Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Theses/Dissertations

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 1599

Full-Text Articles in Entire DC Network

Enabling Iov Communication Through Secure Decentralized Clustering Using Federated Deep Reinforcement Learning, Chandler Scott Aug 2024

Enabling Iov Communication Through Secure Decentralized Clustering Using Federated Deep Reinforcement Learning, Chandler Scott

Electronic Theses and Dissertations

The Internet of Vehicles (IoV) holds immense potential for revolutionizing transporta- tion systems by facilitating seamless vehicle-to-vehicle and vehicle-to-infrastructure communication. However, challenges such as congestion, pollution, and security per- sist, particularly in rural areas with limited infrastructure. Existing centralized solu- tions are impractical in such environments due to latency and privacy concerns. To address these challenges, we propose a decentralized clustering algorithm enhanced with Federated Deep Reinforcement Learning (FDRL). Our approach enables low- latency communication, competitive packet delivery ratios, and cluster stability while preserving data privacy. Additionally, we introduce a trust-based security framework for IoV environments, integrating a central authority …


Federated Learning Based Autoencoder Ensemble System For Malware Detection On Internet Of Things Devices, Steven Edward Arroyo Jun 2024

Federated Learning Based Autoencoder Ensemble System For Malware Detection On Internet Of Things Devices, Steven Edward Arroyo

Theses and Dissertations

New technologies are being introduced at a rate faster than ever before and smaller in size. Due to the size of these devices, security is often difficult to implement. The existing solution is a firewall-segmented “IoT Network” that only limits the effect of these infected devices on other parts of the network. We propose a lightweight unsupervised hybrid-cloud ensemble anomaly detection system for malware detection. We perform transfer learning using a generalized model trained on multiple IoT device sources to learn network traffic on new devices with minimal computational resources. We further extend our proposed system to utilize federated learning …


Companionship, Romance, And Self-Perception With Conversational Chatbots, Jonathan Windsor May 2024

Companionship, Romance, And Self-Perception With Conversational Chatbots, Jonathan Windsor

Student Research Submissions

Serving as a metaphorical gateway transcending the communicative barriers of physical relationships in interpersonal dialogues, artificial imators of human behavior and speech, also known as conversational chatbots; a simulation of human knowledge and existence in a bi-directional conversation, functions as a rhetor of expression. Spanning from contexts of professional to romantic, I serve to dissect and critically analyze the nuances of human-machine relationships based on pre-established literature, inviting ethical considerations and biases in their design and marketing. Corporate influences spark pre-established servitude-esque relationships with conversational agents. Professional applications, both task-oriented and emotionally based alike, paint a mixed picture of …


Detection Of Jamming Attacks In Vanets, Thomas Justice May 2024

Detection Of Jamming Attacks In Vanets, Thomas Justice

Undergraduate Honors Theses

A vehicular network is a type of communication network that enables vehicles to communicate with each other and the roadside infrastructure. The roadside infrastructure consists of fixed nodes such as roadside units (RSUs), traffic lights, road signs, toll booths, and so on. RSUs are devices equipped with communication capabilities that allow vehicles to obtain and share real-time information about traffic conditions, weather, road hazards, and other relevant information. These infrastructures assist in traffic management, emergency response, smart parking, autonomous driving, and public transportation to improve roadside safety, reduce traffic congestion, and enhance the overall driving experience. However, communication between the …


The Human Side Of Adaptive Autonomy: Design Considerations For Adaptive Autonomous Teammates, Allyson Hauptman May 2024

The Human Side Of Adaptive Autonomy: Design Considerations For Adaptive Autonomous Teammates, Allyson Hauptman

All Dissertations

Ground-breaking advances in artificial intelligence (AI) have led to the possibility of AI agents operating not just as useful tools for teams, but also as full-fledged team members with unique, interdependent roles. This possibility is fueled by the human desire to create more and more autonomous systems that possess computational powers beyond human capability and the promise of increasing the productivity and efficiency of human teams dramatically. Yet, for all the promise and potential of these human-AI teams, the inclusion of AI teammates presents several challenges and concerns for both teaming and human-centered AI.

An important part of teaming is …


A Post-Quantum Mercurial Signature Scheme, Madison Mabe May 2024

A Post-Quantum Mercurial Signature Scheme, Madison Mabe

All Theses

This paper introduces the first post-quantum mercurial signature scheme. We also discuss how this can be used to construct a credential scheme, as well as some practical applications for the constructions.


Humanity Amid Innovation: Exploring Our Relationship To Technology, Sarah Durkee May 2024

Humanity Amid Innovation: Exploring Our Relationship To Technology, Sarah Durkee

Senior Theses and Projects

This thesis examines the impacts of technology on fundamental aspects of human nature and experience. Drawing on the works from Kant, Turing, Arendt, Benjamin, and Freud, it explores how rapid technological change is redefining human reason, intelligence, and creativity in the digital age. The first chapter analyzes whether modern online communication platforms realize or undermine Kant's vision of an enlightened public sphere fostering free discourse and critique. It argues that prioritizing engagement over substantive debate, these digital realms corrode the depth of interaction essential for cultivating human reason. The second chapter explores the pursuit of artificial intelligence as a reproduction …


Security And Interpretability In Large Language Models, Lydia Danas May 2024

Security And Interpretability In Large Language Models, Lydia Danas

Undergraduate Honors Theses

Large Language Models (LLMs) have the capability to model long-term dependencies in sequences of tokens, and are consequently often utilized to generate text through language modeling. These capabilities are increasingly being used for code generation tasks; however, LLM-powered code generation tools such as GitHub's Copilot have been generating insecure code and thus pose a cybersecurity risk. To generate secure code we must first understand why LLMs are generating insecure code. This non-trivial task can be realized through interpretability methods, which investigate the hidden state of a neural network to explain model outputs. A new interpretability method is rationales, which obtains …


An In-Network Approach For Pmu Missing Data Recovery With Data Plane Programmability, Jack Norris May 2024

An In-Network Approach For Pmu Missing Data Recovery With Data Plane Programmability, Jack Norris

Computer Science and Computer Engineering Undergraduate Honors Theses

Phasor measurement unit (PMU) systems often experience unavoidable missing and erroneous measurements, which undermine power system observability and operational effectiveness. Traditional solutions for recovering missing PMU data employ a centralized approach at the control center, resulting in lengthy recovery times due to data transmission and aggregation. In this work, we leverage P4-based programmable networks to expedite missing data recovery. Our approach utilizes the data plane programmability offered by P4 to present an in-network solution for PMU data recovery. We establish a data-plane pipeline on P4 switches, featuring a customized PMU protocol parser, a missing data detection module, and an auto-regressive …


Legislative Recommendations On Biometric Security And Privacy Jurisprudence, Joshua M. Morrow May 2024

Legislative Recommendations On Biometric Security And Privacy Jurisprudence, Joshua M. Morrow

All Student Scholarship

This project focuses on the prevalence of biometrics today, their various applications, and the biometric laws and legislations in place in the United States (U.S.) and Maine. Due to various threats and vulnerabilities imposing risk on collecting and using peoples’ biometric data, sufficient cyber protections related to citizens’ privacy rights, ethical control, and security of personally identifiable information (PII) must become necessary components of contemporary biometric laws and legislation. Without such explicit cyber protections, citizens participate in and comply with various technical domains and entities, such as private companies and governmental agencies, with minimal awareness or comprehension that their sensitive …


Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Honors Theses

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Investigating User Awareness Of Privacy And Security Concerns In The Iot Era, Jack Ruffner May 2024

Investigating User Awareness Of Privacy And Security Concerns In The Iot Era, Jack Ruffner

ALL - Honors Theses

The Internet of Things (IoT) has had a significant impact on the way we view and interact with technology. This is especially prevalent in the areas of smart homes, smart tech, and mobile devices. However, despite the advantageous functions of IoT devices, they are accompanied by numerous security concerns that enable several severe privacy concerns. Many studies and informative articles present ideas that explain and prove the presence of the various risks associated with IoT devices and the need to address them. This thesis paper aims to explore the relationship between IoT device usage and security and privacy risks as …


Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy May 2024

Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy

Theses/Capstones/Creative Projects

Cryptocurrencies rely on a distributed public ledger (record of transactions) in order to perform their intended functions. However, the public’s ability to audit the network is both its greatest strength and greatest weakness: Anyone can see what address sent currency, and to whom the currency was sent. If cryptocurrency is ever going to take some of the responsibility of fiat currency, then there needs to be a certain level of confidentiality. Thus far, Monero has come out on top as the preferred currency for embodying the ideas of privacy and confidentiality. Through numerous cryptographic procedures, Monero is able to obfuscate …


Space Transformation For Open Set Recognition, Atefeh Mahdavi May 2024

Space Transformation For Open Set Recognition, Atefeh Mahdavi

Theses and Dissertations

Open Set Recognition (OSR) is about dealing with unknown situations that were not learned by the models during training. In OSR, only a limited number of known classes are available at the time of training the model and the possibility of unknown classes never seen at training time emerges in the test environment. In such a setting, the unknown classes and their risk should be considered in the algorithm. Such systems require not only to identify and discriminate instances that belong to the source domain (i.e., the seen known classes contained in the training dataset) but also to reject unknown …


White Cell Support Application For Expo Ops Tactical Wargame System, Zackery Joseph Milder May 2024

White Cell Support Application For Expo Ops Tactical Wargame System, Zackery Joseph Milder

Theses

The purpose of this project was to create a support application for a tabletop wargame currently used for training and scenario simulation by the United States Marine Corps. The EXPO OPS Companion is meant to enhance the capabilities of the White Cell/table director, the unbiased third party responsible for running adjudication for the EXPO OPS Tactical Wargames System. EXPO OPS TWS is “…a table top wargame covering contemporary and future conflict at the platoon, company and battalion level. It is a wargame toolkit that enables wargaming scenarios in the 2020 to 2030 timeframe. The design centers on plans and decisions …


Achieving Responsible Anomaly Detection, Xiao Han May 2024

Achieving Responsible Anomaly Detection, Xiao Han

All Graduate Theses and Dissertations, Fall 2023 to Present

In the digital transformation era, safeguarding online systems against anomalies – unusual patterns indicating potential threats or malfunctions – has become crucial. This dissertation embarks on enhancing the accuracy, explainability, and ethical integrity of anomaly detection systems. By integrating advanced machine learning techniques, it improves anomaly detection performance and incorporates fairness and explainability at its core.

The research tackles performance enhancement in anomaly detection by leveraging few-shot learning, demonstrating how systems can effectively identify anomalies with minimal training data. This approach overcomes data scarcity challenges. Reinforcement learning is employed to iteratively refine models, enhancing decision-making processes. Transfer learning enables the …


Stability Of Quantum Computers, Samudra Dasgupta May 2024

Stability Of Quantum Computers, Samudra Dasgupta

Doctoral Dissertations

Quantum computing's potential is immense, promising super-polynomial reductions in execution time, energy use, and memory requirements compared to classical computers. This technology has the power to revolutionize scientific applications such as simulating many-body quantum systems for molecular structure understanding, factorization of large integers, enhance machine learning, and in the process, disrupt industries like telecommunications, material science, pharmaceuticals and artificial intelligence. However, quantum computing's potential is curtailed by noise, further complicated by non-stationary noise parameter distributions across time and qubits. This dissertation focuses on the persistent issue of noise in quantum computing, particularly non-stationarity of noise parameters in transmon processors. It …


Artificial Intelligence's Ability To Detect Online Predators, Olatilewa Osifeso May 2024

Artificial Intelligence's Ability To Detect Online Predators, Olatilewa Osifeso

Electronic Theses, Projects, and Dissertations

Online child predators pose a danger to children who use the Internet. Children fall victim to online predators at an alarming rate, based on the data from the National Center of Missing and Exploited Children. When making online profiles and joining websites, you only need a name, an email and a password without identity verification. Studies have shown that online predators use a variety of methods and tools to manipulate and exploit children, such as blackmail, coercion, flattery, and deception. These issues have created an opportunity for skilled online predators to have fewer obstacles when it comes to contacting and …


Multimodal Stylometry: A Novel Approach For Authorship Identification., Glory O. Adebayo May 2024

Multimodal Stylometry: A Novel Approach For Authorship Identification., Glory O. Adebayo

Electronic Theses and Dissertations

This dissertation introduces multimodal stylometry, a novel approach to authorship identification that integrates text and source code features for a comprehensive understanding of an author's unique style. Traditional stylometric methods have primarily focused on either text stylometry or source code stylometry, thereby neglecting the potential insights that multimodality may provide. This research aims to bridge this gap by proposing a framework that combines textual and source code data to enhance the accuracy and reliability of authorship identification. The study begins by reviewing existing literature on authorship identification and stylometry, highlighting the limitations of unimodal approaches. Leveraging recent advancements in multimodal …


Multithreaded Applications On The Heterogeneous Research Computing Environment., Sungbo Jung May 2024

Multithreaded Applications On The Heterogeneous Research Computing Environment., Sungbo Jung

Electronic Theses and Dissertations

Bioinformatics is a domain that has experienced rapid research growth in recent years, as evidenced by the increasing number of articles in biomedical databases such as PubMed, which adds over a million publications every year. However, this also poses a challenge for researchers who need to find relevant citations for their work. Therefore, developing efficient indexing and searching methods for text data is crucial for Bioinformatics. One key technique for information retrieval is document inversion, which involves creating an inverted index to enable efficient searching through vast collections of text or documents. This Ph.D. research aims to design the research …


Individual Behavioral Modeling Across Games Of Strategy, Logan Fields Mar 2024

Individual Behavioral Modeling Across Games Of Strategy, Logan Fields

USF Tampa Graduate Theses and Dissertations

An individual’s actions in a particular environment and with specified resources can reveal their decision-making tendencies and patterns, and by analyzing the variations in cognitive traits among individuals, it may be possible to identify trends that can foretell their future behaviors. This can be a powerful tool in various fields including cognitive modeling, player analytics, computer security, and threat detection. Collectible card games are a fruitful test space for studying cognitive differences in decision-making, as they can have clearly defined and replicable environments and large player bases. As such, in this work, I explore the potential of using two virtual …


An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley Mar 2024

An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley

LSU Master's Theses

The growing cybersecurity workforce gap underscores the urgent need to address deficiencies in cybersecurity education: the current education system is not producing competent cybersecurity professionals, and current efforts are not informing the non-technical general public of basic cybersecurity practices. We argue that this gap is compounded by a fundamental disconnect between cybersecurity education literature and established education theory. Our research addresses this issue by examining the alignment of cybersecurity education literature concerning educational methods and tools with education literature.

In our research, we endeavor to bridge this gap by critically analyzing the alignment of cybersecurity education literature with education theory. …


Introductory Chemistry Student Success: Evaluating Peer-Led Team Learning And Describing Sense Of Belonging, Jessica D. Young Mar 2024

Introductory Chemistry Student Success: Evaluating Peer-Led Team Learning And Describing Sense Of Belonging, Jessica D. Young

USF Tampa Graduate Theses and Dissertations

Identifying approaches that make science and engineering education broader and more inclusive is core to discipline based education research. Both fundamental and applied research are important in advancing a STEM education that retains the necessary scientists of the U.S.’s future. Thus, the major goal of this work was to evaluate and describe efforts that promote student success within introductory STEM courses. This began with applied research by utilizing quantitative analyses like case-matching, logistic regression, independent sample t-tests, and repeated measures while evaluating the efficacy of peer-led team learning (PLTL). Later, this work delves into qualitative approaches to answer fundamental research …


A Study On Ethical Hacking In Cybersecurity Education Within The United States, Jordan Chew Mar 2024

A Study On Ethical Hacking In Cybersecurity Education Within The United States, Jordan Chew

Master's Theses

As the field of computer security continues to grow, it becomes increasingly important to educate the next generation of security professionals. However, much of the current education landscape primarily focuses on teaching defensive skills. Teaching offensive security, otherwise known as ethical hacking, is an important component in the education of all students who hope to contribute to the field of cybersecurity. Doing so requires a careful consideration of what ethical, legal, and practical issues arise from teaching students skills that can be used to cause harm. In this thesis, we first examine the current state of cybersecurity education in the …


Adaptive Model Selection In Stock Market Prediction: A Modular And Scalable Big Data Analytics Approach, Mohammadehsan Akhavanpour Jan 2024

Adaptive Model Selection In Stock Market Prediction: A Modular And Scalable Big Data Analytics Approach, Mohammadehsan Akhavanpour

Electronic Theses and Dissertations

In today's globalized economy, financial markets are more interconnected than ever, generating vast amounts of data from thousands of sources every second. The need to accurately analyze and interpret this data is crucial for investors, analysts, and researchers alike. Traditional models for market prediction are limited by their ability to adapt to the real-time nature and 'big data' dimensions of these complex financial datasets. To address these challenges, this thesis proposes and implements a novel framework that combines Apache Kafka with a microservices framework. This framework offers a scalable, real-time solution for financial market prediction that effectively manages the 5Vs …


Towards Energy-Efficient Edge Computing For Tiny Ai Applications, Vamsi Krishna Bhagavathula Jan 2024

Towards Energy-Efficient Edge Computing For Tiny Ai Applications, Vamsi Krishna Bhagavathula

Theses and Dissertations

As artificial intelligence (AI) applications become more common on the edge of networks, like Raspberry Pi servers, it is crucial to optimize their energy use. This research project investigates how AI algorithms affect energy efficiency and resource usage on Raspberry Pi servers. Two models were created: one predicts resource usage, and the other predicts power consumption of AI algorithms on Raspberry Pi. Several factors are considered like CPU and memory use, algorithm speed, dataset size, and types of algorithms and datasets. Using regression-based methods, we model how these factors affect energy use. By converting categorical factors into numerical ones, we …


Employing Genetic Algorithms For Energy-Efficient Data Routing In Internet Of Things Networks, Farzana Akhter Jan 2024

Employing Genetic Algorithms For Energy-Efficient Data Routing In Internet Of Things Networks, Farzana Akhter

Graduate College Dissertations and Theses

The Internet of Things (IoT) connects a vast number of smart objects for various applications,such as home automation, industrial control, and healthcare. The rapid advancement in wireless technologies and miniature embedded devices has enabled IoT systems to be deployed in various environments. However, the performance of IoT devices is limited because of the imbalance of data traffic on different router nodes. Nodes that experience high data volume will have a higher energy depletion rate and, as a result, will reach the end of their life quicker than other routers that have less data traffic. Genetic Algorithms are a well-known technique …


How Increased Ransomware Attacks Have Impacted Hospitals In The United States, Mackenzie Dotson Jan 2024

How Increased Ransomware Attacks Have Impacted Hospitals In The United States, Mackenzie Dotson

Theses, Dissertations and Capstones

Introduction: The healthcare industry, particularly hospitals, have fallen prey to the alarming rise of ransomware attacks. In recent years, highly sophisticated cybergroups, armed with substantial funds and advanced technology, have intensified their focus on hospitals. Despite the advice against it, most hospitals have paid the ransom in order to regain access to their electronic systems and patient data, underlining the severity of these attacks.

Purpose of the Study: The purpose of this research was to evaluate the effects of ransomware attacks on hospitals in the US to determine if the patients were at risk due to hackers withholding patient information …


Time Series Anomaly Detection Using Generative Adversarial Networks, Shyam Sundar Saravanan Jan 2024

Time Series Anomaly Detection Using Generative Adversarial Networks, Shyam Sundar Saravanan

Masters Theses

"Anomaly detection is widely used in network intrusion detection, autonomous driving, medical diagnosis, credit card frauds, etc. However, several key challenges remain open, such as lack of ground truth labels, presence of complex temporal patterns, and generalizing over different datasets. In this work, we propose TSI-GAN, an unsupervised anomaly detection model for time-series that can learn complex temporal patterns automatically and generalize well, i.e., no need for choosing dataset-specific parameters, making statistical assumptions about underlying data, or changing model architectures. To achieve these goals, we convert each input time-series into a sequence of 2D images using two encoding techniques with …


Optimizing Php Api Calls With Pagination And Caching, Parsharam Reddy Sudda Jan 2024

Optimizing Php Api Calls With Pagination And Caching, Parsharam Reddy Sudda

Dissertations, Master's Theses and Master's Reports

The Keweenaw Time Traveler (KeTT) project is devoted to mapping the historical and social landscapes of the Keweenaw Peninsula. During the project, it was discovered that the server-side performance needed improvement. To address this issue, the "Optimizing PHP API Calls with Pagination and Caching" initiative was launched. This initiative focused on refining API calls, implementing server caching and pagination, and fortifying security against common vulnerabilities. The project successfully mitigated risks associated with SQL Injection and XSS through meticulous code enhancements while improving error handling. Additionally, the introduction of Scroll-Induced Pagination optimized data delivery, significantly reducing response times, and elevating the …