• Find People
  • Campus Map
  • PiratePort
  • A-Z
    • About
    • Submit
    • Browse
    • Login
    Search 
    •   ScholarShip Home
    • Academic Affairs
    • College of Engineering and Technology
    • Computer Science
    • Search
    •   ScholarShip Home
    • Academic Affairs
    • College of Engineering and Technology
    • Computer Science
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of The ScholarShipCommunities & CollectionsDateAuthorsTitlesSubjectsTypeDate SubmittedThis CollectionDateAuthorsTitlesSubjectsTypeDate Submitted

    My Account

    Login

    Discover

    AuthorHe, Yuan (2)Tabrizi, Nasseh (2)Adeli, Hossein (1)Adhikari, Anil (1)Ahmadvand, Ali (1)Anderson, David (1)Anderson, James Carold (1)Arbabifard, Kamyar (1)Asghary Karahroudy, Ali (1)Ashayer, Alireza (1)... View MoreSubjectComputer science (29)Machine learning (9)Computer engineering (8)Cloud computing (7)Data mining (5)Programming languages (Electronic computers) (5)Big data (4)Computer security (4)Application software (3)Computer software--Development (3)... View MoreDate Issued2016 (14)2019 (13)2018 (12)2013 (8)2014 (6)2011 (5)2012 (5)2015 (5)2017 (3)2010 (1)Has File(s)
    true (72)

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 72

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Applying Mutable Object Snapshots to a High-level Object-Oriented Language 

    Davis, Matthew C (East Carolina University, 2018-11-30)
    Software Engineers are familiar with mutable and immutable object state. Mutable objects shared across modules may lead to unexpected results as changes to the object in one module are visible to other modules sharing the ...
    Thumbnail

    Software Technology Maturation and Software Security 

    Locklear, Trina Kay (East Carolina University, 2019-08-05)
    Software technology maturation, also referred to as technology transfer, is as difficult as it is rare, mostly because of the time scale involved. Software maturation is defined as the process of taking a piece of technology ...
    Thumbnail

    Archival Document Processing using Cognitive Computing 

    Patel, Himaniben P (East Carolina University, 2019-07-22)
    The world, as we know it, is constructed in the form of knowledge. Our ancestors have passed their experiences to the next generation over time using handwritten documents. Although these old manuscripts are still available ...
    Thumbnail

    Performance Analysis of Extractive Text Summarization 

    Patel, Vishwa (East Carolina University, 2019-07-22)
    In this era, data is increasing exponentially, and it is crucial for people to keep up with all of this information. The information is available in several different forms such as news articles, online blogs, etc., many ...
    Thumbnail

    CUSTOMER REVENUE PREDICTION FROM GEOGRAPHICAL DATA 

    Khademorezaian, Kasra (East Carolina University, 2019-07-22)
    Online stores have created more opportunities for firms to offer different products and services to their customers. These online stores produce a tremendous amount of data that serve different purposes, including revenue ...
    Thumbnail

    TEXT EXTRACTION FROM IMAGES USING NEURAL NETWORKS 

    Pala, Venkatesh Reddy (East Carolina University, 2019-09-16)
    Most western languages have witnessed the power of Artificial Intelligence (AI) in one other form. Primary fact for this achievement is due to the efforts of several researchers contributing to the field of computational ...
    Thumbnail

    CUSTOMER REVIEWS ANALYSIS WITH DEEP NEURAL NETWORKS FOR E-COMMERCE RECOMMENDER SYSTEMS 

    Maleki Shoja, Babak (East Carolina University, 2019-07-17)
    The first part of this thesis systematically reviews the trend of researches conducted from 2011 to 2018 in terms of challenges and problems regarding developing a recommendation system, areas of application, proposed ...
    Thumbnail

    Intrusion detection using machine learning algorithms 

    Lakshminarayana, Deepthi Hassan (East Carolina University, 2019-11-27)
    With the growing rate of cyber-attacks, there is a significant need for intrusion detection systems (IDS) in networked environments. As intrusion tactics become more sophisticated and more challenging to detect, this ...
    Thumbnail

    Using n-Grams to Identify Time Periods of Cultural Influence 

    Tabrizi, Nasseh (2016-11-03)
    Thumbnail

    Customer Reviews Analysis with Deep Neural Networks for E-Commerce Recommender Systems 

    Tabrizi, Nasseh (2019-01-01)
    • «
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 8
    • »

    East Carolina University has created ScholarShip, a digital archive for the scholarly output of the ECU community.

    • About
    • Contact Us
    • Send Feedback