Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- MHealth (2)
- Android Apps (1)
- Apache Spark (1)
- Authentication (1)
- Biometric (1)
-
- Blockchain (1)
- Blockchain Technology (1)
- Bounded KNN (1)
- Child health (1)
- Classifier (1)
- Coherent One-way Protocol(COW) (1)
- Communication protocol (1)
- Consensus Mechanism (1)
- Convolutional Neural Network (1)
- Crowdsourcing (1)
- DNP3 SaV5 (1)
- Data Integrity (1)
- Data-driven Decision Making (1)
- Detrimental impact (1)
- Dilated Layers (1)
- Document Layout Analysis (1)
- Electronic Health Records (HER) (1)
- Ethereum (1)
- HIPAA (1)
- Hyperledger Fabric (1)
- IDE plugin (1)
- Infants and toddlers (1)
- Iris (1)
- KNN (1)
- Kak’s Three-Stage protocol (1)
Articles 1 - 10 of 10
Full-Text Articles in Engineering
Evaluating The Effect Of Noise On Secure Quantum Networks, Karthick Anbalagan
Evaluating The Effect Of Noise On Secure Quantum Networks, Karthick Anbalagan
Master's Theses
This thesis focuses on examining the resilience of secure quantum networks to environmental noise. Specifically, we evaluate the effectiveness of two well-known quantum key distribution (QKD) protocols: the Coherent One-Way (COW) protocol and Kak’s Three-Stage protocol (Kak06). The thesis systematically evaluates these protocols in terms of their efficiency, operational feasibility, and resistance to noise, thereby contributing to the progress of secure quantum communications. Using simulations, this study evaluates the protocols in realistic scenarios that include factors such as noise and decoherence. The results illustrate each protocol’s relative benefits and limitations, highlighting the three-stage protocol’s superior security characteristics, resistance to interference, …
Assessing Blockchain’S Potential To Ensure Data Integrity And Security For Ai And Machine Learning Applications, Aiasha Siddika
Assessing Blockchain’S Potential To Ensure Data Integrity And Security For Ai And Machine Learning Applications, Aiasha Siddika
Master of Science in Information Technology Theses
The increasing use of data-centric approaches in the fields of Machine Learning and Artificial Intelligence (ML/AI) has raised substantial issues over the security, integrity, and trustworthiness of data. In response to this challenge, Blockchain technology offered a promising and practical solution, as its inherent characteristics as a decentralized distributed ledger, coupled with cryptographic processes, offer an unprecedented level of data confidentiality and immutability. This study examines the mutually beneficial connection between Blockchain technology and ML/AI, using Blockchain's inherent capacity to protect against unauthorized alterations of data during the training phase of ML models. The method involves building valid blocks of …
Screensafefuture: A Parent-Empathetic And Practical Mhealth Application For Toddlers' Brain Development Addressing Screen-Addiction Challenges, Nafisa Anjum
Master of Science in Information Technology Theses
The surging incidents of infants and toddlers screen addiction in the United States are becoming a pressing concern due to its detrimental and compound impact on cognitive development, mental health, and physical growth. To address this era's critical child health and human development problem, we propose an innovative mHealth application-- ScreenSafeFuture-- in this paper. ScreenSafeFuture provides practical and parent-friendly solutions that seamlessly fit into parents' busy lifestyles, also acknowledging the effectiveness and convenience of smartphones as a healthcare tool. Our offering includes essential features designed to enhance the experience between parents and their children under 3 years old. With an …
Analysis Of The Adherence Of Mhealth Applications To Hipaa Technical Safeguards, Bilash Saha
Analysis Of The Adherence Of Mhealth Applications To Hipaa Technical Safeguards, Bilash Saha
Master of Science in Information Technology Theses
The proliferation of mobile health technology, or mHealth apps, has made it essential to protect individual health details. People now have easy access to digital platforms that allow them to save, share, and access their medical data and treatment information as well as easily monitor and manage health-related issues. It is crucial to make sure that protected health information (PHI) is effectively and securely transmitted, received, created, and maintained in accordance with the rules outlined by the Health Insurance Portability and Accountability Act (HIPAA), as the use of mHealth apps increases. Unfortunately, many mobile app developers, particularly those of mHealth …
A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li
A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li
Master of Science in Software Engineering Theses
Traditional data collection, storage, and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Addressing the challenges of conventional database techniques and improving the overall aspects of EHR application, blockchain technology is being evaluated to find a possible solution. Blockchain refers to an emerging distributed technology and incorruptible database of records or digital events which execute, validate, and maintain by a ledger technology to provide an immutable architecture and prevent records manipulation …
Optimal Order Assignment With Minimum Wage Consideration (Ooamwc), Hakem Alazmi
Optimal Order Assignment With Minimum Wage Consideration (Ooamwc), Hakem Alazmi
Master of Science in Computer Science Theses
While the application of crowdsourcing has increased over the years, the technology experiences various issues during implementation. Examples of some of the issues that affect crowdsourcing include task assignment, profit maximizations, as well as time window issues. In some instances addressing some of the issues results in the other issues being overlooked. An example is when assigning tasks to workers, the profits of the workers might not be considered and this ends up affecting the profit maximization aspect. Various algorithms have been proposed to address the task assignment, profit maximizations, and time window issues. However, these algorithms address the issues …
A Framework To Detect Presentation Attacks, Laeticia Etienne
A Framework To Detect Presentation Attacks, Laeticia Etienne
Master of Science in Information Technology Theses
Biometric-based authentication systems are becoming the preferred choice to replace password-based authentication systems. Among several variations of biometrics (e.g., face, eye, fingerprint), iris-based authentication is commonly used in every day applications. In iris-based authentication systems, iris images from legitimate users are captured and certain features are extracted to be used for matching during the authentication process. Literature works suggest that iris-based authentication systems can be subject to presentation attacks where an attacker obtains printed copy of the victim’s eye image and displays it in front of an authentication system to gain unauthorized access. Such attacks can be performed by displaying …
Document Layout Analysis And Recognition Systems, Sai Kosaraju
Document Layout Analysis And Recognition Systems, Sai Kosaraju
Master of Science in Computer Science Theses
Automatic extraction of relevant knowledge to domain-specific questions from Optical Character Recognition (OCR) documents is critical for developing intelligent systems, such as document search engines, sentiment analysis, and information retrieval, since hands-on knowledge extraction by a domain expert with a large volume of documents is intensive, unscalable, and time-consuming. There have been a number of studies that have automatically extracted relevant knowledge from OCR documents, such as ABBY and Sandford Natural Language Processing (NLP). Despite the progress, there are still limitations yet-to-be solved. For instance, NLP often fails to analyze a large document. In this thesis, we propose a knowledge …
Knn Optimization For Multi-Dimensional Data, Arialdis Japa
Knn Optimization For Multi-Dimensional Data, Arialdis Japa
Master of Science in Computer Science Theses
The K-Nearest Neighbors (KNN) algorithm is a simple but powerful technique used in the field of data analytics. It uses a distance metric to identify existing samples in a dataset which are similar to a new sample. The new sample can then be classified via a class majority voting of its most similar samples, i.e. nearest neighbors. The KNN algorithm can be applied in many fields, such as recommender systems where it can be used to group related products or predict user preferences. In most cases, the performance of the KNN algorithm tends to suffer as the size of the …
Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli
Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli
Master of Science in Computer Science Theses
With the recent advances in the power grid system connecting to the internet, data sharing, and networking enables space for hackers to maliciously attack them based on their vulnerabilities. Vital stations in the smart grid are the generation, transmission, distribution, and customer substations are connected and controlled remotely by the network. Every substation is controlled by a Supervisory Control and Data Acquisition (SCADA) system which communicates on DNP3 protocol on Internet/IP which has many security vulnerabilities. This research will focus on Distributed Network Protocol (DNP3) communication which is used in the smart grid to communicate between the controller devices. We …