Digital Forensic Tools & Cloud-Based Machine Learning For Analyzing Crime Data, 2018 Georgia Southern University
Digital Forensic Tools & Cloud-Based Machine Learning For Analyzing Crime Data, Majeed Kayode Raji
Electronic Theses and Dissertations
Digital forensics is a branch of forensic science in which we can recreate past events using forensic tools for legal measure. Also, the increase in the availability of mobile devices has led to their use in criminal activities. Moreover, the rate at which data is being generated has been on the increase which has led to big data problems. With cloud computing, data can now be stored, processed and analyzed as they are generated. This thesis documents consists of three studies related to data analysis. The first study involves analyzing data from an android smartphone while making a comparison between ...
Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, 2018 Wojciech Budzianowski Consulting Services
Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski
No abstract provided.
Elevated Temperature Progressive Damage And Failure Of Duplex Stainless Steel, 2018 University of New Mexico - Main Campus
Elevated Temperature Progressive Damage And Failure Of Duplex Stainless Steel, Darren P. Luke
Civil Engineering ETDs
Ductile failure of metals has been the focus of research efforts within academia and industry for many years since it is tremendously important for understanding the failure of structures under extreme loading conditions. However, limited research has been dedicated to elevated temperature ductile failure, which is critical for evaluating catastrophic events such as industrial, structural or shipping vessel fires. A detailed investigation was conducted on the structural response of Duplex Stainless Steel at elevated temperatures. The temperature dependence of elastic modulus, yield strength, ultimate strength, and ductility was measured up to 1000°C and a continuum damage plasticity model was ...
Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, 2018 The University of Western Ontario
Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali
Electronic Thesis and Dissertation Repository
The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify ...
Variable Input Observer For Nonstationary High-Rate Dynamic Systems, 2018 Iowa State University
Variable Input Observer For Nonstationary High-Rate Dynamic Systems, Jonathan Hong, Simon Laflamme, Liang Cao, Jacob Dodson, Bryan Joyce
Civil, Construction and Environmental Engineering Publications
Engineering systems experiencing events of amplitudes higher than 100 gn for a duration under 100 ms, here termed high-rate dynamics, can undergo rapid damaging effects. If the structural health of such systems could be accurately estimated in a timely manner, preventative measures could be employed to minimize adverse effects. For complex high-rate problems, adaptive observers have shown promise due to their capability to deal with nonstationary, noisy, and uncertain systems. However, adaptive observers have slow convergence rates, which impede their applicability to the high-rate problems. To improve on the convergence rate, we propose a variable input space concept for ...
A Computational Analysis Of The Gradient Concentration Profile Of Deet And The Mosquito Behavioral Response, 2018 University of Southern Mississippi
A Computational Analysis Of The Gradient Concentration Profile Of Deet And The Mosquito Behavioral Response, Brandon Carver
DEET is a common active ingredient in most spatial repellents. DEET is also a volatile organic compound. DEET prevents mosquitoes from detecting and coming into contact with an human individual. Gas sensing technologies such as metal oxide semiconductor sensors can detect VOCs. The World Health Organization provides the majority of efficacy testing methods. This research adapts methods from the WHO and use of MOS sensors to further understand how and why DEET affects mosquitos. A custom developed system is used to measure DEET dissipation and observe mosquito behavioral response to the DEET. DEET dissipations and mosquito behavior is measured within ...
Blokus Game Solver, 2018 California Polytechnic State University, San Luis Obispo
Blokus Game Solver, Chin Chao
Blokus (officially pronounced as “Block us”) is an abstract strategy board game with transparent Tetris-shaped, color pieces that players are trying to place onto the board. However, the players can only place a piece that touches at least one corner of their own pieces on the board. The ultimate goal of the game is to place as many pieces onto the board as a player can while blocking off the opponent’s ability to place more pieces onto the board. Each player has pieces with different shapes and sizes that can be placed onto the board, where each block within ...
A Scalable, Chunk-Based Slicer For Cooperative 3d Printing, 2018 University of Arkansas, Fayetteville
A Scalable, Chunk-Based Slicer For Cooperative 3d Printing, Jace J. Mcpherson
Computer Science and Computer Engineering Undergraduate Honors Theses
Cooperative 3D printing is an emerging technology that aims to increase the 3D printing speed and to overcome the size limit of the printable object by having multiple mobile 3D printers (printhead-carrying mobile robots) work together on a single print job on a factory floor. It differs from traditional layer-by-layer 3D printing due to requiring multiple mobile printers to work simultaneously without interfering with each other. Therefore, a new approach for slicing a digital model and generating commands for the mobile printers is needed, which has not been discussed in literature before. We propose a chunk-by-chunk based slicer that divides ...
Fingerprint Database Privacy Guard: An Open-Source System That Secures Fingerprints With Locality Sensitive Hashing Algorithms, 2018 University of Arkansas, Fayetteville
Fingerprint Database Privacy Guard: An Open-Source System That Secures Fingerprints With Locality Sensitive Hashing Algorithms, Enrique Sanchez
Computer Science and Computer Engineering Undergraduate Honors Theses
Fingerprint identification is one of the most accurate sources of identification, yet it is not widely used in public facilities for security concerns. Moreover, the cost of fingerprint system is inaccessible for small-budget business because of their high cost. Therefore, this study created an open-source solution to secure fingerprint samples in the database while using low-cost hardware components. Locality Sensitive Hashing Algorithms such as ORB and Image hash were compared in this study as a potential alternative to SURF. To test the design, fifteen samples were collected and stored in a database without verifying the quality of the samples. Then ...
Landmine Detection Using Semi-Supervised Learning., 2018 University of Louisville
Landmine Detection Using Semi-Supervised Learning., Graham Reid
Electronic Theses and Dissertations
Landmine detection is imperative for the preservation of both military and civilian lives. While landmines are easy to place, they are relatively difficult to remove. The classic method of detecting landmines was by using metal-detectors. However, many present-day landmines are composed of little to no metal, necessitating the use of additional technologies. One of the most successful and widely employed technologies is Ground Penetrating Radar (GPR). In order to maximize efficiency of GPR-based landmine detection and minimize wasted effort caused by false alarms, intelligent detection methods such as machine learning are used. Many sophisticated algorithms are developed and employed to ...
A Validation Study Of Time Series Data Forecasting Using Neural Networks, 2018 Southwestern Oklahoma State University
A Validation Study Of Time Series Data Forecasting Using Neural Networks, Marco Martinez, Jeremy Evert
Artificial Intelligence(AI) is a growing topic in Computer Science and has many uses in real world applications. One application is using Al, or more specifically Neural Networks to model data and predict outcomes. Neural Networks have been used in the past to predict weather changes, create facial recognition software , and to create self-driving cars. Our project is a validation study of, “Modeling Time Series Data With Deep Fourier Neural Networks” by Gashler and Ashmore, 2016. Here we show that a neural network can be trained to be an effective predictor of weather patterns in Alaska over several years. Our ...
Toward Building Resilient, Sustainable, And Smart Infrastructure In The 21st Century, 2018 Louisiana State University
Toward Building Resilient, Sustainable, And Smart Infrastructure In The 21st Century, Aly Mousaad Aly
In recent years, as a result of significant climate change, stringent windstorms are becoming more frequent than before. Given the threat that windstorms bring to people and property, wind/structural engineering research is imperative to improve the resilience of existing and new infrastructure, for community safety and assets protection. The Windstorm Impact, Science and Engineering (WISE) research program at Louisiana State University (LSU) focuses on creating new knowledge applicable to the mitigation of existing and new infrastructure, to survive and perform optimally under natural hazards. To achieve our research goals, we address two imperious challenges: (i) characterization of realistic wind ...
Dynamic Fracture Of Pmma, Intefacial Failure, And Local Heating, 2018 University of Nebraska - Lincoln
Dynamic Fracture Of Pmma, Intefacial Failure, And Local Heating, Javad Mehrmashhadi, Longzhen Wang, Florin Bobaru Ph.D.
Web-Based Archaeology And Collaborative Research, 2018 University of York
Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto
Anthropology Faculty Publications
While digital technologies have been part of archaeology for more than fifty years, archaeologists still look for more efficient methodologies to integrate digital practices of fieldwork recording with data management, analysis, and ultimately interpretation.This Special Issue of the Journal of Field Archaeology gathers international scholars affiliated with universities, organizations, and commercial enterprises working in the field of Digital Archaeology. Our goal is to offer a discussion to the international academic community and practitioners. While the approach is interdisciplinary, our primary audience remains readers interested in web technology and collaborative platforms in archaeology
Esense 2.0: Modeling Biomimetic Predation With Multi-Agent Multi-Team Distributed Artificial Intelligence, 2018 Kennesaw State University
Esense 2.0: Modeling Biomimetic Predation With Multi-Agent Multi-Team Distributed Artificial Intelligence, D. Michael Franklin, Derek Martin
Georgia Undergraduate Research Conference (GURC)
Biologic predation is a complex interaction amongst sets of predators and prey operating within the same environment. There are many disparate factors for each member of each set to consider as they interact. Additionally, they each must seek food while avoiding other predators, meaning that they must prioritize their actions based on policies. eSense provides a powerful yet simplistic reinforcement learning algorithm that employs model-based behavior across multiple learning layers. These independent layers split the learning objectives across multiple layers, avoiding the learning-confusion common in many multi-agent systems. The new eSense 2.0 increases the number of layers and the ...
Resource Allocation In The Cognitive Radio Network-Aided Internet Of Things For The Cyber-Physical-Social System: An Efficient Jaya Algorithm, 2018 University of Science and Technology Beijing
Resource Allocation In The Cognitive Radio Network-Aided Internet Of Things For The Cyber-Physical-Social System: An Efficient Jaya Algorithm, Xiong Luo, Zhijie He, Zhigang Zhao, Long Wang, Weiping Wang, Huansheng Ning, Jenq-Haur Wang, Wenbing Zhao, Jun Zhang
Electrical Engineering & Computer Science Faculty Publications
Currently, there is a growing demand for the use of communication network bandwidth for the Internet of Things (IoT) within the cyber-physical-social system (CPSS), while needing progressively more powerful technologies for using scarce spectrum resources. Then, cognitive radio networks (CRNs) as one of those important solutions mentioned above, are used to achieve IoT effectively. Generally, dynamic resource allocation plays a crucial role in the design of CRN-aided IoT systems. Aiming at this issue, orthogonal frequency division multiplexing (OFDM) has been identified as one of the successful technologies, which works with a multi-carrier parallel radio transmission strategy. In this article, through ...
Fogfly: A Traffic Light Optimization Solution Based On Fog Computing, 2018 Singapore Management University
Fogfly: A Traffic Light Optimization Solution Based On Fog Computing, Quang Tran Minh, Chanh Minh Tran, Tuan An Le, Binh Thai Nguyen, Triet Minh Tran, Rajesh Krishna Balan
Research Collection School Of Information Systems
This paper provides a fog-based approach to solving the traffic light optimization problem which utilizes the Adaptive Traffic Signal Control (ATSC) model. ATSC systems demand the ability to strictly reflect real-time traffic state. The proposed fog computing framework, namely FogFly, aligns with this requirement by its natures in location-awareness, low latency and affordability to the changes in traffic conditions. As traffic data is updated timely and processed at fog nodes deployed close to data sources (i.e., vehicles at intersections) traffic light cycles can be optimized efficiently while virtualized resources available at network edges are efficiently utilized. Evaluation results show ...
Experimental Tests And Numerical Simulations For Failure Investigation On Corrugated Boxes Used On Household Appliance Packaging, Diego Fernandes Rodrigues, José Carlos Pereira
Journal of Applied Packaging Research
Packages made of corrugated paper are fundamental to the protection, transportation and handling of the appliance product market. During the storage and sales stages of a product, the package must resist compressive loads in different directions beyond moderate impacts. In this context, the objective of this work is to develop and implement a post-processor that allows the simultaneous analysis of two of the most common failure modes of packages made of corrugated paper: failure due to tensile or compressive stress limit, and failure due to local buckling, when the buckling of the faces of the corrugated paper between two peaks ...
Prediction Of Flood Hydrograph In Small River Catchments Using System Modelling Approach, 2018 Technological University Dublin
Prediction Of Flood Hydrograph In Small River Catchments Using System Modelling Approach, Ahmed Nasr, Zeinab Bedri, Loreta Ramanauske
Floods remain to be one of the natural catastrophic disasters with serious adverse social and economic implications on individuals and communities all around the world. In Ireland, frequency of flood events have increased dramatically during the last forty years and is expected to continue to rise primarily due to changes in rainfall and temperature patterns as a result of the global climate change. Small river catchments are usually vulnerable to different types of flooding particularly those associated with “monster” rainfall events, which are characterised by short durations and high intensities. Therefore accurate prediction of flood hydrographs resulting from these rainfall ...
Multi-Objective Bayesian Optimization Of Super Hydrophobic Coatings On Asphalt Concrete Surfaces, 2018 Iowa State University