Browsing Master Theses & Projects by Title
Now showing items 50-69 of 326
-
Cluster techniques and prediction models for a digital media learning environment
(2012-08-01)The present work applies well-known data mining techniques in a digital learning media environment in order to identify groups of students based on their pro le. We generate identi able clusters where some interesting ... -
Cluster-based target tracking in vehicular ad hoc networks
(2015-01-01)Recently Vehicular Ad-hoc Networks (VANETs) have drawn the attention of academic and industry researchers due to their potential applications in enabling Intelligent Transportation System (ITS), including safe driving, ... -
A coherent point drift algorithm for breast image registration via surface markers
(2017-03-01)Breast Magnetic Resonance Imaging (MRI) is a reliable imaging tool for localization and evaluation of lesions prior to breast conserving surgery (BCS). MR images typically will be used to determine the size and location ... -
Comparative analysis of deep learning and graph cut algorithms for cell image segmentation
(2020-08-01)Image segmentation is a commonly used technique in digital image processing with many applications in the area of computer vision and medical image analysis. The goal of image segmentation is to partition an image into ... -
Comparing the effects of traditional, VR, and custom-made input devices on usability, cognitive load, and presence on virtual laparoscopic tasks : investigating the potential of low-cost, consumer-level VR technology for medical simulation and training through laparoscopy simulation
(2023-12-01)Digital simulators are essential in medical education, allowing to train procedures that are otherwise impossible or difficult to recreate in real life. Laparoscopy training, a procedure that allows a surgeon to access the ... -
A comparison of seated and room-scale virtual reality on medical-based serious games and virtual simulation
(2016-12-01)Simulation-based training has been widely adopted by healthcare education as a vital tool in the practice of skills within a safe environment. However, significant cost and logistical challenges exist within traditional ... -
Component-based modeling for Android application testing
(2017-04-01)The rising popularity of Android and the component-based structure of its apps have motivated the need for automated model-based testing techniques on Android plat- form. Prior researches have primarily focused on the ... -
Computational and laboratory investigations of a model of blood droplet flight for forensic applications
(2012-09-01)We present a three-dimensional, forward model of blood droplets in ight. The proposed model is based on a set of ordinary di erential equations (ODEs) incorporating viscous drag and gravitational forces. We validate the ... -
Computational and laboratory investigations of a model of blood droplet flight for forensic applications
(2014-01-01)Game developers strive to maximize immersion and engagement, to emotionally involve the audience in their material. One technique used to increase engagement is the development of new technologies, such as Stereoscopic ... -
Computational studies of semiflexible polymer translocation in nanopore systems
(2019-08-01)The translocation of double stranded DNA (dsDNA) through nanopore systems is a field with rich physics and many promising technological applications. Double stranded DNA is not fully flexible, and the translocation dynamics ... -
Conductive Si doped metal oxide fuel cell catalyst supports: understanding the role of Si content
(2021-08-01)Current proton exchange membrane fuel cell (PEMFC) catalysts commonly use platinum supported on carbon (Pt/C) which is susceptible to corrosion, thus a highly conductive and stable Ti3O5 doped by Si (TOS) conductive metal ... -
The conjugation and evaluation of hydrophobic small molecules to trazole-linked siRNAs
(2014-08-01)According to the Human Development Index, it is estimated that all cancer cases will rise from 12.7 million cases in 2008 to 22.2 million by 2030. Traditional therapies, including surgery, radiation therapy, and chemotherapy, ... -
Convection in a differentially heated rotating spherical shell of Boussinesq fluid with radiative forcing
(2012-12-01)In this study we investigate the flow of a Boussinesq fluid contained in a rotating, differentially heated spherical shell. Previous work, on the spherical shell of Boussinesq fluid, differentially heated the shell by ... -
Data curation with ontology functional dependences
(2017-04-01)Poor data quality has become a pervasive issue due to the increasing complexity and size of modern datasets. Functional dependencies have been used in existing cleaning solutions to model syntactic equivalence. They are ... -
Deep learning approach to discontinuity-preserving image registration
(2020-05-01)Image registration is an indispensable tool in medical image analysis. Traditionally, registration algorithms are aimed at aligning image pairs using regularizers to impose smoothness restrictions on unknown deformation ... -
Depletant induced attractions in red blood cells
(2018-10-01)Red blood cells suspended in plasma are able to aggregate into linearly stacked rouleau. The aggregations can form complex clusters and branching networks which cause complications in various pathological cases. The self ... -
Depletion induced bundling of rod-like colloids and simulations of triple helix bundles
(2023-06-01)We ran molecular dynamics simulations of rod-like colloids acting under depletion forces. In these simulations, we found bundling of the rods above a given strength of the depletion force. We then analyzed the bundle ... -
Design and evaluation of a novel convolutional neural network for short-term vehicle multi-traffic prediction
(2019-08-01)Short-term vehicle traffic forecasting is about predicting how traffic indicators are going to be in the near future. The main traffic parameters are: traffic volume, traffic speed, and congestion state. In this thesis, ... -
Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt
(2013-03-01)The lack of encryption of data at rest or in motion is one of the top 10 database vulnerabilities according to team SHATTER [72]. In the quest to improve the security landscape, we identify an opportunity area: two tools ... -
Design and performance evaluation of data dissemination and hovering information protocols for vehicular ad hoc networks (VANETs)
(2017-07-01)Robust and efficient communication protocols for Vehicular Ad Hoc Networks (VANETs) are still an open topic in the literature. Because of that, our attention has been gathered by the Data Dissemination and the Information ...