Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2022

Institution
Keyword
Publication
Publication Type
File Type

Articles 661 - 677 of 677

Full-Text Articles in Computer Engineering

Automatically Generating Searchable Fingerprints For Wordpress Plugins Using Static Program Analysis, Chuang Li Jan 2022

Automatically Generating Searchable Fingerprints For Wordpress Plugins Using Static Program Analysis, Chuang Li

Browse all Theses and Dissertations

This thesis introduces a novel method to automatically generate fingerprints for WordPress plugins. Our method performs static program analysis using Abstract Syntax Trees (ASTs) of WordPress plugins. The generated fingerprints can be used for identifying these plugins using search engines, which have support critical applications such as proactively identifying web servers with vulnerable WordPress plugins. We have used our method to generate fingerprints for over 10,000 WordPress plugins and analyze the resulted fingerprints. Our fingerprints have also revealed 453 websites that are potentially vulnerable. We have also compared fingerprints for vulnerable plugins and those for vulnerability-free plugins.


Data Analytics And Visualization For Virtual Simulation, Sri Lekha Koppaka Jan 2022

Data Analytics And Visualization For Virtual Simulation, Sri Lekha Koppaka

Browse all Theses and Dissertations

Healthcare organizations attract a diversity of caregivers and patients by providing essential care. While interacting with people of various races, ethnicity, and economical background, caregivers need to be empathetic and compassionate. Proper training and exposure are needed to understand the patient’s background and handle different situations and provide the best care for the patient. With social determinants of health (SDOH) as the basis, the thesis focuses on providing exposure through “Wright LIFE (Lifelike Immersion for Equity) - A simulation-based training tool” to two such scenarios covering patients from the LGBTQIA+ community & autism spectrum disorder (ASD). This interactive tool helps …


Development Of Enhanced User Interaction And User Experience For Supporting Serious Role-Playing Games In A Healthcare Setting, Mark Lee Alow Jan 2022

Development Of Enhanced User Interaction And User Experience For Supporting Serious Role-Playing Games In A Healthcare Setting, Mark Lee Alow

Browse all Theses and Dissertations

Education about implicit bias in clinical settings is essential for improving the quality of healthcare for underrepresented groups. Such a learning experience can be delivered in the form of a serious game simulation. WrightLIFE (Lifelike Immersion for Equity) is a project that combines two serious game simulations, with each addressing the group that faces implicit bias. These groups are individuals that identify as LGBTQIA+ and people with autism spectrum disorder (ASD). The project presents healthcare providers with a training tool that puts them in the roles of the patient and a medical specialist and immerses them in social and clinical …


Few-Shot Malware Detection Using A Novel Adversarial Reprogramming Model, Ekula Praveen Kumar Jan 2022

Few-Shot Malware Detection Using A Novel Adversarial Reprogramming Model, Ekula Praveen Kumar

Browse all Theses and Dissertations

The increasing sophistication of malware has made detecting and defending against new strains a major challenge for cybersecurity. One promising approach to this problem is using machine learning techniques that extract representative features and train classification models to detect malware in an early stage. However, training such machine learning-based malware detection models represents a significant challenge that requires a large number of high-quality labeled data samples while it is very costly to obtain them in real-world scenarios. In other words, training machine learning models for malware detection requires the capability to learn from only a few labeled examples. To address …


A Solder-Defined Computer Architecture For Backdoor And Malware Resistance, Marc W. Abel Jan 2022

A Solder-Defined Computer Architecture For Backdoor And Malware Resistance, Marc W. Abel

Browse all Theses and Dissertations

This research is about securing control of those devices we most depend on for integrity and confidentiality. An emerging concern is that complex integrated circuits may be subject to exploitable defects or backdoors, and measures for inspection and audit of these chips are neither supported nor scalable. One approach for providing a “supply chain firewall” may be to forgo such components, and instead to build central processing units (CPUs) and other complex logic from simple, generic parts. This work investigates the capability and speed ceiling when open-source hardware methodologies are fused with maker-scale assembly tools and visible-scale final inspection.

The …


Hardware Implementations Of Spiking Neural Networks And Artificially Intelligent Systems, Alexander J. Leigh Jan 2022

Hardware Implementations Of Spiking Neural Networks And Artificially Intelligent Systems, Alexander J. Leigh

Electronic Theses and Dissertations

Artificial spiking neural networks are gaining increasing prominence due to their potential advantages over traditional, time-static artificial neural networks. Custom hardware implementations of spiking neural networks present many advantages over other implementation mediums. Two main topics are the focus of this work. Firstly, digital hardware implementations of spiking neurons and neuromorphic hardware are explored and presented. These implementations include novel implementations for lowered digital hardware requirements and reduced power consumption.

The second section of this work proposes a novel method for selectively adding sparsity to a spiking neural network based on training set images for pattern recognition applications, thereby greatly …


Computer Enabled Interventions To Communication And Behavioral Problems In Collaborative Work Environments, Ashutosh Shivakumar Jan 2022

Computer Enabled Interventions To Communication And Behavioral Problems In Collaborative Work Environments, Ashutosh Shivakumar

Browse all Theses and Dissertations

Task success in co-located and distributed collaborative work settings is characterized by clear and efficient communication between participating members. Communication issues like 1) Unwanted interruptions and 2) Delayed feedback in collaborative work based distributed scenarios have the potential to impede task coordination and significantly decrease the probability of accomplishing task objective. Research shows that 1) Interrupting tasks at random moments can cause users to take up to 30% longer to resume tasks, commit up to twice the errors, and experience up to twice the negative effect than when interrupted at boundaries 2) Skill retention in collaborative learning tasks improves with …


Optimized Cancer Detection On Various Magnified Histopathological Colon Imagesbased On Dwt Features And Fcm Clustering, Tina Babu, Tripty Singh, Deepa Gupta, Shahin Hameed Jan 2022

Optimized Cancer Detection On Various Magnified Histopathological Colon Imagesbased On Dwt Features And Fcm Clustering, Tina Babu, Tripty Singh, Deepa Gupta, Shahin Hameed

Turkish Journal of Electrical Engineering and Computer Sciences

Due to the morphological characteristics and other biological aspects in histopathological images, the computerized diagnosis of colon cancer in histopathology images has gained popularity. The images acquired using the histopathology microscope may differ for greater visibility by magnifications. This causes a change in morphological traits leading to intra and inter-observer variability. An automatic colon cancer diagnosis system for various magnification is therefore crucial. This work proposes a magnification independent segmentation approach based on the connected component area and double density dual tree DWT (discrete wavelet transform) coefficients are derived from the segmented region. The derived features are reduced further shortened …


Motion-Aware Vehicle Detection In Driving Videos, Mehmet Kiliçarslan, Tansu Temel Jan 2022

Motion-Aware Vehicle Detection In Driving Videos, Mehmet Kiliçarslan, Tansu Temel

Turkish Journal of Electrical Engineering and Computer Sciences

This paper focuses on vehicle detection based on motion features in driving videos. Long-term motion information can assist in driving scenarios since driving is a complicated and dynamic process. The proposed method is a deep learning based model which processes motion frame image. This image merges both spatial (frame) and temporal (motion) information. Hence, the model jointly detects vehicles and their motion from a single image. The trained model on Toyota Motor Europe Motorway Dataset reaches 83% mean average precision (mAP). Our experiments demonstrate that the proposed method has a higher mAP than a tracking-based model. The proposed method runs …


Fft Enabled Ecc For Wsn Nodes Without Hardware Multiplier Support, Utku Gülen, Selçuk Baktir Jan 2022

Fft Enabled Ecc For Wsn Nodes Without Hardware Multiplier Support, Utku Gülen, Selçuk Baktir

Turkish Journal of Electrical Engineering and Computer Sciences

ECC is a popular cryptographic algorithm for key distribution in wireless sensor networks where power efficiency is desirable. A power efficient implementation of ECC without using hardware multiplier support was proposed earlier for wireless sensor nodes. The proposed implementation utilized the number theoretic transform to carry operands to the frequency domain, and conducted Montgomery multiplication, in addition to other finite field operations, in that domain. With this work, we perform in the frequency domain only polynomial multiplication and use the fast Fourier transform to carry operands between the time and frequency domains. Our ECC implementation over $GF((2^{13}-1)^{13})$ on the MSP430 …


Improving Collaborative Recommendation Based On Item Weight Link Prediction, Sahraoui Kharroubi, Youcef Dahmani, Omar Nouali Jan 2022

Improving Collaborative Recommendation Based On Item Weight Link Prediction, Sahraoui Kharroubi, Youcef Dahmani, Omar Nouali

Turkish Journal of Electrical Engineering and Computer Sciences

There is a continuous information overload on the Web. The problem treated is how to have relevant items (documents, products, services, etc.) at time and without difficulty. Filtering system also called recommender systems are widely used to recommend items to users by similarity process such as Amazon, MovieLens, Cdnow, etc. In the literature, to predict a link in a bipartite network, most methods are based either on a binary history (like, dislike) or on the common neighbourhood of the active user. In this paper, we modelled the recommender system by a weighted bipartite network. The bipartite topology offers a bidirectional …


A Futuristic Approach To Generate Random Bit Sequence Using Dynamic Perturbedchaotic System, Sathya Krishnamoorthi, Premalatha Jayapaul, Vani Rajasekar, Rajesh Kumar Dhanaraj, Celestine Iwendi Jan 2022

A Futuristic Approach To Generate Random Bit Sequence Using Dynamic Perturbedchaotic System, Sathya Krishnamoorthi, Premalatha Jayapaul, Vani Rajasekar, Rajesh Kumar Dhanaraj, Celestine Iwendi

Turkish Journal of Electrical Engineering and Computer Sciences

Most of the web applications require security which in turn requires random numbers. Pseudo-random numbers are required with good statistical properties and efficiency. Use of chaotic map to dynamically perturb another chaotic map that generates the random bit output is introduced in this work. Perturbance is introduced to improvise the chaotic behaviour of a base map and increase the periodicity. PRNG with this architecture is devised to generate random bit sequence from initial keyspace. The statistical properties of newly constructed PRNG are tested with NIST SP 800-22 statistical test suite and were shown to have good randomness. To ensure its …


Evaluating The English-Turkish Parallel Treebank For Machine Translation, Onur Görgün, Olcay Taner Yildiz Jan 2022

Evaluating The English-Turkish Parallel Treebank For Machine Translation, Onur Görgün, Olcay Taner Yildiz

Turkish Journal of Electrical Engineering and Computer Sciences

This study extends our initial efforts in building an English-Turkish parallel treebank corpus for statistical machine translation tasks. We manually generated parallel trees for about 17K sentences selected from the Penn Treebank corpus. English sentences vary in length: 15 to 50 tokens including punctuation. We constrained the translation of trees by (i) reordering of leaf nodes based on suffixation rules in Turkish, and (ii) gloss replacement. We aim to mimic human annotator?s behavior in real translation task. In order to fill the morphological and syntactic gap between languages, we do morphological annotation and disambiguation. We also apply our heuristics by …


A Novel Energy Consumption Model For Autonomous Mobile Robot, Gürkan Gürgöze, İbrahi̇m Türkoğlu Jan 2022

A Novel Energy Consumption Model For Autonomous Mobile Robot, Gürkan Gürgöze, İbrahi̇m Türkoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, a novel predictive energy consumption model has been developed to facilitate the development of tasks based on efficient energy consumption strategies in mobile robot systems. For the proposed energy consumption model, an advanced mathematical system model that takes into account all parameters during the motion of the mobile robot is created. The parameters of inclination, load, dynamic friction, wheel slip and speed-torque saturation limit, which are often neglected in existing models, are especially used in our model. Thus, the effects of unexpected disruptors on energy consumption in the real world environment are also taken into account. As …


Automatically Classifying Familiar Web Users From Eye-Tracking Data:A Machine Learning Approach, Meli̇h Öder, Şükrü Eraslan, Yeli̇z Yesi̇lada Jan 2022

Automatically Classifying Familiar Web Users From Eye-Tracking Data:A Machine Learning Approach, Meli̇h Öder, Şükrü Eraslan, Yeli̇z Yesi̇lada

Turkish Journal of Electrical Engineering and Computer Sciences

Eye-tracking studies typically collect enormous amount of data encoding rich information about user behaviours and characteristics on the web. Eye-tracking data has been proved to be useful for usability and accessibility testing and for developing adaptive systems. The main objective of our work is to mine eye-tracking data with machine learning algorithms to automatically detect users' characteristics. In this paper, we focus on exploring different machine learning algorithms to automatically classify whether users are familiar or not with a web page. We present our work with an eye-tracking data of 81 participants on six web pages. Our results show that …


Shape Investigations Of Structures Formed By The Self-Assembly Of Aromaticamino Acids Using The Density-Based Spatial Clustering Of Applications With Noise Algorithm, Mehmet Gökhan Habi̇boğlu, Helen W. Hernandez, Şahi̇n Uyaver Jan 2022

Shape Investigations Of Structures Formed By The Self-Assembly Of Aromaticamino Acids Using The Density-Based Spatial Clustering Of Applications With Noise Algorithm, Mehmet Gökhan Habi̇boğlu, Helen W. Hernandez, Şahi̇n Uyaver

Turkish Journal of Electrical Engineering and Computer Sciences

Tyrosine, tryptophan, and phenylalanine are important aromatic amino acids for human health. If they are not properly metabolized, severe rare mental or metabolic diseases can emerge, many of which are not researched enough due to economic priorities. In our previous simulations, all three of these amino acids are discovered to be self-organizing and to have complex aggregations at different temperatures. Two of these essential stable formations are observed during our simulations: tubular-like and spherical-like structures. In this study, we develop and implement a clustering analyzing algorithm using density-based spatial clustering of applications with noise (DBSCAN) to measure the shapes of …


An Effective Prediction Method For Network State Information In Sd-Wan, Erdal Akin, Ferdi̇ Saraç, Ömer Aslan Jan 2022

An Effective Prediction Method For Network State Information In Sd-Wan, Erdal Akin, Ferdi̇ Saraç, Ömer Aslan

Turkish Journal of Electrical Engineering and Computer Sciences

In a software-defined wide area network (SD-WAN), a logically centralized controller is responsible for computing and installing paths in order to transfer packets among geographically distributed locations and remote users. Accordingly, this would necessitate obtaining the global view and dynamic network state information (NSI) of the network. Therefore, the centralized controller periodically collects link-state information from each port of each switch at fixed time periods. While collecting NSI in short periods causes protocol overhead on the controller, collecting in longer periods leads to obtaining inaccurate NSI. In both cases, packet losses are inevitable, which is not preferred for quality of …