The applications of machine learning algorithms are innumerable and cover nearly every domain of modern technology. During this rapid growth of this area, more and more companies have expressed a desire to utilize machine ...
Low power, lossy networks (LLNs) are becoming a critical infrastructure for future applications that are ad-hoc and untethered for periods of years. The applications enabled by LLNs include Smart Grid, data center power ...
Recommender systems are intended to help users make effective product and service choices, especially over the Internet. They are used in a variety of applications and have proven to be valuable for predicting the utility ...
Forensic recovery of previously deleted data could be a time-consuming activity during a digital forensic investigation. As tedious as the procedure is, it may not produce useful results or any results at all, as the deleted ...
Pattern mining is an umbrella term used for data mining algorithms with the goal of finding relationships between attributes, such as association rules, frequent sets, contrast patterns, emerging patterns, etc. While ...
The approach-and-landing is one of the most complex procedures in airline operations. To mitigate the potential risks in this phase of flight, airlines and regulators have published stabilized approach criteria that require ...
Digital information goods include computer software, music, movies, electronic version of newspapers and magazines, electronic books, video games, and other multimedia products. These goods are characterized by a relatively ...
Component-based software architectures (CBSAs) are a well-known approach for building increasingly complex software systems from components that are intended to be distributed and autonomic. However, CBSAs often run in ...
The growing complexity of modern real-time embedded systems makes component-based software engineering (CBSE) technology more desirable. Although many ideas have been proposed for building component-based real-time embedded ...
Network forensics is the science that addresses the capture, recording and analysis of network events and traffic for detecting intrusions and investigating them, attributing blame and supporting a case against potential ...
Moving Target Defenses (MTDs) are techniques used to defend computer networks that seek to delay or prevent attacks during any phase of the cyber kill chain by dynamically changing the makeup of the systems or network such ...
Engineers implement structural health monitoring and nondestructive evaluation techniques to effectively assess the status and safety of civil infrastructure. In addition to the financial cost, the logistical burden involved ...
With the rapid development in genomic and genetic research, precision medicine has gained more attention in modern clinical trials. Molecularly targeted therapies are likely to only work with a subgroup of patients. However, ...
This dissertation presents an approach to the abstraction of the reasoning of a
knowledge-based agent that facilitates human-agent collaboration in complex problem
solving and decision-making and the development of systems ...
Nationally, the six year graduation rate for four year degree programs at universities and colleges in the United States has remained approximately 60% over the past decade. One of the main reasons for poor retention (and ...
There are many marine applications for 3D reconstruction ranging from the analysis of coastal erosion and bathymetric mapping using LiDAR to assisting in the structural health assessment of ships using photogrammetrically ...
Ocean acoustic tomography is a powerful method that uses sound to study
ocean properties such as temperature, which is directly related to sound speed in
water. This thesis focuses on using ambient noise to infer the ...
Active, or continuous, authentication is gradually gaining grounds as the preferred method of personal authentication. This is due to the limited nature of standard authentication methods that are unable to guarantee user ...
“The significant problems we face today cannot be solved at the same level of thinking at which they were created” (Albert Einstein). Information Technology (IT) systems have become an important competitive element across ...
The frequency-domain properties of time series have been found to contain valuable information in many studies. It is often the case that biomedical time series are collected from multiple participants in conjunction with ...