROM THERMAL IMAGES 

      Ilikci, Burak (2019-04-17)
      Nowadays, emotion recognition has become a feasible problem with implementation of Convolutional Neural Networks in Computer Vision domain. However, credibility of emotion recognition from daily images or videos is not ...
    • Identifying stealth malware using CPU power consumption and learning algorithms 

      Lucket, Patrick; McDonald, J. Todd; Glisson, William Bradley; Benton, Ryan; Dawson, Joel; Doyle, Blair A. (Journal of Computer Security, 2018)
      With the increased assimilation of technology into all aspects of everyday life, rootkits pose a credible threat to individuals, corporations, and governments. Using various techniques, rootkits can infect systems and ...
    • NNMF IN GOOGLE TENSORFLOW AND APACHE SPARK: A COMPARISON STUDY 

      Li, Qizhao; 0000-0003-4124-3503 (2019-07-12)
      Data mining is no longer a new term as it has been already pervasive in all aspects of our lives. New computing platforms for specific usages are proposed continuously. Therefore, the awareness of the characteristics and ...
    • PHONETIC MATCHING TOOLKIT WITH STATE-OF-THE-ART META-SOUNDEX ALGORITHM (ENGLISH AND SPANISH) 

      Koneru, Keerthi; 0000-0002-0112-6858 (2016-10-27)
      Researchers confront major problems while searching for various kinds of data in large imprecise databases, as they are not spelled correctly or in the way they were expected to be spelled. As a result, they cannot find ...
    • QUALITATIVE CLEANING METHODS ON DISTRIBUTED IOT DATASETS 

      Ogungbemile, George (2019-04-08)
      Data analysis encompasses a set of individual steps that allows a typically large data set to be remodeled such that actionable information can be extracted from the data set, which can then be used to support decision-making. ...
    • SELECTED FORENSIC DATA ACQUISITION FROM ANDROID DEVICES 

      Rathi, Khushboo; 0000-0002-3493-4448 (2018-11-12)
      In recent times, amount of data stored in the smartphones have increased phenomenally. A smartphone is as powerful as a laptop or a desktop where people store their person data or do daily activities, as a result it can ...
    • SPHERICAL AND STOCHASTIC CO-CLUSTERING ALGORITHMS 

      Sariboz, Emrah; 0000-0002-5250-9779 (2019-04-17)
      Clustering, without a doubt, is a dominating area in data mining and machine learning field. Due to the wide range of the necessity to clustering algorithms, it has many applications in real-life problems, ranging from ...