Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 14 of 14
Full-Text Articles in Engineering
A Bidirectional Deep Lstm Machine Learning Method For Flight Delay Modelling And Analysis, Desmond B. Bisandu, Irene Moulitsas
A Bidirectional Deep Lstm Machine Learning Method For Flight Delay Modelling And Analysis, Desmond B. Bisandu, Irene Moulitsas
National Training Aircraft Symposium (NTAS)
Flight delays can be prevented by providing a reference point from an accurate prediction model because predicting flight delays is a problem with a specific space. Only a few algorithms consider predicted classes' mutual correlation during flight delay classification or prediction modelling tasks. None of these existing methods works for all scenarios. Therefore, the need to investigate the performance of more models in solving the problem of flight delay is vast and rapidly increasing. This paper presents the development and evaluation of LSTM and BiLSTM models by comparing them for a flight delay prediction. The LSTM does the feature extraction …
Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle
Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle
Computer Science Faculty Publications
Web archives, such as the Internet Archive, preserve the web and allow access to prior states of web pages. We implicitly trust their versions of archived pages, but as their role moves from preserving curios of the past to facilitating present day adjudication, we are concerned with verifying the fixity of archived web pages, or mementos, to ensure they have always remained unaltered. A widely used technique in digital preservation to verify the fixity of an archived resource is to periodically compute a cryptographic hash value on a resource and then compare it with a previous hash value. If the …
A Deep Bilstm Machine Learning Method For Flight Delay Prediction Classification, Desmond B. Bisandu Phd, Irene Moulitsas Phd
A Deep Bilstm Machine Learning Method For Flight Delay Prediction Classification, Desmond B. Bisandu Phd, Irene Moulitsas Phd
Journal of Aviation/Aerospace Education & Research
This paper proposes a classification approach for flight delays using Bidirectional Long Short-Term Memory (BiLSTM) and Long Short-Term Memory (LSTM) models. Flight delays are a major issue in the airline industry, causing inconvenience to passengers and financial losses to airlines. The BiLSTM and LSTM models, powerful deep learning techniques, have shown promising results in a classification task. In this study, we collected a dataset from the United States (US) Bureau of Transportation Statistics (BTS) of flight on-time performance information and used it to train and test the BiLSTM and LSTM models. We set three criteria for selecting highly important features …
Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer
Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer
Browse all Theses and Dissertations
Vulnerabilities in source code can be compiled for multiple processor architectures and make their way into several different devices. Security researchers frequently have no way to obtain this source code to analyze for vulnerabilities. Therefore, the ability to effectively analyze binary code is essential. Similarity detection is one facet of binary code analysis. Because source code can be compiled for different architectures, the need can arise for detecting code similarity across architectures. This need is especially apparent when analyzing firmware from embedded computing environments such as Internet of Things devices, where the processor architecture is dependent on the product and …
Image Analysis Of Charged Bimodal Colloidal Systems In Microgravity., Adam J. Cecil
Image Analysis Of Charged Bimodal Colloidal Systems In Microgravity., Adam J. Cecil
Electronic Theses and Dissertations
Colloids are suspensions of two or more phases and have been topics of research for advanced, tunable materials for decades. Stabilization of colloids is typically attributed to thermodynamic mechanisms; however, recent studies have identified transport or entropic mechanisms that can potentially stabilize a thermodynamically unstable colloidal system. In this study, suspensions of silsesquioxane microparticles and zirconia nanoparticles were dispersed in a nitric acid solution and allowed to aggregate for 8-12 days in microgravity aboard the International Space Station. The suspensions were subsequently imaged periodically at 2.5x magnification. Due to the inadequacy of existing image analysis programs, the python package “Colloidspy” …
Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla
Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla
VMASC Publications
Blockchain promises to provide a distributed and decentralized means of trust among untrusted users. However, in recent years, a shift from decentrality to centrality has been observed in the most accepted Blockchain system, i.e., Bitcoin. This shift has motivated researchers to identify the cause of decentrality, quantify decentrality and analyze the impact of decentrality. In this work, we take a holistic approach to identify and quantify decentrality in Blockchain based systems. First, we identify the emergence of centrality in three layers of Blockchain based systems, namely governance layer, network layer and storage layer. Then, we quantify decentrality in these layers …
Extracting Information From Subroutines Using Static Analysis Semantics, Luke A. Burnett
Extracting Information From Subroutines Using Static Analysis Semantics, Luke A. Burnett
Browse all Theses and Dissertations
Understanding how a system component can interact with other services can take an immeasurable amount of time. Reverse engineering embedded and large systems can rely on understanding how components interact with one another. This process is time consuming and can sometimes be generalized through certain behavior.We will be explaining two such complicated systems and highlighting similarities between them. We will show that through static analysis you can capture compiler behavior and apply it to the understanding of a function, reducing the total time required to understand a component of whichever system you are learning.
Representation And Analysis Of Multi-Modal, Nonuniform Time Series Data: An Application To Survival Prognosis Of Oncology Patients In An Outpatient Setting, Jennifer Winikus
Representation And Analysis Of Multi-Modal, Nonuniform Time Series Data: An Application To Survival Prognosis Of Oncology Patients In An Outpatient Setting, Jennifer Winikus
Dissertations, Master's Theses and Master's Reports
The representation of nonuniform, multi-modal, time-limited time series data is complex and explored through the use of discrete representation, dimensionality reduction with segmentation based techniques, and with behavioral representation approaches. These explorations are done with a focus on an outpatient oncology setting with the classification and regression analysis being used for length of survival prognosis. Each decision of representation and analysis is not independent, with implications of each decision in method for how the data is represented and then which analysis technique is used. One unique aspect of the work is the use of outpatient clinical data for patients, which …
Detecting Php-Based Cross-Site Scripting Vulnerabilities Using Static Program Analysis, Steven M. Kelbley
Detecting Php-Based Cross-Site Scripting Vulnerabilities Using Static Program Analysis, Steven M. Kelbley
Browse all Theses and Dissertations
With the widespread adoption of dynamic web applications in recent years, a number of threats to the security of these applications have emerged as significant challenges for application developers. The security of developed applications has become a higher priority for both developers and their employers as cyber attacks become increasingly more prevalent and damaging. Some of the most used web application frameworks are written in PHP and have become major targets due to the large number of servers running these applications worldwide. A number of tools exist to evaluate PHP code for issues, however most of these applications are not …
A User-Oriented Network Forensic Analyser: The Design Of A High-Level Protocol Analyser, D Joy, F Li, N L. Clarke, S M. Furnell
A User-Oriented Network Forensic Analyser: The Design Of A High-Level Protocol Analyser, D Joy, F Li, N L. Clarke, S M. Furnell
Australian Digital Forensics Conference
Network forensics is becoming an increasingly important tool in the investigation of cyber and computer-assisted crimes. Unfortunately, whilst much effort has been undertaken in developing computer forensic file system analysers (e.g. Encase and FTK), such focus has not been given to Network Forensic Analysis Tools (NFATs). The single biggest barrier to effective NFATs is the handling of large volumes of low-level traffic and being able to exact and interpret forensic artefacts and their context – for example, being able extract and render application-level objects (such as emails, web pages and documents) from the low-level TCP/IP traffic but also understand how …
Robotic Swarming Without Inter-Agent Communication, Daniel Jonathan Standish
Robotic Swarming Without Inter-Agent Communication, Daniel Jonathan Standish
USF Tampa Graduate Theses and Dissertations
Many physical and algorithmic swarms utilize inter-agent communication to achieve advanced swarming behaviors. These swarms are inspired by biological swarms that can be seen throughout nature and include bee swarms, ant colonies, fish schools, and bird flocks. These biological swarms do not utilize inter-agent communication like their physical and algorithmic counterparts. Instead, organisms in nature rely on a local awareness of other swarm members that facilitates proper swarm motion and behavior. This research aims to pursue an effective swarm algorithm using only line-of-sight proximity information and no inter-agent communication. It is expected that the swarm performance will be lower than …
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Analysis Of Segmentation Algorithms For Pavement Distress Images, Allen Downey, Haris N. Koutsopoulos, Ibrahim El Sanhouri
Analysis Of Segmentation Algorithms For Pavement Distress Images, Allen Downey, Haris N. Koutsopoulos, Ibrahim El Sanhouri
Allen B. Downey
Collection and analysis of pavement distress data is an important component of any pavement‐management system. Various systems are currently under development that automate this process. They consist of appropriate hardware for the acquisition of pavement distress images and, in some cases, software for the analysis of the collected data. An important step in the automatic interpretation of images is segmentation, the process of extracting the objects of interest (distresses) from the background. We examine algorithms for segmenting pavement images and evaluate their effectiveness in separating the distresses from the background. The methods examined include the Otsu method, Kittler's method, a …
Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland
Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland
Journal of Digital Forensics, Security and Law
The ownership and use of mobile phones, Personal Digital Assistants and other hand held devices is now ubiquitous both for home and business use. The majority of these devices have a high initial cost, a relatively short period before they become obsolescent and a relatively low second hand value. As a result of this, when the devices are replaced, there are indications that they tend to be discarded. As technology has continued to develop, it has led to an increasing diversity in the number and type of devices that are available, and the processing power and the storage capacity of …