The objective of this work is to create a control mechanism for smooth operation of powered wheelchairs through speech recognition and humming detection. Users of wheelchairs are estimated to be about 200 million people ...
This dissertation presents a hybrid filtering method and a case-based reasoning
framework for enhancing the effectiveness of Web search. Web search may not reflect
user needs, intent, context, and preferences, because ...
Coal Combustion Products (CCPs) also known as coal ash/residues are generated when coal is burnt to generate electricity or steam. CCPs include fly ash, bottom ash, flue gas desulfurization (FGD) materials (FGD solids, FGD ...
Computers store persistent information in a non-volatile storage device such as a hard drive. Users directly create and delete files on the hard drive, and users install and uninstall applications which indirectly creates ...
This dissertation investigates the construction of nonseparable multidimensional
wavelets using multidimensional filterbanks. The main contribution of the dissertation is
the derivation of the relations zeros of higher ...
This thesis describes the development of two different methods to produce an optimal
platform for immobilizing biological matter (cells and proteins). Firstly, transparent
indium tin oxide (ITO) microelectrodes were ...
In 2005, a major security
flaw was discovered in Secure Hash Algorithm-1 (SHA-1), an
NSA-designed cryptographic hash function, standardized by National Institute of Science
and Technology (NIST) since 1995. Basic ...
The Integrated Circuit (IC) supply chain has been undergoing changes inorder to adapt and sustain to the growing costs and technology changes borne by the IC Design house . These changes also add vulnerabilities in the ...
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are cryptographic protocols designed to provide secure communication between a web server and a web browser. This thesis introduces a unique approach to ...
Nowadays, the fourth generation mobile communication is being popularized all over the world. As the core technologies, OFDM and MIMO are being widely researched and attracting more and more people to make them perfect. ...
Forward error correction enables reliable one-way communication over noisy channels by
transmitting redundant data along with the message in order to detect and resolve errors
at the receiver. Low-density parity-check ...
This dissertation provides a new methodology of using star observations and advanced nonlinear estimation algorithms to improve the ability of a space based Infrared tracking system to track cold body targets in space. ...
Unavailability of functional units and their unequal activity makes them performance bottleneck and thermal hot spots units in general-purpose processors. This thesis proposes to use reconfigurable functional units to ...
Crowdsourcing and the wisdom of crowds [5] have established that a large number of
low quality inputs can be reliably aggregated to yield a higher quality output. This thesis
examines whether the wisdom of crowds can be ...
Traffic incidents are a major contributing factor towards traffic congestion. Effective incident response strategies can significantly reduce non-recurrent congestion and thus represent important research topics. In many ...
Multiple large-scale traffic simulators have been developed to represent and analyze the con-
sequences of real-life traffic scenarios. These tools can be used to understand the complexity
of urban traffic situations and ...
Age-dependent branching processes arise in multiple areas of scientific applications such as cell biology, epidemic spread, and medical science. Researchers have shown that the size of the process grows exponentially fast ...
Preferential attachment models arise in several areas of mathematics and scientific applications such as in the analysis of social, financial, and gene regulatory networks. However, inferential questions related to such ...
We provide a novel approach to approximate conditional randomization tests fol-
lowing Efron's randomization procedure by sampling from the conditional reference
set. We use combinatorial algebra to derive the conditional ...
Social media (SM) is used extensively in Saudi Arabia, especially by women for online shopping. The number of active social media users has ranked the country as one of the strongest business markets in the world, and the ...