Background of the study
Traffic congestion is a major problem in many cities, and the fixed-cycle light signal controllers are not resolving the high waiting time in the intersection. We see often a policeman managing the movements instead of the traffi...
ABSTRACT
This research developed a license plate and classification scheme using deep learning architecture which utilized transfer learning using pre-trained Convolutional Neural Network (CNN). The developed scheme used images obtained from Caltech dataset, Peking University VehicleID...
Abstract
Machine Learning (ML) using Artificial Neural Networks (ANNs), referred to as Deep Learning (DL), is a very popular and powerful method of statistical inference. A primary advantage of deep-learning has been the automatic learning of informative features (that encodes the data...
ABSTRACT
This dissertation focuses on disambiguation of language use on Twitter about drug use, consumption types of drugs, drug legalization, ontology-enhanced approaches, and prediction analysis of data-driven by developing novel NLP models. Three technical aims comprise this wo...
ABSTRACT
Website fingerprinting is a passive network traffic analysis technique which enables an adversary to identify the website a user visited despite encryption and the use of privacy services such as Tor. Several website fingerprinting defenses built on top of Tor have been put for...
ABSTRACT
The evolution of the Web over the last three decades has led to a deluge of scientific and news articles on the Internet. Harnessing these publications in different fields of study is critical to effective end user information consumption. Similarly, in the domain of heal...
Background to the Study
Generally education is the corner stone for development. It forms the basis for literacy, skill acquisition, technological advancement and ability to harness human and material resources towards the achievement of societal goal, Federal Republic...
ABSTRACT
Driven by considerable economic profits, there has been explosive growth of malware which has posed significant damages and finical losses to public users. The increasingly sophisticated malware call for new defensive techniques that are capable of protecting l...
Abstract
Cervical cancer is the second most common and second most deadly cancer in Ethiopia. The disease's incidence and prevalence are increasing over time due to population growth and aging, as well as an...