Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Machine Learning (4)
- Artificial Intelligence (2)
- 6G (1)
- AMR (1)
- Age of information (1)
-
- Aggregate Data rate (1)
- Anomaly detection (1)
- Artificial Intelligence Web Development Train Scheduling UI Design Backend Processes Machine Learning Microservices Architecture User Experience Data Acquisition Model Training Real-time Data Processing Containerization Natural Language Processing Predictive Analytics System Integration (1)
- Attention mechanisms (1)
- Attention-based models (1)
- Automatic Speech Recognition (1)
- Bombardment (1)
- CNN (1)
- Cellular-connected UAV (1)
- Coherent One-way Protocol(COW) (1)
- Containerization (1)
- ConvLSTM (1)
- Cyber Resilience (1)
- Cybersecurity (1)
- Data Analysis (1)
- Data collection (1)
- Data privacy (1)
- Data reduction (1)
- Deep Learning (1)
- Deep learning models (1)
- Docker (1)
- Effective APPL stock forecasting (1)
- Effective CNN-LSTM stock forecasting (1)
- Effective stock market forecasting (1)
- Ethical AI (1)
Articles 1 - 18 of 18
Full-Text Articles in Engineering
Evaluating The Effect Of Noise On Secure Quantum Networks, Karthick Anbalagan
Evaluating The Effect Of Noise On Secure Quantum Networks, Karthick Anbalagan
Master's Theses
This thesis focuses on examining the resilience of secure quantum networks to environmental noise. Specifically, we evaluate the effectiveness of two well-known quantum key distribution (QKD) protocols: the Coherent One-Way (COW) protocol and Kak’s Three-Stage protocol (Kak06). The thesis systematically evaluates these protocols in terms of their efficiency, operational feasibility, and resistance to noise, thereby contributing to the progress of secure quantum communications. Using simulations, this study evaluates the protocols in realistic scenarios that include factors such as noise and decoherence. The results illustrate each protocol’s relative benefits and limitations, highlighting the three-stage protocol’s superior security characteristics, resistance to interference, …
Machine Learning For Intrusion Detection Into Unmanned Aerial System 6g Networks, Faisal Alrefaei
Machine Learning For Intrusion Detection Into Unmanned Aerial System 6g Networks, Faisal Alrefaei
Doctoral Dissertations and Master's Theses
Progress in the development of wireless network technology has played a crucial role in the evolution of societies and provided remarkable services over the past decades. It remotely offers the ability to execute critical missions and effective services that meet the user's needs. This advanced technology integrates cyber and physical layers to form cyber-physical systems (CPS), such as the Unmanned Aerial System (UAS), which consists of an Unmanned Aerial Vehicle (UAV), ground network infrastructure, communication link, etc. Furthermore, it plays a crucial role in connecting objects to create and develop the Internet of Things (IoT) technology. Therefore, the emergence of …
Effectiveness Of Cnn-Lstm Models Used For Apple Stock Forecasting, Ethan White
Effectiveness Of Cnn-Lstm Models Used For Apple Stock Forecasting, Ethan White
Electronic Theses, Projects, and Dissertations
This culminating experience project investigates the effectiveness of convolutional neural networks mixed with long short-term memory (CNN-LSTM) models, and an ensemble method, extreme gradient boosting (XGBoost), in predicting closing stock prices. This quantitative analysis utilizes recent AAPL stock data from the NASDAQ index. The chosen research questions (RQs) are: RQ1. What are the optimal hyperparameters for CNN-LSTM models in stock price forecasting? RQ2. What is the best architecture for CNN-LSTM models in this context? RQ3. How can ensemble techniques like XGBoost effectively enhance the predictions of CNN-LSTM models for stock price forecasting?
The research questions were answered through a thorough …
Automatic Speech Recognition For Air Traffic Control Using Convolutional Lstm, Sakshi Nakashe
Automatic Speech Recognition For Air Traffic Control Using Convolutional Lstm, Sakshi Nakashe
Electronic Theses, Projects, and Dissertations
The need for automatic speech recognition in air traffic control is critical as it enhances the interaction between the computer and human. Speech recognition helps to automatically transcribe the communication between the pilots and the air traffic controllers, which reduces the time taken for administrative tasks. This project aims to provide improvement to the Automatic Speech Recognition (ASR) system for air traffic control by investigating the impact of convolution LSTM model on ASR as suggested by previous studies. The research questions are: (Q1) Comparing the performance of ConvLSTM with other conventional models, how does ConvLSTM perform with respect to recognizing …
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Honors Theses
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Enhancing Cyber Resilience: Development, Challenges, And Strategic Insights In Cyber Security Report Websites Using Artificial Inteligence, Pooja Sharma
Harrisburg University Dissertations and Theses
In an era marked by relentless cyber threats, the imperative of robust cyber security measures cannot be overstated. This thesis embarks on an in-depth exploration of the historical trajectory and contemporary relevance of penetration testing methodologies, elucidating their evolution from nascent origins to indispensable tools in the cyber security arsenal. Moreover, it undertakes the ambitious task of conceptualizing and implementing a cyber security report website, meticulously designed to fortify cyber resilience in the face of ever-evolving threats in the digital realm.
The research journey commences with an insightful examination of the historical antecedents of penetration testing, tracing its genesis in …
The Role Of Attention Mechanisms In Enhancing Transparency And Interpretability Of Neural Network Models In Explainable Ai, Bhargav Kotipalli
The Role Of Attention Mechanisms In Enhancing Transparency And Interpretability Of Neural Network Models In Explainable Ai, Bhargav Kotipalli
Harrisburg University Dissertations and Theses
In the rapidly evolving field of artificial intelligence (AI), deep learning models' interpretability
and reliability are severely hindered by their complexity and opacity. Enhancing the
transparency and interpretability of AI systems for humans is the primary objective of the
emerging field of explainable AI (XAI). The attention mechanisms at the heart of XAI's work
are based on human cognitive processes. Neural networks can now dynamically focus on
relevant parts of the input data thanks to these mechanisms, which enhances interpretability
and performance. This report covers in-depth talks of attention mechanisms in neural networks
within XAI, as well as an analysis …
Decoding The Future: Integration Of Artificial Intelligence In Web Development, Dhiraj Choithramani
Decoding The Future: Integration Of Artificial Intelligence In Web Development, Dhiraj Choithramani
Harrisburg University Dissertations and Theses
The thesis explores AI's profound impact on web development, particularly in front-end and back-end processes. AI revolutionizes UI prototyping by automating design creation, enhancing both efficiency and aesthetics. It also aids in code review, content generation, and process flow experimentation, streamlining development workflows. Through AI-driven tools like GitHub's Copilot and Wix ADI, developers benefit from coding assistance and innovative design capabilities. Despite some challenges, AI's evolving role promises to reshape web development, offering unprecedented efficiency and user-centric solutions.
Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner
Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner
Honors College Theses
Modern advancements in machine learning are transforming the technological landscape, including information architecture within user experience design. With the unparalleled amount of user data generated on online media platforms and applications, an adjustment in the design process to incorporate machine learning for categorizing the influx of semantic data while maintaining a user-centric structure is essential. Machine learning tools, such as the classification and recommendation system, need to be incorporated into the design for user experience and marketing success. There is a current gap between incorporating the backend modeling algorithms and the frontend information architecture system design together. The aim of …
Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao
Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao
Masters Theses
Embedded systems based on lightweight microprocessors are becoming more prevalent in various applications. However, the security of them remains a significant challenge due to the limited resources and exposure to external threats. Especially, some of these devices store sensitive data and control critical devices, making them high-value targets for attackers. Software security is particularly important because attackers can easily access these devices on the internet and obtain control of them by injecting malware.
Return address (RA) hijacking is a common software attack technique used to compromise control flow integrity (CFI) by manipulating memory, such as return-to-libc attacks. Several methods have …
Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim
Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim
Masters Theses
Due to significant investment, research, and development efforts over the past decade, deep neural networks (DNNs) have achieved notable advancements in classification and regression domains. As a result, DNNs are considered valuable intellectual property for artificial intelligence providers. Prior work has demonstrated highly effective model extraction attacks which steal a DNN, dismantling the provider’s business model and paving the way for unethical or malicious activities, such as misuse of personal data, safety risks in critical systems, or spreading misinformation. This thesis explores the feasibility of model extraction attacks on mobile devices using aggregated runtime profiles as a side-channel to leak …
An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou
An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou
Doctoral Dissertations
With the proliferation of video content from surveillance cameras, social media, and live streaming services, the need for efficient video analytics has grown immensely. In recent years, machine learning based computer vision algorithms have shown great success in various video analytic tasks. Specifically, neural network models have dominated in visual tasks such as image and video classification, object recognition, object detection, and object tracking. However, compared with classic computer vision algorithms, machine learning based methods are usually much more compute-intensive. Powerful servers are required by many state-of-the-art machine learning models. With the development of cloud computing infrastructures, people are able …
Adaptive Load-Aware Elastic Data Reduction And Re-Computation For Adaptive Mesh Refinement, Mengxiao Wang
Adaptive Load-Aware Elastic Data Reduction And Re-Computation For Adaptive Mesh Refinement, Mengxiao Wang
Computer Science and Engineering Theses
The increasing performance gap between computation and I/O creates huge data management challenges for simulation-based scientific discovery. Data reduction, among others, is deemed to be a promising technique to bridge the gap through reducing the amount of data migrated to persistent storage. However, the reduction performance is still far from what is being demanded from production applications. To this end, we propose a new methodology that aggressively reduces data despite the substantial loss of information, and re-computes the original accuracy on-demand. As a result, our scheme creates an illusion of a fast and large storage medium with the availability of …
The Impact Of Ai In Gaming Industry, Huang Xiaorong
The Impact Of Ai In Gaming Industry, Huang Xiaorong
MA Theses
With the rapid development of artificial intelligence (AI) technology, the application
of AI art in game development is becoming increasingly popular. AI art can not only help game developers speed up the creative process but also improve the visual quality and user experience of games. This paper provides an overview of the application of AI art in games, including character design, scene generation, animation production, and more. It also discusses the challenges and future directions of AI art. Through comprehensive analysis of existing research and practices, we find that AI art has tremendous potential in game development but still faces …
Reinventing Integrated Photonic Devices And Circuits For High Performance Communication And Computing Applications, Venkata Sai Praneeth Karempudi
Reinventing Integrated Photonic Devices And Circuits For High Performance Communication And Computing Applications, Venkata Sai Praneeth Karempudi
Theses and Dissertations--Electrical and Computer Engineering
The long-standing technological pillars for computing systems evolution, namely Moore's law and Von Neumann architecture, are breaking down under the pressure of meeting the capacity and energy efficiency demands of computing and communication architectures that are designed to process modern data-centric applications related to Artificial Intelligence (AI), Big Data, and Internet-of-Things (IoT). In response, both industry and academia have turned to 'more-than-Moore' technologies for realizing hardware architectures for communication and computing. Fortunately, Silicon Photonics (SiPh) has emerged as one highly promising ‘more-than-Moore’ technology. Recent progress has enabled SiPh-based interconnects to outperform traditional electrical interconnects, offering advantages like high bandwidth density, …
Efficient Connectivity Management And Path Planning For Iot And Uav Networks, Amirahmad Chapnevis
Efficient Connectivity Management And Path Planning For Iot And Uav Networks, Amirahmad Chapnevis
Theses and Dissertations
This dissertation explores how to better manage resources in mobile networks, especially for enhancing the performance of Unmanned Aerial Vehicles (UAV)-supported IoT networks. We explored ways to set up a flexible communication architecture that can handle large IoT deployments by making good use of mobile core network resources like bearers and data paths. We developed strategies that meet the needs of IoT networks and enhance network performance. We also developed and tested a system that combines traffic from several mobile devices that use the same user identity and network resources within the core mobile network. We used everyday smartphones, SIM …
Cross-Layer Design Of Highly Scalable And Energy-Efficient Ai Accelerator Systems Using Photonic Integrated Circuits, Sairam Sri Vatsavai
Cross-Layer Design Of Highly Scalable And Energy-Efficient Ai Accelerator Systems Using Photonic Integrated Circuits, Sairam Sri Vatsavai
Theses and Dissertations--Electrical and Computer Engineering
Artificial Intelligence (AI) has experienced remarkable success in recent years, solving complex computational problems across various domains, including computer vision, natural language processing, and pattern recognition. Much of this success can be attributed to the advancements in deep learning algorithms and models, particularly Artificial Neural Networks (ANNs). In recent times, deep ANNs have achieved unprecedented levels of accuracy, surpassing human capabilities in some cases. However, these deep ANN models come at a significant computational cost, with billions to trillions of parameters. Recent trends indicate that the number of parameters per ANN model will continue to grow exponentially in the foreseeable …
Assessing Performance Optimization Strategies In Cloud-Native Environments Through Containerization And Orchestration Analysis, Daniel E. Ukene
Assessing Performance Optimization Strategies In Cloud-Native Environments Through Containerization And Orchestration Analysis, Daniel E. Ukene
Electronic Theses and Dissertations
This thesis comprises three distinct, yet interconnected studies addressing critical aspects of web infrastructure management. We begin by studying containerization via Docker and its impact on web server performance, focusing on Apache and Nginx hosted on virtualized environments. Through meticulous load testing and analysis, we provide insights into the comparative performance of these servers, adding users of this technology know which webservers to leverage when hosting their webservice along alongside the infrastructure to host it on. Next, we expand our focus to examine the performance of caching systems, namely Redis and Memcached, across traditional VMs and Docker containers. By comparing …