Browsing by Advisor
Now showing items 1-17 of 17
-
A classification study of rough sets generalization
(2004)In the development of rough set theory, many different interpretations and formulations have been proposed and studied. One can classify the studies of rough sets into algebraic and constructive approaches. While algebraic ... -
Access control scheme for partially ordered set hierarchy with provable security
(2005)In many multi-user information systems, the users are organized as a hierarchy. Each user is a subordinate, superior and/or coordinate of some others. In such systems, a user has access to the information if and only if ... -
Adding time-series data to enhance performance of naural language processing tasks
(2023)In the past few decades, with the explosion of information, a large number of computer scientists have devoted themselves to analyzing collected data and applying these findings to many disciplines. Natural language ... -
Boosting feature extraction performance on the aspect of representation learning efficiency
(2022)Machine learning is famous for its automatic data handling. While there is a slow growth in the performance of the state-of-the-art models in the most recent well-known learning frameworks, the number of parameters and ... -
A comparison and analysis of explainable clinical decision making using white box and black box models
(2024)Explainability is a crucial element of machine learning-based making in high stake scenarios such as risk assessment in criminal justice [80], climate modeling [79], disaster response [82], education [81] and critical ... -
Database anonymization and protections of sensitive attributes
(2008)The importance of database anonymization has become increasingly critical for organizations that publish their database to the public. Current security measures for anonymization poses different manner of drawbacks. ... -
An enhanced passkey entry protocol for secure simple pairing in bluetooth
(2020)Bluetooth devices are being used very extensively in today's world. From simple wireless headsets to maintaining an entire home network, the Bluetooth technology is used everywhere. However, there are still vulnerabilities ... -
Feature learning boosts network performance
(2020)Features are an important part of machine learning. Features are often the reduced-dimensional representation of input data, feature calculation, extraction, and fusion directly affect the final result of the network. ... -
Indirect key derivation schemes for key management of access hierarchies
(2004)In this thesis, we study the problem of key management within an access hierarchy. Our contribution to the key management problem is an indirect key derivation approach we call the HMAC-method. It is called the HMAC-method, ... -
Joint design of PAPR, PICR and OBP in OFDM systems
(2008)Orthogonal frequency division multiplexing (OFDM) technique has been adopted by many existing and future wireless communication systems for high-speed data transmission. However, a major problem of OFDM systems is the high ... -
Permissioned blockchains for real world applications
(2020)Blockchain technology, even though relatively new, has evolved rapidly in the past 12 years. Bitcoin’s underlying technology - the first blockchain - was a public, permissionless, and completely decentralized network ... -
Searching for incomplete self orthogonal latin squares : a targeted and parallel approach
(2003)The primary purpose of this dissertation is in the search for new methods in which to search for Incomplete Self Orthogonal Latin Squares. As such a full understanding of the structures involved must be examined, ... -
Secret sharing for mobile agent cryptography
(2003)A mobile agent is a multi-threaded autonomous program that can be distributed over a heterogeneous network to perform some predefined task for its hum an creator (user). The independence, flexibility and autonomy offered ... -
The inference problem in multilevel secure databases
(2005)Conventional access control models, such as role-based access control, protect sensitive data from unauthorized disclosure via direct accesses, however, they fail to prevent unauthorized disclosure happening through ... -
Vapnik-Chervonenkis dimension in neural networks
(2023)This thesis aims to explore the potential of statistical concepts, specifically the Vapnik-Chervonenkis Dimension (VCD)[33], in optimizing neural networks. With the increasing use of neural networks in replacing human ... -
Visual cryptography with cheating shares
(2006)Visual cryptography is a technique that applies the human visual system to decode encrypted information, such as text, image and number, without any sophisticated devices and computing capabilities. Therefore, compared ... -
Wireless sensor network scheduling schemes
(2012-11-10)Wireless Sensor Network (WSN) consists of small sensing devices with constrained power and resources. It is widely used for environment monitoring. WSN usually works in hostile environments and performs critical tasks, for ...