Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Wright State University

Discipline
Keyword
Publication Year
File Type

Articles 1 - 30 of 1189

Full-Text Articles in Engineering

Additively Manufactured Polymeric Surface-Based Lattice Structures For Vibration Attenuation, Imabin Kelvin Ekpelu Jan 2023

Additively Manufactured Polymeric Surface-Based Lattice Structures For Vibration Attenuation, Imabin Kelvin Ekpelu

Browse all Theses and Dissertations

The focus of this study was to select triply periodic minimal surface (TPMS) structures made of 3D-printed polymers. The primary variables in this study were: TPMS shape, lattice volume ratio, and lattice material. Vibration absorption was characterized by damping ratio via transmissibility at the system’s natural frequency. The vibration testing was performed using an electro-dynamic shaker, a known mass, an input/control accelerometer, and an output/response accelerometer. The 3D-printed absorber/lattice was mounted to the shaker baseplate and a mass will be mounted on top of the absorber. One accelerometer will be mounted to the shaker baseplate and the other will be …


Friend Or Foe? The Role Of Transforming Growth Factor-Β (Tgfβ) Signaling In Calcineurin Inhibitor-Induced Renal Damage, Adaku Uwe Jan 2023

Friend Or Foe? The Role Of Transforming Growth Factor-Β (Tgfβ) Signaling In Calcineurin Inhibitor-Induced Renal Damage, Adaku Uwe

Browse all Theses and Dissertations

With its incorporation into clinical practice in the early 1980s, the class of pharmacological agents known as calcineurin inhibitors (CNIs) quickly became the cornerstone of immunosuppressive therapy post-organ transplantation. However, its use is limited by irreversible kidney damage in the form of renal fibrosis. The molecular mechanism by which CNIs induce renal fibrosis remains to be better understood, and to date, there are no specific therapeutic strategies to mitigate this damage. This dilemma presents a critical need to explain mechanisms by which CNIs cause renal damage. Kidneys of patients on chronic CNI therapy show increased expression of the proinflammatory cytokine …


Icing Mitigation Via High-Pressure Membrane Dehumidification In An Aircraft Thermal Management, Danielle D. Hollon Jan 2023

Icing Mitigation Via High-Pressure Membrane Dehumidification In An Aircraft Thermal Management, Danielle D. Hollon

Browse all Theses and Dissertations

Icing, or the formation of ice from water via freezing or water vapor via desublimation, is a phenomenon that commonly occurs within air cycle-based refrigeration systems and requires thermal control that limits system performance. In aircraft applications icing frequently occurs in the heat exchangers and turbine(s) that are part of the air cycle machine, the refrigeration unit of the environmental control system. Traditionally, water vapor is removed from an air cycle machine via condensing in a heat exchanger and subsequent high-pressure water separation. This approach is not capable of removing all of the vapor present at low altitude conditions, corresponding …


Semantics-Driven Abstractive Document Summarization, Amanuel Alambo Jan 2022

Semantics-Driven Abstractive Document Summarization, Amanuel Alambo

Browse all Theses and Dissertations

The evolution of the Web over the last three decades has led to a deluge of scientific and news articles on the Internet. Harnessing these publications in different fields of study is critical to effective end user information consumption. Similarly, in the domain of healthcare, one of the key challenges with the adoption of Electronic Health Records (EHRs) for clinical practice has been the tremendous amount of clinical notes generated that can be summarized without which clinical decision making and communication will be inefficient and costly. In spite of the rapid advances in information retrieval and deep learning techniques towards …


Behavior Of 3d Printed Polymeric Triply Periodic Minimal Surface (Tpms) Cellular Structures Under Low Velocity Impact Loads, Jesse James Leiffer Jan 2022

Behavior Of 3d Printed Polymeric Triply Periodic Minimal Surface (Tpms) Cellular Structures Under Low Velocity Impact Loads, Jesse James Leiffer

Browse all Theses and Dissertations

Surface-based lattice structures such as triply periodic minimal surface (TPMS) lattices are lightweight structures that are widely being investigated for applications in automotive, aerospace, military, railway, and naval structures. Due to the recent advent of three-dimensional (3D) printing (3DP) technologies, architected cellular materials such as surface- or strut-based periodic lattice cell structures have emerged as a unique class of lightweight metamaterials. These materials possess enhanced strength to weight ratio, high stiffness, exceptional capabilities in reducing noise and vibration, insulating heat, and effective impact energy absorption. Understanding the impact behavior of such materials are important so that they can be reliably …


Building An Understanding Of Human Activities In First Person Video Using Fuzzy Inference, Bradley A. Schneider Jan 2022

Building An Understanding Of Human Activities In First Person Video Using Fuzzy Inference, Bradley A. Schneider

Browse all Theses and Dissertations

Activities of Daily Living (ADL’s) are the activities that people perform every day in their home as part of their typical routine. The in-home, automated monitoring of ADL’s has broad utility for intelligent systems that enable independent living for the elderly and mentally or physically disabled individuals. With rising interest in electronic health (e-Health) and mobile health (m-Health) technology, opportunities abound for the integration of activity monitoring systems into these newer forms of healthcare. In this dissertation we propose a novel system for describing ’s based on video collected from a wearable camera. Most in-home activities are naturally defined by …


Reconfigurable Array Control Via Convolutional Neural Networks, Garrett A. Harris Jan 2022

Reconfigurable Array Control Via Convolutional Neural Networks, Garrett A. Harris

Browse all Theses and Dissertations

A method for the beam forming control of an array of reconfigurable antennas is presented. The method consists of using two parallel convolutional neural networks (CNNs) to analyze a desired radiation pattern image, or mask, and provide a suggestion for the reconfigurable element state, array shape, and steering weights necessary to obtain the radiation pattern. This research compares beam forming systems designed for three distinct element types: a patch antenna, a reconfigurable square spiral antenna restricted to a single reconfigurable state, and the fully reconfigurable square spiral. The parametric sweeps for the design of the CNNs are presented along with …


Unit Circle Roots Based Sensor Array Signal Processing, Jared P. Smith Jan 2022

Unit Circle Roots Based Sensor Array Signal Processing, Jared P. Smith

Browse all Theses and Dissertations

As technology continues to rapidly evolve, the presence of sensor arrays and the algorithms processing the data they generate take an ever-increasing role in modern human life. From remote sensing to wireless communications, the importance of sensor signal processing cannot be understated. Capon's pioneering work on minimum variance distortionless response (MVDR) beamforming forms the basis of many modern sensor array signal processing (SASP) algorithms. In 2004, Steinhardt and Guerci proved that the roots of the polynomial corresponding to the optimal MVDR beamformer must lie on the unit circle, but this result was limited to only the MVDR. This dissertation contains …


A Solder-Defined Computer Architecture For Backdoor And Malware Resistance, Marc W. Abel Jan 2022

A Solder-Defined Computer Architecture For Backdoor And Malware Resistance, Marc W. Abel

Browse all Theses and Dissertations

This research is about securing control of those devices we most depend on for integrity and confidentiality. An emerging concern is that complex integrated circuits may be subject to exploitable defects or backdoors, and measures for inspection and audit of these chips are neither supported nor scalable. One approach for providing a “supply chain firewall” may be to forgo such components, and instead to build central processing units (CPUs) and other complex logic from simple, generic parts. This work investigates the capability and speed ceiling when open-source hardware methodologies are fused with maker-scale assembly tools and visible-scale final inspection.

The …


Modeling The Tribo-Dynamic Behavior Of Roller Contact, Ali Kolivand Jan 2022

Modeling The Tribo-Dynamic Behavior Of Roller Contact, Ali Kolivand

Browse all Theses and Dissertations

This study proposes dynamic modeling of lubricated rolling contact and a numerical sub-model for fatigue life prediction of rollers under starved lubrication conditions. Excitation caused by surface defects in rolling disks is numerically calculated and used as a metric in predicting surface pitting failure occurrence. Surface topography of mating surfaces is used as input to the model for determining maximum acceleration, approach velocity, and approach distance of rollers in presence of pits (defects). Resultant bearing force, contacting force versus approach distance are generated and compared for different pit sizes, developing an accurate tool for design purposes. Maximum acceleration and displacement …


Simulation Of Residual Stress Generation In Additive Manufacturing Of Complex Lattice Geometries, Katie Sue Bruggeman Jan 2022

Simulation Of Residual Stress Generation In Additive Manufacturing Of Complex Lattice Geometries, Katie Sue Bruggeman

Browse all Theses and Dissertations

Residual stresses developed during additive manufacturing (AM) can influence the mechanical performance of structural components in their intended applications. In this study, thermomechanical residual stress simulations of the laser powder bed fusion (LPBF) process are conducted for both simplified (plate and cube-shaped) geometries as well as five complex lattice geometries fabricated with Inconel 718. These simulations are conducted with the commercial software package Simufact Additive©, which uses a non-linear finite element analysis and layer-by-layer averaging approach in determining residual stresses. To verify the efficacy of the Simufact Additive© simulations, numerical results for the plate and cube-shape geometries are analyzed for …


Cmos Wide Tuning Gilbert Mixer With Controllable If Bandwidth In Upcoming Rf Front End For Multi-Band Multi-Standard Applications, Jianfeng Ren Jan 2022

Cmos Wide Tuning Gilbert Mixer With Controllable If Bandwidth In Upcoming Rf Front End For Multi-Band Multi-Standard Applications, Jianfeng Ren

Browse all Theses and Dissertations

The current global system for mobile communications, wireless local area, Bluetooth, and ultra-wideband demands a multi-band/multi-standard RF front end that can access all the available bandwidth specifications. Trade-offs occur between power consumption, noise figure, and linearity in CMOS Gilbert mixer wide tuning designs. Besides, it is preferable to have a constant IF bandwidth for different gain settings as the bandwidth varies with the load impedance when an RF receiver is tuned to a higher frequency. My dissertation consists of three parts. First, a tunable constant IF bandwidth Gilbert mixer is introduced for multi-band standard wireless applications such as 802.11 a/b/g …


Demonstration Of High-Temperature Operation Of Beta-Gallium Oxide (Β-Ga2o3) Metal-Oxide-Semiconductor Field Effect Transistors (Mosfet) With Electrostatic Model In Comsol, Nicholas Paul Sepelak Jan 2022

Demonstration Of High-Temperature Operation Of Beta-Gallium Oxide (Β-Ga2o3) Metal-Oxide-Semiconductor Field Effect Transistors (Mosfet) With Electrostatic Model In Comsol, Nicholas Paul Sepelak

Browse all Theses and Dissertations

β-Ga2O3 is a robust semiconductor material set with a large band gap of ~4.8 eV, low intrinsic carrier concentration, and high melting point that offers a stable platform for operating electronic devices at high temperatures and extreme environments. The first half of this thesis will cover the fabrication of a fixture and packaging to test electronic components at high temperatures. Then it will highlight the characterization of β-Ga2O3 field effect transistors from room temperature (RT) up to 500 °C. The devices, fabricated with Ni/Au and Al2O3 gate metal-oxide-semiconductor (MOS), demonstrate stable operation up to 500 oC. The tested device shows …


A Design Thinking Framework For Human-Centric Explainable Artificial Intelligence In Time-Critical Systems, Paul Benjamin Stone Jan 2022

A Design Thinking Framework For Human-Centric Explainable Artificial Intelligence In Time-Critical Systems, Paul Benjamin Stone

Browse all Theses and Dissertations

Artificial Intelligence (AI) has seen a surge in popularity as increased computing power has made it more viable and useful. The increasing complexity of AI, however, leads to can lead to difficulty in understanding or interpreting the results of AI procedures, which can then lead to incorrect predictions, classifications, or analysis of outcomes. The result of these problems can be over-reliance on AI, under-reliance on AI, or simply confusion as to what the results mean. Additionally, the complexity of AI models can obscure the algorithmic, data and design biases to which all models are subject, which may exacerbate negative outcomes, …


Automatically Generating Searchable Fingerprints For Wordpress Plugins Using Static Program Analysis, Chuang Li Jan 2022

Automatically Generating Searchable Fingerprints For Wordpress Plugins Using Static Program Analysis, Chuang Li

Browse all Theses and Dissertations

This thesis introduces a novel method to automatically generate fingerprints for WordPress plugins. Our method performs static program analysis using Abstract Syntax Trees (ASTs) of WordPress plugins. The generated fingerprints can be used for identifying these plugins using search engines, which have support critical applications such as proactively identifying web servers with vulnerable WordPress plugins. We have used our method to generate fingerprints for over 10,000 WordPress plugins and analyze the resulted fingerprints. Our fingerprints have also revealed 453 websites that are potentially vulnerable. We have also compared fingerprints for vulnerable plugins and those for vulnerability-free plugins.


A Digital Twin For Synchronized Multi-Laser Powder Bed Fusion (M-Lpbf) Additive Manufacturing, Shayna Petitjean Jan 2022

A Digital Twin For Synchronized Multi-Laser Powder Bed Fusion (M-Lpbf) Additive Manufacturing, Shayna Petitjean

Browse all Theses and Dissertations

One of the technological challenges in the widespread application of additive manufacturing is the formation of undesired material microstructure and defects. Specifically, in metal additive manufacturing, the microstructural formation of columnar grains in Ti-6Al-4V is common and results in anisotropic mechanical properties and a reduction in properties such as ductility and endurance limit. This work presents the application of hexagonal and circular arrays of synchronized lasers to alter the microstructure of Ti-6Al-4V in favor of equiaxed grains. An anisotropic heat transfer model obtains the temporal/spatial temperature distribution and constructs the solidification map for various process parameters, including laser power, laser …


Development Of Improved Cfd Tools For The Optimization Of A Scramjet Engine, Francis A. Centlivre Jan 2022

Development Of Improved Cfd Tools For The Optimization Of A Scramjet Engine, Francis A. Centlivre

Browse all Theses and Dissertations

In the present work, a plugin has been developed for use with the DoD HPCMP CREATE-AV Kestrel multi-physics solver that adds volumetric source terms to the energy equation. These source terms model the heat released due to combustion, but are much more computationally efficient than a full chemistry model. A thrust-based optimization study was then carried out under the control of Sandia National Laboratories' Dakota toolkit. Dakota was allowed to control the amount of heat added to three regions of the scramjet combustor. The plugin was then extended to consider ignition delay time. By comparing ignition delay time to dwell …


Novel Natural Language Processing Models For Medical Terms And Symptoms Detection In Twitter, Farahnaz Golrooy Motlagh Jan 2022

Novel Natural Language Processing Models For Medical Terms And Symptoms Detection In Twitter, Farahnaz Golrooy Motlagh

Browse all Theses and Dissertations

This dissertation focuses on disambiguation of language use on Twitter about drug use, consumption types of drugs, drug legalization, ontology-enhanced approaches, and prediction analysis of data-driven by developing novel NLP models. Three technical aims comprise this work: (a) leveraging pattern recognition techniques to improve the quality and quantity of crawled Twitter posts related to drug abuse; (b) using an expert-curated, domain-specific DsOn ontology model that improve knowledge extraction in the form of drug-to-symptom and drug-to-side effect relations; and (c) modeling the prediction of public perception of the drug’s legalization and the sentiment analysis of drug consumption on Twitter. We collected …


A Cloud Computing-Based Dashboard For The Visualization Of Motivational Interviewing Metrics, E Jinq Heng Jan 2022

A Cloud Computing-Based Dashboard For The Visualization Of Motivational Interviewing Metrics, E Jinq Heng

Browse all Theses and Dissertations

Motivational Interviewing (MI) is an evidence-based brief interventional technique that has been demonstrated to be effective in triggering behavior change in patients. To facilitate behavior change, healthcare practitioners adopt a nonconfrontational, empathetic dialogic style, a core component of MI. Despite its advantages, MI has been severely underutilized mainly due to the cognitive overload on the part of the MI dialogue evaluator, who has to assess MI dialogue in real-time and calculate MI characteristic metrics (number of open-ended questions, close-ended questions, reflection, and scale-based sentences) for immediate post-session evaluation both in MI training and clinical settings. To automate dialogue assessment and …


Deep Understanding Of Technical Documents : Automated Generation Of Pseudocode From Digital Diagrams & Analysis/Synthesis Of Mathematical Formulas, Nikolaos Gkorgkolis Jan 2022

Deep Understanding Of Technical Documents : Automated Generation Of Pseudocode From Digital Diagrams & Analysis/Synthesis Of Mathematical Formulas, Nikolaos Gkorgkolis

Browse all Theses and Dissertations

The technical document is an entity that consists of several essential and interconnected parts, often referred to as modalities. Despite the extensive attention that certain parts have already received, per say the textual information, there are several aspects that severely under researched. Two such modalities are the utility of diagram images and the deep automated understanding of mathematical formulas. Inspired by existing holistic approaches to the deep understanding of technical documents, we develop a novel formal scheme for the modelling of digital diagram images. This extends to a generative framework that allows for the creation of artificial images and their …


Synthetic Aperture Ladar Automatic Target Recognizer Design And Performance Prediction Via Geometric Properties Of Targets, Jacob W. Ross Jan 2022

Synthetic Aperture Ladar Automatic Target Recognizer Design And Performance Prediction Via Geometric Properties Of Targets, Jacob W. Ross

Browse all Theses and Dissertations

Synthetic Aperture LADAR (SAL) has several phenomenology differences from Synthetic Aperture RADAR (SAR) making it a promising candidate for automatic target recognition (ATR) purposes. The diffuse nature of SAL results in more pixels on target. Optical wavelengths offers centimeter class resolution with an aperture baseline that is 10,000 times smaller than an SAR baseline. While diffuse scattering and optical wavelengths have several advantages, there are also a number of challenges. The diffuse nature of SAL leads to a more pronounced speckle effect than in the SAR case. Optical wavelengths are more susceptible to atmospheric noise, leading to distortions in formed …


Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer Jan 2022

Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer

Browse all Theses and Dissertations

Vulnerabilities in source code can be compiled for multiple processor architectures and make their way into several different devices. Security researchers frequently have no way to obtain this source code to analyze for vulnerabilities. Therefore, the ability to effectively analyze binary code is essential. Similarity detection is one facet of binary code analysis. Because source code can be compiled for different architectures, the need can arise for detecting code similarity across architectures. This need is especially apparent when analyzing firmware from embedded computing environments such as Internet of Things devices, where the processor architecture is dependent on the product and …


Printing, Characterization, And Mechanical Testing Of Additively Manufactured Refractory Metal Alloys, Brianna M. Sexton Jan 2022

Printing, Characterization, And Mechanical Testing Of Additively Manufactured Refractory Metal Alloys, Brianna M. Sexton

Browse all Theses and Dissertations

Refractory metal alloys in the tungsten molybdenum rhenium ternary system were additively manufactured using laser power bed fusion. Four ternary alloys with varying concentrations of tungsten, molybdenum, and rhenium were manufactured and manufactured again with an addition of 1 wt% hafnium carbide. Samples were heat treated to heal cracks, reduce porosity, and reduce inhomogeneity. Material microstructure was characterized before and after heat treatment using microscopy, energy dispersive x-ray spectroscopy, and electron backscatter diffraction mapping. Mechanical testing was conducted on both three-point bend specimens and compression specimens, resulting in maximum bending strengths of 677.86 MPa, and maximum compression 0.2% yield strengths …


Validating Software States Using Reverse Execution, Nathaniel Christian Boland Jan 2022

Validating Software States Using Reverse Execution, Nathaniel Christian Boland

Browse all Theses and Dissertations

A key feature of software analysis is determining whether it is possible for a program to reach a certain state. Various methods have been devised to accomplish this including directed fuzzing and dynamic execution. In this thesis we present a reverse execution engine to validate states, the Complex Emulator. The Complex Emulator seeks to validate a program state by emulating it in reverse to discover if a contradiction exists. When unknown variables are found during execution, the emulator is designed to use constraint solving to compute their values. The Complex Emulator has been tested on small assembly programs and is …


Quadrature Phase-Domain Adpll With Integrated On-Line Amplitude Locked Loop Calibration For 5g Multi-Band Applications, Xiaomeng Zhang Jan 2022

Quadrature Phase-Domain Adpll With Integrated On-Line Amplitude Locked Loop Calibration For 5g Multi-Band Applications, Xiaomeng Zhang

Browse all Theses and Dissertations

5th generation wireless systems (5G) have expanded frequency band coverage with the low-band 5G and mid-band 5G frequencies spanning 600 MHz to 4 GHz spectrum. This dissertation focuses on a microelectronic implementation of CMOS 65 nm design of an All-Digital Phase Lock Loop (ADPLL), which is a critical component for advanced 5G wireless transceivers. The ADPLL is designed to operate in the frequency bands of 600MHz-930MHz, 2.4GHz-2.8GHz and 3.4GHz-4.2GHz. Unique ADPLL sub-components include: 1) Digital Phase Frequency Detector, 2) Digital Loop Filter, 3) Channel Bank Select Circuit, and 4) Digital Control Oscillator. Integrated with the ADPLL is a 90-degree active …


Topological Hierarchies And Decomposition: From Clustering To Persistence, Kyle A. Brown Jan 2022

Topological Hierarchies And Decomposition: From Clustering To Persistence, Kyle A. Brown

Browse all Theses and Dissertations

Hierarchical clustering is a class of algorithms commonly used in exploratory data analysis (EDA) and supervised learning. However, they suffer from some drawbacks, including the difficulty of interpreting the resulting dendrogram, arbitrariness in the choice of cut to obtain a flat clustering, and the lack of an obvious way of comparing individual clusters. In this dissertation, we develop the notion of a topological hierarchy on recursively-defined subsets of a metric space. We look to the field of topological data analysis (TDA) for the mathematical background to associate topological structures such as simplicial complexes and maps of covers to clusters in …


Automatically Inferring Image Bases Of Arm32 Binaries, Daniel T. Chong Jan 2022

Automatically Inferring Image Bases Of Arm32 Binaries, Daniel T. Chong

Browse all Theses and Dissertations

Reverse engineering tools rely on the critical image base value for tasks such as correctly mapping code into virtual memory for an emulator or accurately determining branch destinations for a disassembler. However, binaries are often stripped and therefore, do not explicitly state this value. Currently available solutions for calculating this essential value generally require user input in the form of parameter configurations or manual binary analysis, thus these methods are limited by the experience and knowledge of the user. In this thesis, we propose a user-independent solution for determining the image base of ARM32 binaries and describe our implementation. Our …


Secure Authenticated Key Exchange For Enhancing The Security Of Routing Protocol For Low-Power And Lossy Networks, Sarah Mohammed Alzahrani Jan 2022

Secure Authenticated Key Exchange For Enhancing The Security Of Routing Protocol For Low-Power And Lossy Networks, Sarah Mohammed Alzahrani

Browse all Theses and Dissertations

The current Routing Protocol for Low Power and Lossy Networks (RPL) standard provides three security modes Unsecured Mode (UM), Preinstalled Secure Mode (PSM), and Authenticated Secure Mode (ASM). The PSM and ASM are designed to prevent external routing attacks and specific replay attacks through an optional replay protection mechanism. RPL's PSM mode does not support key replacement when a malicious party obtains the key via differential cryptanalysis since it considers the key to be provided to nodes during the configuration of the network. This thesis presents an approach to implementing a secure authenticated key exchange mechanism for RPL, which ensures …


Molecular Dynamics Simulation Study Of A Polymer Droplet Transport Over An Array Of Spherical Nanoparticles, Anish Thomas Jan 2022

Molecular Dynamics Simulation Study Of A Polymer Droplet Transport Over An Array Of Spherical Nanoparticles, Anish Thomas

Browse all Theses and Dissertations

This study uses molecular dynamics simulations to evaluate the dynamic behavior of a partially wetting polymer droplet driven over a nanostructured interface. We consider the bead-spring model to represent a polymeric liquid that partially wets a rough surface composed of a periodic array of spherical particles. Results show that at sufficiently small values of external force, the droplet remains pinned at the particle's surface, whereas above the threshold its motion consists of alternating periods of pinning and rapid displacements between neighboring particles. The latter process involves large periodic variation of the advancing and receding contact angles due to the attachment …


Locality Analysis Of Patched Php Vulnerabilities, Luke N. Holt Jan 2022

Locality Analysis Of Patched Php Vulnerabilities, Luke N. Holt

Browse all Theses and Dissertations

The size and complexity of modern software programs is constantly growing making it increasingly difficult to diligently find and diagnose security exploits. The ability to quickly and effectively release patches to prevent existing vulnerabilities significantly limits the exploitation of users and/or the company itself. Due to this it has become crucial to provide the capability of not only releasing a patched version, but also to do so quickly to mitigate the potential damage. In this thesis, we propose metrics for evaluating the locality between exploitable code and its corresponding sanitation API such that we can statistically determine the proximity of …