Now showing items 1-10 of 16
OPEN-SET INTRUSION RECOGNITION USING EXTREME VALUE MACHINE
Machine learning is continuously expanding as a sub-field of computer science which evolved from pattern recognition and computational learning theory. Advancements in machine learning, combined with the availability of ...
CONTINUOUS AUTHENTICATION OF SMARTPHONE OWNERS BASED ON APP ACCESS BEHAVIOR
Author(s):Alzubaidi, Abdulaziz Ali
In recent years, smartphone use has become ubiquitous. The number of the applications on these devices has increased tremendously, leading to an increase in potential threats to the personal accounts of smartphone owners. ...
Detection And Analysis Of Software Clones
Author(s):Sheneamer, Abdullah Mohammad
Effective detection of code clones is important for software maintenance. Code clones introduce difficulty in software maintenance and lead to bug propagation. Detection of duplicated bugs within a piece of software is ...
AUTOMATIC PARKING LOT DETECTION WITH IMAGE-BASED MACHINE LEARNING, DRONES AND MOBILE PLATFORMS
Author(s):Budia Tirado, Guillem
Format:born digital; masters theses
Many parking lot facilities suffer from capacity overloads and many times there are no monitoring tools to provide feedback. As a consequence, the people, wanting to park, become frustrated as there is considerably loss ...
Learning Indoor Localization using Radio Received Signal Strength
With this research we will investigate a novel machine learning approach to the prediction of location from received signal strength indicators (RSSI) values obtained from these transmitting access points. Indoor localization ...
Probabilistic Open Set Recognition
Author(s):Jain, Lalit Prithviraj
Real-world tasks in computer vision, pattern recognition and machine learning often touch upon the open set recognition problem: multi-class recognition with incomplete knowledge of the world and many unknown inputs. An ...
Autonomic performance and power control in virtualized datacenters
Virtualized datacenters, the platform for supporting Cloud computing, allow diverse applications to share the underlying server resources. Due to the highly dynamic nature of Internet workloads, increasing complexity of ...
Towards More Secure Bluetooth Low Energy Beacon Technology
Format:born digital; doctoral dissertations
In this dissertation we investigated the security of Bluetooth Low Energy (BLE) technology, in particular the beacon systems used to identify geolocation of the users. The vulnerabilities of the current BLE beacon systems ...
EFFICIENT MACHINE LEARNING INFERENCE FOR EMBEDDED SYSTEMS WITH INTEGER BASED RESTRICTED BOLTZMANN MACHINES CLASSIFIERS
Author(s):Sosa Barillas, Bryan Samuel
Nowadays, there exist many emerging applications for embedded systems, such as computer vision and speech recognition, which heavily rely on machine learning classification. The typical approach to carry out machine learning ...
Towards Robust Deep Neural Networks
One of the greatest technological advancements of the 21st century has been the rise of machine learning. This thriving field of research already has a great impact on our lives and, considering research topics and the ...