• Login
    Search 
    •   Home
    • Scholarly Contributions
    • Computing, School of
    • School of Computing Graduate Theses
    • Search
    •   Home
    • Scholarly Contributions
    • Computing, School of
    • School of Computing Graduate Theses
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-7 of 7

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • xmlui.Discovery.AbstractSearch.sort_by.dc.date.available_dt_asc
    • xmlui.Discovery.AbstractSearch.sort_by.dc.date.available_dt_desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Explicating a Biological Basis for Chronic Fatigue Syndrome 

    Abou-Gouda, Samar A. (2007-12-18)
    In the absence of clinical markers for Chronic Fatigue Syndrome (CFS), research to find a biological basis for it is still open. Many data-mining techniques have been widely employed to analyze biomedical data describing ...
    Thumbnail

    A Modified Genetic Algorithm and Switch-Based Neural Network Model Applied to Misuse-Based Intrusion Detection 

    Stewart, Ian (2009-03-17)
    As our reliance on the Internet continues to grow, the need for secure, reliable networks also increases. Using a modified genetic algorithm and a switch-based neural network model, this thesis outlines the creation of a ...
    Thumbnail

    Mining Unstructured Software Repositories Using IR Models 

    Thomas, Stephen (2012-12-12)
    Mining Software Repositories, which is the process of analyzing the data related to software development practices, is an emerging field which aims to aid development teams in their day to day tasks. However, data in many ...
    Thumbnail

    Detecting Deception in Interrogation Settings 

    Lamb, Carolyn (2012-12-18)
    Bag-of-words deception detection systems outperform humans, but are still not always accurate enough to be useful. In interrogation settings, present models do not take into account potential influence of the words in a ...
    Thumbnail

    Data Mining the Genetics of Leukemia 

    Morton, Geoffrey (2010-01-13)
    Acute Lymphoblastic Leukemia (ALL) is the most common cancer in children under the age of 15. At present, diagnosis, prognosis and treatment decisions are made based upon blood and bone marrow laboratory testing. With ...
    Thumbnail

    Spectral Techniques for Heterogeneous Social Networks 

    Zheng, Quan (2016-01-26)
    Social networks represent a set of participants and the pairwise relationships between them. There are several different types of networks, such as directed networks, networks with typed edges, dynamic networks and signed ...
    Thumbnail

    Counter-Surveillance in an Algorithmic World 

    Dutrisac, James George (2007-09-26)
    Surveillance is the act of collecting, analysing, and acting upon information about specific objects, data, or individuals. Recent advances have allowed for the automation of a large part of this process. Of particular ...

    DSpace software copyright © 2002-2015  DuraSpace
    Contact Us
    Theme by 
    Atmire NV
     

     

    Browse

    All of QSpaceCommunities & CollectionsPublished DatesAuthorsTitlesSubjectsTypesThis CollectionPublished DatesAuthorsTitlesSubjectsTypes

    My Account

    LoginRegister

    Discover

    AuthorAbou-Gouda, Samar A. (1)Dutrisac, James George (1)Lamb, Carolyn (1)Morton, Geoffrey (1)Stewart, Ian (1)Thomas, Stephen (1)Zheng, Quan (1)Subject
    Data Mining (7)
    Machine Learning (3)Computer Science (2)Acute Lymphoblastic Leukemia (1)Algorithmic (1)Counter Surveillance (1)Counter-Surveillance (1)Countersurveillance (1)Data-Mining (1)Deception (1)... View MoreDate Published2016 (1)2012 (2)2010 (1)2009 (1)2007 (2)

    DSpace software copyright © 2002-2015  DuraSpace
    Contact Us
    Theme by 
    Atmire NV