Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Air pollution (1)
- Apple (1)
- Architecture (1)
- Auto driving (1)
- C-Ranker (1)
-
- Cloud (1)
- Cloud computing (1)
- Clustering (1)
- Compressed codes (1)
- Computer (1)
- Computer Vision (1)
- Computer science (1)
- Cryptography (1)
- Davies-Bouldin Index (1)
- Dish Encryption (1)
- Dots and boxes (1)
- Encryption (1)
- Euclidean distance (1)
- Financial data (1)
- Gravity distance (1)
- Hash functions (1)
- Interface (1)
- JPlag (1)
- Java (1)
- K-means (1)
- Log analysis (1)
- Lstm (1)
- Machine learning (1)
- McAfee (1)
- Message Digest (1)
Articles 1 - 13 of 13
Full-Text Articles in Engineering
Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike
Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike
Masters Theses & Specialist Projects
The Jing-Jin-Ji region of China is a highly industrialized and populated area of the country. Its periodic high pollution and smog includes particles smaller than 2.5 μm, known as PM2.5, linked to many respiratory and cardiovascular illnesses. PM2.5 concentration around Jing-Jin-Ji has exceeded China’s urban air quality safety threshold for over 20% of all days in 2017 through 2020.
The quantity of ground weather stations that measure the concentrations of these pollutants, and their valuable data, is unfortunately small. By employing many machine learning strategies, many researchers have focused on interpolating finer spatial grids of PM2.5, or hindcasting PM2.5. However, …
Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu
Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu
Masters Theses & Specialist Projects
Advancements in computer technology and internet services have led to the availability of vast amounts of information like videos, articles, research papers, and code samples. Free online information will increase the possibility of plagiarism and collusion among students. People can commit plagiarism in both text and code [1], as tools used to detect plagiarism between texts and between codes are distinct. Traditionally plagiarism in code is detected using manual inspection, which is a tedious process and misses to compare code from previous submissions and external sources. To overcome this issue, systems that can automatically detect plagiarism in code were developed …
A Low-Cost And Low-Tech Solution To Test For Variations Between Multiple Offline Programming Software Packages., Steffen Wendell Bolz
A Low-Cost And Low-Tech Solution To Test For Variations Between Multiple Offline Programming Software Packages., Steffen Wendell Bolz
Masters Theses & Specialist Projects
This research paper chronicles the attempt to bring forth a low-cost and low-tech testing methodology whereby multiple offline programming (OLP) software packages’ generated programs may be compared when run on industrial robots. This research was initiated by the discovery that no real research exists to test between iterations of OLP software packages and that most research for positional accuracy and/or repeatability on industrial robots is expensive and technologically intensive. Despite this, many countries’ leaders are pushing for intensive digitalization of manufacturing and Small and Mediumsized Enterprises (SMEs) are noted to be lagging in adoption of such technologies. The research consisted …
K-Means Clustering Using Gravity Distance, Ajinkya Vishwas Indulkar
K-Means Clustering Using Gravity Distance, Ajinkya Vishwas Indulkar
Masters Theses & Specialist Projects
Clustering is an important topic in data modeling. K-means Clustering is a well-known partitional clustering algorithm, where a dataset is separated into groups sharing similar properties. Clustering an unbalanced dataset is a challenging problem in data modeling, where some group has a much larger number of data points than others. When a K-means clustering algorithm with Euclidean distance is applied to such data, the algorithm fails to form good clusters. The standard K-means tends to split data into smaller clusters during a clustering process evenly.
We propose a new K-means clustering algorithm to overcome the disadvantage by introducing a different …
Supply Chain Analysis To Determine E-Commerce Distribution Center Locations, Fatima Chebchoub
Supply Chain Analysis To Determine E-Commerce Distribution Center Locations, Fatima Chebchoub
Masters Theses & Specialist Projects
Supply chain management is the key success for each business. Having a robust supply chain will help the business to improve service, quality, reduce the costs, improve the speed, and be more flexible. Organizations need to look at data and deploy plans to move the product from operation to logistics to manage a global chain. In this paper we will use E-Comm shipment data to identify the best locations to build a new distribution center (DC).
Load Balancing Of Financial Data Using Machine Learning And Cloud Analytics, Dimple Jaiswal
Load Balancing Of Financial Data Using Machine Learning And Cloud Analytics, Dimple Jaiswal
Masters Theses & Specialist Projects
The rising use of technology for web applications, android applications, digital marketing, and e-application systems for financial investments benefits a large sector of stakeholders and common people. It allows investors to make an appropriate choice for investment and to increase their capital growth. This requires proper research of investment companies, their trends in price and analysis of historical and current information. In addition, prediction of prices makes the process of investment more comfortable and reliable for investors as shares are the most volatile type of investment. To offer this service to multiple users spread across the globe, there are certain …
Design And Implementation Of Sql Online Practice Platform, Wenhui Zhang
Design And Implementation Of Sql Online Practice Platform, Wenhui Zhang
Masters Theses & Specialist Projects
Database management is a very important subject in computer science education. The study of SQL syntax is the most important part of this course. The traditional teaching method only lets the students practice SQL syntax through the textbook exercise. Students cannot get the query result directly. Moreover, students do not know intuitively what is wrong with the query sentence. In this study, we want to find a better way for the teachers and the students to learn this part of database management. Teacher uploads a SQL file through a web page, it will create a database with several tables and …
Exploring The Effect Of Different Numbers Of Convolutional Filters And Training Loops On The Performance Of Alphazero, Jared Prince
Exploring The Effect Of Different Numbers Of Convolutional Filters And Training Loops On The Performance Of Alphazero, Jared Prince
Masters Theses & Specialist Projects
In this work, the algorithm used by AlphaZero is adapted for dots and boxes, a two-player game. This algorithm is explored using different numbers of convolutional filters and training loops, in order to better understand the effect these parameters have on the learning of the player. Different board sizes are also tested to compare these parameters in relation to game complexity. AlphaZero originated as a Go player using an algorithm which combines Monte Carlo tree search and convolutional neural networks. This novel approach, integrating a reinforcement learning method previously applied to Go (MCTS) with a supervised learning method (neural networks) …
Application Of Huffman Data Compression Algorithm In Hashing Computation, Lakshmi Narasimha Devulapalli Venkata,
Application Of Huffman Data Compression Algorithm In Hashing Computation, Lakshmi Narasimha Devulapalli Venkata,
Masters Theses & Specialist Projects
Cryptography is the art of protecting information by encrypting the original message into an unreadable format. A cryptographic hash function is a hash function which takes an arbitrary length of the text message as input and converts that text into a fixed length of encrypted characters which is infeasible to invert. The values returned by the hash function are called as the message digest or simply hash values. Because of its versatility, hash functions are used in many applications such as message authentication, digital signatures, and password hashing [Thomsen and Knudsen, 2005].
The purpose of this study is to apply …
Vertical Implementation Of Cloud For Education (V.I.C.E.), Travis S. Brummett
Vertical Implementation Of Cloud For Education (V.I.C.E.), Travis S. Brummett
Masters Theses & Specialist Projects
There are several different implementations of open source cloud software that organizations can utilize when deploying their own private cloud. Some possible solutions are OpenNebula, Nimbus, and Eucalyptus. These are Infrastructure-as-a-Service (IaaS) cloud implementations that ultimately gives users virtual machines to undefined job types. A typical IaaS cloud is composed of a front-end cloud controller node, a cluster controller node for controlling compute nodes, a virtual machine image repository node, and many persistent storage nodes and compute nodes. These architectures are built for ease of scalability and availability.
Interestingly, the potential of such architectures could have in the educational field …
Pedestrian Detection Using Basic Polyline: A Geometric Framework For Pedestrian Detection, Liang Gongbo
Pedestrian Detection Using Basic Polyline: A Geometric Framework For Pedestrian Detection, Liang Gongbo
Masters Theses & Specialist Projects
Pedestrian detection has been an active research area for computer vision in recently years. It has many applications that could improve our lives, such as video surveillance security, auto-driving assistance systems, etc. The approaches of pedestrian detection could be roughly categorized into two categories, shape-based approaches and appearance-based approaches. In the literature, most of approaches are appearance-based. Shape-based approaches are usually integrated with an appearance-based approach to speed up a detection process.
In this thesis, I propose a shape-based pedestrian detection framework using the geometric features of human to detect pedestrians. This framework includes three main steps. Give a static …
Distributed Approach For Peptide Identification, Naga V K Abhinav Vedanbhatla
Distributed Approach For Peptide Identification, Naga V K Abhinav Vedanbhatla
Masters Theses & Specialist Projects
A crucial step in protein identification is peptide identification. The Peptide Spectrum Match (PSM) information set is enormous. Hence, it is a time-consuming procedure to work on a single machine. PSMs are situated by a cross connection, a factual score, or a probability that the match between the trial and speculative is right and original. This procedure takes quite a while to execute. So, there is demand for enhancement of the performance to handle extensive peptide information sets. Development of appropriate distributed frameworks are expected to lessen the processing time.
The designed framework uses a peptide handling algorithm named C-Ranker, …
A Problem Solving Approach To Enterprise Filevault 2 Management And Integration, Nicholas Cobb
A Problem Solving Approach To Enterprise Filevault 2 Management And Integration, Nicholas Cobb
Masters Theses & Specialist Projects
Consumer technology adoption into large enterprise environments is occurring at an unprecedented rate. Employees require the flexibility and efficiency of using operating systems, computers, and mobility products they are familiar with and that enable their productivity. Due to this industry phenomenon, one large shipping enterprise must work to create solutions to integrate Apple’s OS X operating system into its traditional Windows-based operating environment. This level of integration must take place carefully to enable usability and foster the continued data security of enterprise assets. This paper describes the steps and methodology taken, as well as the rationale used, to accomplish the …