Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 1488

Full-Text Articles in Computer Engineering

Semantics-Based Summarization Of Entities In Knowledge Graphs, Kalpa Gunaratna Jan 2017

Semantics-Based Summarization Of Entities In Knowledge Graphs, Kalpa Gunaratna

Browse all Theses and Dissertations

The processing of structured and semi-structured content on the Web has been gaining attention with the rapid progress in the Linking Open Data project and the development of commercial knowledge graphs. Knowledge graphs capture domain-specific or encyclopedic knowledge in the form of a data layer and add rich and explicit semantics on top of the data layer to infer additional knowledge. The data layer of a knowledge graph represents entities and their descriptions. The semantic layer on top of the data layer is called the schema (ontology), where relationships of the entity descriptions, their classes, and the hierarchy of the ...


An Optimization Compiler Framework Based On Polyhedron Model For Gpgpus, Lifeng Liu Jan 2017

An Optimization Compiler Framework Based On Polyhedron Model For Gpgpus, Lifeng Liu

Browse all Theses and Dissertations

General purpose GPU (GPGPU) is an effective many-core architecture that can yield high throughput for many scientific applications with thread-level parallelism. However, several challenges still limit further performance improvements and make GPU programming challenging for programmers who lack the knowledge of GPU hardware architecture. In this dissertation, we describe an Optimization Compiler Framework Based on Polyhedron Model for GPGPUs to bridge the speed gap between the GPU cores and the off-chip memory and improve the overall performance of the GPU systems. The optimization compiler framework includes a detailed data reuse analyzer based on the extended polyhedron model for GPU kernels ...


Oclep+: One-Class Intrusion Detection Using Length Of Patterns, Sai Kiran Pentukar Jan 2017

Oclep+: One-Class Intrusion Detection Using Length Of Patterns, Sai Kiran Pentukar

Browse all Theses and Dissertations

In an earlier paper, a method called One-class Classification using Length statistics of (jumping) Emerging Patterns (OCLEP) was introduced for masquerader detection. Jumping emerging patterns (JEPs) for a test instance are minimal patterns that match the test instance but they do not match any normal instances. OCLEP was based on the observation that one needs long JEPs to differentiate an instance of one class from instances of the same class, but needs short JEPs to differentiate an instance of one class from instances of a different class. In this thesis, we present OCLEP+, One-class Classification using Length statistics of Emerging ...


Multi-Class Classification Of Textual Data: Detection And Mitigation Of Cheating In Massively Multiplayer Online Role Playing Games, Naga Sai Nikhil Maguluri Jan 2017

Multi-Class Classification Of Textual Data: Detection And Mitigation Of Cheating In Massively Multiplayer Online Role Playing Games, Naga Sai Nikhil Maguluri

Browse all Theses and Dissertations

The success of any multiplayer game depends on the player’s experience. Cheating/Hacking undermines the player’s experience and thus the success of that game. Cheaters, who use hacks, bots or trainers are ruining the gaming experience of a player and are making him leave the game. As the video game industry is a constantly increasing multibillion dollar economy, it is crucial to assure and maintain a state of security. Players reflect their gaming experience in one of the following places: multiplayer chat, game reviews, and social media. This thesis is an exploratory study where our goal is to ...


Intelligent Tutoring System Effects On The Learning Process, Ali Talib Qasim Al-Aqbi Jan 2017

Intelligent Tutoring System Effects On The Learning Process, Ali Talib Qasim Al-Aqbi

Browse all Theses and Dissertations

The traditional education systems that have been used for several centuries have evolved very slowly and might be ineffective for addressing diverse learning styles and levels of preparation. This system is characterized by many students interacting with a single teacher, who is unable to address the individual needs of every student. Therefore, some students can become frustrated and fail to reach their educational potential. An Intelligent Tutoring System (ITS), which is a computer application used to provide students with one-to-one supplemental tutoring tailored to the student's learning style and pace, is of interest to educators for improving student learning ...


Collaboratively Detecting Http-Based Distributed Denial Of Service Attack Using Software Defined Network, Ademola A. Ikusan Jan 2017

Collaboratively Detecting Http-Based Distributed Denial Of Service Attack Using Software Defined Network, Ademola A. Ikusan

Browse all Theses and Dissertations

Over the years, there have been a lot of attacks on the web servers of critical companies and organization. As much as these organizations tighten their security, it always tends not to be enough to stop all the attacks towards their servers. These attack vectors are so difficult to stop because of the technicalities behind the attack. Furthermore, there are different classes of distributed denial of service(DDoS) attacks such as the high rates (SYN Flood attacks, ARP Flood attacks, etc), low-rate(HTTP-GET, HTTP-POST). Although there are different ways to stop high rate DDoS attacks by traffic sampling and detecting ...


Development Of A Performance Assessment System For Language Learning, Imen Kasrani Jan 2017

Development Of A Performance Assessment System For Language Learning, Imen Kasrani

Browse all Theses and Dissertations

Recent advances in computer-assisted, language-speaking, learning/training technology have demonstrated its promising potential to improve the outcome of language learning in early education, special education, English as a Second Language (ESL), and foreign language. The growing number of readily available mobile app-based solutions help encourage interest in learning to speak a foreign language, but their effectiveness is limited due to their lack of objective assessment and performance feedback resembling expert judgment. For example, it has been recognized that, in early education, students learn best with one-on-one instructions. Unfortunately, teachers do not have the time, and it is challenging to extend ...


Finding Street Gang Member Profiles On Twitter, Lakshika Balasuriya Jan 2017

Finding Street Gang Member Profiles On Twitter, Lakshika Balasuriya

Browse all Theses and Dissertations

The crime and violence street gangs introduce into neighborhoods is a growing epidemic in cities around the world. Today, over 1.4 million people, belonging to more than 33,000 gangs, are active in the United States, of which 88% identify themselves as being members of a street gang. With the recent popularity of social media, street gang members have established online presences coinciding with their physical occupation of neighborhoods. Recent studies report that approximately 45% of gang members participate in online offending activities such as threatening, harassing individuals, posting violent videos or attacking someone on the street for something ...


Adapting The Search Space While Limiting Damage During Learning In A Simulated Flapping Wing Micro Air Vehicle, Monica Sam Jan 2017

Adapting The Search Space While Limiting Damage During Learning In A Simulated Flapping Wing Micro Air Vehicle, Monica Sam

Browse all Theses and Dissertations

Cyber-Physical Systems (CPS) are characterized by closely coupled physical and software components that operate simultaneously on different spatial and temporal scales; exhibit multiple and distinct behavioral modalities; and interact with one another in ways not entirely predictable at the time of design. A commonly appearing type of CPS are systems that contain one or more smart components that adapt locally in response to global measurements of whole system performance. An example of a smart component robotic CPS system is a Flapping Wing Micro Air Vehicle (FW-MAV) that contains wing motion oscillators that control their wing flapping patterns to enable the ...


Semantic Web Foundations For Representing, Reasoning, And Traversing Contextualized Knowledge Graphs, Vinh Thi Kim Nguyen Jan 2017

Semantic Web Foundations For Representing, Reasoning, And Traversing Contextualized Knowledge Graphs, Vinh Thi Kim Nguyen

Browse all Theses and Dissertations

Semantic Web technologies such as RDF and OWL have become World Wide Web Consortium (W3C) standards for knowledge representation and reasoning. RDF triples about triples, or meta triples, form the basis for a contextualized knowledge graph. They represent the contextual information about individual triples such as the source, the occurring time or place, or the certainty. However, an efficient RDF representation for such meta-knowledge of triples remains a major limitation of the RDF data model. The existing reification approach allows such meta-knowledge of RDF triples to be expressed in RDF by using four triples per reified triple. While reification is ...


Implementation And Evaluation Of Goal Selection In A Cognitive Architecture, Sravya Kondrakunta Jan 2017

Implementation And Evaluation Of Goal Selection In A Cognitive Architecture, Sravya Kondrakunta

Browse all Theses and Dissertations

A cognitive system attempts to achieve its goals by utilizing the appropriate resources present to yield the best possible outcome within a short duration. To achieve the goals in such an efficient manner, it is important for the agent to manage its goals well. Goal management not only makes the agent efficient but also flexible, more durable to the sudden changes in the environment, and self-reliant. Goal Management consists of various goal operations including goal formulation, selection, change, delegation, achievement, and monitoring. Each operation is unique and has its own significance in aiding the performance of the agent. The thesis ...


Smart Ev Charging For Improved Sustainable Mobility, Ashutosh Shivakumar Jan 2017

Smart Ev Charging For Improved Sustainable Mobility, Ashutosh Shivakumar

Browse all Theses and Dissertations

The landscape of energy generation and utilization is witnessing an unprecedented change. We are at the threshold of a major shift in electricity generation from utilization of conventional sources of energy like coal to sustainable and renewable sources of energy like solar and wind. On the other hand, electricity consumption, especially in the field of transportation, due to advancements in the field of battery research and exponential technologies like vehicle telematics, is seeing a shift from carbon based to Lithium based fuel. Encouraged by 1. Decrease in the cost of Li – ion based batteries 2. Breakthroughs in battery chemistry research ...


Development Of An Ultra-Portable Non-Contact Wound Measurement System, Anka Babu Billa Jan 2017

Development Of An Ultra-Portable Non-Contact Wound Measurement System, Anka Babu Billa

Browse all Theses and Dissertations

Continuous monitoring of changes in wound size is key to correctly predict whether wounds will heal readily with conventional treatment or require more aggressive treatment strategies. Unfortunately, existing wound measurement solutions don't meet the clinical demand due to their limitations in accuracy, operating complexity and time, acquisition and operation cost, or reproducibility, resulting in unnecessarily lengthy recovery or extra treatment procedures, incurring an excessively high financial cost, and in many cases extended usage of addictive painkillers. In this thesis, we proposed and developed a low cost, a portable non-contact solution that combines multi-spectral imaging and a portfolio of imaging ...


Diffusion Maps And Transfer Subspace Learning, Olga L. Mendoza-Schrock Jan 2017

Diffusion Maps And Transfer Subspace Learning, Olga L. Mendoza-Schrock

Browse all Theses and Dissertations

Transfer Subspace Learning has recently gained popularity for its ability to perform cross-dataset and cross-domain object recognition. The ability to leverage existing data without the need for additional data collections is attractive for Aided Target Recognition applications. For Aided Target Recognition (or object assessment) applications, Transfer Subspace Learning is particularly useful, as it enables the incorporation of sparse and dynamically collected data into existing systems that utilize large databases. In this dissertation, Manifold Learning and Transfer Subspace Learning are combined to create new Aided Target Recognition systems capable of achieving high target recognition rates for cross-dataset conditions and cross-domain applications ...


Deep Learning Approach For Intrusion Detection System (Ids) In The Internet Of Things (Iot) Network Using Gated Recurrent Neural Networks (Gru), Manoj Kumar Putchala Jan 2017

Deep Learning Approach For Intrusion Detection System (Ids) In The Internet Of Things (Iot) Network Using Gated Recurrent Neural Networks (Gru), Manoj Kumar Putchala

Browse all Theses and Dissertations

The Internet of Things (IoT) is a complex paradigm where billions of devices are connected to a network. These connected devices form an intelligent system of systems that share the data without human-to-computer or human-to-human interaction. These systems extract meaningful data that can transform human lives, businesses, and the world in significant ways. However, the reality of IoT is prone to countless cyber-attacks in the extremely hostile environment like the internet. The recent hack of 2014 Jeep Cherokee, iStan pacemaker, and a German steel plant are a few notable security breaches. To secure an IoT system, the traditional high-end security ...


Detecting Information Leakage In Android Malware Using Static Taint Analysis, Soham P. Kelkar Jan 2017

Detecting Information Leakage In Android Malware Using Static Taint Analysis, Soham P. Kelkar

Browse all Theses and Dissertations

According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted attackers to use Android as a platform to conduct malicious activities. To achieve these malicious activities some attacker choose to develop malicious Apps to steal information from the Android users. As the modern day smartphones process, a lot of sensitive information, information security, and privacy becoming a potential target for the attacker. The malicious Apps steal information from the infected phone and send this information to the attacker-controlled URLs using various Android sink functions. Therefore, it necessary to protect data as it can prove ...


Gait Analysis From Wearable Devices Using Image And Signal Processing, Bradley A. Schneider Jan 2017

Gait Analysis From Wearable Devices Using Image And Signal Processing, Bradley A. Schneider

Browse all Theses and Dissertations

We present the results of analyzing gait motion in-person video taken from a commercially available wearable camera embedded in a pair of glasses. The video is analyzed with three different computer vision methods to extract motion vectors from different gait sequences from four individuals for comparison against a manually annotated ground truth dataset. Using a combination of signal processing and computer vision techniques, gait features are extracted to identify the walking pace of the individual wearing the camera and are validated using the ground truth dataset. We perform an additional data collection with both the camera and a body-worn accelerometer ...


Visualization Of Carbon Monoxide Particles Released From Firearms, Sadan Suneesh Menon Jan 2017

Visualization Of Carbon Monoxide Particles Released From Firearms, Sadan Suneesh Menon

Browse all Theses and Dissertations

A number of soldiers have come forward to report discomfort, irritation and respiratory problems after taking part in a live firing session. These problems are caused due to the fumes and particulates emitted from the gun upon firing. There exists substantial research work focused on lead and other harmful metallic particulates expelled from a firearm, since they are the most harmful among the other emissions. However, our research focuses on visualizing the carbon monoxide (CO) particles released from a firearm in order to help understand adverse effects they may have on the human body. We use data provided by researchers ...


Web-Delivered Assembly Language Interactive Training And Its Sequence Identification For Software Reverse Engineering, Sunethra Thimmapuram Jan 2017

Web-Delivered Assembly Language Interactive Training And Its Sequence Identification For Software Reverse Engineering, Sunethra Thimmapuram

Browse all Theses and Dissertations

The purpose of this research is to help the beginners of software reverse engineering, the process of extracting knowledge or design information from a product and reproducing it on basis of extracted information. Beginner users often find it difficult to use, as the task may be found daunting at first sight due to a lack of existing learning resources. We need a better way to present information to the novice reverse engineer about how to understand low-level sequences of assembly instructions. This is akin to how the key to learning a foreign language is based upon a fundamental knowledge of ...


Settings Protection Add-On: A User-Interactive Browser Extension To Prevent The Exploitation Of Preferences, Venkata Naga Siva Seelam Jan 2017

Settings Protection Add-On: A User-Interactive Browser Extension To Prevent The Exploitation Of Preferences, Venkata Naga Siva Seelam

Browse all Theses and Dissertations

The abuse of browser preferences is a significant application security issue, despite numerous protections against automated software changing these preferences. Browser hijackers modify user’s desired preferences by injecting malicious software into the browser. Users are not aware of these modifications, and the unwanted changes can annoy the user and circumvent security preferences. Reverting these changes is not easy, and users often have to go through complicated sequences of steps to restore their preferences to the previous values. Tasks to resolve this issue include uninstalling and re-installing the browser, resetting browser preferences, and installing malware removal tools. This thesis describes ...


Data-Driven Network-Centric Threat Assessment, Dae Wook Kim Jan 2017

Data-Driven Network-Centric Threat Assessment, Dae Wook Kim

Browse all Theses and Dissertations

As the Internet has grown increasingly popular as a communication and information sharing platform, it has given rise to two major types of Internet security threats related to two primary entities: end-users and network services. First, information leakages from networks can reveal sensitive information about end-users. Second, end-users systems can be compromised through attacks on network services, such as scanning-and-exploit attacks, spamming, drive-by downloads, and fake anti-virus software. Designing threat assessments to detect these threats is, therefore, of great importance, and a number of the detection systems have been proposed. However, these existing threat assessment systems face significant challenges in ...


Exploiting Alignments In Linked Data For Compression And Query Answering, Amit Krishna Joshi Jan 2017

Exploiting Alignments In Linked Data For Compression And Query Answering, Amit Krishna Joshi

Browse all Theses and Dissertations

Linked data has experienced accelerated growth in recent years due to its interlinking ability across disparate sources, made possible via machine-processable RDF data. Today, a large number of organizations, including governments and news providers, publish data in RDF format, inviting developers to build useful applications through reuse and integration of structured data. This has led to tremendous increase in the amount of RDF data on the web. Although the growth of RDF data can be viewed as a positive sign for semantic web initiatives, it causes performance bottlenecks for RDF data management systems that store and provide access to data ...


Conditional Correlation Analysis, Sanjeev Bhatta Jan 2017

Conditional Correlation Analysis, Sanjeev Bhatta

Browse all Theses and Dissertations

Correlation analysis is a frequently used statistical measure to examine the relationship among variables in different practical applications. However, the traditional correlation analysis uses an overly simplistic method to do so. It measures how two variables are related in an application by examining only their relationship in the entire underlying data space. As a result, traditional correlation analysis may miss a strong correlation between those variables especially when that relationship exists in the small subpopulation of the larger data space. This is no longer acceptable and may lose a fair share of information in this era of Big Data which ...


Rendering Owl In Latex For Improved Readability: Extensions To The Owlapi, Cogan M. Shimizu Jan 2017

Rendering Owl In Latex For Improved Readability: Extensions To The Owlapi, Cogan M. Shimizu

Browse all Theses and Dissertations

As ontology engineering is inherently a multidisciplinary process, it is necessary to utilize multiple vehicles to present an ontology to a user. In order to examine the content of an ontology, formal logic renderings of the axioms appear to be a very helpful approach for some. This thesis introduces a number of incremental improvements to the OWLAPI's \LaTeX{} rendering framework in order to improve the readability, concision, and correctness of OWL files translated into Description Logic and First Order Logic. In addition, we examine the efficacy of these renderings as vehicles for understanding an ontology.


Knowledge Driven Search Intent Mining, Ashutosh Jadhav Jan 2016

Knowledge Driven Search Intent Mining, Ashutosh Jadhav

Browse all Theses and Dissertations

Understanding users' latent intents behind search queries is essential for satisfying a user's search needs. Search intent mining can help search engines to enhance its ranking of search results, enabling new search features like instant answers, personalization, search result diversification, and the recommendation of more relevant ads. Hence, there has been increasing attention on studying how to effectively mine search intents by analyzing search engine query logs. While state-of-the-art techniques can identify the domain of the queries (e.g. sports, movies, health), identifying domain-specific intent is still an open problem. Among all the topics available on the Internet, health ...


Intelligent Caching To Mitigate The Impact Of Web Robots On Web Servers, Howard Nathan Rude Jan 2016

Intelligent Caching To Mitigate The Impact Of Web Robots On Web Servers, Howard Nathan Rude

Browse all Theses and Dissertations

With an ever increasing amount of data that is shared and posted on the Web, the desire and necessity to automatically glean this information has led to an increase in the sophistication and volume of software agents called web robots or crawlers. Recent measurements, including our own across the entire logs of Wright State University Web servers over the past two years, suggest that at least 60\% of all requests originate from robots rather than humans. Web robots display different statistical and behavioral patterns in their traffic compared to humans, yet present Web server optimizations presume that traffic exhibits predominantly ...


Measures Of User Interactions, Conversations, And Attacks In A Crowdsourced Platform Offering Emotional Support., Samir Yelne Jan 2016

Measures Of User Interactions, Conversations, And Attacks In A Crowdsourced Platform Offering Emotional Support., Samir Yelne

Browse all Theses and Dissertations

Online social systems have emerged as a popular medium for people in society to communicate with each other. Among the most important reasons why people communicate is to share emotional problems, but most online social systems are uncomfortable or unsafe spaces for this purpose. This has led to the rise of online emotional support systems, where users needing to speak to someone can anonymously connect to a crowd of trained listeners for a one-on-one conversation. To better understand who, how and when users utilize these systems, and to evaluate their safety, this thesis offers a comprehensive examination of the characteristics ...


Educational Methods For Inverted-Lecture Computer Science And Engineering Classrooms To Overcome Common Barriers To Stem Student Success, Kathleen Timmerman Jan 2016

Educational Methods For Inverted-Lecture Computer Science And Engineering Classrooms To Overcome Common Barriers To Stem Student Success, Kathleen Timmerman

Browse all Theses and Dissertations

New educational pedagogies are emerging in an effort to increase the number of new engineers available to enter the workforce in the coming years. One of the re-occurring themes in these pedagogies is variations of the flipped classroom. Often the additional classroom time gained from flipping is used to reinforce learning objectives. It is hypothesized that it might be more beneficial to students if a portion of that time is used to address common non-cognitive barriers that prevent students from succeeding in the major. In a freshman Introductory Computer Science course, three different pedagogies are compared: a hybrid lecture-active learning ...


Detecting Php-Based Cross-Site Scripting Vulnerabilities Using Static Program Analysis, Steven M. Kelbley Jan 2016

Detecting Php-Based Cross-Site Scripting Vulnerabilities Using Static Program Analysis, Steven M. Kelbley

Browse all Theses and Dissertations

With the widespread adoption of dynamic web applications in recent years, a number of threats to the security of these applications have emerged as significant challenges for application developers. The security of developed applications has become a higher priority for both developers and their employers as cyber attacks become increasingly more prevalent and damaging. Some of the most used web application frameworks are written in PHP and have become major targets due to the large number of servers running these applications worldwide. A number of tools exist to evaluate PHP code for issues, however most of these applications are not ...


Computer Graphics And Visualization Based Analysis And Record System For Hand Surgery And Therapy Practice, Venkatamanikanta Subrahmanyakartheek Gokavarapu Jan 2016

Computer Graphics And Visualization Based Analysis And Record System For Hand Surgery And Therapy Practice, Venkatamanikanta Subrahmanyakartheek Gokavarapu

Browse all Theses and Dissertations

In this thesis, we have designed and developed a computer graphics and visualization based analysis and record system for hand surgery and therapy practice. In particular, we have designed and developed three novel technologies: (i) model-based data compression for hand motion records (ii) model-based surface area estimation of a human hand and (iii) an emulated study of hand wound area estimation. First, we have presented a new data compression technique to better address the needs of electronic health record systems, such as file storage and privacy. In our proposed approach, we will extract the patient's hand motion information and ...