Now showing items 61-80 of 94

  • MACHINE LEARNING BASED MEDICAL INFORMATION RETRIEVAL SYSTEMS 

    Gudivada, Akhil (East Carolina University, 2019-04-23)
    As many fields progress with the assistance of cognitive computing, the field of health care is also adapting, providing many benefits to all users. However, advancements in this area are hindered by several challenges ...
  • Personality assessment from social media data: An ensemble model 

    Taghikhani, Shahin (East Carolina University, 2019-05-01)
    The global prevalence of social media encourages people to upload and share a vast and recurrent amount of information about themselves through various mediums of communication such as text, pictures, audio, and video. ...
  • Modeling and Prediction of Cryptocurrency Prices Using Machine Learning Techniques 

    Ashayer, Alireza (East Carolina University, 2019-05-01)
    With the introduction of Bitcoin in the year 2008 as the first practical decentralized cryptocurrency, the interest in cryptocurrencies and their underlying technology, Blockchain, has skyrocketed. Their promise of security, ...
  • DYNAMIC DEFENSES AND THE TRANSFERABILITY OF ADVERSARIAL EXAMPLES 

    Thomas, Sam (East Carolina University, 2019-05-02)
    Adversarial machine learning has been an important area of study for the securing of machine learning systems. However, for every defense that is made to protect these artificial learners, a more sophisticated attack emerges ...
  • CUSTOMER REVIEWS ANALYSIS WITH DEEP NEURAL NETWORKS FOR E-COMMERCE RECOMMENDER SYSTEMS 

    Maleki Shoja, Babak (East Carolina University, 2019-07-17)
    The first part of this thesis systematically reviews the trend of researches conducted from 2011 to 2018 in terms of challenges and problems regarding developing a recommendation system, areas of application, proposed ...
  • Archival Document Processing using Cognitive Computing 

    Patel, Himaniben P (East Carolina University, 2019-07-22)
    The world, as we know it, is constructed in the form of knowledge. Our ancestors have passed their experiences to the next generation over time using handwritten documents. Although these old manuscripts are still available ...
  • Performance Analysis of Extractive Text Summarization 

    Patel, Vishwa (East Carolina University, 2019-07-22)
    In this era, data is increasing exponentially, and it is crucial for people to keep up with all of this information. The information is available in several different forms such as news articles, online blogs, etc., many ...
  • CUSTOMER REVENUE PREDICTION FROM GEOGRAPHICAL DATA 

    Khademorezaian, Kasra (East Carolina University, 2019-07-22)
    Online stores have created more opportunities for firms to offer different products and services to their customers. These online stores produce a tremendous amount of data that serve different purposes, including revenue ...
  • POSTGRESQL AS A MULTI-MODEL DATABASE 

    Khanal, Rabindra (East Carolina University, 2019-07-26)
    Data is being generated at unprecedented volume and speed, which is popularly known as Big Data. Most of this data is unstructured and requires natural language processing and information retrieval techniques to extract ...
  • Software Technology Maturation and Software Security 

    Locklear, Trina Kay (East Carolina University, 2019-08-05)
    Software technology maturation, also referred to as technology transfer, is as difficult as it is rare, mostly because of the time scale involved. Software maturation is defined as the process of taking a piece of technology ...
  • TEXT EXTRACTION FROM IMAGES USING NEURAL NETWORKS 

    Pala, Venkatesh Reddy (East Carolina University, 2019-09-16)
    Most western languages have witnessed the power of Artificial Intelligence (AI) in one other form. Primary fact for this achievement is due to the efforts of several researchers contributing to the field of computational ...
  • Intrusion detection using machine learning algorithms 

    Lakshminarayana, Deepthi Hassan (East Carolina University, 2019-11-27)
    With the growing rate of cyber-attacks, there is a significant need for intrusion detection systems (IDS) in networked environments. As intrusion tactics become more sophisticated and more challenging to detect, this ...
  • ESTIMATING EFFORT FOR LOW-CODE APPLICATIONS 

    Butler, Rhonda R (East Carolina University, 2020-06-22)
    Two issues continually plaguing the software industry are software size calculation and project effort estimation. Incorrect estimates may lead to inappropriate allocation of resources (people), shortage of time, insufficient ...
  • MVC EDUCATION 3D : A FRAMEWORK FOR DISTANCE EDUCATION VIRTUAL REALITY APPLICATIONS 

    Chegireddy, Yashwanth Reddy (East Carolina University, 2020-06-22)
    Recent advancements in the online course delivery for Distance Education(DE) pro- gram is evolving from day-to-day. Though DE programs cost less and also provide exibility to students depending on their pace of learning, ...
  • FRAMEWORK FOR BLOCKCHAIN BASED DECENTRALIZED ECOMMERCE APPLICATION USING SMART CONTRACTS 

    Kulkarni, Sumati (East Carolina University, 2020-06-22)
    There is a lot of excitement around Blockchain technology and its ability to disrupt many traditional industries and business practices. First invented as a part of Bitcoin’s underlying infrastructure, Blockchain technology ...
  • ENVIRONMENTAL MODEL ACCURACY IMPROVEMENT FRAMEWORK USING STATISTICAL TECHNIQUES AND A NOVEL TRAINING APPROACH 

    Matta, Rekesh (East Carolina University, 2020-06-22)
    It is challenging to predict environmental behaviors because of extreme events, such as heatwaves, typhoons, droughts, tsunamis, torrential downpour, wind ramps, or hurricanes. In this thesis, we proposed a novel framework ...
  • A FRAMEWORK FOR QUESTION ANSWERING SYSTEM USING DYNAMIC CO-ATTENTION NETWORKS 

    Busireddy, Swetha (East Carolina University, 2020-06-22)
    Question answering (QA) systems have evolved exponentially over the past few years and have reached a reliable human standard. Attention mechanisms, as well as other methods of deep learning, paved the way for this ...
  • Developing Concept Enriched Models for Big Data Processing Within the Medical Domain 

    Gudivada, Akhil; Tabrizi, Nasseh; Philips, James (2020-07)
    Within the past few years, the medical domain has endeavored to incorporate artificial intelligence, including cognitive computing tools, to develop enriched models for processing and synthesizing knowledge from Big Data. ...
  • Studies on Gopala-Hemachandra Codes and their Applications 

    Childers, Logan (East Carolina University, 2020-11-16)
    Gopala-Hemachandra codes are a variation of the Fibonacci universal code and have applications in data compression and cryptography. We study a specific parameterization of Gopala-Hemachandra codes and present several ...