Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Engineering

Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater Aug 2023

Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater

SMU Data Science Review

Static and dynamic analyses are the two primary approaches to analyzing malicious applications. The primary distinction between the two is that the application is analyzed without execution in static analysis, whereas the dynamic approach executes the malware and records the behavior exhibited during execution. Although each approach has advantages and disadvantages, dynamic analysis has been more widely accepted and utilized by the research community whereas static analysis has not seen the same attention. This study aims to apply advancements in static analysis techniques to demonstrate the identification of fine-grained functionality, and show, through clustering, how malicious applications may be grouped …


Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn Mar 2023

Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn

SMU Data Science Review

Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …


Electricity Market Operations With Massive Renewable Integration: New Designs, Shengfei Yin Jul 2021

Electricity Market Operations With Massive Renewable Integration: New Designs, Shengfei Yin

Electrical Engineering Theses and Dissertations

Electricity market has been transitioning from a conventional and deterministic operation to a stochastic operation under the increasing penetration of renewable energy. Industry-level solutions toward the future electricity market operation ask for both accuracy and efficiency while maintaining model interpretability. Hence, reliable stochastic optimization techniques come to the first place for such a complex and dynamic problem.

This work starts at proposing a solution strategy for the uncertainty-based power system planning problem, which acts as a preliminary and instructs the electricity market operation. Considering 100% renewable penetration in the future, it analyzes the cost-effectiveness of renewable energy from a long-term …


Multigrid For The Nonlinear Power Flow Equations, Enrique Pereira Batista Dec 2020

Multigrid For The Nonlinear Power Flow Equations, Enrique Pereira Batista

Mathematics Theses and Dissertations

The continuously changing structure of power systems and the inclusion of renewable
energy sources are leading to changes in the dynamics of modern power grid,
which have brought renewed attention to the solution of the AC power flow equations.
In particular, development of fast and robust solvers for the power flow problem
continues to be actively investigated. A novel multigrid technique for coarse-graining
dynamic power grid models has been developed recently. This technique uses an
algebraic multigrid (AMG) coarsening strategy applied to the weighted
graph Laplacian that arises from the power network's topology for the construction
of coarse-grain approximations to …


A Modeling Framework For Urban Growth Prediction Using Remote Sensing And Video Prediction Technologies: A Time-Dependent Convolutional Encoder-Decoder Architecture, Ahmed Hassan Jaad Aug 2020

A Modeling Framework For Urban Growth Prediction Using Remote Sensing And Video Prediction Technologies: A Time-Dependent Convolutional Encoder-Decoder Architecture, Ahmed Hassan Jaad

Civil and Environmental Engineering Theses and Dissertations

Studying the growth pattern of cities/urban areas has received considerable attention during the past few decades. The goal is to identify directions and locations of potential growth, assess infrastructure and public service requirements, and ensure the integration of the new developments with the existing city structure. This dissertation presents a novel model for urban growth prediction using a novel machine learning model. The model treats successive historical satellite images of the urban area under consideration as a video for which future frames are predicted. A time-dependent convolutional encoder-decoder architecture is adopted. The model considers as an input a satellite image …


Big-Data Talent Analytics In The Public Sector: A Promotion And Firing Model Of Employees At Federal Agencies, Rabih Neouchi Oct 2019

Big-Data Talent Analytics In The Public Sector: A Promotion And Firing Model Of Employees At Federal Agencies, Rabih Neouchi

Operations Research and Engineering Management Theses and Dissertations

Talent analytics is a relatively new area of focus to researchers working in analytics and data science. Talent Analytics has the potential to help companies make many informed critical decisions around talent acquisition, promotion and retention. This work investigates data science to predict “shiny star” employees in the U.S. public sector, defined as top-notch performers over the years of a given time span. Its scope falls within talent analytics, also called people analytics, a relatively new research area.

We clean a data set made available by the U.S. Office of Personnel Management (OPM) and present two models to predict the …


Machine Learning In Support Of Electric Distribution Asset Failure Prediction, Robert D. Flamenbaum, Thomas Pompo, Christopher Havenstein, Jade Thiemsuwan Aug 2019

Machine Learning In Support Of Electric Distribution Asset Failure Prediction, Robert D. Flamenbaum, Thomas Pompo, Christopher Havenstein, Jade Thiemsuwan

SMU Data Science Review

In this paper, we present novel approaches to predicting as- set failure in the electric distribution system. Failures in overhead power lines and their associated equipment in particular, pose significant finan- cial and environmental threats to electric utilities. Electric device failure furthermore poses a burden on customers and can pose serious risk to life and livelihood. Working with asset data acquired from an electric utility in Southern California, and incorporating environmental and geospatial data from around the region, we applied a Random Forest methodology to predict which overhead distribution lines are most vulnerable to fail- ure. Our results provide evidence …


Self-Driving Cars: Evaluation Of Deep Learning Techniques For Object Detection In Different Driving Conditions, Ramesh Simhambhatla, Kevin Okiah, Shravan Kuchkula, Robert Slater May 2019

Self-Driving Cars: Evaluation Of Deep Learning Techniques For Object Detection In Different Driving Conditions, Ramesh Simhambhatla, Kevin Okiah, Shravan Kuchkula, Robert Slater

SMU Data Science Review

Deep Learning has revolutionized Computer Vision, and it is the core technology behind capabilities of a self-driving car. Convolutional Neural Networks (CNNs) are at the heart of this deep learning revolution for improving the task of object detection. A number of successful object detection systems have been proposed in recent years that are based on CNNs. In this paper, an empirical evaluation of three recent meta-architectures: SSD (Single Shot multi-box Detector), R-CNN (Region-based CNN) and R-FCN (Region-based Fully Convolutional Networks) was conducted to measure how fast and accurate they are in identifying objects on the road, such as vehicles, pedestrians, …


Analysis Of Computer Audit Data To Create Indicators Of Compromise For Intrusion Detection, Steven Millett, Michael Toolin, Justin Bates May 2019

Analysis Of Computer Audit Data To Create Indicators Of Compromise For Intrusion Detection, Steven Millett, Michael Toolin, Justin Bates

SMU Data Science Review

Network security systems are designed to identify and, if possible, prevent unauthorized access to computer and network resources. Today most network security systems consist of hardware and software components that work in conjunction with one another to present a layered line of defense against unauthorized intrusions. Software provides user interactive layers such as password authentication, and system level layers for monitoring network activity. This paper examines an application monitoring network traffic that attempts to identify Indicators of Compromise (IOC) by extracting patterns in the network traffic which likely corresponds to unauthorized access. Typical network log data and construct indicators are …


Visualization And Machine Learning Techniques For Nasa’S Em-1 Big Data Problem, Antonio P. Garza Iii, Jose Quinonez, Misael Santana, Nibhrat Lohia May 2019

Visualization And Machine Learning Techniques For Nasa’S Em-1 Big Data Problem, Antonio P. Garza Iii, Jose Quinonez, Misael Santana, Nibhrat Lohia

SMU Data Science Review

In this paper, we help NASA solve three Exploration Mission-1 (EM-1) challenges: data storage, computation time, and visualization of complex data. NASA is studying one year of trajectory data to determine available launch opportunities (about 90TBs of data). We improve data storage by introducing a cloud-based solution that provides elasticity and server upgrades. This migration will save $120k in infrastructure costs every four years, and potentially avoid schedule slips. Additionally, it increases computational efficiency by 125%. We further enhance computation via machine learning techniques that use the classic orbital elements to predict valid trajectories. Our machine learning model decreases trajectory …


Comparative Study Of Sentiment Analysis With Product Reviews Using Machine Learning And Lexicon-Based Approaches, Heidi Nguyen, Aravind Veluchamy, Mamadou Diop, Rashed Iqbal Jan 2019

Comparative Study Of Sentiment Analysis With Product Reviews Using Machine Learning And Lexicon-Based Approaches, Heidi Nguyen, Aravind Veluchamy, Mamadou Diop, Rashed Iqbal

SMU Data Science Review

In this paper, we present a comparative study of text sentiment classification models using term frequency inverse document frequency vectorization in both supervised machine learning and lexicon-based techniques. There have been multiple promising machine learning and lexicon-based techniques, but the relative goodness of each approach on specific types of problems is not well understood. In order to offer researchers comprehensive insights, we compare a total of six algorithms to each other. The three machine learning algorithms are: Logistic Regression (LR), Support Vector Machine (SVM), and Gradient Boosting. The three lexicon-based algorithms are: Valence Aware Dictionary and Sentiment Reasoner (VADER), Pattern, …


Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater Jan 2019

Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater

SMU Data Science Review

The problem of forecasting market volatility is a difficult task for most fund managers. Volatility forecasts are used for risk management, alpha (risk) trading, and the reduction of trading friction. Improving the forecasts of future market volatility assists fund managers in adding or reducing risk in their portfolios as well as in increasing hedges to protect their portfolios in anticipation of a market sell-off event. Our analysis compares three existing financial models that forecast future market volatility using the Chicago Board Options Exchange Volatility Index (VIX) to six machine/deep learning supervised regression methods. This analysis determines which models provide best …


Improving Gas Well Economics With Intelligent Plunger Lift Optimization Techniques, Atsu Atakpa, Emmanuel Farrugia, Ryan Tyree, Daniel W. Engels, Charles Sparks Jan 2019

Improving Gas Well Economics With Intelligent Plunger Lift Optimization Techniques, Atsu Atakpa, Emmanuel Farrugia, Ryan Tyree, Daniel W. Engels, Charles Sparks

SMU Data Science Review

In this paper, we present an approach to reducing bottom hole plunger dwell time for artificial lift systems. Lift systems are used in a process to remove contaminants from a natural gas well. A plunger is a mechanical device used to deliquefy natural gas wells by removing contaminants in the form of water, oil, wax, and sand from the wellbore. These contaminants decrease bottom-hole pressure which in turn hampers gas production by forming a physical barrier within the well tubing. As the plunger descends through the well it emits sounds which are recorded at the surface by an echo-meter that …


Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels Apr 2018

Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels

SMU Data Science Review

In this paper, we present a comparative evaluation of deep learning approaches to network intrusion detection. A Network Intrusion Detection System (NIDS) is a critical component of every Internet connected system due to likely attacks from both external and internal sources. A NIDS is used to detect network born attacks such as Denial of Service (DoS) attacks, malware replication, and intruders that are operating within the system. Multiple deep learning approaches have been proposed for intrusion detection systems. We evaluate three models, a vanilla deep neural net (DNN), self-taught learning (STL) approach, and Recurrent Neural Network (RNN) based Long Short …


Near-Optimal Control Of Switched Systems With Continuous-Time Dynamics Using Approximate Dynamic Programming, Tohid Sardarmehni Apr 2018

Near-Optimal Control Of Switched Systems With Continuous-Time Dynamics Using Approximate Dynamic Programming, Tohid Sardarmehni

Mechanical Engineering Research Theses and Dissertations

Optimal control is a control method which provides inputs that minimize a performance index subject to state or input constraints [58]. The existing solutions for finding the exact optimal control solution such as Pontryagin’s minimum principle and dynamic programming suffer from curse of dimensionality in high order dynamical systems. One remedy for this problem is finding near optimal solution instead of the exact optimal solution to avoid curse of dimensionality [31]. A method for finding the approximate optimal solution is through Approximate Dynamic Programming (ADP) methods which are discussed in the subsequent chapters.

In this dissertation, optimal switching in switched …