Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Theses/Dissertations

Computer Sciences

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 15036

Full-Text Articles in Entire DC Network

A Nlp Approach To Automating The Generation Of Surveys For Market Research, Anav Chug May 2024

A Nlp Approach To Automating The Generation Of Surveys For Market Research, Anav Chug

Honors College Theses

Market Research is vital but includes activities that are often laborious and time consuming. Survey questionnaires are one possible output of the process and market researchers spend a lot of time manually developing questions for focus groups. The proposed research aims to develop a software prototype that utilizes Natural Language Processing (NLP) to automate the process of generating survey questions for market research. The software uses a pre-trained Open AI language model to generate multiple choice survey questions based on a given product prompt, send it to a targeted email list, and also provides a real-time analysis of the responses …


Analysis And Numerical Simulation Of Tumor Growth Models, Daniel Acosta Soba May 2024

Analysis And Numerical Simulation Of Tumor Growth Models, Daniel Acosta Soba

Masters Theses and Doctoral Dissertations

In this dissertation we focus on the numerical analysis of tumor growth models. Due to the difficulty of developing physically meaningful approximations of such models, we divide the main problem into more simple pieces of work that are addressed in the different chapters. First, in Chapter 2 we present a new upwind discontinuous Galerkin (DG) scheme for the convective Cahn–Hilliard model with degenerate mobility which preserves the pointwise bounds and prevents non-physical spurious oscillations. These ideas are based on a well-suited piecewise constant approximation of convection equations. The proposed numerical scheme is contrasted with other approaches in several numerical experiments. …


Guardians Of The Data: Government Use Of Ai And Iot In The Digital Age, Jannat Saeed May 2024

Guardians Of The Data: Government Use Of Ai And Iot In The Digital Age, Jannat Saeed

Honors Theses

The exponential growth of technology, epitomized by Moore's Law – “the observation that the number of transistors on an integrated circuit will double every two years”– has propelled the swift evolution of Artificial Intelligence (AI) and Internet of Things (IoT) technologies. This phenomenon has revolutionized various facets of daily life, from smart home devices to autonomous vehicles, reshaping how individuals interact with the world around them. However, as governments worldwide increasingly harness these innovations to monitor and collect personal data, profound privacy concerns have arisen among the general populace. Despite the ubiquity of AI and IoT in modern society, formal …


An In-Network Approach For Pmu Missing Data Recovery With Data Plane Programmability, Jack Norris May 2024

An In-Network Approach For Pmu Missing Data Recovery With Data Plane Programmability, Jack Norris

Computer Science and Computer Engineering Undergraduate Honors Theses

Phasor measurement unit (PMU) systems often experience unavoidable missing and erroneous measurements, which undermine power system observability and operational effectiveness. Traditional solutions for recovering missing PMU data employ a centralized approach at the control center, resulting in lengthy recovery times due to data transmission and aggregation. In this work, we leverage P4-based programmable networks to expedite missing data recovery. Our approach utilizes the data plane programmability offered by P4 to present an in-network solution for PMU data recovery. We establish a data-plane pipeline on P4 switches, featuring a customized PMU protocol parser, a missing data detection module, and an auto-regressive …


Detection And Classification Of Diabetic Retinopathy Using Deep Learning Models, Aishat Olatunji May 2024

Detection And Classification Of Diabetic Retinopathy Using Deep Learning Models, Aishat Olatunji

Electronic Theses and Dissertations

Healthcare analytics leverages extensive patient data for data-driven decision-making, enhancing patient care and results. Diabetic Retinopathy (DR), a complication of diabetes, stems from damage to the retina’s blood vessels. It can affect both type 1 and type 2 diabetes patients. Ophthalmologists employ retinal images for accurate DR diagnosis and severity assessment. Early detection is crucial for preserving vision and minimizing risks. In this context, we utilized a Kaggle dataset containing patient retinal images, employing Python’s versatile tools. Our research focuses on DR detection using deep learning techniques. We used a publicly available dataset to apply our proposed neural network and …


Detection Of Jamming Attacks In Vanets, Thomas Justice May 2024

Detection Of Jamming Attacks In Vanets, Thomas Justice

Undergraduate Honors Theses

A vehicular network is a type of communication network that enables vehicles to communicate with each other and the roadside infrastructure. The roadside infrastructure consists of fixed nodes such as roadside units (RSUs), traffic lights, road signs, toll booths, and so on. RSUs are devices equipped with communication capabilities that allow vehicles to obtain and share real-time information about traffic conditions, weather, road hazards, and other relevant information. These infrastructures assist in traffic management, emergency response, smart parking, autonomous driving, and public transportation to improve roadside safety, reduce traffic congestion, and enhance the overall driving experience. However, communication between the …


Multi-Script Handwriting Identification By Fragmenting Strokes, Joshua Jude Thomas May 2024

Multi-Script Handwriting Identification By Fragmenting Strokes, Joshua Jude Thomas

<strong> Theses and Dissertations </strong>

This study tests the effectiveness of Multi-Script Handwriting Identification after simplifying character strokes, by segmenting them into sub-parts. Character simplification is performed through splitting the character by branching-points and end-points, a process called stroke fragmentation in this study. The resulting sub-parts of the character are called stroke fragments and are evaluated individually to identify the writer. This process shares similarities with the concept of stroke decomposition in Optical Character Recognition which attempts to recognize characters through the writing strokes that make them up. The main idea of this study is that the characters of different writing‑scripts (English, Chinese, etc.) may …


Evaluation Of An End-To-End Radiotherapy Treatment Planning Pipeline For Prostate Cancer, Mohammad Daniel El Basha, Court Laurence, Carlos Eduardo Cardenas, Julianne Pollard-Larkin, Steven Frank, David T. Fuentes, Falk Poenisch, Zhiqian H. Yu May 2024

Evaluation Of An End-To-End Radiotherapy Treatment Planning Pipeline For Prostate Cancer, Mohammad Daniel El Basha, Court Laurence, Carlos Eduardo Cardenas, Julianne Pollard-Larkin, Steven Frank, David T. Fuentes, Falk Poenisch, Zhiqian H. Yu

Dissertations & Theses (Open Access)

Radiation treatment planning is a crucial and time-intensive process in radiation therapy. This planning involves carefully designing a treatment regimen tailored to a patient’s specific condition, including the type, location, and size of the tumor with reference to surrounding healthy tissues. For prostate cancer, this tumor may be either local, locally advanced with extracapsular involvement, or extend into the pelvic lymph node chain. Automating essential parts of this process would allow for the rapid development of effective treatment plans and better plan optimization to enhance tumor control for better outcomes.

The first objective of this work, to automate the treatment …


Decentralized Unknown Building Exploration By Frontier Incentivization And Voronoi Segmentation In A Communication Restricted Domain, Huzeyfe M. Kocabas May 2024

Decentralized Unknown Building Exploration By Frontier Incentivization And Voronoi Segmentation In A Communication Restricted Domain, Huzeyfe M. Kocabas

All Graduate Theses and Dissertations, Fall 2023 to Present

Exploring unknown environments using multiple robots poses a complex challenge, particularly in situations where communication between robots is either impossible or limited. Existing exploration techniques exhibit research gaps due to unrealistic communication assumptions or the computational complexities associated with exploration strategies in unfamiliar domains. In our investigation of multi-robot exploration in unknown areas, we employed various exploration and coordination techniques, evaluating their performance in terms of robustness and efficiency across different levels of environmental complexity.

Our research is centered on optimizing the exploration process through strategic agent distribution. We initially address the challenge of city roadway coverage, aiming to minimize …


Pedestrian Pathing Prediction Using Complex Contextual Behavioral Data In High Foot Traffic Settings, Laurel Bingham May 2024

Pedestrian Pathing Prediction Using Complex Contextual Behavioral Data In High Foot Traffic Settings, Laurel Bingham

All Graduate Theses and Dissertations, Fall 2023 to Present

Ensuring the safe integration of autonomous vehicles into real-world environments requires a comprehensive understanding of pedestrian behavior. This study addresses the challenge of predicting the movement and crossing intentions of pedestrians, a crucial aspect in the development of fully autonomous vehicles.

The research focuses on leveraging Honda's TITAN dataset, comprising 700 unique clips captured by moving vehicles in high-foot-traffic areas of Tokyo, Japan. Each clip provides detailed contextual information, including human-labeled tags for individuals and vehicles, encompassing attributes such as age, motion status, and communicative actions. Long Short-Term Memory (LSTM) networks were employed and trained on various combinations of contextual …


The Quantitative Analysis And Visualization Of Nfl Passing Routes, Sandeep Chitturi May 2024

The Quantitative Analysis And Visualization Of Nfl Passing Routes, Sandeep Chitturi

Computer Science and Computer Engineering Undergraduate Honors Theses

The strategic planning of offensive passing plays in the NFL incorporates numerous variables, including defensive coverages, player positioning, historical data, etc. This project develops an application using an analytical framework and an interactive model to simulate and visualize an NFL offense's passing strategy under varying conditions. Using R-programming and data management, the model dynamically represents potential passing routes in response to different defensive schemes. The system architecture integrates data from historical NFL league years to generate quantified route scores through designed mathematical equations. This allows for the prediction of potential passing routes for offensive skill players in response to the …


Proof-Of-Concept For Converging Beam Small Animal Irradiator, Benjamin Insley May 2024

Proof-Of-Concept For Converging Beam Small Animal Irradiator, Benjamin Insley

Dissertations & Theses (Open Access)

The Monte Carlo particle simulator TOPAS, the multiphysics solver COMSOL., and

several analytical radiation transport methods were employed to perform an in-depth proof-ofconcept

for a high dose rate, high precision converging beam small animal irradiation platform.

In the first aim of this work, a novel carbon nanotube-based compact X-ray tube optimized for

high output and high directionality was designed and characterized. In the second aim, an

optimization algorithm was developed to customize a collimator geometry for this unique Xray

source to simultaneously maximize the irradiator’s intensity and precision. Then, a full

converging beam irradiator apparatus was fit with a multitude …


Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Undergraduate Honors Theses

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Inferring A Hierarchical Input Type For An Sql Query, Santosh Aryal May 2024

Inferring A Hierarchical Input Type For An Sql Query, Santosh Aryal

All Graduate Theses and Dissertations, Fall 2023 to Present

SQL queries are a common method to retrieve information from databases, much like asking a detailed question and getting a precise answer. Plug-and-play queries simplify the process of querying. In a Plug-and-play SQL query a programmer sketches the shape of the input to the query as a hierarchy. But the programmer could make a mistake in specifying the hierarchy and it takes programmer time and effort to specify the hierarchy. A better solution is to automatically infer the hierarchy from a query. This thesis presents a system to infer a hierarchical input type for an SQL query. We consider two …


A Framework That Explores The Cognitive Load Of Cs1 Assignments Using Pausing Behavior, Joshua O. Urry May 2024

A Framework That Explores The Cognitive Load Of Cs1 Assignments Using Pausing Behavior, Joshua O. Urry

All Graduate Theses and Dissertations, Fall 2023 to Present

Pausing behavior in introductory Computer Science (CS1) courses has been related to a student’s performance in the course and could be linked to a student’s cognitive load, or assignment difficulty. Having an objective measure of the cognitive load would be beneficial to course instructors as it would help them design assignments that are not too difficult. Two studies are presented in this work. The first study uses Cognitive Load Theory and Vygotsky’s Zone of Proximal Development as a theoretical framework to analyze pause times between keystrokes to better understand what types of assignments need more educational support than others. The …


A Review Of Student Attitudes Towards Keystroke Logging And Plagiarism Detection In Introductory Computer Science Courses, Caleb Syndergaard May 2024

A Review Of Student Attitudes Towards Keystroke Logging And Plagiarism Detection In Introductory Computer Science Courses, Caleb Syndergaard

All Graduate Theses and Dissertations, Fall 2023 to Present

The following paper addresses student attitudes towards keystroke logging and plagiarism prevention measures. Specifically, the paper concerns itself with changes made to the “ShowYourWork” plugin, which was implemented to log the keystrokes of students in Utah State University’s introductory Computer Science course, CS1400. Recent work performed by the Edwards Lab provided insights into students’ feelings towards keystroke logging as a measure of deterring plagiarism. As a result of that research, we have concluded that measures need to be taken to enable students to have more control over their data and assist students to feel more comfortable with keystroke logging. This …


Generative Ai In Education From The Perspective Of Students, Educators, And Administrators, Aashish Ghimire May 2024

Generative Ai In Education From The Perspective Of Students, Educators, And Administrators, Aashish Ghimire

All Graduate Theses and Dissertations, Fall 2023 to Present

This research explores how advanced artificial intelligence (AI), like the technology that powers tools such as ChatGPT, is changing the way we teach and learn in schools and universities. Imagine AI helping to summarize thick legal documents into something you can read over a coffee break or helping students learn how to code by offering personalized guidance. We looked into how teachers feel about using these AI tools in their classrooms, what kind of rules schools have about them, and how they can make learning programming easier for students. We found that most teachers are excited about the possibilities but …


Achieving Responsible Anomaly Detection, Xiao Han May 2024

Achieving Responsible Anomaly Detection, Xiao Han

All Graduate Theses and Dissertations, Fall 2023 to Present

In the digital transformation era, safeguarding online systems against anomalies – unusual patterns indicating potential threats or malfunctions – has become crucial. This dissertation embarks on enhancing the accuracy, explainability, and ethical integrity of anomaly detection systems. By integrating advanced machine learning techniques, it improves anomaly detection performance and incorporates fairness and explainability at its core.

The research tackles performance enhancement in anomaly detection by leveraging few-shot learning, demonstrating how systems can effectively identify anomalies with minimal training data. This approach overcomes data scarcity challenges. Reinforcement learning is employed to iteratively refine models, enhancing decision-making processes. Transfer learning enables the …


Maximizing Data Optimization: Analysis, Retention, And Website Accessibility, Selena Cade Apr 2024

Maximizing Data Optimization: Analysis, Retention, And Website Accessibility, Selena Cade

Culminating Experience Projects

As a graduate assistant at Grand Valley, there is significant involvement with a program that assists middle and high school students with learning about college. As a preface, the information presented in this document will remain anonymous and confidential for the program's benefit.

Students receive a campus tour, eat at the dining halls, and obtain information about college. Before students arrive, a pre-visit survey is sent to gauge their college knowledge. After the visit, a post-visit survey with the same questions is sent out to determine if they gained more knowledge. This data has rarely been viewed in the past …


Comprehensive Question And Answer Generation With Llama 2, Matous Hybl Apr 2024

Comprehensive Question And Answer Generation With Llama 2, Matous Hybl

MS in Computer Science Theses

Since the introduction of transformers, large language models have proven capable in many natural language processing fields. However, existing systems still face challenges in generating high-quality extractive questions. Base models and public chatbots fall short if the question source or quantity are critical. Our contribution is a question and answer generator for generating comprehensive, extractive questions and answers. This approach includes fine-tuning a LLaMA 2 base model for answer extraction (AE) and question generation (QG). We evaluate the resulting system using common automated metrics and a manual evaluation. We find that our system is comparable to the latest research and …


Unearthing The Past: A Comprehensive Study Of Natural And Anthropogenic Changes At An Archaeological Site Through Hydrogeologic Connectivity Utilizing Gis, Mehlich Ii Phosphorus Extractant, And Ph, Dana L. F. Herren Apr 2024

Unearthing The Past: A Comprehensive Study Of Natural And Anthropogenic Changes At An Archaeological Site Through Hydrogeologic Connectivity Utilizing Gis, Mehlich Ii Phosphorus Extractant, And Ph, Dana L. F. Herren

Theses

This thesis aims to thoroughly analyze the Mehlich II Phosphorus Extractant and pH levels at the Bains Gap Village Site in Anniston, AL., while examining the impact of various environmental factors and human activities on them. Phosphorus is often used in archaeology as an indicator of human activity. Soil core samples were collected to analyze anomalies in phosphorus levels.

To establish any relationships, phosphorus and pH levels from soil cores were correlated with findings from past excavation units and features. The potential effects of hydrogeologic connectivity on soil phosphorus and pH levels were investigated. Geospatial technologies were used to manage …


Combine Shapelets, Zeng Qingwen Apr 2024

Combine Shapelets, Zeng Qingwen

LMU/LLS Theses and Dissertations

Sensor-based human activity recognition has become an important research field within pervasive and ubiquitous computing. Techniques for recognizing atomic activities such as gestures or actions are mature for now, but complex activity recognition still remains a challenging issue. I was a candidate in an activity classification thesis. It collected 4 activities, which included walking on the sidewalk for a set distance, walking up and down a set of stairs, walking on the treadmill at 2.5 mph for 2 minutes, and jogging on the treadmill at 5.5 mph for 1 minute. It took 30 minutes to collect one candidate data. If …


Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim Mar 2024

Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim

Masters Theses

Due to significant investment, research, and development efforts over the past decade, deep neural networks (DNNs) have achieved notable advancements in classification and regression domains. As a result, DNNs are considered valuable intellectual property for artificial intelligence providers. Prior work has demonstrated highly effective model extraction attacks which steal a DNN, dismantling the provider’s business model and paving the way for unethical or malicious activities, such as misuse of personal data, safety risks in critical systems, or spreading misinformation. This thesis explores the feasibility of model extraction attacks on mobile devices using aggregated runtime profiles as a side-channel to leak …


An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley Mar 2024

An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley

LSU Master's Theses

The growing cybersecurity workforce gap underscores the urgent need to address deficiencies in cybersecurity education: the current education system is not producing competent cybersecurity professionals, and current efforts are not informing the non-technical general public of basic cybersecurity practices. We argue that this gap is compounded by a fundamental disconnect between cybersecurity education literature and established education theory. Our research addresses this issue by examining the alignment of cybersecurity education literature concerning educational methods and tools with education literature.

In our research, we endeavor to bridge this gap by critically analyzing the alignment of cybersecurity education literature with education theory. …


Sensor Analytics For Subsea Pipeline And Cable Inspection: A Review, Connor R. Vincent Mar 2024

Sensor Analytics For Subsea Pipeline And Cable Inspection: A Review, Connor R. Vincent

LSU Master's Theses

Submarine pipelines and cables are vital for transmitting physical and digital resources across bodies of water, necessitating regular inspection to assess maintenance needs. The safety of subsea pipelines and cables is paramount for sustaining industries such as telecommunications, power transmission, water supply, waste management, and oil and gas. Incidents like those involving the Nord Stream subsea pipeline and the SEA-ME-WE 4 subsea communications cable exemplify the severe economic and environmental consequences of damage to these critical infrastructures. Existing inspection methods often fail to meet accuracy requirements, emphasizing the need for advancements in inspection technologies. This comprehensive survey covers the sensors …


An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou Mar 2024

An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou

Doctoral Dissertations

With the proliferation of video content from surveillance cameras, social media, and live streaming services, the need for efficient video analytics has grown immensely. In recent years, machine learning based computer vision algorithms have shown great success in various video analytic tasks. Specifically, neural network models have dominated in visual tasks such as image and video classification, object recognition, object detection, and object tracking. However, compared with classic computer vision algorithms, machine learning based methods are usually much more compute-intensive. Powerful servers are required by many state-of-the-art machine learning models. With the development of cloud computing infrastructures, people are able …


Automated Identification And Mapping Of Interesting Mineral Spectra In Crism Images, Arun M. Saranathan Mar 2024

Automated Identification And Mapping Of Interesting Mineral Spectra In Crism Images, Arun M. Saranathan

Doctoral Dissertations

The Compact Reconnaissance Imaging Spectrometer for Mars (CRISM) has proven to be an invaluable tool for the mineralogical analysis of the Martian surface. It has been crucial in identifying and mapping the spatial extents of various minerals. Primarily, the identification and mapping of these mineral spectral-shapes have been performed manually. Given the size of the CRISM image dataset, manual analysis of the full dataset would be arduous/infeasible. This dissertation attempts to address this issue by describing an (machine learning based) automated processing pipeline for CRISM data that can be used to identify and map the unique mineral signatures present in …


Data To Science With Ai And Human-In-The-Loop, Gustavo Perez Sarabia Mar 2024

Data To Science With Ai And Human-In-The-Loop, Gustavo Perez Sarabia

Doctoral Dissertations

AI has the potential to accelerate scientific discovery by enabling scientists to analyze vast datasets more efficiently than traditional methods. For example, this thesis considers the detection of star clusters in high-resolution images of galaxies taken from space telescopes, as well as studying bird migration from RADAR images. In these applications, the goal is to make measurements to answer scientific questions, such as how the star formation rate is affected by mass, or how the phenology of bird migration is influenced by climate change. However, current computer vision systems are far from perfect for conducting these measurements directly. They may …


Policy Gradient Methods: Analysis, Misconceptions, And Improvements, Christopher P. Nota Mar 2024

Policy Gradient Methods: Analysis, Misconceptions, And Improvements, Christopher P. Nota

Doctoral Dissertations

Policy gradient methods are a class of reinforcement learning algorithms that optimize a parametric policy by maximizing an objective function that directly measures the performance of the policy. Despite being used in many high-profile applications of reinforcement learning, the conventional use of policy gradient methods in practice deviates from existing theory. This thesis presents a comprehensive mathematical analysis of policy gradient methods, uncovering misconceptions and suggesting novel solutions to improve their performance. We first demonstrate that the update rule used by most policy gradient methods does not correspond to the gradient of any objective function due to the way the …


Multi-Slam Systems For Fault-Tolerant Simultaneous Localization And Mapping, Samer Nashed Mar 2024

Multi-Slam Systems For Fault-Tolerant Simultaneous Localization And Mapping, Samer Nashed

Doctoral Dissertations

Mobile robots need accurate, high fidelity models of their operating environments in order to complete their tasks safely and efficiently. Generating these models is most often done via Simultaneous Localization and Mapping (SLAM), a paradigm where the robot alternatively estimates the most up-to-date model of the environment and its position relative to this model as it acquires new information from its sensors over time. Because robots operate in many different environments with different compute, memory, sensing, and form constraints, the nature and quality of information available to individual instances of different SLAM systems varies substantially. `One-size-fits-all' solutions are thus exceedingly …