Now showing items 21-40 of 109

    • An Evaluation of Key-value Stores in Scientific Applications 

      Shirwadkar, Sonia 1989-; 0000-0001-6729-2907 (2017-05)
      Big data analytics is a rapidly evolving multidisciplinary field that involves the use of computing capacity, tools, techniques, and theories to solve scientific and engineering problems. With the big data boom, scientific ...
    • AN EVALUATION OF THE SPARK PROGRAMMING MODEL FOR BIG DATA ANALYTICS 

      Ayyalasomayajula, Haripriya 1992- (2015-05)
      The focus of companies like Google, Amazon etc. is to gain competitive business advantage from the insights drawn by processing petabytes of data. Big Data refers to data characterized by large volume, great variety, and ...
    • ANALYSIS SUPPORTED SPH FLUID SIMULATION 

      Cao, Wei 1985- (2013-12)
      Smoothed Particle Hydrodynamics (SPH) is a mesh-free method that has been widely used in several fields such as astrophysics, solids mechanics, and fluid dynamics. This computational fluid dynamics model has been extensively ...
    • APPLICATION DEVELOPMENT FOR THE NETWORK NODES OF SOFTWARE-DEFINED NETWORKS 

      Mala, Praveen 1987- (2012-12)
      Open Flow is a protocol that enables software-defined networking towards scalable, and programmable network architectures. In classical switches the control plane and the data plane are built into the operating system and ...
    • Association Rule Mining for Risk Assessment in Epidemiology 

      Toti, Giulia 1986- (2016-08)
      In epidemiology, a risk assessment measures the association between exposures and a health outcome. Risk characterization has traditionally been performed using statistical methods such as logistic regression, but such ...
    • Automated Lecture Video Indexing With Text Analysis and Machine Learning 

      Tuna, Tayfun 1981- (2015-05)
      Videos recorded during in-class teaching and made accessible online are a versatile resource on par with a textbook and the classroom itself. Nonetheless, the adoption of lecture videos has been limited, in large part due ...
    • Avatar Creation and Customization for Health Games 

      Chen, Cheng 1988- (2014-05)
      Creating 3D avatars that realistically depict a user is very difficult and time consuming. Most 3D avatars are created manually by artists, and personalization options are few. Because 3D scan is an emerging technology, ...
    • Captioning for Classroom Lecture Videos 

      Borgaonkar, Rucha 1985- (2013-12)
      Tablet PC-based lecture videos are widely used by students at the University of Houston. The goal of the ICS (Indexed, Captioned, and Searchable) Videos Project is to enhance user experience and improve usability of classroom ...
    • Choosing the Right Kernel A Meta-Learning Approach to Kernel Selection in Support Vector Machines 

      Valerio Molina, Roberto 1983-; 0000-0002-4508-9788 (2015-05)
      In recent years Support Vector Machines (SVM) have gained increasing popularity over other classification algorithms due to their ability to produce a flexible boundary over non-linearly separable datasets. Such an ability ...
    • Cluster Validation of WHAN Galaxy Classification Using a Novel Approach To External Cluster Validation 

      Parmar, Kunal Jagdishbhai 1993-; 0000-0001-5450-1888 (2016-05)
      The classification of galaxies is traditionally carried out using human-eye analysis of morphology or through information provided by a large survey of galaxies. Clustering methods can reduce the effort of manual classification ...
    • Compiler Cost Model for Multicore Architectures 

      Tolubaeva, Munara 1986- (2014-05)
      The intention to move from single core to multicore architectures has been to increase the performance of a system and hence increase the performance of an application. However, obtaining the optimal application performance ...
    • Concurrent Transmission with Adaptive Forwarder Set 

      Li, Qiang 1976- (2014-12)
      Precisely-timed concurrent transmission(CX) is relatively new in wireless sensor network (WSN), and protocols based on CX can implement reliable and conceptually simple flooding mechanism. These protocols work well; however, ...
    • Contextual Descriptors for Human Activity Recognition 

      Tran, Khai Nguyen 1984- (2013-08)
      Human activity recognition is one of the most challenging problems that has received considerable attention from the computer vision community in recent years. Its applications are diverse, spanning from its use in activity ...
    • Cost-Based Workload Balancing for Ray Tracing on a Heterogeneous Platform 

      Rincon-Nigro, Mario 1983- (2012-12)
      Heterogeneous computational platforms consisting of CPUs and multiple discrete GPUs are becoming common and widely available these days. Such availability has brought up the need to develop techniques that allow the effective ...
    • CPU Transparent Protection of OS Kernel and Hypervisor Integrity with Programmable DRAM 

      Liu, Ziyi 1988- (2013-08)
      Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and they have seriously undermined the integrity of the entire computer system. To eliminate these threats, it is imperative ...
    • Dataset Modification To Improve Machine Learning Algorithm Performance And Speed 

      Ahmed, Owais 1985- (2014-05)
      We propose two pre-processing steps to classification that apply convex hull-based algorithms to the training set to help improve the performance and speed of classification. The Class Reconstruction algorithm uses a ...
    • DESIGN AND IMPLEMENTATION OF A CO-LOCATION ANALYSIS TOOL 

      Man, Xiaoxi 1984- (2014-12)
      In recent years the widespread usage of scanning device, such as GPS-enabled devices, PDAs, and video cameras, has resulted in an abundance of spatial data. Therefore, there is an increasing interest in mining hidden ...
    • Detecting Network Intruders by Examining Packet Crossovers in Connections 

      Zhang, Hongyang 1988- (2014-05)
      Routing packet traffic through a chain of hosts is a common technique for hackers to attack a victim machine without exposing themselves. Generally, a long connection chain formed is an indication of the presence of an ...
    • DEVELOPMENT AND EVALUATION OF TEXT - BASED INDEXING FOR LECTURE VIDEOS 

      Varghese, Varun 1978- (2014-08)
      Lecture videos are an extremely valued learning resource which has been validated by surveys among the students of the University of Houston. The inability to directly access the topics of interest within the video due to ...
    • Development of a Hybrid EEG-NIRS Brain-Computer Interface for Multiple Motor Tasks 

      Buccino, Alessio Paolo 1991-; 0000-0003-3661-527X (2015-08)
      Non-invasive Brain-Computer Interfaces (BCI) have demonstrated great promise for neuroprosthetics and assistive devices. Here we aim to investigate methods to combine Electroencephalography (EEG) and Near-infrared Spectroscopy ...