Search results
-
-
Title
-
'Practice' for Enhancing the Performance of a Deep Reinforcement Learning Agent
-
Author
-
Kancharla, Venkata Sai Santosh Ravi Teja
-
Date Created
-
2019
-
Subjects--Topical
-
Artificial intelligence
-
Description
-
Deep reinforcement learning has demonstrated its capability to solve a diverse array of challenging problems, which were not able to solve previously. It has been able to achieve human-level performance in Atari 2600 games and it has shown great p...
-
-
Title
-
A Beginning-to-End System for Efficiently Gathering Tracking Data on Multiple Targets
-
Author
-
Rice, Lance
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science
-
Description
-
Multi-object tracking in video has the potential for broad applicability, from analyzing division-of-labor within biological networks such as insects, to surveillance and traffic monitoring. Despite any potential the field of multiple object track...
-
-
Title
-
A LANGUAGE-BASED APPROACH FOR SECURING ACTIONSCRIPT/FLASH VULNERABILITIES
-
Author
-
Yilmaz, Fadi
-
Date Created
-
2020
-
Subjects--Topical
-
Computer science
-
Description
-
Web technologies enable web users to share files, images, audios, videos with each other worldwide. The accessibility provided by the web lures web pirates to perform unauthorized, malicious activities in victim machines remotely by exploiting des...
-
-
Title
-
A Survey of Network Modeling
-
Author
-
Wells, Unique
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
Network modeling is a set of techniques for extracting various patterns of interestfrom graphs. They can be used in many real-life analytic fields, such as sales andmarketing, journal reports, government and law enforcement, social networking site...
-
-
Title
-
A framework for the use of wearables to enable study of stress
-
Author
-
Kanchinadam, Teja Simha
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science
-
Description
-
Stress is a common condition that has major health impacts. Even though short-term stress helps people to react to danger immediately, chronic stress has larger health impacts such as early aging, post-traumatic stress disorder, and depression. In...
-
-
Title
-
AI Based Realistic Multi-Hop Wireless Simulation
-
Author
-
pothuneedi, tagore
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
Wireless multi-hop networks and software-defined networking (SDN) are emerging technologies in wireless communications for deploying cost-efficient programmable network backbones. However, the physical testbeds do not provide scalable environments...
-
-
Title
-
AUTOMATIC UNIT TESTING TO DETECT SECURITY VULNERABILITIES IN WEB APPLICATIONS
-
Author
-
Mohammadi, Mahmoud
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
Web applications consume data from different inputs. Some of these inputs originate from untrusted sources, such as user inputs which will be rendered in browsers or browser-based applications such as mobile apps. Many applications with these func...
-
-
Title
-
Active Cyber Defense Planning and Orchestration
-
Author
-
Islam, Md Mazharul
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
The overwhelming number of recent data breaches reported that hundreds of terabytes of highly sensitive information, including national, financial, and personal, have been stolen from different organizations, indicating a clear asymmetric disadvan...
-
-
Title
-
An Approach Towards an Autonomic Computing Prototype Reference Architecture
-
Author
-
Williams, Trevon
-
Date Created
-
2019
-
Subjects--Topical
-
Computer science, Information technology, System theory
-
Description
-
Autonomic Computing is a grand challenge that strives to create self-regulating environments. The end goal, is to create an environment that can self-optimize, self-protect, self-heal and self-configure based on built-in, formulated, and generated...
-
-
Title
-
Anomaly Detection for Manufacturing Applications Using Convolutional Autoencoders
-
Author
-
Zouar, Nourelislam
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
ABSTRACTNOURELISLAM ZOUAR. ANOMALY DETECTION FOR MANUFACTURING APPLICATIONS USING CONVOLUTIONAL AUTOENCODERS. (Under the direction of DR. MIN SHIN) Anomaly Detection in manufacturing environments is increasingly gaining popularity among companies ...
-
-
Title
-
Art Authentication in an Untagged Art Database
-
Author
-
Dobbs, Bryan
-
Date Created
-
2022
-
Subjects--Topical
-
Computer science, Art--Historiography, Mathematics
-
Description
-
The identification of the artist of a painting is also known as art authentication, and the answer to this question is manifest through art gallery exhibition and is reinforced through financial transactions. Art authentication has visual influenc...
-
-
Title
-
Automated Classification and Mitigation of Cybersecurity Vulnerabilities
-
Author
-
Aghaei, Ehsan
-
Date Created
-
2022
-
Subjects--Topical
-
Computer science
-
Description
-
With the widespread use of computers and networks today, cybersecurity has emerged as a crucial concern for many businesses as they fight with growing cyber threats by vulnerability exploitation. To identify and mitigate zero-day or unpatched vuln...