Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

Department of Computer Science and Engineering

Articles 1 - 30 of 220

Full-Text Articles in Computer Engineering

Semantics-Driven Abstractive Document Summarization, Amanuel Alambo Jan 2022

Semantics-Driven Abstractive Document Summarization, Amanuel Alambo

Browse all Theses and Dissertations

The evolution of the Web over the last three decades has led to a deluge of scientific and news articles on the Internet. Harnessing these publications in different fields of study is critical to effective end user information consumption. Similarly, in the domain of healthcare, one of the key challenges with the adoption of Electronic Health Records (EHRs) for clinical practice has been the tremendous amount of clinical notes generated that can be summarized without which clinical decision making and communication will be inefficient and costly. In spite of the rapid advances in information retrieval and deep learning techniques towards …


Building An Understanding Of Human Activities In First Person Video Using Fuzzy Inference, Bradley A. Schneider Jan 2022

Building An Understanding Of Human Activities In First Person Video Using Fuzzy Inference, Bradley A. Schneider

Browse all Theses and Dissertations

Activities of Daily Living (ADL’s) are the activities that people perform every day in their home as part of their typical routine. The in-home, automated monitoring of ADL’s has broad utility for intelligent systems that enable independent living for the elderly and mentally or physically disabled individuals. With rising interest in electronic health (e-Health) and mobile health (m-Health) technology, opportunities abound for the integration of activity monitoring systems into these newer forms of healthcare. In this dissertation we propose a novel system for describing ’s based on video collected from a wearable camera. Most in-home activities are naturally defined by …


A Solder-Defined Computer Architecture For Backdoor And Malware Resistance, Marc W. Abel Jan 2022

A Solder-Defined Computer Architecture For Backdoor And Malware Resistance, Marc W. Abel

Browse all Theses and Dissertations

This research is about securing control of those devices we most depend on for integrity and confidentiality. An emerging concern is that complex integrated circuits may be subject to exploitable defects or backdoors, and measures for inspection and audit of these chips are neither supported nor scalable. One approach for providing a “supply chain firewall” may be to forgo such components, and instead to build central processing units (CPUs) and other complex logic from simple, generic parts. This work investigates the capability and speed ceiling when open-source hardware methodologies are fused with maker-scale assembly tools and visible-scale final inspection.

The …


Automatically Generating Searchable Fingerprints For Wordpress Plugins Using Static Program Analysis, Chuang Li Jan 2022

Automatically Generating Searchable Fingerprints For Wordpress Plugins Using Static Program Analysis, Chuang Li

Browse all Theses and Dissertations

This thesis introduces a novel method to automatically generate fingerprints for WordPress plugins. Our method performs static program analysis using Abstract Syntax Trees (ASTs) of WordPress plugins. The generated fingerprints can be used for identifying these plugins using search engines, which have support critical applications such as proactively identifying web servers with vulnerable WordPress plugins. We have used our method to generate fingerprints for over 10,000 WordPress plugins and analyze the resulted fingerprints. Our fingerprints have also revealed 453 websites that are potentially vulnerable. We have also compared fingerprints for vulnerable plugins and those for vulnerability-free plugins.


Novel Natural Language Processing Models For Medical Terms And Symptoms Detection In Twitter, Farahnaz Golrooy Motlagh Jan 2022

Novel Natural Language Processing Models For Medical Terms And Symptoms Detection In Twitter, Farahnaz Golrooy Motlagh

Browse all Theses and Dissertations

This dissertation focuses on disambiguation of language use on Twitter about drug use, consumption types of drugs, drug legalization, ontology-enhanced approaches, and prediction analysis of data-driven by developing novel NLP models. Three technical aims comprise this work: (a) leveraging pattern recognition techniques to improve the quality and quantity of crawled Twitter posts related to drug abuse; (b) using an expert-curated, domain-specific DsOn ontology model that improve knowledge extraction in the form of drug-to-symptom and drug-to-side effect relations; and (c) modeling the prediction of public perception of the drug’s legalization and the sentiment analysis of drug consumption on Twitter. We collected …


A Cloud Computing-Based Dashboard For The Visualization Of Motivational Interviewing Metrics, E Jinq Heng Jan 2022

A Cloud Computing-Based Dashboard For The Visualization Of Motivational Interviewing Metrics, E Jinq Heng

Browse all Theses and Dissertations

Motivational Interviewing (MI) is an evidence-based brief interventional technique that has been demonstrated to be effective in triggering behavior change in patients. To facilitate behavior change, healthcare practitioners adopt a nonconfrontational, empathetic dialogic style, a core component of MI. Despite its advantages, MI has been severely underutilized mainly due to the cognitive overload on the part of the MI dialogue evaluator, who has to assess MI dialogue in real-time and calculate MI characteristic metrics (number of open-ended questions, close-ended questions, reflection, and scale-based sentences) for immediate post-session evaluation both in MI training and clinical settings. To automate dialogue assessment and …


Deep Understanding Of Technical Documents : Automated Generation Of Pseudocode From Digital Diagrams & Analysis/Synthesis Of Mathematical Formulas, Nikolaos Gkorgkolis Jan 2022

Deep Understanding Of Technical Documents : Automated Generation Of Pseudocode From Digital Diagrams & Analysis/Synthesis Of Mathematical Formulas, Nikolaos Gkorgkolis

Browse all Theses and Dissertations

The technical document is an entity that consists of several essential and interconnected parts, often referred to as modalities. Despite the extensive attention that certain parts have already received, per say the textual information, there are several aspects that severely under researched. Two such modalities are the utility of diagram images and the deep automated understanding of mathematical formulas. Inspired by existing holistic approaches to the deep understanding of technical documents, we develop a novel formal scheme for the modelling of digital diagram images. This extends to a generative framework that allows for the creation of artificial images and their …


Synthetic Aperture Ladar Automatic Target Recognizer Design And Performance Prediction Via Geometric Properties Of Targets, Jacob W. Ross Jan 2022

Synthetic Aperture Ladar Automatic Target Recognizer Design And Performance Prediction Via Geometric Properties Of Targets, Jacob W. Ross

Browse all Theses and Dissertations

Synthetic Aperture LADAR (SAL) has several phenomenology differences from Synthetic Aperture RADAR (SAR) making it a promising candidate for automatic target recognition (ATR) purposes. The diffuse nature of SAL results in more pixels on target. Optical wavelengths offers centimeter class resolution with an aperture baseline that is 10,000 times smaller than an SAR baseline. While diffuse scattering and optical wavelengths have several advantages, there are also a number of challenges. The diffuse nature of SAL leads to a more pronounced speckle effect than in the SAR case. Optical wavelengths are more susceptible to atmospheric noise, leading to distortions in formed …


Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer Jan 2022

Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer

Browse all Theses and Dissertations

Vulnerabilities in source code can be compiled for multiple processor architectures and make their way into several different devices. Security researchers frequently have no way to obtain this source code to analyze for vulnerabilities. Therefore, the ability to effectively analyze binary code is essential. Similarity detection is one facet of binary code analysis. Because source code can be compiled for different architectures, the need can arise for detecting code similarity across architectures. This need is especially apparent when analyzing firmware from embedded computing environments such as Internet of Things devices, where the processor architecture is dependent on the product and …


Validating Software States Using Reverse Execution, Nathaniel Christian Boland Jan 2022

Validating Software States Using Reverse Execution, Nathaniel Christian Boland

Browse all Theses and Dissertations

A key feature of software analysis is determining whether it is possible for a program to reach a certain state. Various methods have been devised to accomplish this including directed fuzzing and dynamic execution. In this thesis we present a reverse execution engine to validate states, the Complex Emulator. The Complex Emulator seeks to validate a program state by emulating it in reverse to discover if a contradiction exists. When unknown variables are found during execution, the emulator is designed to use constraint solving to compute their values. The Complex Emulator has been tested on small assembly programs and is …


Topological Hierarchies And Decomposition: From Clustering To Persistence, Kyle A. Brown Jan 2022

Topological Hierarchies And Decomposition: From Clustering To Persistence, Kyle A. Brown

Browse all Theses and Dissertations

Hierarchical clustering is a class of algorithms commonly used in exploratory data analysis (EDA) and supervised learning. However, they suffer from some drawbacks, including the difficulty of interpreting the resulting dendrogram, arbitrariness in the choice of cut to obtain a flat clustering, and the lack of an obvious way of comparing individual clusters. In this dissertation, we develop the notion of a topological hierarchy on recursively-defined subsets of a metric space. We look to the field of topological data analysis (TDA) for the mathematical background to associate topological structures such as simplicial complexes and maps of covers to clusters in …


Automatically Inferring Image Bases Of Arm32 Binaries, Daniel T. Chong Jan 2022

Automatically Inferring Image Bases Of Arm32 Binaries, Daniel T. Chong

Browse all Theses and Dissertations

Reverse engineering tools rely on the critical image base value for tasks such as correctly mapping code into virtual memory for an emulator or accurately determining branch destinations for a disassembler. However, binaries are often stripped and therefore, do not explicitly state this value. Currently available solutions for calculating this essential value generally require user input in the form of parameter configurations or manual binary analysis, thus these methods are limited by the experience and knowledge of the user. In this thesis, we propose a user-independent solution for determining the image base of ARM32 binaries and describe our implementation. Our …


Secure Authenticated Key Exchange For Enhancing The Security Of Routing Protocol For Low-Power And Lossy Networks, Sarah Mohammed Alzahrani Jan 2022

Secure Authenticated Key Exchange For Enhancing The Security Of Routing Protocol For Low-Power And Lossy Networks, Sarah Mohammed Alzahrani

Browse all Theses and Dissertations

The current Routing Protocol for Low Power and Lossy Networks (RPL) standard provides three security modes Unsecured Mode (UM), Preinstalled Secure Mode (PSM), and Authenticated Secure Mode (ASM). The PSM and ASM are designed to prevent external routing attacks and specific replay attacks through an optional replay protection mechanism. RPL's PSM mode does not support key replacement when a malicious party obtains the key via differential cryptanalysis since it considers the key to be provided to nodes during the configuration of the network. This thesis presents an approach to implementing a secure authenticated key exchange mechanism for RPL, which ensures …


Locality Analysis Of Patched Php Vulnerabilities, Luke N. Holt Jan 2022

Locality Analysis Of Patched Php Vulnerabilities, Luke N. Holt

Browse all Theses and Dissertations

The size and complexity of modern software programs is constantly growing making it increasingly difficult to diligently find and diagnose security exploits. The ability to quickly and effectively release patches to prevent existing vulnerabilities significantly limits the exploitation of users and/or the company itself. Due to this it has become crucial to provide the capability of not only releasing a patched version, but also to do so quickly to mitigate the potential damage. In this thesis, we propose metrics for evaluating the locality between exploitable code and its corresponding sanitation API such that we can statistically determine the proximity of …


Data Analytics And Visualization For Virtual Simulation, Sri Lekha Koppaka Jan 2022

Data Analytics And Visualization For Virtual Simulation, Sri Lekha Koppaka

Browse all Theses and Dissertations

Healthcare organizations attract a diversity of caregivers and patients by providing essential care. While interacting with people of various races, ethnicity, and economical background, caregivers need to be empathetic and compassionate. Proper training and exposure are needed to understand the patient’s background and handle different situations and provide the best care for the patient. With social determinants of health (SDOH) as the basis, the thesis focuses on providing exposure through “Wright LIFE (Lifelike Immersion for Equity) - A simulation-based training tool” to two such scenarios covering patients from the LGBTQIA+ community & autism spectrum disorder (ASD). This interactive tool helps …


Realistic Virtual Human Character Design Strategy And Experience For Supporting Serious Role-Playing Simulations On Mobile Devices, Sindhu Kumari Jan 2022

Realistic Virtual Human Character Design Strategy And Experience For Supporting Serious Role-Playing Simulations On Mobile Devices, Sindhu Kumari

Browse all Theses and Dissertations

Promoting awareness of social determinants of health (SDoH) among healthcare providers is important to improve the patient care experience and outcome as it helps providers understand their patients in a better way which can facilitate more efficient and effective communication about health conditions. Healthcare professionals are typically educated about SDoH through lectures, questionaries, or role-play-based approaches; but in today’s world, it is becoming increasingly possible to leverage modern technology to create more impactful and accessible tools for SDoH education. Wright LIFE (Lifelike Immersion for Equity) is a simulation-based training tool especially created for this purpose. It is a mobile app …


Design, Analysis, And Optimization Of Traffic Engineering For Software Defined Networks, Mohammed Ibrahim Salman Jan 2022

Design, Analysis, And Optimization Of Traffic Engineering For Software Defined Networks, Mohammed Ibrahim Salman

Browse all Theses and Dissertations

Network traffic has been growing exponentially due to the rapid development of applications and communications technologies. Conventional routing protocols, such as Open-Shortest Path First (OSPF), do not provide optimal routing and result in weak network resources. Optimal traffic engineering (TE) is not applicable in practice due to operational constraints such as limited memory on the forwarding devices and routes oscillation. Recently, a new way of centralized management of networks enabled by Software-Defined Networking (SDN) made it easy to apply most traffic engineering ideas in practice. \par Toward creating an applicable traffic engineering system, we created a TE simulator for experimenting …


Development Of Enhanced User Interaction And User Experience For Supporting Serious Role-Playing Games In A Healthcare Setting, Mark Lee Alow Jan 2022

Development Of Enhanced User Interaction And User Experience For Supporting Serious Role-Playing Games In A Healthcare Setting, Mark Lee Alow

Browse all Theses and Dissertations

Education about implicit bias in clinical settings is essential for improving the quality of healthcare for underrepresented groups. Such a learning experience can be delivered in the form of a serious game simulation. WrightLIFE (Lifelike Immersion for Equity) is a project that combines two serious game simulations, with each addressing the group that faces implicit bias. These groups are individuals that identify as LGBTQIA+ and people with autism spectrum disorder (ASD). The project presents healthcare providers with a training tool that puts them in the roles of the patient and a medical specialist and immerses them in social and clinical …


Few-Shot Malware Detection Using A Novel Adversarial Reprogramming Model, Ekula Praveen Kumar Jan 2022

Few-Shot Malware Detection Using A Novel Adversarial Reprogramming Model, Ekula Praveen Kumar

Browse all Theses and Dissertations

The increasing sophistication of malware has made detecting and defending against new strains a major challenge for cybersecurity. One promising approach to this problem is using machine learning techniques that extract representative features and train classification models to detect malware in an early stage. However, training such machine learning-based malware detection models represents a significant challenge that requires a large number of high-quality labeled data samples while it is very costly to obtain them in real-world scenarios. In other words, training machine learning models for malware detection requires the capability to learn from only a few labeled examples. To address …


Complex Interactions Between Multiple Goal Operations In Agent Goal Management, Sravya Kondrakunta Jan 2021

Complex Interactions Between Multiple Goal Operations In Agent Goal Management, Sravya Kondrakunta

Browse all Theses and Dissertations

A significant issue in cognitive systems research is to make an agent formulate and manage its own goals. Some cognitive scientists have implemented several goal operations to support this issue, but no one has implemented more than a couple of goal operations within a single agent. One of the reasons for this limitation is the lack of knowledge about how various goals operations interact with one another. This thesis addresses this knowledge gap by implementing multiple-goal operations, including goal formulation, goal change, goal selection, and designing an algorithm to manage any positive or negative interaction between them. These are integrated …


Leveraging Sequential Nature Of Conversations For Intent Classification, Shree Gotteti Jan 2021

Leveraging Sequential Nature Of Conversations For Intent Classification, Shree Gotteti

Browse all Theses and Dissertations

Conversations are more than just a sequence of text, it is where two or more participants interact in order to achieve their goals. Conversation Understanding (CU) requires all participants to understand each others intent. In the past decade, CU has been extended from automated human-human text processing to build automated conversational agents for human-machine interactions. Despite their popularity, these automated conversational agents (like Siri, Alexa, etc) can't handle more than one or two utterances, and they don't recognize conversations as intents. The development of approaches that extract intents behind an utterance is essential for the advancements of Question Answering (QA) …


Texture-Driven Image Clustering In Laser Powder Bed Fusion, Alexander H. Groeger Jan 2021

Texture-Driven Image Clustering In Laser Powder Bed Fusion, Alexander H. Groeger

Browse all Theses and Dissertations

The additive manufacturing (AM) field is striving to identify anomalies in laser powder bed fusion (LPBF) using multi-sensor in-process monitoring paired with machine learning (ML). In-process monitoring can reveal the presence of anomalies but creating a ML classifier requires labeled data. The present work approaches this problem by printing hundreds of Inconel-718 coupons with different processing parameters to capture a wide range of process monitoring imagery with multiple sensor types. Afterwards, the process monitoring images are encoded into feature vectors and clustered to isolate groups in each sensor modality. Four texture representations were learned by training two convolutional neural network …


Evaluating The Performance Of Using Speaker Diarization For Speech Separation Of In-Person Role-Play Dialogues, Raveendra Medaramitta Jan 2021

Evaluating The Performance Of Using Speaker Diarization For Speech Separation Of In-Person Role-Play Dialogues, Raveendra Medaramitta

Browse all Theses and Dissertations

Development of professional communication skills, such as motivational interviewing, often requires experiential learning through expert instructor-guided role-plays between the trainee and a standard patient/actor. Due to the growing demand for such skills in practices, e.g., for health care providers in the management of mental health challenges, chronic conditions, substance misuse disorders, etc., there is an urgent need to improve the efficacy and scalability of such role-play based experiential learning, which are often bottlenecked by the time-consuming performance assessment process. WSU is developing ReadMI (Real-time Assessment of Dialogue in Motivational Interviewing) to address this challenge, a mobile AI solution aiming to …


Goal Management In Multi-Agent Systems, Venkatsampath Raja Gogineni Jan 2021

Goal Management In Multi-Agent Systems, Venkatsampath Raja Gogineni

Browse all Theses and Dissertations

Autonomous agents in a multi-agent system coordinate to achieve their goals. However, in a partially observable world, current multi-agent systems are often less effective in achieving their goals. In much part, this limitation is due to an agent's lack of reasoning about other agents and their mental states. Another factor is the agent's inability to share required knowledge with other agents and the lack of explanations in justifying the reasons behind the goal. This research addresses these problems by presenting a general approach for agent goal management in unexpected situations. In this approach, an agent applies three main concepts: goal …


Mathematical Formula Recognition And Automatic Detection And Translation Of Algorithmic Components Into Stochastic Petri Nets In Scientific Documents, Elisavet Elli Kostalia Jan 2021

Mathematical Formula Recognition And Automatic Detection And Translation Of Algorithmic Components Into Stochastic Petri Nets In Scientific Documents, Elisavet Elli Kostalia

Browse all Theses and Dissertations

A great percentage of documents in scientific and engineering disciplines include mathematical formulas and/or algorithms. Exploring the mathematical formulas in the technical documents, we focused on the mathematical operations associations, their syntactical correctness, and the association of these components into attributed graphs and Stochastic Petri Nets (SPN). We also introduce a formal language to generate mathematical formulas and evaluate their syntactical correctness. The main contribution of this work focuses on the automatic segmentation of mathematical documents for the parsing and analysis of detected algorithmic components. To achieve this, we present a synergy of methods, such as string parsing according to …


Content Adaption And Design In Mobile Learning Of Wind Instruments, Neha Priyadarshani Jan 2021

Content Adaption And Design In Mobile Learning Of Wind Instruments, Neha Priyadarshani

Browse all Theses and Dissertations

People in today's world seek things that are simple to use. Learning is one of the most crucial aspects of the ongoing digital transformation. Everything is now accessible with a single click on mobile devices, making access to instructional materials faster, easier, and more comfortable. It takes time and effort to build abilities and become an expert in the fields of learning, training, and teaching; and music learning demands a great deal of both practice and mentoring. Initially, music teachers and band directors must maintain a steady attention and devote a significant amount of time to manually teaching materials. This …


A Deep Understanding Of Structural And Functional Behavior Of Tabular And Graphical Modules In Technical Documents, Michail Alexiou Jan 2021

A Deep Understanding Of Structural And Functional Behavior Of Tabular And Graphical Modules In Technical Documents, Michail Alexiou

Browse all Theses and Dissertations

The rapid increase of published research papers in recent years has escalated the need for automated ways to process and understand them. The successful recognition of the information that is contained in technical documents, depends on the understanding of the document’s individual modalities. These modalities include tables, graphics, diagrams and etc. as defined in Bourbakis’ pioneering work. However, the depth of understanding is correlated to the efficiency of detection and recognition. In this work, a novel methodology is proposed for automatic processing of and understanding of tables and graphics images in technical document. Previous attempts on tables and graphics understanding …


Detecting Server-Side Web Applications With Unrestricted File Upload Vulnerabilities, Jin Huang Jan 2021

Detecting Server-Side Web Applications With Unrestricted File Upload Vulnerabilities, Jin Huang

Browse all Theses and Dissertations

Vulnerable web applications fundamentally undermine website security as they often expose critical infrastructures and sensitive information behind them to potential risks and threats. Web applications with unrestricted file upload vulnerabilities allow attackers to upload a file with malicious code, which can be later executed on the server by attackers to enable various attacks such as information exfiltration, spamming, phishing, and spreading malware. This dissertation presents our research in building two novel frameworks to detect server-side applications vulnerable to unrestricted file uploading attacks. We design the innovative model that holistically characterizes both data and control flows using a graphbased data structure. …


Identifying Knowledge Gaps Using A Graph-Based Knowledge Representation, Daniel P. Schmidt Jan 2020

Identifying Knowledge Gaps Using A Graph-Based Knowledge Representation, Daniel P. Schmidt

Browse all Theses and Dissertations

Knowledge integration and knowledge bases are becoming more and more prevalent in the systems we use every day. When developing these knowledge bases, it is important to ensure the correctness of the information upon entry, as well as allow queries of all sorts; for this, understanding where the gaps in knowledge can arise is critical. This thesis proposes a descriptive taxonomy of knowledge gaps, along with a framework for automated detection and resolution of some of those gaps. Additionally, the effectiveness of this framework is evaluated in terms of successful responses to queries on a knowledge base constructed from a …


Improving Pain Management In Patients With Sickle Cell Disease Using Machine Learning Techniques, Fan Yang Jan 2020

Improving Pain Management In Patients With Sickle Cell Disease Using Machine Learning Techniques, Fan Yang

Browse all Theses and Dissertations

Sickle cell disease (SCD) is an inherited red blood cell disorder that can cause a multitude of complications throughout a patient's life. Pain is the most common complication and a significant cause of morbidity. Since pain is a highly subjective experience, both medical providers and patients express difficulty in determining ideal treatment and management strategies for pain. Therefore, the development of objective pain assessment and pain forecasting methods is critical to pain management in SCD. On the other hand, the rapidly increasing use of mobile health (mHealth) technology and wearable devices gives the ability to build a remote health intervention …