Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (74)
- Computer Sciences (71)
- Electrical and Computer Engineering (18)
- Computational Engineering (10)
- Artificial Intelligence and Robotics (7)
-
- Electrical and Electronics (7)
- Robotics (7)
- Business (6)
- Applied Mathematics (4)
- Computer and Systems Architecture (4)
- Education (4)
- Other Computer Engineering (4)
- Business Administration, Management, and Operations (3)
- Digital Communications and Networking (3)
- Mechanical Engineering (3)
- Physics (3)
- Biomedical Engineering and Bioengineering (2)
- Chemical Engineering (2)
- Civil and Environmental Engineering (2)
- Data Storage Systems (2)
- Databases and Information Systems (2)
- Hardware Systems (2)
- Human Resources Management (2)
- Life Sciences (2)
- Management Information Systems (2)
- Mathematics (2)
- Numerical Analysis and Scientific Computing (2)
- OS and Networks (2)
- Institution
- Keyword
-
- Machine learning (19)
- Knowledge Management (15)
- Knowledge management (14)
- Deep learning (13)
- Machine Learning (12)
-
- Classification (9)
- Regression (8)
- Support Vector Machine (8)
- Deep Learning (7)
- Security (7)
- Twitter (7)
- Data mining (6)
- Knowledge (6)
- Mental Workload (6)
- Natural Language Processing (6)
- Sentiment analysis (6)
- Wiki (6)
- BERT (5)
- Natural language processing (5)
- Supervised Machine Learning (5)
- CNN (4)
- Cloud computing (4)
- Computer vision (4)
- E-learning (4)
- Education (4)
- LSTM (4)
- Neural Networks (4)
- Robotics (4)
- Support Vector Machines (4)
- Transfer Learning (4)
- Publication Year
- Publication Type
Articles 301 - 308 of 308
Full-Text Articles in Computer Engineering
Security Information Management With Frame-Based Attack Presentation And First-Order Reasoning, Wei Yan
Security Information Management With Frame-Based Attack Presentation And First-Order Reasoning, Wei Yan
Dissertations
Internet has grown by several orders of magnitude in recent years, and this growth has escalated the importance of computer security. Intrusion Detection System (IDS) is used to protect computer networks. However, the overwhelming flow of log data generated by IDS hamper security administrators from uncovering new insights and hidden attack scenarios. Security Information Management (SIM) is a new growing area of interest for intrusion detection. The research work in this dissertation explores the semantics of attack behaviors and designs Frame-based Attack Representation and First-order logic Automatic Reasoning (FAR-FAR) using linguistics and First-order Logic (FOL) based approaches. Techniques based on …
Tcp Performance Enhancement In Wireless Networks Via Adaptive Congestion Control And Active Queue Management, Kai Xu
Dissertations
The transmission control protocol (TCP) exhibits poor performance when used in error-prone wireless networks. Remedy to this problem has been an active research area. However, a widely accepted and adopted solution is yet to emerge. Difficulties of an acceptable solution lie in the areas of compatibility, scalability, computational complexity and the involvement of intermediate routers and switches.
This dissertation rexriews the current start-of-the-art solutions to TCP performance enhancement, and pursues an end-to-end solution framework to the problem. The most noticeable cause of the performance degradation of TCP in wireless networks is the higher packet loss rate as compared to that …
A Versatile Programming Model For Dynamic Task Scheduling On Cluster Computers, Dejiang Jin
A Versatile Programming Model For Dynamic Task Scheduling On Cluster Computers, Dejiang Jin
Dissertations
This dissertation studies the development of application programs for parallel and distributed computer systems, especially PC clusters. A methodology is proposed to increase the efficiency of code development, the productivity of programmers and enhance performance of executing the developed programs on PC clusters while facilitating improvement of scalability and code portability of these programs. A new programming model, named the Super-Programming Model (SPM), is created. Programs are developed assuming an instruction set architecture comprised of SuperInstructions (SIs). SPM models the target system as a large Virtual Machine (VM); VM contains functional units which are underlain with sub-computer systems and SIs …
Qos Constrained Cellular Ad Hoc Augmented Networks, Chi-Tung Chen
Qos Constrained Cellular Ad Hoc Augmented Networks, Chi-Tung Chen
Dissertations
In this dissertation, based on different design criteria, three novel quality of service (QoS) constrained cellular ad hoc augmented network (CAHAN) architectures are proposed for next generation wireless networks. The CAHAN architectures have a hybrid architecture, in which each MT of CDMA cellular networks has ad hoc communication capability. The CAHAN architectures are an evolutionary approach to conventional cellular networks. The proposed architectures have good system scalability and high system reliability.
The first proposed architecture is the QoS constrained minimum-power cellular ad hoc augmented network architecture (QCMP CAHAN). The QCMP CAHAN can find the optimal minimum-power routes under the QoS …
Mobile Agent Based Distributed Network Management : Modeling, Methodologies And Applications, Jian Ye
Mobile Agent Based Distributed Network Management : Modeling, Methodologies And Applications, Jian Ye
Dissertations
The explosive growth of the Internet and the continued dramatic increase for all wireless services are fueling the demand for increased capacity, data rates, support of multimedia services, and support for different Quality of Services (QoS) requirements for different classes of services. Furthermore future communication networks will be strongly characterized by heterogeneity. In order to meet the objectives of instant adaptability to the users' requirements and of interoperability and seamless operation within the heterogeneous networking environments, flexibility in terms of network and resource management will be a key design issue. The new emerging technology of mobile agent (MA) has arisen …
Ip Traceback With Deterministic Packet Marking Dpm, Andrey Belenky
Ip Traceback With Deterministic Packet Marking Dpm, Andrey Belenky
Dissertations
In this dissertation, a novel approach to Internet Protocol (IP) Traceback - Deterministic Packet Marking (DPM) is presented. The proposed approach is scalable, simple to implement, and introduces no bandwidth and practically no processing overhead on the network equipment. It is capable of tracing thousands of simultaneous attackers during a Distributed Denial of Service (DDoS) attack. Given sufficient deployment on the Internet, DPM is capable of tracing back to the slaves for DDoS attacks which involve reflectors. Most of the processing is done at the victim. The traceback process can be performed post-mortem, which allows for tracing the attacks that …
Optimal And Intelligent Decision Making In Sustainable Development Of Electronic Products, Meimei Gao
Optimal And Intelligent Decision Making In Sustainable Development Of Electronic Products, Meimei Gao
Dissertations
Increasing global population and consumption are causing declining natural and social systems. Multi-lifecycle engineering and sustainable development address these issues by integrating strategies for economic successes, environmental quality, and social equity. Based on multi-lifecycle engineering and sustainable development concepts, this doctoral dissertation aims to provide decision making approaches to growing a strong industrial economy while maintaining a clean, healthy environment. The research develops a methodology to complete both the disassembly leveling and bin assignment decisions in demanufacturing through balancing the disassembly efforts, value returns, and environmental impacts. The proposed method is successfully implemented into a demanufacturing module of a Multi-LifeCycle …
Efficient Resource Allocation And Call Admission Control In High Capacity Wireless Networks, Jiongkuan Hou
Efficient Resource Allocation And Call Admission Control In High Capacity Wireless Networks, Jiongkuan Hou
Dissertations
Resource Allocation (RA) and Call Admission Control (CAC) in wireless networks are processes that control the allocation of the limited radio resources to mobile stations (MS) in order to maximize the utilization efficiency of radio resources and guarantee the Quality of Service (QoS) requirements of mobile users. In this dissertation, several distributed, adaptive and efficient RA/CAC schemes are proposed and analyzed, in order to improve the system utilization while maintaining the required QoS.
Since the most salient feature of the mobile wireless network is that users are moving, a Mobility Based Channel Reservation (MBCR) scheme is proposed which takes the …