Browsing Computer Science by Author "Computer Science"
-
CUSTOMER REVIEWS ANALYSIS WITH DEEP NEURAL NETWORKS FOR E-COMMERCE RECOMMENDER SYSTEMS
Maleki Shoja, Babak (East Carolina University, 2019-07-17)The first part of this thesis systematically reviews the trend of researches conducted from 2011 to 2018 in terms of challenges and problems regarding developing a recommendation system, areas of application, proposed ... -
DEVELOPING A REAL-TIME DATA ANALYTICS FRAMEWORK FOR TWITTER STREAMING DATA
Yadranjiaghdam, Babak (East Carolina University, 2016-12-13)Twitter is an online social networking service with more than 300 million users, generating a huge amount of information every day. Twitter's most important characteristic is its ability for users to tweet about events, ... -
DYNAMIC DEFENSES AND THE TRANSFERABILITY OF ADVERSARIAL EXAMPLES
Thomas, Sam (East Carolina University, 2019-05-02)Adversarial machine learning has been an important area of study for the securing of machine learning systems. However, for every defense that is made to protect these artificial learners, a more sophisticated attack emerges ... -
EDUCATIONAL DATA MINING AND ITS USES TO PREDICT THE MOST PROSPEROUS LEARNING ENVIRONMENT
Whitley, Lewis Adam (East Carolina University, 2018-04-23)The use of technology and data analysis within the classroom has been a resourceful tool in order to collect, study, and compare a student's level of success. With the large amount of regularly collected data from student ... -
ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK
Anderson, James Carold (East Carolina University, 2012)Social networks supply a means by which people can communicate with each other while allowing for ease in initiating interaction and expressions. These systems of human collaboration may also be used to store and distribute ... -
Exploring the Usability Issues Encountered by Individuals with Visual Impairments on Social Networking Sites: Problem Description, System Evaluation and Semantic Web Solution
Brinkley, Julian (East Carolina University, 2014-08-28)While social networking sites (SNSs) like Facebook are widely used and have been broadly studied, investigations of their use by individuals with visual impairments are scarce within the academic literature. Anecdotal ... -
Formal Model To Reduce the Risk Of Cloud Outages
Hotwani, Komal (East Carolina University, 2014)Cloud outages have become very common in recent years as many companies adopt hosted services. One of the major reasons for cloud outages is the service level for availability, reliability, security not being met as mentioned ... -
GestDefLS : A Gesture Definition Language in Swift
Writtenberry, Robert William (East Carolina University, 2015)The application programming interfaces supplied by Apple for developing applications in the Swift programming language on iOS devices provide limited support when it comes to declaring gesture recognizers outside of those ... -
Group Mutual Exclusion in Linear Time and Space
He, Yuan (East Carolina University, 2014)The Group Mutual Exclusion (GME) problem, introduced by Joung, is a natural extension of the classical Mutual Exclusion problem. In the classical Mutual Exclusion problem, two or more processes are not simultaneously allowed ... -
IMPLEMENTATION OF BERT BASED MACHINE LEARNING MODEL TO EXTRACT CANCER –MIRNA RELATIONSHIP FROM RESEARCH LITERATURE
Sundharam, Arunprasad (East Carolina University, 2021-04-15)In the world today, text mining is a widely popular and growing branch of Information technology, in which we extract useful information out of the given pile of text data. There are thousands of research papers in medical ... -
Improving Access to Information through Conceptual Classification
Bazargani, Sahar (East Carolina University, 2011)Overwhelming the users with large amount of information on the Web has resulted in users' inability to find the information and their dissatisfaction with available information searching and filtering systems. On the other ... -
INTELLIGENT MODEL FOR IMAGE-BASED RECOMMENDATION SYSTEM
Prateek, Prerna (East Carolina University, 2016-08-29)Online shopping has developed in parallel with the Internet, and Recommendation Systems have played a pivotal role in its growth. The recommendations are usually provided in two ways: Content-based Filtering and Collaborative ... -
Intrusion detection using machine learning algorithms
Lakshminarayana, Deepthi Hassan (East Carolina University, 2019-11-27)With the growing rate of cyber-attacks, there is a significant need for intrusion detection systems (IDS) in networked environments. As intrusion tactics become more sophisticated and more challenging to detect, this ... -
INVESTIGATING THE STAR SCHEMA BENCHMARK AS A REPLACEMENT FOR THE TPC-H DECISION SUPPORT SYSTEM
Sanchez, Jimi Carmen (East Carolina University, 2016-12-13)Decision Support System (DSS) are at the core of business intelligence systems. Implementation costs for enterprise level Database Management System (DBMS) and DSS average $10,461 for installation costs. This does not ... -
Knowledge Discovery for Clinical Decision Support System in Patient Records
Budhathoki, Dev (East Carolina University, 2018-07-23)Knowledge discovery from the patient's health records is a challenging task for the medical specialists. The knowledge generated from the patient's records can assist specialists to make an effective decision and recommend ... -
MACHINE LEARNING BASED MEDICAL INFORMATION RETRIEVAL SYSTEMS
Gudivada, Akhil (East Carolina University, 2019-04-23)As many fields progress with the assistance of cognitive computing, the field of health care is also adapting, providing many benefits to all users. However, advancements in this area are hindered by several challenges ... -
MC/DC COVERAGE FOR REQUIREMENTS SPECIFICATIONS
Das, Gourav (East Carolina University, 2018-05-02)In the early 1990s, the Modi ed Condition/Decision Coverage (MC/DC) criterion was suggested as a structural white-box testing approach, but it can also be used for blackbox speci cation-based testing. Practical application ... -
Migrating Legacy Software Applications to Cloud Computing Environments : A Software Architect's Approach
Rowe, Fred (East Carolina University, 2011)Cloud computing has garnered a great deal of interest in the past few years. The availability of on-demand computational power is presumed to provide substantial IT infrastructure cost-savings, partially through the ... -
Migration of Legacy Web Application Using NoSQL Databases
Ghasemi, Pouyan (East Carolina University, 2013)The Migration of the legacy web application to Content Management Systems (CMS) is inevitable because of the overload of managing the content. Traditionally, Content Management Systems are built with RDBMSes and the migration ... -
miRCancer : a microRNA-Cancer Association Database and Toolkit Based on Text Mining
Xie, Boya (East Carolina University, 2010)MicroRNAs (miRNAs) are a class of single-stranded small non-coding RNAs. Study of miRNAs has been a fast growing field since the first miRNA was discovered in 1993. Many findings indicate that miRNA plays an important role ...