Now showing items 1-7 of 7
Probabilistic Open Set Recognition
Contributor:Jain, Lalit Prithviraj
Real-world tasks in computer vision, pattern recognition and machine learning often touch upon the open set recognition problem: multi-class recognition with incomplete knowledge of the world and many unknown inputs. An ...
Learning Indoor Localization using Radio Received Signal Strength
With this research we will investigate a novel machine learning approach to the prediction of location from received signal strength indicators (RSSI) values obtained from these transmitting access points. Indoor localization ...
Autonomic performance and power control in virtualized datacenters
Virtualized datacenters, the platform for supporting Cloud computing, allow diverse applications to share the underlying server resources. Due to the highly dynamic nature of Internet workloads, increasing complexity of ...
Detection And Analysis Of Software Clones
Contributor:Sheneamer, Abdullah Mohammad
Effective detection of code clones is important for software maintenance. Code clones introduce difficulty in software maintenance and lead to bug propagation. Detection of duplicated bugs within a piece of software is ...
Towards Automating Big Texts Security Classification
Contributor:Alzhrani, Khudran Maeed
The U.S Government has been the target of cyber-attacks from all over the world. Former President Obama accused the Russian government of leaking emails to WikiLeaks and declared that the U.S. might be forced to respond. ...
A Machine Learning Model for Elite Athletes
Abstract In this research we have used different machine learning algorithms to predict the performance of the elite athletes riding bicycles. The study of measuring the performance of the athletes is based on different ...
Post-Traumatic Stress Disorder Severity Prediction on Web-based Trauma Recovery Treatments Through Electrodermal Activity Measurements
Recent studies have shown evidences regarding trauma recovery through web-based interventions. Currently, a widespread protocol is to assess trauma severity by answering the PTSD Checklist (PCL) questionnaire, which requires ...