Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering

Theses/Dissertations

2021

Institution
Keyword
Publication

Articles 1 - 30 of 56

Full-Text Articles in Engineering

Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor Dec 2021

Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor

Computer Science and Engineering Theses and Dissertations

The physical state of a system is affected by the activities and processes in which it is tasked with carrying out. In the past there have been many instances where such physical changes have been exploited by bad actors in order to gain insight into the operational state and even the data being held on a system. This method of side channel exploitation is very often effective due to the relative difficulty of obfuscating activity on a physical level. However, in order to take advantage of side channel data streams one must have a detailed working knowledge of how a …


Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr. Dec 2021

Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr.

Theses and Dissertations

Malware is a growing concern that not only affects large businesses but the basic consumer as well. As a result, there is a need to develop tools that can identify the malicious activities of malware authors. A useful technique to achieve this is memory forensics. Memory forensics is the study of volatile data and its structures in Random Access Memory (RAM). It can be utilized to pinpoint what actions have occurred on a computer system.

This dissertation utilizes memory forensics to extract relationships between objects and supervised machine learning as a novel method for identifying malicious processes in a system …


Federated Agentless Detection Of Endpoints Using Behavioral And Characteristic Modeling, Hansaka Angel Dias Edirisinghe Kodituwakku Dec 2021

Federated Agentless Detection Of Endpoints Using Behavioral And Characteristic Modeling, Hansaka Angel Dias Edirisinghe Kodituwakku

Doctoral Dissertations

During the past two decades computer networks and security have evolved that, even though we use the same TCP/IP stack, network traffic behaviors and security needs have significantly changed. To secure modern computer networks, complete and accurate data must be gathered in a structured manner pertaining to the network and endpoint behavior. Security operations teams struggle to keep up with the ever-increasing number of devices and network attacks daily. Often the security aspect of networks gets managed reactively instead of providing proactive protection. Data collected at the backbone are becoming inadequate during security incidents. Incident response teams require data that …


Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang Dec 2021

Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang

Doctoral Dissertations and Master's Theses

Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex …


Lung Nodules Identification In Ct Scans Using Multiple Instance Learning., Wiem Safta Dec 2021

Lung Nodules Identification In Ct Scans Using Multiple Instance Learning., Wiem Safta

Electronic Theses and Dissertations

Computer Aided Diagnosis (CAD) systems for lung nodules diagnosis aim to classify nodules into benign or malignant based on images obtained from diverse imaging modalities such as Computer Tomography (CT). Automated CAD systems are important in medical domain applications as they assist radiologists in the time-consuming and labor-intensive diagnosis process. However, most available methods require a large collection of nodules that are segmented and annotated by radiologists. This process is labor-intensive and hard to scale to very large datasets. More recently, some CAD systems that are based on deep learning have emerged. These algorithms do not require the nodules to …


Ahmedabad City App, Rushabh Picha Dec 2021

Ahmedabad City App, Rushabh Picha

Electronic Theses, Projects, and Dissertations

The Ahmedabad City App is a city guide app that provides information on the city's accessible resources. The project's goal is to provide a concrete, one-stop platform for finding information on all of Ahmedabad's accessible resources. The main goal is to simplify the railway's schedule and make it easier for customers to get from one point to another swiftly and safely. Emergency connections such as the blood bank, fire department, police station, and hospitals will be included in the app. Restaurants and picnic areas are also included in the rejuvenation process.

The proposed system uses SQLite as the database and …


An Analysis Of Camera Configurations And Depth Estimation Algorithms For Triple-Camera Computer Vision Systems, Jared Peter-Contesse Dec 2021

An Analysis Of Camera Configurations And Depth Estimation Algorithms For Triple-Camera Computer Vision Systems, Jared Peter-Contesse

Master's Theses

The ability to accurately map and localize relevant objects surrounding a vehicle is an important task for autonomous vehicle systems. Currently, many of the environmental mapping approaches rely on the expensive LiDAR sensor. Researchers have been attempting to transition to cheaper sensors like the camera, but so far, the mapping accuracy of single-camera and dual-camera systems has not matched the accuracy of LiDAR systems. This thesis examines depth estimation algorithms and camera configurations of a triple-camera system to determine if sensor data from an additional perspective will improve the accuracy of camera-based systems. Using a synthetic dataset, the performance of …


Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager Nov 2021

Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager

Honors College Theses

With cybersecurity constantly in the media outlets with breaches, cybercrime, and cyberwarfare, it has become a significant concern for all. One of the most recent breaches in the summer of 2021 was the Colonial Pipeline breach, which has proven the country's reliance on these industrial control systems and networking. The systems were taken for ransom by a new type of ransomware written in a different programming language. Although the Colonial Pipeline breach was quickly addressed, the impact of the gas shortage and the response time were alarming at triaging the breach. However, this attack showed the public how dangerous ransomware …


Asynchronous, Distributed Optical Mutual Exclusion And Applications, Ahmed Bahaael Mansour Nov 2021

Asynchronous, Distributed Optical Mutual Exclusion And Applications, Ahmed Bahaael Mansour

LSU Doctoral Dissertations

Silicon photonics have drawn much recent interest in the setting of intra-chip andmodule communication. In this dissertation, we address a fundamental computationalproblem, mutual exclusion, in the setting of optical interconnects. As a main result, wepropose an optical network and an algorithm for it to distribute a token (shared resource)mutually exclusively among a set ofnprocessing elements. Following a request, the tokenis granted in constant amortized time andO(n) worst case time; this assumes constantpropagation time for light within the chip. Additionally, the distribution of tokens is fair,ensuring that no token request is denied more thann−1 times in succession; this is thebest possible. …


Translating Video Recordings Of Mobile App Ui Gestures Into Replayable Scenarios For Native And Hybrid Apps, Madeleine Havranek Nov 2021

Translating Video Recordings Of Mobile App Ui Gestures Into Replayable Scenarios For Native And Hybrid Apps, Madeleine Havranek

Undergraduate Honors Theses

Screen recordings of mobile applications are easy to obtain and capture a wealth of information pertinent to software developers (e.g., bugs or feature requests), making them a popular mechanism for crowdsourced app feedback. Thus, these videos are becoming a common artifact that developers must manage. In light of unique mobile development constraints, including swift release cycles and rapidly evolving platforms, automated techniques for analyzing all types of rich software artifacts provide benefit to mobile developers. Unfortunately, automatically analyzing screen recordings presents serious challenges, due to their graphical nature, compared to other types of (textual) artifacts. To address these challenges, this …


Exploring Neural Networks For Predicting Sentinel-C Backscatter Between Image Acquisitions, Zhongdi Wu Oct 2021

Exploring Neural Networks For Predicting Sentinel-C Backscatter Between Image Acquisitions, Zhongdi Wu

Computer Science and Engineering Theses and Dissertations

Measuring moisture dynamics in soil and overlying vegetation is key to understanding ecosystem and agricultural dynamics in many contexts. For many applications, moisture information is demanded at high temporal frequency over large areas. Sentinel-1 C-band radar backscatter satellite images provide a repeating sequence of fine-resolution (10-m) observations that can be used to infer soil and vegetation moisture, but the 12-day interval between satellite observations is infrequent relative to the sensed moisture dynamics. Machine learning approaches have been used to predict soil moisture at higher spatial resolutions than the original satellite images, but little effort has been made to increase the …


Deep Learning For High-Impedance Fault Detection And Classification, Khushwant Rai Aug 2021

Deep Learning For High-Impedance Fault Detection And Classification, Khushwant Rai

Electronic Thesis and Dissertation Repository

High-Impedance Faults (HIFs) are a hazard to public safety but are difficult to detect because of their low current amplitude and diverse characteristics. Supervised machine learning techniques have shown great success in HIF detection; however, these approaches rely on resource-intensive signal processing techniques and fail in presence of non-HIF disturbances and even for scenarios not included in training data. This thesis leverages unsupervised learning and proposes a Convolutional Autoencoder framework for HIF Detection (CAE-HIFD). In CAE-HIFD, Convolutional Autoencoder learns only from HIF signals by employing cross-correlation; consequently, eliminating the need for diverse non-HIF scenarios in training. Furthermore, this thesis proposes …


Cosine-Based Explainable Matrix Factorization For Collaborative Filtering Recommendation., Pegah Sagheb Haghighi Aug 2021

Cosine-Based Explainable Matrix Factorization For Collaborative Filtering Recommendation., Pegah Sagheb Haghighi

Electronic Theses and Dissertations

Recent years saw an explosive growth in the amount of digital information and the number of users who interact with this information through various platforms, ranging from web services to mobile applications and smart devices. This increase in information and users has naturally led to information overload which inherently limits the capacity of users to discover and find their needs among the staggering array of options available at any given time, the majority of which they may never become aware of. Online services have handled this information overload by using algorithmic filtering tools that can suggest relevant and personalized information …


Flight Trajectory Prediction For Aeronautical Communications., Nathan T Schimpf Aug 2021

Flight Trajectory Prediction For Aeronautical Communications., Nathan T Schimpf

Electronic Theses and Dissertations

The development of future technologies for the National Airspace System (NAS) will be reliant on a new communications infrastructure capable of managing a limited spectrum among aircraft and ground systems. Emerging approaches to this spectrum allocation task mostly consider machine learning techniques reliant on aircraft and Air Traffic Control (ATC) sector data. Much of this data, however, is not directly available. This thesis considers the development of two such data products: the 4D trajectory (latitude, longitude, altitude, and time) of aircraft, and the anticipated airspace utilization and communication demand within an ATC sector. Data predictions are treated as a time …


Physically Based Rendering Techniques To Visualize Thin-Film Smoothed Particle Hydrodynamics Fluid Simulations, Aditya H. Prasad Jun 2021

Physically Based Rendering Techniques To Visualize Thin-Film Smoothed Particle Hydrodynamics Fluid Simulations, Aditya H. Prasad

Dartmouth College Undergraduate Theses

This thesis introduces a methodology and workflow I developed to visualize smoothed hydrodynamic particle based simulations for the research paper ’Thin-Film Smoothed Particle Hydrodynamics Fluid’ (2021), that I co-authored. I introduce a physically based rendering model which allows point cloud simulation data representing thin film fluids and bubbles to be rendered in a photorealistic manner. This includes simulating the optic phenomenon of thin-film interference and rendering the resulting iridescent patterns. The key to the model lies in the implementation of a physically based surface shader that accounts for the interference of infinitely many internally reflected rays in its bidirectional surface …


Pier Ocean Pier, Brandon J. Nowak Jun 2021

Pier Ocean Pier, Brandon J. Nowak

Computer Engineering

Pier Ocean Peer is a weatherproof box containing a Jetson Nano, connected to a cell modem and camera, and powered by a Lithium Iron Phosphate battery charged by a 50W solar panel. This system can currently provide photos to monitor the harbor seal population that likes to haul out at the base of the Cal Poly Pier, but more importantly it provides a platform for future expansion by other students either though adding new sensors directly to the Jetson Nano or by connecting to the jetson nano remotely through a wireless protocol of their choice.


Observation Of The Evolution Of Hide And Seek Ai, Anthony J. Catelani Jun 2021

Observation Of The Evolution Of Hide And Seek Ai, Anthony J. Catelani

Computer Science and Software Engineering

The purpose of this project is to observe the evolution of two artificial agents, a ‘Seeker’ and a ‘Hider’, as they play a simplified version of the game Hide and Seek. These agents will improve through machine learning, and will only be given an understanding of the rules of the game and the ability to navigate through the grid-like space where the game shall be played; they will not be taught or given any strategies, and will be made to learn from a clean slate. Of particular interest is observing the particular playstyle of hider and seeker intelligences as new …


Efficient Protocols For Multi-Party Computation, Tahereh Jafarikhah Jun 2021

Efficient Protocols For Multi-Party Computation, Tahereh Jafarikhah

Dissertations, Theses, and Capstone Projects

Secure Multi-Party Computation (MPC) allows a group of parties to compute a join function on their inputs without revealing any information beyond the result of the computation. We demonstrate secure function evaluation protocols for branching programs, where the communication complexity is linear in the size of the inputs, and polynomial in the security parameter. Our result is based on the circular security of the Paillier's encryption scheme. Our work followed the breakthrough results by Boyle et al. [9; 11]. They presented a Homomorphic Secret Sharing scheme which allows the non-interactive computation of Branching Programs over shares of the secret inputs. …


Using Pitch Tipping For Baseball Pitch Prediction, Brian Ishii Jun 2021

Using Pitch Tipping For Baseball Pitch Prediction, Brian Ishii

Master's Theses

Data Analytics and technology have changed baseball as we know it. From the increase in defensive shifts to teams using cameras in the outfield to steal signs, teams will try anything to win. One way to gain an edge in baseball is to figure out what pitches a pitcher will pitch. Pitch prediction is a popular task to try to accomplish with all the data that baseball provides. Most methods involve using situational data like the ball and strike count. In this paper, we try a different method of predicting pitch type by only looking at the pitcher's pose in …


Automating Deep-Sea Video Annotation, Hanson Egbert Jun 2021

Automating Deep-Sea Video Annotation, Hanson Egbert

Master's Theses

As the world explores opportunities to develop offshore renewable energy capacity, there will be a growing need for pre-construction biological surveys and post-construction monitoring in the challenging marine environment. Underwater video is a powerful tool to facilitate such surveys, but the interpretation of the imagery is costly and time-consuming. Emerging technologies have improved automated analysis of underwater video, but these technologies are not yet accurate or accessible enough for widespread adoption in the scientific community or industries that might benefit from these tools.

To address these challenges, prior research developed a website that allows to: (1) Quickly play and annotate …


Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui Jun 2021

Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui

Master's Theses

The use of dependencies have been increasing in popularity over the past decade, especially as package managers such as JavaScript's npm has made getting these packages a simple command to run. However, while incidents such as the left-pad incident has increased awareness of how vulnerable relying on these packages are, there is still some work to be done when it comes to getting developers to take the extra research step to determine if a package is up to standards. Finding metrics of different packages and comparing them is always a difficult and time consuming task, especially since potential vulnerabilities are …


Convolutional Neural Networks For Deflate Data Encoding Classification Of High Entropy File Fragments, Nehal Ameen May 2021

Convolutional Neural Networks For Deflate Data Encoding Classification Of High Entropy File Fragments, Nehal Ameen

University of New Orleans Theses and Dissertations

Data reconstruction is significantly improved in terms of speed and accuracy by reliable data encoding fragment classification. To date, work on this problem has been successful with file structures of low entropy that contain sparse data, such as large tables or logs. Classifying compressed, encrypted, and random data that exhibit high entropy is an inherently difficult problem that requires more advanced classification approaches. We explore the ability of convolutional neural networks and word embeddings to classify deflate data encoding of high entropy file fragments after establishing ground truth using controlled datasets. Our model is designed to either successfully classify file …


Decentralized Aggregation Design And Study Of Federated Learning, Venkata Naga Surya Sameeraja Malladi May 2021

Decentralized Aggregation Design And Study Of Federated Learning, Venkata Naga Surya Sameeraja Malladi

Master of Science in Software Engineering Theses

The advent of machine learning techniques has given rise to modern devices with built-in models for decision making and providing rich content to users. This typically involves processing huge volumes of data in central servers and sending updated models to end-user devices. There are two main concerns on this server architecture, one is the privacy of data that is being transferred to a central server and the other is volumes of data sent over the network for the model update. Federated Learning helps solve these problems by training models on local data within the device and aggregating the model with …


Redai: A Machine Learning Approach To Cyber Threat Intelligence, Luke Noel May 2021

Redai: A Machine Learning Approach To Cyber Threat Intelligence, Luke Noel

Masters Theses, 2020-current

The world is continually demanding more effective and intelligent solutions and strategies to combat adversary groups across the cyber defense landscape. Cyber Threat Intelligence (CTI) is a field within the domain of cyber security that allows for organizations to utilize threat intelligence and serves as a tool for organizations to proactively harden their defense posture. However, there is a large volume of CTI and it is often a daunting task for organizations to effectively consume, utilize, and apply it to their defense strategies. In this thesis we develop a machine learning solution, named RedAI, to investigate whether open-source intelligence (OSINT) …


Synthesizer Parameter Approximation By Deep Learning, Daniel Faronbi, Alisa Gilmore May 2021

Synthesizer Parameter Approximation By Deep Learning, Daniel Faronbi, Alisa Gilmore

Theses/Capstones/Creative Projects

Synthesizers have been an essential tool for composers of any style of music including computer generated sound. They allow for an expansion in timbral variety to the orchestration of a piece of music or sound scape. Sound designers are trained to be able to recreate a timbre in their head using a synthesizer. This works well for simple sounds but becomes more difficult as the number of parameters required to produce a specific timbre increase. The goal of this research project is to formulate a method for synthesizers to approximate a timbre given an input audio sample using deep learning. …


Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li May 2021

Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li

Doctoral Dissertations

In recent years, deep neural networks (DNNs) are increasingly investigated in the literature to be employed in cyber-physical systems (CPSs). DNNs own inherent advantages in complex pattern identifying and achieve state-of-the-art performances in many important CPS applications. However, DNN-based systems usually require large datasets for model training, which introduces new data management issues. Meanwhile, research in the computer vision domain demonstrated that the DNNs are highly vulnerable to adversarial examples. Therefore, the security risks of employing DNNs in CPSs applications are of concern.

In this dissertation, we study the security of employing DNNs in CPSs from both the data domain …


Utility Scale Building Energy Modeling And Climate Impacts, Brett C. Bass May 2021

Utility Scale Building Energy Modeling And Climate Impacts, Brett C. Bass

Doctoral Dissertations

Energy consumption is steadily increasing year over year in the United States (US). Climate change and anthropogenically forced shifts in weather have a significant impact on energy use as well as the resilience of the built environment and the electric grid. With buildings accounting for about 40% of total energy use in the US, building energy modeling (BEM) at a large scale is critical. This work advances that effort in a number of ways. First, current BEM approaches, their ability to scale to large geographical areas, and global climate models are reviewed. Next, a methodology for large-scale BEM is illustrated, …


An Analysis Of Modern Password Manager Security And Usage On Desktop And Mobile Devices, Timothy Oesch May 2021

An Analysis Of Modern Password Manager Security And Usage On Desktop And Mobile Devices, Timothy Oesch

Doctoral Dissertations

Security experts recommend password managers to help users generate, store, and enter strong, unique passwords. Prior research confirms that managers do help users move towards these objectives, but it also identified usability and security issues that had the potential to leak user data or prevent users from making full use of their manager. In this dissertation, I set out to measure to what extent modern managers have addressed these security issues on both desktop and mobile environments. Additionally, I have interviewed individuals to understand their password management behavior.

I begin my analysis by conducting the first security evaluation of the …


Heterogeneous Graph-Based User-Specific Review Helpfulness Prediction, Dongkai Chen May 2021

Heterogeneous Graph-Based User-Specific Review Helpfulness Prediction, Dongkai Chen

Dartmouth College Master’s Theses

With the popularity of e-commerce and review websites, it is becoming increasingly important to identify the helpfulness of reviews. However, existing works on predicting reviews’ helpfulness have three major issues: (i) the correlation between helpfulness and features from review text is not clear yet, although many standard features are proposed, (ii) the relations between users, reviews and products have not been considered, (iii) the effectiveness of the existing approaches have not been systematically compared. To address these challenges, we first analyze the correlation between standard features and review helpfulness that are widely used in other work. Based on this analysis, …


Multi-Style Explainable Matrix Factorization Techniques For Recommender Systems., Olurotimi Nugbepo Seton May 2021

Multi-Style Explainable Matrix Factorization Techniques For Recommender Systems., Olurotimi Nugbepo Seton

Electronic Theses and Dissertations

Black-box recommender system models are machine learning models that generate personalized recommendations without explaining how the recommendations were generated to the user or giving them a way to correct wrong assumptions made about them by the model. However, compared to white-box models, which are transparent and scrutable, black-box models are generally more accurate. Recent research has shown that accuracy alone is not sufficient for user satisfaction. One such black-box model is Matrix Factorization, a State of the Art recommendation technique that is widely used due to its ability to deal with sparse data sets and to produce accurate recommendations. Recent …