Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Bioinformatics (1)
- Biological image processing (1)
- Commnication (1)
- Communication artifacts (1)
- Communication in engineering (1)
-
- Communication metaphors (1)
- Computational linguistics; English language — Data processing; English language — Roots; Natural language processing (Computer science) (1)
- Computer recognition (1)
- Computer software – Development (1)
- Deep learning (1)
- Flying objects (1)
- Framework (1)
- Hyper-dimensional (1)
- Interaction evaluation (1)
- IoT (1)
- Levels of interaction (1)
- Machine learning (1)
- Object tracking (1)
- Organizational environment (1)
- Real time (1)
- Requirements engineering (1)
- Security (1)
- Three dimensional object recognition (1)
- Tracking objects (1)
- Two dimensional images (1)
- Vulnariblity (1)
- Work environment (1)
- ZigBee (1)
Articles 1 - 6 of 6
Full-Text Articles in Computer Engineering
Modeling And Analysis Of Subcellular Protein Localization In Hyper-Dimensional Fluorescent Microscopy Images Using Deep Learning Methods, Yang Jiao
UNLV Theses, Dissertations, Professional Papers, and Capstones
Hyper-dimensional images are informative and become increasingly common in biomedical research. However, the machine learning methods of studying and processing the hyper-dimensional images are underdeveloped. Most of the methods only model the mapping functions between input and output by focusing on the spatial relationship, whereas neglect the temporal and causal relationships. In many cases, the spatial, temporal, and causal relationships are correlated and become a relationship complex. Therefore, only modeling the spatial relationship may result in inaccurate mapping function modeling and lead to undesired output. Despite the importance, there are multiple challenges on modeling the relationship complex, including the model …
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
UNLV Theses, Dissertations, Professional Papers, and Capstones
Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …
An End To End V.M.T Framework With Controlled V.M.T Tax Rate Using Optimal Feedback Control Technique, Pratik Verma
An End To End V.M.T Framework With Controlled V.M.T Tax Rate Using Optimal Feedback Control Technique, Pratik Verma
UNLV Theses, Dissertations, Professional Papers, and Capstones
Vehicle Mile Travel (VMT) is a study related to available alternatives for the road
revenue collection system. As per the demand, the existing Gas/Fuel tax based revenue
collection system is not found an appropriate option in the longer run. Due
to existing system constraints like: no eective tax process for vehicles based on alternative
fuel (e.g. electric vehicles), no eective changes in tax due to economical
ination, and more highway expenditure than generated revenue, an alternative revenue
collection mechanism is required. Hence, the objective is to study an alternative
option in detail, which can address the gaps between required revenue …
Communication Artifacts And Interaction Evaluation For Requirements Engineering, Miloslava Plachkinova
Communication Artifacts And Interaction Evaluation For Requirements Engineering, Miloslava Plachkinova
UNLV Theses, Dissertations, Professional Papers, and Capstones
This paper aims to answer an important question regarding the development of new information systems (IS): "What is the predominant factor for the selection of communication artifacts for requirements engineering (RE)?". Many researchers have focused on the RE and communication as separate disciplines, but little or no research addressed the RE communication issues. These problems are important because they often lead to misunderstanding and misinterpretation of the gathered requirements. We develop expectations about the RE communication process based on prior literature from both disciplines and we test them through several case studies. Our methodology consists of analysis of six case …
Study Of Stemming Algorithms, Savitha Kodimala
Study Of Stemming Algorithms, Savitha Kodimala
UNLV Theses, Dissertations, Professional Papers, and Capstones
Automated stemming is the process of reducing words to their roots. The stemmed words are typically used to overcome the mismatch problems associated with text searching.
In this thesis, we report on the various methods developed for stemming. In particular, we show the effectiveness of n-gram stemming methods on a collection of documents.
On-Board Three-Dimensional Object Tracking: Software And Hardware Solutions, Ajay Kumar Mandava
On-Board Three-Dimensional Object Tracking: Software And Hardware Solutions, Ajay Kumar Mandava
UNLV Theses, Dissertations, Professional Papers, and Capstones
We describe a real time system for recognition and tracking 3D objects such as UAVs, airplanes, fighters with the optical sensor. Given a 2D image, the system has to perform background subtraction, recognize relative rotation, scale and translation of the object to sustain a prescribed topology of the fleet. In the thesis a comparative study of different algorithms and performance evaluation is carried out based on time and accuracy constraints. For background subtraction task we evaluate frame differencing, approximate median filter, mixture of Gaussians and propose classification based on neural network methods. For object detection we analyze the performance of …