Computer Science: Recent submissions
Now showing items 1-20 of 91
-
A PERFORMANCE ANALYSIS ON MACHINE LEARNING ALGORITHMS TO PREDICT MOBILE APPLICATION’S STAR RATING BY ITS USER INTERFACE FEATURES
(East Carolina University, 2022-05-05)The first part of this thesis concludes with an overall summary of the publications so far on the applied Machine Learning techniques in different phases of the Software Development Life Cycle that including Requirements ... -
ADVANCED DRIVER ASSISTANCE SYSTEM CAR FOLLOWING MODEL OPTIMIZATION FRAMEWORK USING GENETIC ALGORITHM IMPLEMENTED IN SUMO TRAFFIC SIMULATION
(East Carolina University, 2022-04-25)As advanced driver-assistance systems (ADAS) such as smart cruise control and lane keeping have become common technologies, self-driving above SAE level 3 are being competitively developed by major automobile manufacturers, ... -
Analysis of the Impact of Tags on Stack Overflow Questions
(East Carolina University, 2022-04-26)User queries on Stack Overflow commonly suffer from either inadequate length or inadequate clarity with regards to the languages and/or tools they are meant for. Although the site makes use of a tagging system for classifying ... -
Using n-Grams to Identify Time Periods of Cultural Influence
(2016-11-03) -
IMPLEMENTATION OF BERT BASED MACHINE LEARNING MODEL TO EXTRACT CANCER –MIRNA RELATIONSHIP FROM RESEARCH LITERATURE
(East Carolina University, 2021-04-15)In the world today, text mining is a widely popular and growing branch of Information technology, in which we extract useful information out of the given pile of text data. There are thousands of research papers in medical ... -
Tactile Demographics: Predicting Demographic Information Using Touch Data from Mobile Devices
(East Carolina University, 2021-04-20)The research conducted in this thesis was to serve as a baseline on which human demographics are most likely to be able to be predicted through touch screen interactions. In addition, it served as a way of finding which ... -
Auto-Count Symbols in Portable Document Format (PDF)
(2021-04-22)Estimating electrical costs often involves counting symbols in a PDF document. Existing software has sped up this process compared to manual counting, but there is room for further improvement. The proposed solution ... -
Developing Concept Enriched Models for Big Data Processing Within the Medical Domain
(2020-07)Within the past few years, the medical domain has endeavored to incorporate artificial intelligence, including cognitive computing tools, to develop enriched models for processing and synthesizing knowledge from Big Data. ... -
A FRAMEWORK FOR AUTOMATICALLY GENERATING QUESTIONS FOR TOPICS IN DISCRETE MATHEMATICS
(East Carolina University, 2020-11-17)Automated question generation is critical for realizing personalized learning. Also, learning research shows that answering questions is a more effective method than rereading the textbook multiple times. However, creating ... -
Software Engineering for Real-Time NoSQL Systems-centric Big Data Analytics
(East Carolina University, 2020-12-02)Recent advances in Big Data Analytics (BDA) have stimulated widespread interest to integrate BDA capabilities into all aspects of a business. Before these advances, companies have spent time optimizing the software ... -
Studies on Gopala-Hemachandra Codes and their Applications
(East Carolina University, 2020-11-16)Gopala-Hemachandra codes are a variation of the Fibonacci universal code and have applications in data compression and cryptography. We study a specific parameterization of Gopala-Hemachandra codes and present several ... -
Applied Machine Learning for Cybersecurity in Spam Filtering and Malware Detection
(East Carolina University, 2020-11-17)Machine learning is one of the fastest-growing fields and its application to cybersecurity is increasing. In order to protect people from malicious attacks, several machine learning algorithms have been used to predict the ... -
An Empirical Exploration of Python Machine Learning API Usage
(East Carolina University, 2020-11-16)Machine learning is becoming an increasingly important part of many domains, both inside and outside of computer science. With this has come an increase in developers learning to write machine learning applications in ... -
A FRAMEWORK FOR QUESTION ANSWERING SYSTEM USING DYNAMIC CO-ATTENTION NETWORKS
(East Carolina University, 2020-06-22)Question answering (QA) systems have evolved exponentially over the past few years and have reached a reliable human standard. Attention mechanisms, as well as other methods of deep learning, paved the way for this ... -
ENVIRONMENTAL MODEL ACCURACY IMPROVEMENT FRAMEWORK USING STATISTICAL TECHNIQUES AND A NOVEL TRAINING APPROACH
(East Carolina University, 2020-06-22)It is challenging to predict environmental behaviors because of extreme events, such as heatwaves, typhoons, droughts, tsunamis, torrential downpour, wind ramps, or hurricanes. In this thesis, we proposed a novel framework ... -
FRAMEWORK FOR BLOCKCHAIN BASED DECENTRALIZED ECOMMERCE APPLICATION USING SMART CONTRACTS
(East Carolina University, 2020-06-22)There is a lot of excitement around Blockchain technology and its ability to disrupt many traditional industries and business practices. First invented as a part of Bitcoin’s underlying infrastructure, Blockchain technology ... -
MVC EDUCATION 3D : A FRAMEWORK FOR DISTANCE EDUCATION VIRTUAL REALITY APPLICATIONS
(East Carolina University, 2020-06-22)Recent advancements in the online course delivery for Distance Education(DE) pro- gram is evolving from day-to-day. Though DE programs cost less and also provide exibility to students depending on their pace of learning, ... -
ESTIMATING EFFORT FOR LOW-CODE APPLICATIONS
(East Carolina University, 2020-06-22)Two issues continually plaguing the software industry are software size calculation and project effort estimation. Incorrect estimates may lead to inappropriate allocation of resources (people), shortage of time, insufficient ... -
Intrusion detection using machine learning algorithms
(East Carolina University, 2019-11-27)With the growing rate of cyber-attacks, there is a significant need for intrusion detection systems (IDS) in networked environments. As intrusion tactics become more sophisticated and more challenging to detect, this ...