Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (233)
- Western University (44)
- University of Tennessee, Knoxville (41)
- California State University, San Bernardino (30)
- Louisiana State University (24)
-
- West Virginia University (24)
- University of Louisville (23)
- University of North Florida (21)
- Air Force Institute of Technology (19)
- San Jose State University (19)
- University of Arkansas, Fayetteville (18)
- City University of New York (CUNY) (15)
- Boise State University (12)
- Kennesaw State University (12)
- Michigan Technological University (12)
- Southern Methodist University (11)
- Virginia Commonwealth University (10)
- Clemson University (9)
- Georgia Southern University (9)
- The University of Akron (9)
- University of Kentucky (9)
- University of New Orleans (9)
- University of New Mexico (8)
- American University in Cairo (7)
- The University of Southern Mississippi (7)
- Bard College (6)
- Dartmouth College (6)
- James Madison University (6)
- Edith Cowan University (5)
- Embry-Riddle Aeronautical University (5)
- Keyword
-
- Machine Learning (45)
- Machine learning (36)
- Deep learning (25)
- Deep Learning (23)
- Computer Vision (18)
-
- Android (17)
- Security (17)
- Computer Science (16)
- Thesis; University of North Florida; UNF; Dissertations (16)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (14)
- Cybersecurity (13)
- Software (13)
- Artificial Intelligence (12)
- Java (12)
- Game (11)
- Arduino (10)
- IOS (10)
- Computer vision (8)
- Convolutional Neural Network (8)
- Python (8)
- Web (8)
- Artificial intelligence (7)
- Blockchain (7)
- Computer Engineering (7)
- Data mining (7)
- Image Processing (7)
- Mobile (7)
- Neural network (7)
- Application (6)
- Bluetooth (6)
- Publication Year
- Publication
-
- Computer Engineering (107)
- Master's Theses (70)
- Electronic Thesis and Dissertation Repository (44)
- Computer Science and Software Engineering (43)
- Theses and Dissertations (40)
-
- Electronic Theses and Dissertations (39)
- Electronic Theses, Projects, and Dissertations (30)
- Doctoral Dissertations (26)
- Graduate Theses, Dissertations, and Problem Reports (24)
- UNF Graduate Theses and Dissertations (21)
- Master's Projects (19)
- Masters Theses (15)
- Computer Science and Computer Engineering Undergraduate Honors Theses (14)
- Honors Theses (14)
- Boise State University Theses and Dissertations (12)
- Dissertations, Master's Theses and Master's Reports (12)
- LSU Doctoral Dissertations (12)
- LSU Master's Theses (12)
- Dissertations, Theses, and Capstone Projects (9)
- University of New Orleans Theses and Dissertations (9)
- Williams Honors College, Honors Research Projects (9)
- Computer Science and Engineering Theses and Dissertations (7)
- Dissertations and Theses (7)
- Liberal Arts and Engineering Studies (7)
- Theses and Dissertations--Computer Science (7)
- Electrical and Computer Engineering ETDs (6)
- Master of Science in Computer Science Theses (6)
- All Theses (5)
- Doctoral Dissertations and Master's Theses (5)
- Electrical Engineering (5)
Articles 1 - 30 of 748
Full-Text Articles in Entire DC Network
Seal Counting On Our Plages (S.C.O.O.P.), Kaanan Kharwa
Seal Counting On Our Plages (S.C.O.O.P.), Kaanan Kharwa
Master's Theses
The Vertebrate Integrative Physiology (VIP) lab monitors the population of northern elephant seals at the largest mainland breeding colony, located at Piedras Blancas (San Simeon, CA). As the population expands, more human-seal interactions and conflicts over land use occur. The VIP lab's work informs California State Parks and helps with the management of the rookery. Currently, members of the VIP lab fly a drone over the beaches, capture multiple images, and manually count the seals, which takes around 14 to 21 hours of analysis per survey. Machine learning methods such as Convolutional Neural Networks (CNN) and Region-based Convolutional Neural Networks …
Enhancing Strawberry Disease And Quality Detection: Integrating Vision Transformers With Blender-Enhanced Synthetic Data And Swinunet Segmentation Techniques, Kimia Aghamohammadesmaeilketabforoosh
Enhancing Strawberry Disease And Quality Detection: Integrating Vision Transformers With Blender-Enhanced Synthetic Data And Swinunet Segmentation Techniques, Kimia Aghamohammadesmaeilketabforoosh
Electronic Thesis and Dissertation Repository
Agricultural productivity in strawberry cultivation was enhanced through the application of machine learning in this study. Traditional methods for detecting diseases and assessing ripeness in strawberries were identified as labor-intensive and error-prone, which limited farming efficiency and reduced crop yields. To address these challenges, it was hypothesized that advanced machine learning models incorporating attention mechanisms could significantly improve these tasks. The objective was to evaluate the effectiveness of various models by optimizing them for specific agricultural applications. Two datasets of strawberry images were augmented, and three pretrained models—Vision Transformer (ViT), MobileNetV2, and ResNet18—were fine-tuned. Data quality was improved through background …
Crime Data Prediction Based On Geographical Location Using Machine Learning, Sai Bharath Yarlagadda
Crime Data Prediction Based On Geographical Location Using Machine Learning, Sai Bharath Yarlagadda
Electronic Theses, Projects, and Dissertations
This project employs machine learning methods like K Nearest Neighbors (KNN), Random Forest, Logistic Regression, and Decision Tree algorithms to monitor crime data based on location and pinpoint areas with risks. The project implements and tunes the four models to improve the precision of predicting crime levels. These models collaborate to offer a trustworthy evaluation of crime patterns. K Nearest Neighbors (KNN) categorizes locations by examining the proximity of data points considering coordinates and other factors to identify trends linked to increased crime data. Logistic Regression gauges the likelihood of crime incidents by studying the connection, between factors (like location …
Real-Time Gun Detection In Video Streams Using Yolo V8, Harish Kumar Reddy Kunchala
Real-Time Gun Detection In Video Streams Using Yolo V8, Harish Kumar Reddy Kunchala
Electronic Theses, Projects, and Dissertations
In this research, we advance the domain of public safety by developing a machine learning model that utilizes the YOLO v8 architecture for real-time detection of firearms in video streams. A diverse and extensive dataset, capturing a range of firearms in varying lighting and backgrounds, was meticulously assembled and preprocessed to enhance the model's adaptability to real-world scenarios. Leveraging the YOLO v8 framework, known for its real-time object detection accuracy, the model was fine-tuned to accurately identify firearms across different shapes and orientations.
The training phase capitalized on GPU computing and transfer learning to expedite the learning process while preserving …
Optimal False Data Injection (Fdi) In Simulated Cooperative Adaptive Cruise Control (Cacc) Systems, Lovro Dukic
Optimal False Data Injection (Fdi) In Simulated Cooperative Adaptive Cruise Control (Cacc) Systems, Lovro Dukic
Master's Theses
In the rapidly advancing field of autonomous vehicles, ensuring the security and reliability of self-driving systems is crucial. Autonomous vehicle systems, such as cooperative adaptive cruise control (CACC), must undergo significant research and testing before their integration into commercial intelligent transportation systems. CACC considers multiple vehicles in close proximity as a single entity, or platoon, with each vehicle equipped with a controller that uses sensor-based measurements and vehicle-to-vehicle (V2V) communication to control inter-vehicle spacing. While this system offers numerous potential benefits for traffic safety and efficiency, it is also susceptible to False Data Injection (FDI) attacks, which can cause the …
A Comparative Study Of The Npm, Pypi, Maven, And Rubygems Open-Source Communities, Saurav Gupta
A Comparative Study Of The Npm, Pypi, Maven, And Rubygems Open-Source Communities, Saurav Gupta
Master's Theses
Open-source software (OSS) ecosystems, defined as environments composed of package managers and programming languages (e.g., NPM for JavaScript), are essential for software development and foster collaboration and innovation. Although their significance is acknowledged, understanding what makes OSS communities healthy and sustainable requires further exploration. This thesis quantitatively assesses the health of OSS projects and communities within the NPM, PyPI, Maven, and RubyGems ecosystems. We explore five research questions addressing project standards, community responsiveness, contribution distribution, contributor retention, and newcomer integration strategies. Our analysis shows varied documentation practices, insider engagement levels, and contribution patterns. Our findings highlight both strengths and different …
Sequential Memory Generation For Cognitive Models, Eben Miles Sherwood
Sequential Memory Generation For Cognitive Models, Eben Miles Sherwood
Master's Theses
Understanding the process of memory formation in neural systems is of great interest in the field of neuroscience. Valiant’s Neuroidal Model poses a plausible theory for how memories are created within a computational context. Previously, the algorithm JOIN has been used to show how the brain could perform conjunctive and disjunctive coding to store memories. A limitation of JOIN is that it does not consider the coding of temporal information in a meaningful manner. We propose SeqMem, a similar algorithmic primitive that is designed to encode a series of items within a random graph model. We investigate the feasibility of …
Improving Fused Filament Fabrication Additive Manufacturing Through Computer Vision Analysis And Fabrication Optimization, Aliaksei Petsiuk
Improving Fused Filament Fabrication Additive Manufacturing Through Computer Vision Analysis And Fabrication Optimization, Aliaksei Petsiuk
Electronic Thesis and Dissertation Repository
Additive manufacturing (AM), also known as 3-D printing, is one of the fundamental elements of Industry 4.0. According to ASTM standards, AM can be classified by production principles, types of raw materials, energy sources, and fabrication volumes. Fused filament fabrication (FFF) is one of the most accessible technologies that offers independent manufacturers great opportunities due to its simplicity, scalability, and low cost.
Modern 3-D printing is moving from single-material prototyping to complex multi-material product creation. It is firmly established in a wide range of applications, significantly expanding manufacturing horizons, providing innovative design capabilities, and improving product quality through the optimal …
Beyond The Horizon: Exploring Anomaly Detection Potentials With Federated Learning And Hybrid Transformers In Spacecraft Telemetry, Juan Rodriguez
Beyond The Horizon: Exploring Anomaly Detection Potentials With Federated Learning And Hybrid Transformers In Spacecraft Telemetry, Juan Rodriguez
Computer Science and Engineering Theses and Dissertations
Telemetry sensors play a crucial role in spacecraft operations, providing essential data on efficiency, sustainability, and safety. However, identifying irregularities in telemetry data can be a time-consuming process that risks the success of missions. With the rise of CubeSats and smallsats, telemetry data has become more abundant, but concerns about privacy and scalability have resulted in untapped data potential. To address these issues, we propose a new approach to anomaly detection that utilizes machine learning models at data sources. These models solely transmit weights to a centralized server for aggregation, resulting in improved dataset performance with a single global model. …
Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu
Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu
Master's Theses
The rapid advancement in Deep Learning (DL), especially in Reinforcement Learning (RL) and Imitation Learning (IL), has positioned it as a promising approach for a multitude of autonomous robotic systems. However, the current methodologies are predominantly constrained to singular setups, necessitating substantial data and extensive training periods. Moreover, these methods have exhibited suboptimal performance in tasks requiring long-horizontal maneuvers, such as Radio Frequency Identification (RFID) inventory, where a robot requires thousands of steps to complete.
In this thesis, we address the aforementioned challenges by presenting the Cross-modal Reasoning Model (CMRM), a novel zero-shot Imitation Learning policy, to tackle long-horizontal robotic …
Brain Computer Interface-Based Drone Control Using Gyroscopic Data From Head Movements, Ikaia Cacha Melton
Brain Computer Interface-Based Drone Control Using Gyroscopic Data From Head Movements, Ikaia Cacha Melton
Honors College Theses
This research explores the potential of using gyroscopic data from a person’s head movement to control a DJI Tello quadcopter via a Brain-Computer Interface (BCI). In this study, over 100 gyroscopic recordings capturing the X, Y and Z columns (formally known as GyroX, GyroY, GyroZ) between 4 volunteers with the Emotiv Epoc X headset were collected. The Emotiv Epoc X data captured (left, right, still, and forward) head movements of each participant associated with the DJI Tello quadcopter navigation. The data underwent thorough processing and analysis, revealing distinctive patterns in charts using Microsoft Excel. A Python condition algorithm was then …
Gamification Of Speech Therapy With Pronunciation Pal, Parker Zbylut
Gamification Of Speech Therapy With Pronunciation Pal, Parker Zbylut
Theses/Capstones/Creative Projects
This capstone report examines the theory and implementation behind applying game design principles to educational applications, and explores their implementation in an educational game through the Pronunciation Pal application. The gamification of learning tools aims to increase learners' engagement and attentiveness with a subject by restructuring content using game design principles of challenges, rewards and feedback. Feedback can be delivered via visuals and/or sounds, as well as regular indicators of player progress and accomplishment. In addition, a successful game implementation establishes challenges to facilitate a player's intrinsic desire to continue playing and improving at the skills presented by the game. …
Exploration Of Event-Based Camera Data With Spiking Neural Networks, Charles Peter Rizzo
Exploration Of Event-Based Camera Data With Spiking Neural Networks, Charles Peter Rizzo
Doctoral Dissertations
Neuromorphic computing is a novel, non-von Neumann computing architecture that employs power efficient spiking neural networks on specialized hardware. Taking inspiration from the human brain, spiking neural networks are temporal computation units that propagate information throughout the network via binary spikes. Compared to conventional artificial neural networks, these networks can be more sparse, smaller in size, and more efficient power-wise when realized on neuromorphic hardware. Event-based cameras are novel vision sensors that capture visual information through a temporal stream of events instead of as a conventional RGB frame. These cameras are low-power collections of pixels that asynchronously emit events over …
High-Altitude Ballooning And Payload Design, Matthew Smith
High-Altitude Ballooning And Payload Design, Matthew Smith
Honors College Theses
The Icarus project began in 2017 where a team performs high-altitude balloon (HAB) launches to conduct atmospheric and payload design research. The project involves sending a data-collecting payload containing recording equipment to high altitudes (~100,000 feet). This paper outlines the Icarus project as well as the efforts to design a payload that will remain stable throughout flight while also protecting the equipment housed within the payload shell. SOLIDWORKS computer-aided design (CAD) software was used to design a unique payload system. The payload parts were manufactured with PLA filament using a Prusa MK4 3D printer. The secondary goal of this thesis …
Geometric Multi-Resolution Analysis Across Signals, Images, And Networks, Felicia Schenkelberg
Geometric Multi-Resolution Analysis Across Signals, Images, And Networks, Felicia Schenkelberg
Dartmouth College Master’s Theses
This research delves into the transformative potential of Geometric Multi-Resolution Analysis (GMRA) as a robust tool for dimensionality reduction and data analysis in the context of high-dimensional graphs. Statistical techniques for classification have historically been tailored for scenarios wherein the number of observations significantly exceeds the number of features, a paradigm characteristic of low-dimensional datasets. However, recent advancements in technologies have ushered in a transformative era in data collection practices across diverse domains, resulting in the acquisition of extensive feature measurements. As a result of this shift, datasets have transitioned into a high-dimensional realm wherein the number of features significantly …
Diegetic Sonification For Low Vision Gamers, Jhané Dawes
Diegetic Sonification For Low Vision Gamers, Jhané Dawes
Master's Theses
There are not many games designed for all players that provide accommodations for low vision users. This means that low vision users may not get to engage with the gaming community in the same way as their sighted peers. In this thesis, I explore how diegetic sonification can be used as a tool to support these low vision gamers in the typical gaming environment. I asked low vision players to engage with a prototype game level with two diegetic sonification techniques applied, without the use of their corrective lenses. I found that participants had more enjoyment and experienced less difficulty …
Automated Brain Tumor Classifier With Deep Learning, Venkata Sai Krishna Chaitanya Kandula
Automated Brain Tumor Classifier With Deep Learning, Venkata Sai Krishna Chaitanya Kandula
Electronic Theses, Projects, and Dissertations
Brain Tumors are abnormal growth of cells within the brain that can be categorized as benign (non-cancerous) or malignant (cancerous). Accurate and timely classification of brain tumors is crucial for effective treatment planning and patient care. Medical imaging techniques like Magnetic Resonance Imaging (MRI) provide detailed visualizations of brain structures, aiding in diagnosis and tumor classification[8].
In this project, we propose a brain tumor classifier applying deep learning methodologies to automatically classify brain tumor images without any manual intervention. The classifier uses deep learning architectures to extract and classify brain MRI images. Specifically, a Convolutional Neural Network (CNN) …
Attention Guided Data Augmentation For Improving The Classification Performance Of Vision Transformers., Nada Baili
Attention Guided Data Augmentation For Improving The Classification Performance Of Vision Transformers., Nada Baili
Electronic Theses and Dissertations
For over a decade, Deep Neural Networks (DNNs) have been rapidly progressing and achieving great success, forming a robust foundation of state of the art machine learning algorithms that impacted various domains. The advances in data acquisition and processing have undeniably played a major role in these breakthroughs. Data is a crucial component in building successful DNNs, as it enables machine learning models to optimize complex architectures, necessary to perform certain difficult tasks. However, acquiring large-scale data sets is not enough to learn robust models with generalizable features. Instead, an ideal training set should be diverse enough and contain enough …
Defining And Labeling Traversable Space In A Forested Environment, James Nguyen
Defining And Labeling Traversable Space In A Forested Environment, James Nguyen
All Theses
This thesis investigates the problem of identifying traversable terrain in outdoor conditions. We are motivated by research in recent years toward identifying drivable space for the purpose of developing autonomous vehicles. Our motivating application is similar but also different. We envision a “Hiker Helper” that assists humans with dismounted navigation in forested terrain. A common challenge in this type of environment is identifying a viable path for moving through terrain that is congested with trees, bushes, other flora, and natural obstacles that would make navigation difficult. We envision training an artificial intelligence (AI) model to automatically analyze images of this …
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Honors Theses
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Building Software At Scale: Understanding Productivity As A Product Of Software Engineering Intrinsic Factors, Gauthier Ingende Wa Boway
Building Software At Scale: Understanding Productivity As A Product Of Software Engineering Intrinsic Factors, Gauthier Ingende Wa Boway
Master's Theses
During our education at KSU, we have learned about various factors that affect productivity such as schedule, budget, and risks, but those are often controlled outside of what we could learn as software engineering principles, patterns, or practices. On top of that, other off-work factors such as health conditions, emotional distress, or political climate, just to name a few, could drastically affect the productivity of a software engineering team. We see a demarcation between those factors that affect productivity in software engineering but are not inherent to the discipline itself, which we call resistance factors, and the factors that are …
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
LSU Master's Theses
Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …
Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner
Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner
Honors College Theses
Modern advancements in machine learning are transforming the technological landscape, including information architecture within user experience design. With the unparalleled amount of user data generated on online media platforms and applications, an adjustment in the design process to incorporate machine learning for categorizing the influx of semantic data while maintaining a user-centric structure is essential. Machine learning tools, such as the classification and recommendation system, need to be incorporated into the design for user experience and marketing success. There is a current gap between incorporating the backend modeling algorithms and the frontend information architecture system design together. The aim of …
A Study Of Random Partitions Vs. Patient-Based Partitions In Breast Cancer Tumor Detection Using Convolutional Neural Networks, Joshua N. Ramos
A Study Of Random Partitions Vs. Patient-Based Partitions In Breast Cancer Tumor Detection Using Convolutional Neural Networks, Joshua N. Ramos
Master's Theses
Breast cancer is one of the deadliest cancers for women. In the US, 1 in 8 women will be diagnosed with breast cancer within their lifetimes. Detection and diagnosis play an important role in saving lives. To this end, many classifiers with varying structures have been designed to classify breast cancer histopathological images. However, randomly partitioning data, like many previous works have done, can lead to artificially inflated accuracies and classifiers that do not generalize. Data leakage occurs when researchers assume that every image in a dataset is independent of each other, which is often not the case for medical …
Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao
Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao
Master's Theses
Understanding the temporal evolution of cells poses a significant challenge in developmental biology. This study embarks on a comparative analysis of various machine-learning techniques to classify cell colony images across different timestamps, thereby aiming to capture dynamic transitions of cellular states. By performing Transfer Learning with state-of-the-art classification networks, we achieve high accuracy in categorizing single-timestamp images. Furthermore, this research introduces the integration of temporal models, notably LSTM (Long Short Term Memory Network), R-Transformer (Recurrent Neural Network enhanced Transformer) and ViViT (Video Vision Transformer), to undertake this classification task to verify the effectiveness of incorporating temporal features into the classification …
Customer Churn Prediction Based On Sentiment Score, Shadha Al-Safi
Customer Churn Prediction Based On Sentiment Score, Shadha Al-Safi
Theses and Dissertations
In recent years, the telecommunications industry has witnessed intensified competition, wherein the expense associated with acquiring new consumers exceeds that of sustaining existing ones. Consequently, predicting customer churn prior to its occurrence has become essential. This study proposes a sentiment-based customer churn prediction model in which the sentiment of customers is predicted using Random Forest. Subsequently, the derived sentiment predictions are combined with additional features to predict customer churn. The ensemble technique is applied to predict churn, consisting of K-nearest neighbors, Support Vector Machines, Random Forest as base learners, and Multiple Layer Perceptron as a meta learner. Moreover, mutual information …
Multi-Perspective Analysis For Derivative Financial Product Prediction With Stacked Recurrent Neural Networks, Natural Language Processing And Large Language Model, Ethan Lo
Dissertations, Theses, and Capstone Projects
This study developed a multi-perspective, AI-powered model for predicting E-Mini S&P 500 Index Futures prices, tackling the challenging market dynamics of these derivative financial instruments. Leveraging FinBERT for analysis of Wall Street Journal data alongside technical indicators, trader positioning, and economic factors, my stacked recurrent neural network built with LSTMs and GRUs achieves significantly improved accuracy compared to single sub-models. Furthermore, ChatGPT generation of human-readable analysis reports demonstrates the feasibility of using large language models in financial analysis. This research pioneers the use of stacked RNNs and LLMs for multi-perspective financial analysis, offering a novel blueprint for automated prediction and …
A Memory Efficient Deep Recurrent Q-Learning Approach For Autonomous Wildfire Surveillance, Jeremy A. Cantor
A Memory Efficient Deep Recurrent Q-Learning Approach For Autonomous Wildfire Surveillance, Jeremy A. Cantor
UNF Graduate Theses and Dissertations
Previous literature demonstrates that autonomous UAVs (unmanned aerial vehicles) have the po- tential to be utilized for wildfire surveillance. This advanced technology empowers firefighters by providing them with critical information, thereby facilitating more informed decision-making processes. This thesis applies deep Q-learning techniques to the problem of control policy design under the objective that the UAVs collectively identify the maximum number of locations that are under fire, assuming the UAVs can share their observations. The prohibitively large state space underlying the control policy motivates a neural network approximation, but prior work used only convolutional layers to extract spatial fire information from …
Explainable Automated Inconsistency Detection In Biomedical And Health Literature, Prajwol Lamichhane
Explainable Automated Inconsistency Detection In Biomedical And Health Literature, Prajwol Lamichhane
UNF Graduate Theses and Dissertations
Given the exponential growth of scientific information online, researchers often face the daunting task of detecting contradictory statements on crucial health topics. This work develops a comprehensive pipeline for automated contradiction detection that integrates an Information Retrieval (IR) system, machine learning classifiers, and Explainable AI (XAI). The Information Retrieval system is tailored for biomedical data and comprises a datastore, syntactic, and semantic components. Users can input queries, initiating a pipeline that identifies top documents through syntactic analysis and refines results via semantic examination for relevant research claims. Employing a diverse range of Large Language Models such as pre-trained Distil-BERT, BioBERT, …
Securing Internet Of Things (Iot) Data Storage, Savannah Malo
Securing Internet Of Things (Iot) Data Storage, Savannah Malo
Honors Theses and Capstones
Internet of Things (IoT) devices are commonly known to be susceptible to security attacks, which can lead to the leakage, theft, or erasure of data. Despite similar attack methods used on conventional technologies, IoT devices differ in how they consist of a small amount of hardware, limited networking capability, and utilize NoSQL databases. IoT solutions prefer NoSQL databases since they are compatible for larger datasets, unstructured and time-series data. However, these implementations are less likely to employ critical security features, like authentication, authorization, and encryption. The purpose of this project is to understand why those security measures are not strictly …