Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 56

Full-Text Articles in Computer Engineering

Brain-Inspired Spatio-Temporal Learning With Application To Robotics, Thiago André Ferreira Medeiros Dec 2023

Brain-Inspired Spatio-Temporal Learning With Application To Robotics, Thiago André Ferreira Medeiros

USF Tampa Graduate Theses and Dissertations

The human brain still has many mysteries and one of them is how it encodes information. The following study intends to unravel at least one such mechanism. For this it will be demonstrated how a set of specialized neurons may use spatial and temporal information to encode information. These neurons, called Place Cells, become active when the animal enters a place in the environment, allowing it to build a cognitive map of the environment. In a recent paper by Scleidorovich et al. in 2022, it was demonstrated that it was possible to differentiate between two sequences of activations of a …


Deep Learning-Based Automatic Stereology For High- And Low-Magnification Images, Hunter Morera Oct 2023

Deep Learning-Based Automatic Stereology For High- And Low-Magnification Images, Hunter Morera

USF Tampa Graduate Theses and Dissertations

Quantification of the true number of stained cells in specific brain regions is an important metric in many fields of biomedical research involving cell degeneration, cytotoxicology, cellular inflammation, and drug development for a wide range of neurological disorders and mental illnesses. Unbiased stereology is the current state-of-the-art method for collecting the cell count data from tissue sections. These studies require trained experts to manually focus through a z-stack of microscopy images and count (click) on a hundred or more cells per case, making this approach time consuming (~1 hour per case) and prone to human error (i.e., inter-rater variability). Thus, …


Insect Classification And Explainability From Image Data Via Deep Learning Techniques, Tanvir Hossain Bhuiyan Jun 2023

Insect Classification And Explainability From Image Data Via Deep Learning Techniques, Tanvir Hossain Bhuiyan

USF Tampa Graduate Theses and Dissertations

Since the dawn of the Industrial Revolution, humanity has always tried to make labor more efficient and automated, and this trend is only continuing in the modern digital age. With the advent of artificial intelligence (AI) techniques in the latter part of the 20th century, the speed and scale with which AI has been leveraged to automate tasks defy human imagination. Many people deeply entrenched in the technology field are genuinely intrigued and concerned about how AI may change many of the ways in which humans have been living for millennia. Only time will provide the answers. This dissertation is …


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Generative Spatio-Temporal And Multimodal Analysis Of Neonatal Pain, Md Sirajus Salekin Nov 2022

Generative Spatio-Temporal And Multimodal Analysis Of Neonatal Pain, Md Sirajus Salekin

USF Tampa Graduate Theses and Dissertations

Neonates can not express their pain like an adult person. Due to the lacking of proper muscle growth and inability to express non-verbally, it is difficult to understand their emotional status. In addition, if the neonates are under any treatment or left monitored after any major surgeries (post-operative), it is more difficult to understand their pain due to the side effect of medications and the caring system (i.e. intubated, masked face, covered body with blanket, etc.). In a clinical environment, usually, bedside nurses routinely observe the neonate and measure the pain status following any standard clinical pain scale. But current …


Preventing Variadic Function Attacks Through Argument Width Counting, Brennan Ward Oct 2022

Preventing Variadic Function Attacks Through Argument Width Counting, Brennan Ward

USF Tampa Graduate Theses and Dissertations

Format String attacks, first noted in June 2000 [1], are a type of attack in which anadversary has control of the string argument (the format string) passed to a string format function (such as printf). Such control allows the attacker to read and write arbitrary program memory. To prevent these attacks, various methodologies have been proposed, each with their own costs and benefits. I present a novel solution to this problem through argument width counting, ensuring that such format functions cannot access stack memory beyond the space where arguments were placed. Additionally, I show how this approach can be expanded …


Adaptive Multi-Scale Place Cell Representations And Replay For Spatial Navigation And Learning In Autonomous Robots, Pablo Scleidorovich Oct 2022

Adaptive Multi-Scale Place Cell Representations And Replay For Spatial Navigation And Learning In Autonomous Robots, Pablo Scleidorovich

USF Tampa Graduate Theses and Dissertations

Place cells are one of the most widely studied neurons thought to play a vital role in spatial cognition. Extensive studies show that their activity in the rodent hippocampus is highly correlated with the animal’s spatial location, forming “place fields” of smaller sizes near the dorsal pole and larger sizes near the ventral pole. Despite advances, it is yet unclear how this multi-scale representation enables navigation in complex environments.

In this dissertation, we analyze the place cell representation from a computational point of view, evaluating how multi-scale place fields impact navigation in large and cluttered environments. The objectives are to …


The Iwar Range + 21 Years: Cyber Defense Education In 2022, Joseph H. Schafer, Chris Morrell, Ray Blaine May 2022

The Iwar Range + 21 Years: Cyber Defense Education In 2022, Joseph H. Schafer, Chris Morrell, Ray Blaine

Military Cyber Affairs

Twenty-one years ago, The IWAR Range paper published by CCSC described nascent information assurance (now cybersecurity[1]) education programs and the inspiration and details for constructing cyber ranges and facilitating cyber exercises. This paper updates the previously published work by highlighting the dramatic evolution of the cyber curricula, exercise networks and ranges, influences, and environments over the past twenty years.

[1] In 2014, DoD adopted “cybersecurity” instead of “information assurance.” [34:1]


On The Reliability Of Wearable Sensors For Assessing Movement Disorder-Related Gait Quality And Imbalance: A Case Study Of Multiple Sclerosis, Steven Díaz Hernández Mar 2022

On The Reliability Of Wearable Sensors For Assessing Movement Disorder-Related Gait Quality And Imbalance: A Case Study Of Multiple Sclerosis, Steven Díaz Hernández

USF Tampa Graduate Theses and Dissertations

Approximately 33 million American adults had a movement disorder associated with medication use, ear infections, injury, or neurological disorders in 2008, with over 18 million people affected by neurological disorders worldwide. Physical therapists assist people with movement disorders by providing interventions to reduce pain, improve mobility, avoid surgeries, and prevent falls and secondary complications of neurodegenerative disorders. Current gait assessments used by physical therapists, such as the Multiple Sclerosis Walking Scale, provide only semi-quantitative data, and cannot assess walking quality in detail or describe how one’s walking quality changes over time. As a result, quantitative systems have grownas useful tools …


Analyzing Decision-Making In Robot Soccer For Attacking Behaviors, Justin Rodney Mar 2022

Analyzing Decision-Making In Robot Soccer For Attacking Behaviors, Justin Rodney

USF Tampa Graduate Theses and Dissertations

In robotics soccer, decision-making is critical to the performance of a team’s SoftwareSystem. The University of South Florida’s (USF) RoboBulls team implements behavior for the robots by using traditional methods such as analytical geometry to path plan and determine whether an action should be taken. In recent works, Machine Learning (ML) and Reinforcement Learning (RL) techniques have been used to calculate the probability of success for a pass or goal, and even train models for performing low-level skills such as traveling towards a ball and shooting it towards the goal[1, 2]. Open-source frameworks have been created for training Reinforcement Learning …


Enterprise Environment Modeling For Penetration Testing On The Openstack Virtualization Platform, Vincent Karovic Jr., Jakub Bartalos, Vincent Karovic, Michal Gregus Sep 2021

Enterprise Environment Modeling For Penetration Testing On The Openstack Virtualization Platform, Vincent Karovic Jr., Jakub Bartalos, Vincent Karovic, Michal Gregus

Journal of Global Business Insights

The article presents the design of a model environment for penetration testing of an organization using virtualization. The need for this model was based on the constantly increasing requirements for the security of information systems, both in legal terms and in accordance with international security standards. The model was created based on a specific team from the unnamed company. The virtual working environment offered the same functions as the physical environment. The virtual working environment was created in OpenStack and tested with a Linux distribution Kali Linux. We demonstrated that the virtual environment is functional and its security testable. Virtualizing …


Data-Driven Studies On Social Networks: Privacy And Simulation, Yasanka Sameera Horawalavithana Jun 2021

Data-Driven Studies On Social Networks: Privacy And Simulation, Yasanka Sameera Horawalavithana

USF Tampa Graduate Theses and Dissertations

Social media datasets are fundamental to understanding a variety of phenomena, such as epidemics, adoption of behavior, crowd management, and political uprisings. At the same time, many such datasets capturing computer-mediated social interactions are recorded nowadays by individual researchers or by organizations. However, while the need for real social graphs and the supply of such datasets are well established, the flow of data from data owners to researchers is significantly hampered by privacy risks: even when humans’ identities are removed, or data is anonymized to some extent, studies have proven repeatedly that re-identifying anonymized user identities (i.e., de-anonymization) is doable …


Efficient Hardware Constructions For Error Detection Of Post-Quantum Cryptographic Schemes, Alvaro Cintas Canto Mar 2021

Efficient Hardware Constructions For Error Detection Of Post-Quantum Cryptographic Schemes, Alvaro Cintas Canto

USF Tampa Graduate Theses and Dissertations

Quantum computers are presumed to be able to break nearly all public-key encryption algorithms used today. The National Institute of Standards and Technology (NIST) started the process of soliciting and standardizing one or more quantum computer resistant public-key cryptographic algorithms in late 2017. It is estimated that the current and last phase of the standardization process will last till 2022-2024. Among those candidates, code-based and multivariate-based cryptography are a promising solution for thwarting attacks based on quantum computers. Nevertheless, although code-based and multivariate-based cryptography, e.g., McEliece, Niederreiter, and Luov cryptosystems, have good error correction capabilities, research has shown their hardware …


Strategies In Botnet Detection And Privacy Preserving Machine Learning, Di Zhuang Mar 2021

Strategies In Botnet Detection And Privacy Preserving Machine Learning, Di Zhuang

USF Tampa Graduate Theses and Dissertations

Peer-to-peer (P2P) botnets have become one of the major threats in network security for serving as the infrastructure that responsible for various of cyber-crimes. Though a few existing work claimed to detect traditional botnets effectively, the problem of detecting P2P botnets involves more challenges. In this dissertation, we present two P2P botnet detection systems, PeerHunter and Enhanced PeerHunter. PeerHunter starts from a P2P hosts detection component. Then, it uses mutual contacts as the main feature to cluster bots into communities. Finally, it uses community behavior analysis to detect potential botnet communities and further identify bot candidates. Enhanced PeerHunter is an …


Control Of A Human Arm Robotic Unit Using Augmented Reality And Optimized Kinematics, Carlo Canezo Oct 2020

Control Of A Human Arm Robotic Unit Using Augmented Reality And Optimized Kinematics, Carlo Canezo

USF Tampa Graduate Theses and Dissertations

There are more than 350000 amputees in the US who suffer loss of functionality in their daily living activities, and roughly 100000 of them are upper arm amputees. Many of these amputees use prostheses to compensate part of their lost arm function, including power prostheses. Research on 6-7 degree of freedom powered prostheses is still relatively new, and most commercially available powered prostheses are typically limited to 1 to 3 degrees of freedom. Due to the myriad of possible options for various powered protheses from different manufacturers, each configuration is governed by a distinct control scheme typically specific to the …


Detecting Symptoms Of Chronic Obstructive Pulmonary Disease And Congestive Heart Failure Via Cough And Wheezing Sounds Using Smart-Phones And Machine Learning, Anthony Windmon Sep 2020

Detecting Symptoms Of Chronic Obstructive Pulmonary Disease And Congestive Heart Failure Via Cough And Wheezing Sounds Using Smart-Phones And Machine Learning, Anthony Windmon

USF Tampa Graduate Theses and Dissertations

Chronic Obstructive Pulmonary Disease (COPD) and Congestive Heart Failure (CHF) are progressive disorders, and major health concerns among today’s aging population. COPD causes a large mucus buildup in the lungs, leading to chronic cough and difficulty to breathe. CHF causes fluid buildup in the lower lungs due to the failing heart, causing cough and difficulty to breath. People who are clinically diagnosed with COPD or CHF are expected to regularly monitor their symptoms and follow complex medical recommendations in an effort to prevent exacerbation. In this dissertation, we elaborate upon three different machine learning based techniques that we developed for …


Machine Learning For The Internet Of Things: Applications, Implementation, And Security, Vishalini Laguduva Ramnath Jul 2020

Machine Learning For The Internet Of Things: Applications, Implementation, And Security, Vishalini Laguduva Ramnath

USF Tampa Graduate Theses and Dissertations

Artificial intelligence and ubiquitous sensor systems have seen tremendous advances in recent times, resulting in groundbreaking impact across domains such as healthcare, entertainment, and transportation through a collective ecosystem called the Internet of Things. The advent of 5G and improved wireless networks will further accelerate the research and development of tools in deep learning, sensor systems, and computing platforms by providing improved network latency and bandwidth. While tremendous progress has been made in the Internet of Things, current work has largely focused on building robust applications that leverage the data collected through ubiquitous sensor nodes to provide actionable rules and …


Relational Joins On Gpus For In-Memory Database Query Processing, Ran Rui Jun 2020

Relational Joins On Gpus For In-Memory Database Query Processing, Ran Rui

USF Tampa Graduate Theses and Dissertations

Relational join processing is one of the core functionalities in database management systems. Implementing join algorithms on parallel platforms, especially modern GPUs, has gain a lot of momentum in the past decade. This dissertation addresses the following issues on GPU join algorithms. First, we present empirical evaluations of a state-of-the-art work on GPU-based join processing. Since 2008, the compute capabilities of GPUs have increased following a pace faster than that of the multi-core CPUs. We run a comprehensive set of experiments to study how join operations can benefit from such rapid expansion of GPU capabilities. We also present improved GPU …


Action Recognition Using The Motion Taxonomy, Maxat Alibayev Jun 2020

Action Recognition Using The Motion Taxonomy, Maxat Alibayev

USF Tampa Graduate Theses and Dissertations

In the last years, modern action recognition frameworks with deep architectures have achieved impressive results on the large-scale activity datasets. All state-of-the-art models share one common attribute: two-stream architectures. One deep model takes RGB frames, while the other model is fed with pre-computed optical flow vectors. The outputs of both models are combined to be used as a final probability distribution for the action classes. When comparing the results of individual models with the fused model, it is common to see that that latter method is more superior. Researchers explain that phenomena with the fact that optical flow vectors serve …


Service Provisioning And Security Design In Software Defined Networks, Mohamed Rahouti Apr 2020

Service Provisioning And Security Design In Software Defined Networks, Mohamed Rahouti

USF Tampa Graduate Theses and Dissertations

Information and Communications Technology (ICT) infrastructures and systems are being widely deployed to support a broad range of users and application scenarios. A key trend here is the emergence of many different "smart" technology paradigms along with an increasingly diverse array of networked sensors, e.g., for smart homes and buildings, intelligent transportation and autonomous systems, emergency response, remote health monitoring and telehealth, etc. As billions of these devices come online, ICT networks are being tasked with transferring increasing volumes of data to support intelligent real-time decision making and management. Indeed, many applications and services will have very stringent Quality of …


Keyless Anti-Jamming Communication Via Randomized Dsss, Ahmad Alagil Apr 2020

Keyless Anti-Jamming Communication Via Randomized Dsss, Ahmad Alagil

USF Tampa Graduate Theses and Dissertations

Nowadays, wireless networking is ubiquitous. In wireless communication systems, multiple nodes exchange data during the transmission time. Due to the natural use of the communication channel, it is crucial to protect the physical layer to make wireless channels between nodes more reliable. Jamming attacks consider one of the most significant threats on wireless communication. Spread spectrum techniques have been widely used to mitigate the effects of the jammer. Traditional anti-jamming approaches like Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) require a sender and a receiver to share a secret key prior to their communication. If this …


Functional Object-Oriented Network: A Knowledge Representation For Service Robotics, David Andrés Paulius Ramos Mar 2020

Functional Object-Oriented Network: A Knowledge Representation For Service Robotics, David Andrés Paulius Ramos

USF Tampa Graduate Theses and Dissertations

In this dissertation, we discuss our work behind the development of the functional object-oriented network (abbreviated as FOON), a graphical knowledge representation for robotic manipulation and understanding of its own actions and (potentially) the intentions of humans in the household. Based on the theory of affordance, this representation captures manipulations and their effects on actions through the coupling of object and motion nodes as fundamental learning units known as functional units. The activities currently represented in FOON are cooking related, but this representation can be extended to other activities that involve manipulation of objects which result in observable changes of …


Reliability Analysis Of Power Grids And Its Interdependent Infrastructures: An Interaction Graph-Based Approach, Upama Nakarmi Feb 2020

Reliability Analysis Of Power Grids And Its Interdependent Infrastructures: An Interaction Graph-Based Approach, Upama Nakarmi

USF Tampa Graduate Theses and Dissertations

Large blackouts with significant societal and economic impacts result from cascade of failures in the transmission network of power grids. Understanding and mitigating cascading failures in power grids is challenging due to the large number of components and their complex interactions, wherein, in addition to the physical topology of the system, the physics of power flow and functional dependencies among components largely affect the spatial distribution and propagation of failures. In this dissertation, data-driven interaction graphs, which help in capturing the underlying interactions and influences among the components during cascading failures, are used for capturing the non-local nature of propagation …


Algorithms And Framework For Computing 2-Body Statistics On Graphics Processing Units, Napath Pitaksirianan Feb 2020

Algorithms And Framework For Computing 2-Body Statistics On Graphics Processing Units, Napath Pitaksirianan

USF Tampa Graduate Theses and Dissertations

Various types of two-body statistics (2-BS) are regarded as essential components of low-level data analysis in scientific database systems. In relational algebraic terms, a 2-BS is essentially a Cartesian product between two datasets (or two instances of the same dataset) followed by a user-defined aggregate. The quadratic complexity of these computations hinders the timely processing of data. Thus using modern parallel hardware has become an obvious solution to meet such challenges. This dissertation presents our recent work in designing and optimizing parallel algorithms for 2-BS computation on Graphics Processing Units (GPUs). The unique architecture, however, provides abundant opportunities for optimizing …


A Gpu-Based Framework For Parallel Spatial Indexing And Query Processing, Zhila Nouri Lewis Oct 2019

A Gpu-Based Framework For Parallel Spatial Indexing And Query Processing, Zhila Nouri Lewis

USF Tampa Graduate Theses and Dissertations

Support for efficient spatial data storage and retrieval have become a vital component in almost all spatial database systems. Previous work has shown the importance of using spatial indexing and parallel computing to speed up such tasks. While GPUs have become a mainstream platform for high-throughput data processing in recent years, exploiting the massively parallel processing power of GPUs is non-trivial. Current approaches that parallelize one query at a time have low work efficiency and cannot make good use of GPU resources. On the other hand, many spatial database applications are busy systems in which a large number of queries …


Authentication And Sql-Injection Prevention Techniques In Web Applications, Cagri Cetin Jun 2019

Authentication And Sql-Injection Prevention Techniques In Web Applications, Cagri Cetin

USF Tampa Graduate Theses and Dissertations

This dissertation addresses the top two “most critical web-application security risks” by combining two high-level contributions.

The first high-level contribution introduces and evaluates collaborative authentication, or coauthentication, a single-factor technique in which multiple registered devices work together to authenticate a user. Coauthentication provides security benefits similar to those of multi-factor techniques, such as mitigating theft of any one authentication secret, without some of the inconveniences of multi-factor techniques, such as having to enter passwords or biometrics. Coauthentication provides additional security benefits, including: preventing phishing, replay, and man-in-the-middle attacks; basing authentications on high-entropy secrets that can be generated and updated automatically; …


Robotic Motion Generation By Using Spatial-Temporal Patterns From Human Demonstrations, Yongqiang Huang Mar 2019

Robotic Motion Generation By Using Spatial-Temporal Patterns From Human Demonstrations, Yongqiang Huang

USF Tampa Graduate Theses and Dissertations

Robots excel in manufacturing facilities because the tasks are repetitive and do not change. However, when the tasks change, which happens in almost all tasks that humans perform daily, such as cutting, pouring, and grasping, etc., robots perform much worse. We aim at teaching robots to perform tasks that are subject to change using demonstrations collected from humans, a problem referred to as learning from demonstration (LfD).

LfD consists of two parts: the data of human demonstrations, and the algorithm that extracts knowledge from the data to perform the same motions. Similarly, this thesis is divided into two parts. The …


Force Feedback And Intelligent Workspace Selection For Legged Locomotion Over Uneven Terrain, John Rippetoe Mar 2019

Force Feedback And Intelligent Workspace Selection For Legged Locomotion Over Uneven Terrain, John Rippetoe

USF Tampa Graduate Theses and Dissertations

Legged robots present an incredible opportunity for humanity to conduct dangerous operations such as search and rescue, disaster recovery, and planetary exploration without ever placing themselves in harms way. The ability of a leg to more freely dictate its shape, orientation, and length gives it tremendous mobility and adaptability demanded of a system intended for operation outside of a controlled environment. However, one only need look at the average cat, dog, or friendly neighborhood squirrel to understand the immense gap that exists between what is possible of legged systems and their current set of capabilities.

Areas of study relevant to …


On The Feasibility Of Profiling, Forecasting And Authenticating Internet Usage Based On Privacy Preserving Netflow Logs, Soheil Sarmadi Nov 2018

On The Feasibility Of Profiling, Forecasting And Authenticating Internet Usage Based On Privacy Preserving Netflow Logs, Soheil Sarmadi

USF Tampa Graduate Theses and Dissertations

Understanding Internet user behavior and Internet usage patterns is fundamental in developing future access networks and services that meet technical as well as Internet user needs. User behavior is routinely studied and measured, but with different methods depending on the research discipline of the investigator, and these disciplines rarely cross. We tackle this challenge by developing frameworks that the Internet usage statistics used as the main features in understanding Internet user behaviors, with the purpose of finding a complete picture of the user behavior and working towards a unified analysis methodology. In this dissertation we collected Internet usage statistics via …


Channel Camouflage And Manipulation Techniques In Wireless Networks, Song Fang Jun 2018

Channel Camouflage And Manipulation Techniques In Wireless Networks, Song Fang

USF Tampa Graduate Theses and Dissertations

The security of wireless networks and systems is becoming increasingly important as wireless devices are more and more ubiquitous nowadays. The wireless channel exhibits the spatial uncorrelation property, which is that the characteristics of a wireless channel become uncorrelated every half carrier wavelength over distance. This property has prompted an emerging research area that utilizes wireless channel characteristics to achieve location distinction, to detect location changes or facilitate authentication of wireless users, and to establish shared secret key between legitimate communicators. This dissertation includes two work toward the security improvement of existing wireless networks and systems. With the discovered channel …