Browsing by Discipline
Now showing items 1-20 of 87
-
3D GPU-based image reconstruction algorithm for the application in a clinical organ-targeted PET camera
(2022)Functional medical imaging is unique in its ability to visualize molecular interactions and pathways in the body. Organ-targeted Positron Emission Tomography (PET) is a functional imaging technique that has emerged to ... -
A classification study of rough sets generalization
(2004)In the development of rough set theory, many different interpretations and formulations have been proposed and studied. One can classify the studies of rough sets into algebraic and constructive approaches. While algebraic ... -
Access control scheme for partially ordered set hierarchy with provable security
(2005)In many multi-user information systems, the users are organized as a hierarchy. Each user is a subordinate, superior and/or coordinate of some others. In such systems, a user has access to the information if and only if ... -
Adding time-series data to enhance performance of naural language processing tasks
(2023)In the past few decades, with the explosion of information, a large number of computer scientists have devoted themselves to analyzing collected data and applying these findings to many disciplines. Natural language ... -
Agent-based workflow model for enterprise collaboration
(2005)Workflow management system supports the automation of business processes where a collection of tasks is organized between participants according to a defined set of rules to accomplish some business goals. The ... -
The analysis of Canada's health through social media using machine learning
(2019)Real-time online data processing is quickly becoming an essential tool in the analysis of social media for political trends, advertising, public health awareness programs and policy making. Traditionally, processes ... -
Argument summarization: enhancing summary generation and evaluation metrics
(2024)In the current era of mass digital information, the need for effective argument summarization has become paramount. This thesis explores the domain of argument summarization, focusing on the development of techniques and ... -
The artificial facilitator: guiding participants in developing causal maps using voice-activated personal assistant
(2019)When it comes to any problem, their causes, and solutions, people often have very different perspectives, primarily due to the environment in which they were raised (culture, education, socio-economic status, and so ... -
Artificial intelligence empowered virtual network function deployment and service function chaining for next-generation networks
(2021)The entire Internet of Things (IoT) ecosystem is directing towards a high volume of diverse applications. From smart healthcare to smart cities, every ubiquitous digital sector provisions automation for an immersive ... -
Boosting feature extraction performance on the aspect of representation learning efficiency
(2022)Machine learning is famous for its automatic data handling. While there is a slow growth in the performance of the state-of-the-art models in the most recent well-known learning frameworks, the number of parameters and ... -
Building a semantic blog support system for gene Learning Objects on Web 2.0 environment / by Wei Yuan.
(2008)Blogging has become a popular practice on Internet in recent years, and it has been used as information publishing and participate platforms. In recent years, a style of blog called 'semantic blogs' have been introduced ... -
Cache performance of chronological garbage collection
(1999)This thesis presents cache performance analysis of the Chronological Garbage Collection Algorithm used in LVM system. LVM is a new Logic Virtual Machine for Prolog. It adopts one stack policy for all dynamic memory ... -
A comparison and analysis of explainable clinical decision making using white box and black box models
(2024)Explainability is a crucial element of machine learning-based making in high stake scenarios such as risk assessment in criminal justice [80], climate modeling [79], disaster response [82], education [81] and critical ... -
Congestion control enhancement over wireless networks
(2019)In this thesis, we analyze the performance of wireless LAN networks subject to random loss. In this regard, we use a congestion control technique that has been introduced in a previous study, titled TCP Congestion Control ... -
A data warehouse-oriented methodology for qualitative semi-structured web information and social networking sites' user status search
(2019)Finding most desired and useful information from the diverse information and content embedded on webpages has become more challenging due to the rapid growth of websites and webpages, dynamic changes and updates of ... -
Data-driven traversability estimation for mobile robot navigation
(2021)Mobile robots have a promising application prospect as they can assist or replace humans to perform laborious, repetitive or dangerous tasks in various scenarios. There has been a large number of studies for mobile robot ... -
Database anonymization and protections of sensitive attributes
(2008)The importance of database anonymization has become increasingly critical for organizations that publish their database to the public. Current security measures for anonymization poses different manner of drawbacks. ... -
Deep learning based image super resolution
(2021)Image super resolution is one of the most significant computer vision researches aiming to reconstruct high resolution images with realistic details from low resolution images. In the past years, a number of traditional ... -
Design, development and usability evaluation of social system interface and development of computational model
(2021)In recent times, methods of computational intelligence (CI) that aim to solve real-life problems are developed by computer science researchers in collaboration with domain experts. There has also been an increased emphasis ... -
Designing a secure ubiquitous mammography consultation system
(2004)This thesis attempts to design and develop a prototype for mammography image consultation that can work securely within a ubiquitous environment. Mammogram images differ largely from other type of images and it requires ...