Search results
-
-
Title
-
'Practice' for Enhancing the Performance of a Deep Reinforcement Learning Agent
-
Author
-
Kancharla, Venkata Sai Santosh Ravi Teja
-
Date Created
-
2019
-
Subjects--Topical
-
Artificial intelligence
-
Description
-
Deep reinforcement learning has demonstrated its capability to solve a diverse array of challenging problems, which were not able to solve previously. It has been able to achieve human-level performance in Atari 2600 games and it has shown great p...
-
-
Title
-
A Beginning-to-End System for Efficiently Gathering Tracking Data on Multiple Targets
-
Author
-
Rice, Lance
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science
-
Description
-
Multi-object tracking in video has the potential for broad applicability, from analyzing division-of-labor within biological networks such as insects, to surveillance and traffic monitoring. Despite any potential the field of multiple object track...
-
-
Title
-
A LANGUAGE-BASED APPROACH FOR SECURING ACTIONSCRIPT/FLASH VULNERABILITIES
-
Author
-
Yilmaz, Fadi
-
Date Created
-
2020
-
Subjects--Topical
-
Computer science
-
Description
-
Web technologies enable web users to share files, images, audios, videos with each other worldwide. The accessibility provided by the web lures web pirates to perform unauthorized, malicious activities in victim machines remotely by exploiting des...
-
-
Title
-
A Survey of Network Modeling
-
Author
-
Wells, Unique
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
Network modeling is a set of techniques for extracting various patterns of interestfrom graphs. They can be used in many real-life analytic fields, such as sales andmarketing, journal reports, government and law enforcement, social networking site...
-
-
Title
-
A framework for the use of wearables to enable study of stress
-
Author
-
Kanchinadam, Teja Simha
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science
-
Description
-
Stress is a common condition that has major health impacts. Even though short-term stress helps people to react to danger immediately, chronic stress has larger health impacts such as early aging, post-traumatic stress disorder, and depression. In...
-
-
Title
-
AI Based Realistic Multi-Hop Wireless Simulation
-
Author
-
pothuneedi, tagore
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
Wireless multi-hop networks and software-defined networking (SDN) are emerging technologies in wireless communications for deploying cost-efficient programmable network backbones. However, the physical testbeds do not provide scalable environments...
-
-
Title
-
AUTOMATIC UNIT TESTING TO DETECT SECURITY VULNERABILITIES IN WEB APPLICATIONS
-
Author
-
Mohammadi, Mahmoud
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
Web applications consume data from different inputs. Some of these inputs originate from untrusted sources, such as user inputs which will be rendered in browsers or browser-based applications such as mobile apps. Many applications with these func...
-
-
Title
-
Active Cyber Defense Planning and Orchestration
-
Author
-
Islam, Md Mazharul
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
The overwhelming number of recent data breaches reported that hundreds of terabytes of highly sensitive information, including national, financial, and personal, have been stolen from different organizations, indicating a clear asymmetric disadvan...
-
-
Title
-
An Approach Towards an Autonomic Computing Prototype Reference Architecture
-
Author
-
Williams, Trevon
-
Date Created
-
2019
-
Subjects--Topical
-
Computer science, Information technology, System theory
-
Description
-
Autonomic Computing is a grand challenge that strives to create self-regulating environments. The end goal, is to create an environment that can self-optimize, self-protect, self-heal and self-configure based on built-in, formulated, and generated...
-
-
Title
-
Anomaly Detection for Manufacturing Applications Using Convolutional Autoencoders
-
Author
-
Zouar, Nourelislam
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
ABSTRACTNOURELISLAM ZOUAR. ANOMALY DETECTION FOR MANUFACTURING APPLICATIONS USING CONVOLUTIONAL AUTOENCODERS. (Under the direction of DR. MIN SHIN) Anomaly Detection in manufacturing environments is increasingly gaining popularity among companies ...
-
-
Title
-
Anomaly Detection for Manufacturing Applications Using Convolutional Autoencoders
-
Author
-
Zouar, Nourelislam
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
ABSTRACTNOURELISLAM ZOUAR. ANOMALY DETECTION FOR MANUFACTURING APPLICATIONS USING CONVOLUTIONAL AUTOENCODERS. (Under the direction of DR. MIN SHIN) Anomaly Detection in manufacturing environments is increasingly gaining popularity among companies ...
-
-
Title
-
Autonomous Cyber Defense: Formal Models and Applications
-
Author
-
Dutta, Ashutosh
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science, Information science, Information technology
-
Description
-
With technological advancements, cyber attacks are highly automated and organized with asymmetric advantages over defenders regarding cost and efforts.Attackers employ sophisticated and diversified approaches to achieve attack objectives while bei...
-
-
Title
-
Aviatar- An Augmented Reality System to Improve Pilot Performance for Unmanned Aerial Systems
-
Author
-
Abbott, Robert
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science, Aerospace engineering, Cognitive psychology
-
Description
-
In the modern airspace, small unmanned aircraft systems (UAS) such as drones are becoming increasingly popular with both amateur enthusiasts as well as professional pilots. In the three years following the initiation of the small drone registratio...
-
-
Title
-
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS
-
Author
-
Rauf, Usman
-
Date Created
-
2020
-
Subjects--Topical
-
Computer science, Information science
-
Description
-
After decades of deploying cyber-security systems, it is a well-known fact that theexisting cyber infrastructure has numerous inherent limitations that not only makethe maintenance of the current network security devices difficult but also provide...