Now showing items 1-20 of 317

    • 2D-3D Registration Methods for Computer-Assisted Orthopaedic Surgery 

      Gong, Ren Hui (2011-09-28)
      2D-3D registration is one of the underpinning technologies that enables image-guided intervention in computer-assisted orthopaedic surgery (CAOS). Preoperative 3D images and surgical plans need to be mapped to the patient ...
    • Achieving Consumable Big Data Analytics by Distributing Data Mining Algorithms 

      Khalifa, Shady
      Businesses look at Big Data as an opportunity to gain insights for improving their services. The derivation of such insights requires using different data mining techniques. Mature data mining tools like WEKA or R have ...
    • An Adaptable Context-Management Framework for Pervasive Computing 

      Zebedee, Jared A. (2008-09-15)
      Pervasive Computing presents an exciting realm where intelligent devices interact within the background of our environments to create a more intuitive experience for their human users. We demonstrate enabling context-awareness ...
    • Adding Run-Time Monitoring to UML-RT by Modifying the Papyrus-RT Code Generator 

      Juwaidah, Laith (2016-08-22)
      In Model-Driven Engineering (MDE), the developer creates a model using a language such as Unified Modeling Language (UML) or UML for Real-Time (UML-RT) and uses tools such as Papyrus or Papyrus-RT that generate code for ...
    • Advanced Techniques for Robotic Assessment of Neurological Impairments In Stroke Patients 

      Tyryshkin, Kathrin (2014-09-29)
      Stroke is an acute injury of the central nervous system and is caused by the disruption of blood flow or by the rupture of blood vessels. A stroke can impact many body functions, often causing motor, speech, memory, vision ...
    • Advancing the Theory and Utility of Holographic Reduced Representations 

      Kelly, Matthew (2010-08-12)
      In this thesis, we build upon the work of Plate by advancing the theory and utility of Holographic Reduced Representations (HRRs). HRRs are a type of linear, associative memory developed by Plate and are an implementation ...
    • The Algorithmic Expansion of Stories 

      Thomas, Craig Michael (2010-10-12)
      This research examines how the contents and structure of a story may be enriched by computational means. A review of pertinent semantic theory and previous work on the structural analysis of folktales is presented. Merits ...
    • Algorithms for Sequence Similarity Measures 

      Mohamad, Mustafa Amid (2010-11-17)
      Given two sets of points $A$ and $B$ ($|A| = m$, $|B| = n$), we seek to find a minimum-weight many-to-many matching which seeks to match each point in $A$ to at least one point in $B$ and vice versa. Each matched pair (an ...
    • Analysis of Discrete Shapes Using Lie Groups 

      Hefny, Mohamed Salahaldin (2014-01-30)
      Discrete shapes can be described and analyzed using Lie groups, which are mathematical structures having both algebraic and geometrical properties. These structures, borrowed from mathematical physics, are both algebraic ...
    • APPAAS: PROVISIONING OF CONTEXT-AWARE MOBILE APPLICATIONS AS A SERVICE 

      Ejaz, Ali (2013-02-01)
      The global mobile application market is booming in all directions and business giants, viz. Google and Apple, have acknowledged the huge expansion in their Application Market and App Store. There is a demand though for a ...
    • Applications of Quantum Cryptography 

      Nagy, Naya (2010-03-12)
      This thesis extends the applicability of quantum cryptography. First, we prove that quantum cryptography at least equals classical cryptography in an important area, namely authentication. The quantum key distribution ...
    • An Approach to Clone Detection in Behavioral Models 

      Antony, Elizabeth (2014-03-04)
      In this thesis, we present an approach for identifying near-miss interaction clones in reverse-engineered UML behavioural models. Our goal is to identify patterns of interaction ("conversations") that can be used to ...
    • Assisting End-users in Filling Out Web Services 

      Wang, Shaohua (2016-06-01)
      With the quick advance of web service technologies, end-users can conduct various on-line tasks, such as shopping on-line. Usually, end-users compose a set of services to accomplish a task, and need to enter values to ...
    • The Attentive Hearing Aid: visual selection of auditory sources 

      Hart, Jamie Lauren (2007-10-01)
      We present the Attentive Hearing Aid, a system that uses eye input to amplify the audio of tagged sound sources in the environment. A multidisciplinary project, we use the latest technology to take advantage of the social ...
    • Auditory domain speech enhancement 

      Yang, Xiaofeng (2008-06-04)
      Many speech enhancement algorithms suffer from musical noise - an estimation residue noise consisting of music-like varying tones. To reduce this annoying noise, some speech enhancement algorithms require post-processing. ...
    • An Augmented Reality System for Arthroscopic Computer Assisted Mosaic Arthroplasty 

      Slonetsky, Matthew J. B. (2014-12-01)
      Arthroscopic procedures require a difficult mental coordinate transform between the instrument in the surgeon's hand and the image shown on a display mounted near the patient. Significant training and experience is required ...
    • An Augmented Virtuality Navigation System for Arthroscopic Knee Surgery 

      Li, John (2010-11-30)
      Arthroscopic knee surgery can be challenging because there is no intuitive relationship between the arthroscopic image, shown on a screen above the patient, and the camera in the surgeon's hand. As a result, arthroscopic ...
    • Augmenting Petri Nets to Model Health-Care Protocols 

      Whittaker, Sarah-Jane (2011-09-28)
      An outbreak of an infectious illness can have a devastating impact on a population. Once confirmed, local health care organizations will attempt to reduce the spread of the disease by adopting a set of pre-defined guidelines. ...
    • Automated Analysis of Load Testing Results 

      Jiang, Zhen Ming (2013-01-29)
      Many software systems must be load tested to ensure that they can scale up under high load while maintaining functional and non-functional requirements. Studies show that field problems are often related to systems not ...
    • Automated Analysis of Load Tests Using Performance Counter Logs 

      Malik, Haroon (2013-08-29)
      Load testing remains the most integral part of testing and measuring the performance of Large Scale Software Systems (LSS). During the course of a load test, a system under test is closely monitored, resulting in an extremely ...