Browsing Fakultät für Mathematik und Informatik (inkl. GAUSS) by Referee "Yahyapour, Ramin Prof. Dr."
Now showing items 1-20 of 30
-
Utilizing HPC Systems to Serve Compute-Intensive Tasks from a Data Lake Managing Sensitive Data
(2024-10-10)Data lakes have been proposed by James Dixon in 2010 to prevent information loss happening during the extract-transform-load process usually employed to ingest data into a data warehouse. Instead, he proposed a schema-on-read ... -
Narrative Echoes across Time and Space
(2024-02-16)Originating in mythological research, the Hylistic theory introduces hylemes as a basic plot unit, containing actions, states, or background information derived from a source. These statements are organized in hyleme ... -
A Multi-Layered Identity and Access Management Solution for Establishment of Scalable Federated Identity
(2023-12-22)Federated identity management (FIM) systems are defined as a group of organizations (entities) that have agreed to establish trust relationships and share identity information to enable seamless access to resources across ... -
Scalable and Reliable Framework to Detect and Mitigate DDoS Attack in OpenFlow-based SDN Network
(2023-08-10)Software-defined networking in recent years has come into the sight of so many network designers as a successor to traditional networking. Unlike traditional networks where control and data planes engage together within a ... -
Learning-based Biomimetic Strategies for Developing Control Schemes for Lower Extremity Rehabilitation Robotic Devices
(2023-06-16)Lower limb disabilities caused by factors such as amputation, neuromuscular impairment, and traumatic injury can significantly impact mobility and quality of life. To restore impaired functionality, individuals may use ... -
Multiple Extended Target Tracking in Maritime Environment Using Marine Radar Data
(2022-10-13)Target tracking is today one of the main pillars supporting applications for Maritime Traffic Situation Assessment and Monitoring ( MTSAM ). It provides information on the targets (vessels) obtained from the sensors within ... -
Scientific Workflow Execution Using a Dynamic Runtime Model
(2022-07-18)Research projects consist of several kinds of steps covering, e.g., individual procedures to gather data, as well as different ways to process and analyze it. Moreover, the individual steps of the project consist of a ... -
Graph-based Object Understanding
(2021-06-18)Computer Vision algorithms become increasingly prevalent in our everyday lives. Especially recognition systems are often employed to automatize certain tasks (i.e. quality control). In State-of-the-Art approaches global ... -
An Intelligent Visual Analysis Scheme for Automatic Disassembly Processes in the Recycling Industry
(2021-04-30)This thesis aims to develop and deploy a visually intelligent disassembly scheme to automate the recycling routines for end-of-life products. The recent developments in artificial intelligence and computer vision are ... -
Intelligent Medical Decision Support for Predicting Patients at Risk in Intensive Care Units
(2021-01-14)Early detection of at-risk patients has great importance in Intensive Care Units (ICUs) to improve patient healthcare and save patients’ life outcomes. The severity of illness scores have been used for predicting the ... -
Universal Workload-based Graph Partitioning and Storage Adaption for Distributed RDF Stores
(2021-01-06)The publication of machine-readable information has been significantly increasing both in the magnitude and complexity of the embedded relations. The Resource Description Framework(RDF) plays a big role in modeling and ... -
Automating Security Risk and Requirements Management for Cyber-Physical Systems
(2020-12-10)Cyber-Physical Systems enable various modern use cases and business models such as connected vehicles, the Smart (power) Grid, or the Industrial Internet of Things. Their key characteristics, complexity, heterogeneity, ... -
A Secure and Privacy-Friendly IP-based Emergency Services Architecture
(2019-12-20)Emergency services support is one of the most valued features of the public switched telephone network. With the transition to IP-based communication the opportunity to re-design the emergency services communication ... -
Consumer Behavior Analysis and Repeat Buyer Prediction for E-commerce
(2019-12-16)The proliferation of mobile devices especially smart phones brings remarkable opportunities for both industry and academia. In particular, the massive data generated from users' usage logs provide the possibilities for ... -
Action-oriented Scene Understanding
(2019-09-20)In order to allow robots to act autonomously it is crucial that they do not only describe their environment accurately but also identify how to interact with their surroundings. While we witnessed tremendous progress in ... -
Graph Partitioning for the Finite Element Method: Reducing Communication Volume with the Directed Sorted Heavy Edge Matching
(2019-05-07)A technique called the Finite Element Method is primarily utilized to numerically solve Partial Differential Equations, most commonly by the use iterative methods, over a compact domain. The partial differential equations ... -
Inverse Problems in Asteroseismology
(2019-03-06)Asteroseismology allows us to probe the internal structure of stars through their global modes of oscillation. Thanks to missions such as the NASA Kepler space observatory, we now have high-quality asteroseismic data for ... -
High-Performance Persistent Identification for Research Data Management
(2018-09-17)Durable identification and access to datasets, especially to research datasets, become increasingly important. This is mainly driven by the explosive dataset growth in the current age. Although the Internet was originally ... -
Challenges and New Solutions for Live Migration of Virtual Machines in Cloud Computing Environments
(2018-05-31)Live Virtual Machine (VM) migration aims to move a VM between hosts without interruption to the services running in the VM. It is a cornerstone technology for cloud management and is critical for decreasing the operating ... -
Multi-Layered Policy Generation and Management in Clouds
(2018-01-25)The long awaited Cloud computing concept is a reality now due to the transformation of computer generations. However, security challenges are most important obstacles for the advancement of this emerging technology. A ...