Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 39

Full-Text Articles in Engineering

Classification Of Ddos Attack With Machine Learning Architectures And Exploratory Analysis, Amreen Anbar Aug 2023

Classification Of Ddos Attack With Machine Learning Architectures And Exploratory Analysis, Amreen Anbar

Electronic Thesis and Dissertation Repository

The ever-increasing frequency of occurrence and sophistication of DDoS attacks pose a serious threat to network security. Accurate classification of DDoS attacks with efficiency is crucial in order to develop effective defense mechanisms. In this thesis, we propose a novel approach for DDoS classification using the CatBoost algorithm, on CICDDoS2019, a benchmark dataset containing 12 variations of DDoS attacks and legitimate traffic using real-world traffic traces. With a developed ensemble feature selection method and feature engineering, our model proves to be a good fit for DDoS attack type prediction. Our experimental results demonstrate that our proposed approach achieves high classification …


Forecasting The Future Capacities Of Superconducting Quantum Computers: Extending Moore's Law Through Machine Learning, Christopher Tam Jul 2023

Forecasting The Future Capacities Of Superconducting Quantum Computers: Extending Moore's Law Through Machine Learning, Christopher Tam

Electronic Thesis and Dissertation Repository

Quantum computing has emerged as a promising technology that can perform certain tasks exponentially faster than classical computers. Despite the potential for quantum computers to revolutionize the field of computing, the development of fault-tolerant quantum computers remains a critical challenge. Moore's Law has accurately predicted the exponential growth in the capacity of classical computers, with transistor capacity doubling roughly every year. This prediction, established in the 1960s, held true until the early 2010s. However, the emergence of quantum computers raises questions about how to predict the rate of development these technologies. This work presents a novel approach using machine learning …


Automatic Classification And Segmentation Of Patterned Martian Ground Using Deep Learning Techniques, Ruthy Brito Jun 2023

Automatic Classification And Segmentation Of Patterned Martian Ground Using Deep Learning Techniques, Ruthy Brito

Electronic Thesis and Dissertation Repository

Science autonomy onboard spacecraft can optimize image return by prioritizing downlink of meaningful data. Martian polygonally cracked ground is actively studied by planetary geologists and may be indicative of subsurface water. Filtering images containing these polygonal features can be used as a case study for science autonomy and to reduce the overhead associated with parsing through Martian surface images. This thesis demonstrates the use of deep learning techniques in the classification of Martian polygonally patterned ground from HiRISE images. Three tasks are considered, a binary classification to identify images containing polygons, multiclass classification distinguishing different polygon types and semantic segmentation …


Open-Set Source-Free Domain Adaptation In Fundus Images Analysis, Masoud Pourreza Apr 2023

Open-Set Source-Free Domain Adaptation In Fundus Images Analysis, Masoud Pourreza

Electronic Thesis and Dissertation Repository

Unsupervised domain adaptation (UDA) is crucial in medical image analysis where only the source domain data is labeled. There is a lot of emphasis on the closed-set paradigm in UDA, where the label space is assumed to be the same in all domains. However, medical imaging often has an open-world scenario where the source domain has a limited number of disease categories and the target domain has unknown distinct classes. Also, maintaining the privacy of patients is a crucial aspect of medical research and practice. In this work, we shed light on the Open-Set Domain Adaptation (OSDA) setting on fundus …


Behavioral Biometrics-Based Continuous User Authentication, Sanket Vilas Salunke Dec 2022

Behavioral Biometrics-Based Continuous User Authentication, Sanket Vilas Salunke

Electronic Thesis and Dissertation Repository

The field of cybersecurity is exploring new ways to defend against cyber-attacks, including a technique called continuous user authentication. This method uses keystroke (typing) data to continuously match the user's typing pattern with patterns previously recorded using artificial intelligence (AI) to identify the user. While this approach has the potential to improve security, it also has some challenges, including the time it takes to register a user, the performance of machine learning algorithms on real-world data, and latency within the system. In this study, the researchers proposed solutions to these issues by using transfer learning to reduce user registration time, …


Anonymization & Generation Of Network Packet Datasets Using Deep Learning, Spencer K. Vecile Aug 2022

Anonymization & Generation Of Network Packet Datasets Using Deep Learning, Spencer K. Vecile

Electronic Thesis and Dissertation Repository

Corporate networks are constantly bombarded by malicious actors trying to gain access. The current state of the art in protecting networks is deep learning-based intrusion detection systems (IDS). However, for an IDS to be effective it needs to be trained on a good dataset. The best datasets for training an IDS are real data captured from large corporate networks. Unfortunately, companies cannot release their network data due to privacy concerns creating a lack of public cybersecurity data. In this thesis I take a novel approach to network dataset anonymization using character-level LSTM models to learn the characteristics of a dataset; …


Deep Learning For Load Forecasting With Smart Meter Data: Online And Federated Learning, Mohammad Navid Fekri Apr 2022

Deep Learning For Load Forecasting With Smart Meter Data: Online And Federated Learning, Mohammad Navid Fekri

Electronic Thesis and Dissertation Repository

Electricity load forecasting has been attracting increasing attention because of its importance for energy management, infrastructure planning, and budgeting. In recent years, the proliferation of smart meters has created new opportunities for forecasting on the building and even individual household levels. Machine learning (ML) has achieved great successes in this domain; however, conventional ML techniques require data transfer to a centralized location for model training, therefore, increasing network traffic and exposing data to privacy and security risks. Also, traditional approaches employ offline learning, which means that they are only trained once and miss out on the possibility to learn from …


Learning Analytics For The Formative Assessment Of New Media Skills, Negar Shabihi Mar 2022

Learning Analytics For The Formative Assessment Of New Media Skills, Negar Shabihi

Electronic Thesis and Dissertation Repository

Recent theories of education have shifted learning environments towards student-centred education. Also, the advancement of technology and the need for skilled individuals in different areas have led to the introduction of new media skills. Along with new pedagogies and content, these changes require new forms of assessment. However, assessment as the core of learning has not been modified as much as other educational aspects. Hence, much attention is required to develop assessment methods based on current educational requirements. To address this gap, we have implemented two data-driven systematic literature reviews to recognize the existing state of the field in the …


Deep Learning For High-Impedance Fault Detection And Classification, Khushwant Rai Aug 2021

Deep Learning For High-Impedance Fault Detection And Classification, Khushwant Rai

Electronic Thesis and Dissertation Repository

High-Impedance Faults (HIFs) are a hazard to public safety but are difficult to detect because of their low current amplitude and diverse characteristics. Supervised machine learning techniques have shown great success in HIF detection; however, these approaches rely on resource-intensive signal processing techniques and fail in presence of non-HIF disturbances and even for scenarios not included in training data. This thesis leverages unsupervised learning and proposes a Convolutional Autoencoder framework for HIF Detection (CAE-HIFD). In CAE-HIFD, Convolutional Autoencoder learns only from HIF signals by employing cross-correlation; consequently, eliminating the need for diverse non-HIF scenarios in training. Furthermore, this thesis proposes …


Deep Neural Networks For Human Activity Recognition With Wearable Sensors, Davoud Gholamiangonabadi Apr 2021

Deep Neural Networks For Human Activity Recognition With Wearable Sensors, Davoud Gholamiangonabadi

Electronic Thesis and Dissertation Repository

Human Activity Recognition (HAR) has been attracting significant research attention because of a wide range of applications from healthcare to security. Recently, deep learning approaches have demonstrated great success in the HAR area. However, these models are often evaluated on the same subjects as those used to train the model; thus, the provided accuracy estimates do not pertain to new subjects. Consequently, this thesis examines the generalization capability of different machine learning architectures using Leave-One-Subject-Out Cross-Validation (LOSOCV) and then proposes a personalized model. The accuracy is improved by considering two feature selection directions, time- and frequency-domain, and by dynamically selecting …


Inverse Mapping Of Generative Adversarial Networks, Nicky Bayat Nov 2020

Inverse Mapping Of Generative Adversarial Networks, Nicky Bayat

Electronic Thesis and Dissertation Repository

Generative adversarial networks (GANs) synthesize realistic samples (image, audio, video, etc.) from a random latent vector. While many studies have explored various training configurations and architectures for GANs, the problem of inverting a generative model to extract latent vectors of given input images/audio has been inadequately investigated. Although there is exactly one generated output per given random vector, the mapping from an image/audio to its recovered latent vector can have more than one solution. We train a deep residual neural network (ResNet18) architecture to recover a latent vector for a given target that can be used to generate a face …


Machine Learning Prediction Of Shear Capacity Of Steel Fiber Reinforced Concrete, Wassim Ben Chaabene Nov 2020

Machine Learning Prediction Of Shear Capacity Of Steel Fiber Reinforced Concrete, Wassim Ben Chaabene

Electronic Thesis and Dissertation Repository

The use of steel fibers for concrete reinforcement has been growing in recent years owing to the improved shear strength and post-cracking toughness imparted by fiber inclusion. Yet, there is still lack of design provisions for steel fiber-reinforced concrete (SFRC) in building codes. This is mainly due to the complex shear transfer mechanism in SFRC. Existing empirical equations for SFRC shear strength have been developed with relatively limited data examples, making their accuracy restricted to specific ranges. To overcome this drawback, the present study suggests novel machine learning models based on artificial neural network (ANN) and genetic programming (GP) to …


A New Approach For Homomorphic Encryption With Secure Function Evaluation On Genomic Data, Mounika Pratapa Aug 2020

A New Approach For Homomorphic Encryption With Secure Function Evaluation On Genomic Data, Mounika Pratapa

Electronic Thesis and Dissertation Repository

Additively homomorphic encryption is a public-key primitive allowing a sum to be computed on encrypted values. Although limited in functionality, additive schemes have been an essential tool in the private function evaluation toolbox for decades. They are typically faster and more straightforward to implement relative to their fully homomorphic counterparts, and more efficient than garbled circuits in certain applications. This thesis presents a novel method for extending the functionality of additively homomorphic encryption to allow the private evaluation of functions of restricted domain. Provided the encrypted sum falls within the restricted domain, the function can be homomorphically evaluated “for free” …


Ontology-Driven Semantic Data Integration In Open Environment, Islam M. Ali Aug 2020

Ontology-Driven Semantic Data Integration In Open Environment, Islam M. Ali

Electronic Thesis and Dissertation Repository

Collaborative intelligence in the context of information management can be defined as "A shared intelligence that results from the collaboration between various information systems". In open environments, these collaborating information systems can be heterogeneous, dynamic and loosely-coupled. Information systems in open environment can also possess a certain degree of autonomy. The integration of data residing in various heterogeneous information systems is essential in order to drive the intelligence efficiently and accurately. Because of the heterogeneous, loosely-coupled, and dynamic nature of open environment, the integration between these information systems in the data level is not efficient. Several approaches and models have …


Terramechanics And Machine Learning For The Characterization Of Terrain, Bryan W. Southwell Aug 2020

Terramechanics And Machine Learning For The Characterization Of Terrain, Bryan W. Southwell

Electronic Thesis and Dissertation Repository

An instrumented rover wheel can collect vast amounts of data about a planetary surface. Planetary surfaces are changed by complex geological processes which can be better understood with an abundance of surface data and the use of terramechanics. Identifying terrain parameters such as cohesion and angle of friction hold importance for both the rover driver and the planetary scientist. Knowledge of terrain characteristics can warn of unsafe terrain and flag potential interesting scientific sites. The instrumented wheel in this research utilizes a pressure pad to sense load and sinkage, a string potentiometer to measure slip, and records motor current draw. …


Optimized Machine Learning Models Towards Intelligent Systems, Mohammadnoor Ahmad Mohammad Injadat Jul 2020

Optimized Machine Learning Models Towards Intelligent Systems, Mohammadnoor Ahmad Mohammad Injadat

Electronic Thesis and Dissertation Repository

The rapid growth of the Internet and related technologies has led to the collection of large amounts of data by individuals, organizations, and society in general [1]. However, this often leads to information overload which occurs when the amount of input (e.g. data) a human is trying to process exceeds their cognitive capacities [2]. Machine learning (ML) has been proposed as one potential methodology capable of extracting useful information from large sets of data [1]. This thesis focuses on two applications. The first is education, namely e-Learning environments. Within this field, this thesis proposes different optimized ML ensemble models to …


A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki Jan 2020

A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki

Electronic Thesis and Dissertation Repository

Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data interaction, and …


Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo Dec 2019

Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo

Electronic Thesis and Dissertation Repository

Network virtualization has become a key approach for Network Service Providers (NSPs) to mitigate the challenge of the continually increasing demands for network services. Tightly coupled with their software components, legacy network devices are difficult to upgrade or modify to meet the dynamically changing end-user needs. To virtualize their infrastructure and mitigate those challenges, NSPs have started to adopt Software Defined Networking (SDN) and Network Function Virtualization (NFV). To this end, this thesis addresses the challenges faced on the road of transforming the legacy networking infrastructure to a more dynamic and agile virtualized environment to meet the rapidly increasing demand …


Cluster-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian Dec 2019

Cluster-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian

Electronic Thesis and Dissertation Repository

Smart meter popularity has resulted in the ability to collect big energy data and has created opportunities for large-scale energy forecasting. Machine Learning (ML) techniques commonly used for forecasting, such as neural networks, involve computationally intensive training typically with data from a single building/group to predict future consumption for that same building/group. With hundreds of thousands of smart meters, it becomes impractical or even infeasible to individually train a model for each meter. Consequently, this paper proposes Cluster-Based Chained Transfer Learning (CBCTL), an approach for building neural network-based models for many meters by taking advantage of already trained models through …


Classifying Appliances Operation Modes Using Dynamic Time Warping (Dtw) And K Nearest Neighbors (Knn), Abdelkareem M. Jaradat Aug 2019

Classifying Appliances Operation Modes Using Dynamic Time Warping (Dtw) And K Nearest Neighbors (Knn), Abdelkareem M. Jaradat

Electronic Thesis and Dissertation Repository

In the Smart Grid environment, the advent of intelligent measuring devices facilitates monitoring appliance electricity consumption. This data can be used in applying Demand Response (DR) in residential houses through data analytics, and developing data mining techniques. In this research, we introduce a smart system approach that is applied to user's disaggregated power consumption data. This system encourages the users to apply DR by changing their behaviour of using heavier operation modes to lighter modes, and by encouraging users to shift their usages to off-peak hours. First, we apply Cross Correlation to detect times of the occurrences when an appliance …


Quantifying The Outcomes Of A Virtual Reality (Vr)-Based Gamified Neck Rehabilitation, Shahan Salim Aug 2019

Quantifying The Outcomes Of A Virtual Reality (Vr)-Based Gamified Neck Rehabilitation, Shahan Salim

Electronic Thesis and Dissertation Repository

Neck pain is a major global public health concern and adds a significant financial burden to both the healthcare system as well as people suffering from it. Additionally, it presents measurement and evaluation challenges for clinicians as well as adherence challenges and treatment barriers for the patients. We have developed a virtual reality (VR)-based video game that can be used to capture outcomes that may aid in the assessment and treatment of neck pain. We investigated: (i) performance metrics of overall accuracy, accuracy based on movement difficulty, duration, and total envelope of movement; (ii) stability across sessions; (iii) accuracy across …


Adaptation Of A Deep Learning Algorithm For Traffic Sign Detection, Jose Luis Masache Narvaez Jul 2019

Adaptation Of A Deep Learning Algorithm For Traffic Sign Detection, Jose Luis Masache Narvaez

Electronic Thesis and Dissertation Repository

Traffic signs detection is becoming increasingly important as various approaches for automation using computer vision are becoming widely used in the industry. Typical applications include autonomous driving systems, mapping and cataloging traffic signs by municipalities. Convolutional neural networks (CNNs) have shown state of the art performances in classification tasks, and as a result, object detection algorithms based on CNNs have become popular in computer vision tasks. Two-stage detection algorithms like region proposal methods (R-CNN and Faster R-CNN) have better performance in terms of localization and recognition accuracy. However, these methods require high computational power for training and inference that make …


Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo Jun 2019

Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo

Electronic Thesis and Dissertation Repository

The enormous development in the connectivity among different type of networks poses significant concerns in terms of privacy and security. As such, the exponential expansion in the deployment of cloud technology has produced a massive amount of data from a variety of applications, resources and platforms. In turn, the rapid rate and volume of data creation in high-dimension has begun to pose significant challenges for data management and security. Handling redundant and irrelevant features in high-dimensional space has caused a long-term challenge for network anomaly detection. Eliminating such features with spectral information not only speeds up the classification process, but …


Recurrent Neural Network Architectures Toward Intrusion Detection, Wafaa Anani Aug 2018

Recurrent Neural Network Architectures Toward Intrusion Detection, Wafaa Anani

Electronic Thesis and Dissertation Repository

Recurrent Neural Networks (RNN) show a remarkable result in sequence learning, particularly in architectures with gated unit structures such as Long Short-term Memory (LSTM). In recent years, several permutations of LSTM architecture have been proposed mainly to overcome the computational complexity of LSTM. In this dissertation, a novel study is presented that will empirically investigate and evaluate LSTM architecture variants such as Gated Recurrent Unit (GRU), Bi-Directional LSTM, and Dynamic-RNN for LSTM and GRU specifically on detecting network intrusions. The investigation is designed to identify the learning time required for each architecture algorithm and to measure the intrusion prediction accuracy. …


Resource Brokering In Grid Computing, Adrian T. Bienkowski May 2018

Resource Brokering In Grid Computing, Adrian T. Bienkowski

Electronic Thesis and Dissertation Repository

Grid Computing has emerged in the academia and evolved towards the bases of what is currently known as Cloud Computing and Internet of Things (IoT). The vast collection of resources that provide the nature for Grid Computing environment is very complex; multiple administrative domains control access and set policies to the shared computing resources. It is a decentralized environment with geographically distributed computing and storage resources, where each computing resource can be modeled as an autonomous computing entity, yet collectively can work together. This is a class of Cooperative Distributed Systems (CDS). We extend this by applying characteristic of open …


Efficient Alignment Algorithms For Dna Sequencing Data, Nilesh Vinod Khiste Jan 2018

Efficient Alignment Algorithms For Dna Sequencing Data, Nilesh Vinod Khiste

Electronic Thesis and Dissertation Repository

The DNA Next Generation Sequencing (NGS) technologies produce data at a low cost, enabling their application to many ambitious fields such as cancer research, disease control, personalized medicine etc. However, even after a decade of research, the modern aligners and assemblers are far from providing efficient and error free genome alignments and assemblies respectively. This is due to the inherent nature of the genome alignment and assembly problem, which involves many complexities. Many algorithms to address this problem have been proposed over the years, but there still is a huge scope for improvement in this research space.

Many new genome …


Optimal Decomposition Strategy For Tree Edit Distance, Shaofeng Jiang Dec 2017

Optimal Decomposition Strategy For Tree Edit Distance, Shaofeng Jiang

Electronic Thesis and Dissertation Repository

An ordered labeled tree is a tree where the left-to-right order among siblings is significant. Given two ordered labeled trees, the edit distance between them is the minimum cost edit operations that convert one tree to the other.

In this thesis, we present an algorithm for the tree edit distance problem by using the optimal tree decomposition strategy. By combining the vertical compression of trees with optimal decomposition we can significantly reduce the running time of the algorithm. We compare our method with other methods both theoretically and experimentally. The test results show that our strategies on compressed trees are …


Bim Assisted Design Process Automation For Pre-Engineered Buildings (Peb), Mohammad Delavar Feb 2017

Bim Assisted Design Process Automation For Pre-Engineered Buildings (Peb), Mohammad Delavar

Electronic Thesis and Dissertation Repository

The effective adoption and implementation of Building Information Modeling (BIM) is still challenging for the construction industry. However, studies and reports show a significant increase in the rate of BIM implementation and adoption in mainstream construction activities over the last five years. In contrast, Pre-Engineered Building (PEB) construction, a specialized construction system which provides a very efficient approach for construction of primarily industrial buildings, has not seen the same uptake in BIM implementation and adoption. The thesis reviews the benefits and the main applications of BIM for the PEB industry as well as challenges of its practical implementation. To facilitate …


Webgl-Based Simulation Of Bone Removal In Surgical Orthopeadic Procedures, Arezoo Tony Aug 2016

Webgl-Based Simulation Of Bone Removal In Surgical Orthopeadic Procedures, Arezoo Tony

Electronic Thesis and Dissertation Repository

The effective role of virtual reality simulators in surgical operations has been demonstrated during the last decades. The proposed work has been done to give a perspective of the actual orthopeadic surgeries such as a total shoulder arthroplasty with low incidence and visibility of the operation to the surgeon. The research in this thesis is focused on the design and implementation of a web-based graphical feedback for a total shoulder arthroplasty (TSA) surgery. For portability of the simulation and powerful 3D programming features, WebGL is being applied. To simulate the reaming process of the shoulder bone, multiple steps has been …


Virtual Reality Simulator For Training In Myringotomy With Tube Placement, Caiwen Huang Apr 2016

Virtual Reality Simulator For Training In Myringotomy With Tube Placement, Caiwen Huang

Electronic Thesis and Dissertation Repository

Myringotomy refers to a surgical incision in the eardrum, and it is often followed by ventilation tube placement to treat middle-ear infections. The procedure is difficult to learn; hence, the objectives of this work were to develop a virtual-reality training simulator, assess its face and content validity, and implement quantitative performance metrics and assess construct validity.

A commercial digital gaming engine (Unity3D) was used to implement the simulator with support for 3D visualization of digital ear models and support for major surgical tasks. A haptic arm co-located with the stereo scene was used to manipulate virtual surgical tools and to …