Search
Now showing items 51-60 of 94
Developing Concept Enriched Models for Big Data Processing Within the Medical Domain
(2020-07)
Within the past few years, the medical domain has endeavored to incorporate artificial intelligence, including cognitive computing tools, to develop enriched models for processing and synthesizing knowledge from Big Data. ...
Auto-Count Symbols in Portable Document Format (PDF)
(2021-04-22)
Estimating electrical costs often involves counting symbols in a PDF document. Existing
software has sped up this process compared to manual counting, but there is room for
further improvement. The proposed solution ...
Analysis of the Impact of Tags on Stack Overflow Questions
(East Carolina University, 2022-04-26)
User queries on Stack Overflow commonly suffer from either inadequate length or inadequate clarity with regards to the languages and/or tools they are meant for. Although the site makes use of a tagging system for classifying ...
ADVANCED DRIVER ASSISTANCE SYSTEM CAR FOLLOWING MODEL OPTIMIZATION FRAMEWORK USING GENETIC ALGORITHM IMPLEMENTED IN SUMO TRAFFIC SIMULATION
(East Carolina University, 2022-04-25)
As advanced driver-assistance systems (ADAS) such as smart cruise control and lane keeping have become common technologies, self-driving above SAE level 3 are being competitively developed by major automobile manufacturers, ...
MACHINE LEARNING BASED MEDICAL INFORMATION RETRIEVAL SYSTEMS
(East Carolina University, 2019-04-23)
As many fields progress with the assistance of cognitive computing, the field of health care is also adapting, providing many benefits to all users. However, advancements in this area are hindered by several challenges ...
DYNAMIC DEFENSES AND THE TRANSFERABILITY OF ADVERSARIAL EXAMPLES
(East Carolina University, 2019-05-02)
Adversarial machine learning has been an important area of study for the securing of machine learning systems. However, for every defense that is made to protect these artificial learners, a more sophisticated attack emerges ...
Software Technology Maturation and Software Security
(East Carolina University, 2019-08-05)
Software technology maturation, also referred to as technology transfer, is as difficult as it is rare, mostly because of the time scale involved. Software maturation is defined as the process of taking a piece of technology ...
Archival Document Processing using Cognitive Computing
(East Carolina University, 2019-07-22)
The world, as we know it, is constructed in the form of knowledge. Our ancestors have passed their experiences to the next generation over time using handwritten documents. Although these old manuscripts are still available ...
Performance Analysis of Extractive Text Summarization
(East Carolina University, 2019-07-22)
In this era, data is increasing exponentially, and it is crucial for people to keep up with all of this information. The information is available in several different forms such as news articles, online blogs, etc., many ...
CUSTOMER REVENUE PREDICTION FROM GEOGRAPHICAL DATA
(East Carolina University, 2019-07-22)
Online stores have created more opportunities for firms to offer different products and services to their customers. These online stores produce a tremendous amount of data that serve different purposes, including revenue ...