Search
Now showing items 1-10 of 11
EXPLORING CONFIDENTIALITY AND PRIVACY OF IMAGE IN CLOUD COMPUTING
(Computing, 2017 , Master Thesis)
With the increasing popularity of cloud computing, clients are storing their data in cloud servers and are using “software as a service” for computing services. However, clients’ data may be sensitive, critical, and private, ...
Conceptual data sampling for image segmentation- an application for breast cancer images
(Engineering-Computer Science, 2017 , Master Thesis)
At the present time data analytics have become a buzzword for the in-
formation technology sector. In an attempt to analyze data; one may follow
various paths. Be it deploying sophisticated technologies to process big ...
Accurate Classification of Partial Discharge Phenomena in Power Transformers in the Presence of Noise
(Computing, 2017 , Master Thesis)
The objective of this research is to accurately classify different types of Partial
Discharge (PD) phenomenon that occurs in transformers in the presence of noise. A PD is
an electrical discharge or spark that bridges a ...
ICT INDUSTRY INTEGRATED CURRICULA: TOWARDS AN ONTOLOGY BASED COMPETENCY MODEL
(Computing, 2017 , Master Thesis)
As technology advances rapidly, the ever changing industry needs for skills and competencies keeps changing in efforts to seize the nearest competitive advantage. This creates a great burden on higher education institutions ...
Features Ranking Techniques for Single Nucleotide Polymorphism Data
(Engineering-Computer Science, 2017 , Master Thesis)
Identifying biomarkers like single nucleotide polymorphisms (SNPs) is an important topic in biomedical applications. Such SNPs can be associated with an individual’s metabolism of drugs, which make these SNPs targets for ...
Detecting market manipulation in stock market data
(Computing, 2017 , Master Thesis)
Anomaly Detection is an extensively researched problem that has diverse applications in many domains. Anomaly detection is the process of finding data points or patterns that do not conform to expected behavior within a ...
Deanonymizing tor hidden service users through bitcoin transactions analysis
(Engineering-Computer Science, 2017 , Master Thesis)
With the rapid increase of threats on the Internet, people are continuously seeking privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for online transactions and Web browsing. Due ...
Modeling and Simulation of Bio-pathways using Hybrid Functional Petri Nets
(Computing, 2017 , Master Thesis)
The study of biological systems is growing rapidly, and can be considered as an intrinsic task in biological research and a prerequisite for diagnosing diseases and drug development. The integration of biological studies ...
Modeling Family Behaviors in Crowd Simulation
(Computing, 2017 , Master Thesis)
Modeling human behavior for a general situation is difficult, if not impossible. Crowd simulation represents one of the approaches most commonly used to model such behavior. It is mainly concerned with modeling the different ...
A conceptual heuristic for solving the maximum clique problem
(Computing, 2017 , Master Thesis)
The maximum clique problem (MCP) is the problem of finding the clique with maximum cardinality in a graph. It has been intensively studied for years by computer scientists and mathematicians. It has many practical applications ...