Browsing by Author "George, K. M."
Now showing items 1-20 of 74
-
Abstraction and Specification of Local Area Networks
Jo, Chang-Hyun (Oklahoma State University, 1988-07-01) -
Access Control and Security of Datasets by Usage Tracking Using Block Chain Technology
Bhatt, Piyush (2017-12-01)The thesis proposes a novel way to solve the threat of exposure of sensitive data from large datasets. Data is captured by organizations and converted into datasets. Two or more datasets may be combined to fetch critical ... -
Adaptation of a Simple Frame-based System to Accommodate Complex Interaction among Frames
Sabbella, V. R. Reddy (Oklahoma State University, 1988-07-01) -
Algorithms for Mining Parallel-Of-Serial Episodes
Wang, Guohuan (2004-05-01) -
Analysis and Comparison of Extendible Hashing and B+ Trees Access Methods
Patel, Harshad D. (Oklahoma State University, 1987-12-01)This thesis Is a discussion and evaluation of both extendible hashing and B+ tree. The study Includes a design and lmplementatlon under the UNIX system. Comparisons and analysis are made using empirical results. -
Analytics Based on Artificial Neural Network: A Case Study Based on Iowa Corn Yield Forecasting
Singireddy, Naveen Kumar Reddy (2015-07-01)This work is an application of computing techniques to solve real world problems. Agriculture has been playing a crucial role in the growth of world economy and has been associated with production of basic food demands. ... -
Ant Colony Approach for Multiple Pickup and Multiple Dropoff
Gorthi, Venkata Sreeram Phani Sai (2017-12-01)The Multiple Travelling Salesman Problem, popularly known as MTSP is an NP-hard problem. MTSP is a well-known combinatorial optimization problem in which more than one salesmen visit all cities only once and return to the ... -
Application of data analytics - Case studies
Yu, Jiangmin (2017-05)Data analytics is the technique of finding knowledge by examining raw data. It is an important tool for researchers to verify existing knowledge or infer new knowledge. In this dissertation, we focus on anonymous traffic ... -
Application of Machine Learning: An Analysis of Asian Options Pricing Using Neural Netwoprk
Fang, Zhou (2017-07-01)Pricing Asian Option is imperative to researchers, analysts, traders and any other related experts involved in the option trading markets and the academic field. Not only trading highly affected by the accuracy of the price ... -
Approach to Language Implementation and Code Generation for Microcomputers
Butler, Anne Marie (Oklahoma State University, 1987-05-01)A cross-compiler for the Pascal language was developed. The compiler development facilities on the Concurrent XF-610 Unix-based system. The output of the compiler is assembly language code for the Commodore 64 aicrocomputer. ... -
Approach to Quantify Information in Tweets
Ramineni, Ruchishya (2019-05-01)Microblogs such as Twitter play an important role in online social communications. Unlike traditional media, hot topics and emerging news will become much more popular in a short span with the help of information spreading ... -
Arabic programming environment
Al-Salman, Abdulmalik S. (1996-07) -
Boundaries of low-dimensional Teichmuller spaces of Riemann surfaces
Matthews, Charles Allen (1994-05) -
Case Study on Determining the Big Data Veracity: A Method to Compute the Relevance of Twitter Data
Paryani, Jyotsna (2017-05-01)Twitter data (tweets) has all the attributes of Big Data. Also, it has become the source of information where people post their real-time experiences and their opinions on various day-to-day issues. Therefore, twitter data ... -
Comparison of social bot detection techniques
Vallabhaneni, Bhagyasri (2019-12)Online Social Networks act as a major platform for communication. The origin of social bots is one of the consequences of increasing popularity and utilization of social networks by people. A social bot is an automated ... -
Compiler for a toy language in a web browser
Short, John (2016-04-29)Many websites exist today that allow users to compile code. Most of these websites require a network call to a remote server in order to compile this code. This is theoretically not necessary and is inefficient. EMCA Script ... -
Compression Techniques for the Grid File
Chun, Sei Hoon (Oklahoma State University, 1988-12-01) -
Concurrent Operations in Persistent Search Trees
New, Hack Hoo (Oklahoma State University, 1988-05-01) -
Constructing features and pseudo-intersections to map unreliable domain specific data items found in disjoint sets
Gaston, Billy D'Angelo (2007-05) -
Content sensitivity based access control model for big data
Thandapani Kumarasamy, Ashwin Kumar (2017-07)Big data technologies have seen tremendous growth in recent years. They are being widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect the ...