Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 96

Full-Text Articles in Computer Engineering

Computational Modeling And Analysis Of Facial Expressions And Gaze For Discovery Of Candidate Behavioral Biomarkers For Children And Young Adults With Autism Spectrum Disorder, Megan Anita Witherow Apr 2024

Computational Modeling And Analysis Of Facial Expressions And Gaze For Discovery Of Candidate Behavioral Biomarkers For Children And Young Adults With Autism Spectrum Disorder, Megan Anita Witherow

Electrical & Computer Engineering Theses & Dissertations

Facial expression production and perception in autism spectrum disorder (ASD) suggest the potential presence of behavioral biomarkers that may stratify individuals on the spectrum into prognostic or treatment subgroups. High-speed internet and the ease of technology have enabled remote, scalable, affordable, and timely access to medical care, such as measurements of ASDrelated behaviors in familiar environments to complement clinical observation. Machine and deep learning (DL)-based analysis of video tracking (VT) of expression production and eye tracking (ET) of expression perception may aid stratification biomarker discovery for children and young adults with ASD. However, there are open challenges in 1) facial …


Broadband Dielectric Spectroscopic Detection Of Volatile Organic Compounds With Zinc Oxide And Metal-Organic Frameworks As Solid-State Sensor Materials, Papa Kojo Amoah Apr 2024

Broadband Dielectric Spectroscopic Detection Of Volatile Organic Compounds With Zinc Oxide And Metal-Organic Frameworks As Solid-State Sensor Materials, Papa Kojo Amoah

Electrical & Computer Engineering Theses & Dissertations

The industrial revolution drove technological progress but also increased the release of harmful pollutants, posing significant risks to human health and the environment. Volatile organic compounds (VOCs), which have various anthropogenic and natural sources, are particularly concerning due to their impact on public health, especially in urban areas. Addressing these adverse effects requires comprehensive strategies for mitigation as traditional gas sensing techniques have limitations and there is a need for innovative approaches to VOC detection.

VOCs encompass a diverse group of chemicals with high volatility, emitted from various human activities and natural sources. These compounds play a crucial role in …


Time Series Models For Predicting Application Gpu Utilization And Power Draw Based On Trace Data, Dorothy Xiaoshuang Parry Apr 2024

Time Series Models For Predicting Application Gpu Utilization And Power Draw Based On Trace Data, Dorothy Xiaoshuang Parry

Electrical & Computer Engineering Theses & Dissertations

This work explores collecting performance metrics and leveraging various statistical and machine learning time series predictive models on a memory-intensive application, Inception v3. Trace data collected using nvidia-smi measured GPU utilization and power draw for two runs of Inception3. Experimental results from the statistical and machine learning-based time series predictive algorithms showed that the predictions from statistical-based models were unable to capture the complex changes in the trace data. The Probabilistic TNN model provided the best results for the power draw trace, according to the test evaluation metrics. For the GPU utilization trace, the RNN models produced the most accurate …


Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla Aug 2023

Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla

Computer Science Theses & Dissertations

The definition of scholarly content has expanded to include the data and source code that contribute to a publication. While major archiving efforts to preserve conventional scholarly content, typically in PDFs (e.g., LOCKSS, CLOCKSS, Portico), are underway, no analogous effort has yet emerged to preserve the data and code referenced in those PDFs, particularly the scholarly code hosted online on Git Hosting Platforms (GHPs). Similarly, Software Heritage is working to archive public source code, but there is value in archiving the surrounding ephemera that provide important context to the code while maintaining their original URIs. In current implementations, source code …


Towards Intelligent Runtime Framework For Distributed Heterogeneous Systems, Polykarpos Thomadakis Aug 2023

Towards Intelligent Runtime Framework For Distributed Heterogeneous Systems, Polykarpos Thomadakis

Computer Science Theses & Dissertations

Scientific applications strive for increased memory and computing performance, requiring massive amounts of data and time to produce results. Applications utilize large-scale, parallel computing platforms with advanced architectures to accommodate their needs. However, developing performance-portable applications for modern, heterogeneous platforms requires lots of effort and expertise in both the application and systems domains. This is more relevant for unstructured applications whose workflow is not statically predictable due to their heavily data-dependent nature. One possible solution for this problem is the introduction of an intelligent Domain-Specific Language (iDSL) that transparently helps to maintain correctness, hides the idiosyncrasies of lowlevel hardware, and …


Towards A Robust Defense: A Multifaceted Approach To The Detection And Mitigation Of Neural Backdoor Attacks Through Feature Space Exploration And Analysis, Liuwan Zhu Aug 2023

Towards A Robust Defense: A Multifaceted Approach To The Detection And Mitigation Of Neural Backdoor Attacks Through Feature Space Exploration And Analysis, Liuwan Zhu

Electrical & Computer Engineering Theses & Dissertations

From voice assistants to self-driving vehicles, machine learning(ML), especially deep learning, revolutionizes the way we work and live, through the wide adoption in a broad range of applications. Unfortunately, this widespread use makes deep learning-based systems a desirable target for cyberattacks, such as generating adversarial examples to fool a deep learning system to make wrong decisions. In particular, many recent studies have revealed that attackers can corrupt the training of a deep learning model, e.g., through data poisoning, or distribute a deep learning model they created with “backdoors” planted, e.g., distributed as part of a software library, so that the …


Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane Aug 2023

Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane

Engineering Management & Systems Engineering Theses & Dissertations

Cloud Manufacturing(CMfg) is an advanced manufacturing model that caters to fast-paced agile requirements (Putnik, 2012). For manufacturing complex products that require extensive resources, manufacturers explore advanced manufacturing techniques like CMfg as it becomes infeasible to achieve high standards through complete ownership of manufacturing artifacts (Kuan et al., 2011). CMfg, with other names such as Manufacturing as a Service (MaaS) and Cyber Manufacturing (NSF, 2020), addresses the shortcoming of traditional manufacturing by building a virtual cyber enterprise of geographically distributed entities that manufacture custom products through collaboration.

With manufacturing venturing into cyberspace, Digital Trust issues concerning product quality, data, and intellectual …


Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego May 2023

Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego

Electrical & Computer Engineering Theses & Dissertations

World Health Organization (WHO) data show that around 684,000 people die from falls yearly, making it the second-highest mortality rate after traffic accidents [1]. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. In light of the recent widespread adoption of wearable sensors, it has become increasingly critical that fall detection models are developed that can effectively process large and sequential sensor signal data. Several researchers have recently developed fall detection algorithms based on wearable sensor data. However, real-time fall detection remains challenging because of the wide …


Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque Dec 2022

Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque

Electrical & Computer Engineering Theses & Dissertations

Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components dealing with physical processes and real-time computations, along with networking. CPSs often incorporate approaches merging from different scientific fields such as embedded systems, control systems, operational technology, information technology systems (ITS), and cybernetics. Today critical infrastructures (CIs) (e.g., energy systems, electric grids, etc.) and other CPSs (e.g., manufacturing industries, autonomous transportation systems, etc.) are experiencing challenges in dealing with cyberattacks. Major cybersecurity concerns are rising around CPSs because of their ever-growing use of information technology based automation. Often the security concerns are limited to probability-based possible attack …


Hard-Real-Time Computing Performance In A Cloud Environment, Alvin Cornelius Murphy Dec 2022

Hard-Real-Time Computing Performance In A Cloud Environment, Alvin Cornelius Murphy

Engineering Management & Systems Engineering Theses & Dissertations

The United States Department of Defense (DoD) is rapidly working with DoD Services to move from multi-year (e.g., 7-10) traditional acquisition programs to a commercial industrybased approach for software development. While commercial technologies and approaches provide an opportunity for rapid fielding of mission capabilities to pace threats, the suitability of commercial technologies to meet hard-real-time requirements within a surface combat system is unclear. This research establishes technical data to validate the effectiveness and suitability of current commercial technologies to meet the hard-real-time demands of a DoD combat management system. (Moreland Jr., 2013) conducted similar research; however, microservices, containers, and container …


Cyber Deception For Critical Infrastructure Resiliency, Md Ali Reza Al Amin Aug 2022

Cyber Deception For Critical Infrastructure Resiliency, Md Ali Reza Al Amin

Computational Modeling & Simulation Engineering Theses & Dissertations

The high connectivity of modern cyber networks and devices has brought many improvements to the functionality and efficiency of networked systems. Unfortunately, these benefits have come with many new entry points for attackers, making systems much more vulnerable to intrusions. Thus, it is critically important to protect cyber infrastructure against cyber attacks. The static nature of cyber infrastructure leads to adversaries performing reconnaissance activities and identifying potential threats. Threats related to software vulnerabilities can be mitigated upon discovering a vulnerability and-, developing and releasing a patch to remove the vulnerability. Unfortunately, the period between discovering a vulnerability and applying a …


Evaluation Of Generative Models For Predicting Microstructure Geometries In Laser Powder Bed Fusion Additive Manufacturing, Andy Ramlatchan Aug 2022

Evaluation Of Generative Models For Predicting Microstructure Geometries In Laser Powder Bed Fusion Additive Manufacturing, Andy Ramlatchan

Computer Science Theses & Dissertations

In-situ process monitoring for metals additive manufacturing is paramount to the successful build of an object for application in extreme or high stress environments. In selective laser melting additive manufacturing, the process by which a laser melts metal powder during the build will dictate the internal microstructure of that object once the metal cools and solidifies. The difficulty lies in that obtaining enough variety of data to quantify the internal microstructures for the evaluation of its physical properties is problematic, as the laser passes at high speeds over powder grains at a micrometer scale. Imaging the process in-situ is complex …


Applied Deep Learning: Case Studies In Computer Vision And Natural Language Processing, Md Reshad Ul Hoque Aug 2022

Applied Deep Learning: Case Studies In Computer Vision And Natural Language Processing, Md Reshad Ul Hoque

Electrical & Computer Engineering Theses & Dissertations

Deep learning has proved to be successful for many computer vision and natural language processing applications. In this dissertation, three studies have been conducted to show the efficacy of deep learning models for computer vision and natural language processing. In the first study, an efficient deep learning model was proposed for seagrass scar detection in multispectral images which produced robust, accurate scars mappings. In the second study, an arithmetic deep learning model was developed to fuse multi-spectral images collected at different times with different resolutions to generate high-resolution images for downstream tasks including change detection, object detection, and land cover …


Adaptive Risk Network Dependency Analysis Of Complex Hierarchical Systems, Katherine L. Smith Aug 2022

Adaptive Risk Network Dependency Analysis Of Complex Hierarchical Systems, Katherine L. Smith

Computational Modeling & Simulation Engineering Theses & Dissertations

Recently the number, variety, and complexity of interconnected systems have been increasing while the resources available to increase resilience of those systems have been decreasing. Therefore, it has become increasingly important to quantify the effects of risks and the resulting disruptions over time as they ripple through networks of systems. This dissertation presents a novel modeling and simulation methodology which quantifies resilience, as impact on performance over time, and risk, as the impact of probabilistic disruptions. This work includes four major contributions over the state-of-the-art which are: (1) cyclic dependencies are captured by separation of performance variables into layers which …


Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny May 2022

Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny

Civil & Environmental Engineering Theses & Dissertations

Ride-sourcing transportation services offered by transportation network companies (TNCs) like Uber and Lyft are disrupting the transportation landscape. The growing demand on these services, along with their potential short and long-term impacts on the environment, society, and infrastructure emphasize the need to further understand the ride-sourcing system. There were no sufficient data to fully understand the system and integrate it within regional multimodal transportation frameworks. This can be attributed to commercial and competition reasons, given the technology-enabled and innovative nature of the system. Recently, in 2019, the City of Chicago the released an extensive and complete ride-sourcing trip-level data for …


Joint Linear And Nonlinear Computation With Data Encryption For Efficient Privacy-Preserving Deep Learning, Qiao Zhang Dec 2021

Joint Linear And Nonlinear Computation With Data Encryption For Efficient Privacy-Preserving Deep Learning, Qiao Zhang

Electrical & Computer Engineering Theses & Dissertations

Deep Learning (DL) has shown unrivalled performance in many applications such as image classification, speech recognition, anomalous detection, and business analytics. While end users and enterprises own enormous data, DL talents and computing power are mostly gathered in technology giants having cloud servers. Thus, data owners, i.e., the clients, are motivated to outsource their data, along with computationally-intensive tasks, to the server in order to leverage the server’s abundant computation resources and DL talents for developing cost-effective DL solutions. However, trust is required between the server and the client to finish the computation tasks (e.g., conducting inference for the newly-input …


Data-Driven Operational And Safety Analysis Of Emerging Shared Electric Scooter Systems, Qingyu Ma Dec 2021

Data-Driven Operational And Safety Analysis Of Emerging Shared Electric Scooter Systems, Qingyu Ma

Computational Modeling & Simulation Engineering Theses & Dissertations

The rapid rise of shared electric scooter (E-Scooter) systems offers many urban areas a new micro-mobility solution. The portable and flexible characteristics have made E-Scooters a competitive mode for short-distance trips. Compared to other modes such as bikes, E-Scooters allow riders to freely ride on different facilities such as streets, sidewalks, and bike lanes. However, sharing lanes with vehicles and other users tends to cause safety issues for riding E-Scooters. Conventional methods are often not applicable for analyzing such safety issues because well-archived historical crash records are not commonly available for emerging E-Scooters.

Perceiving the growth of such a micro-mobility …


Electrostatic Design And Characterization Of A 200 Kev Photogun And Wien Spin Rotator, Gabriel G. Palacios Serrano Apr 2021

Electrostatic Design And Characterization Of A 200 Kev Photogun And Wien Spin Rotator, Gabriel G. Palacios Serrano

Electrical & Computer Engineering Theses & Dissertations

High-energy nuclear physics experiments at the Jefferson Lab Continuous Electron Beam Accelerator Facility (CEBAF) require high spin-polarization electron beams produced from strained super-lattice GaAs photocathodes activated to negative electron affinity in a high voltage photogun operating at 130 kV dc. A pair of Wien filter spin rotators in the injector provides precise control of the electron beam polarization at the end station target. An upgrade of the CEBAF injector to better support the upcoming Moller experiment requires increasing the electron beam energy to 200 keV, resulting in better transmission through injector apertures and improved photocathode lifetime. In addition, the energy …


Feature Extraction And Design In Deep Learning Models, Daniel Perez Apr 2021

Feature Extraction And Design In Deep Learning Models, Daniel Perez

Computational Modeling & Simulation Engineering Theses & Dissertations

The selection and computation of meaningful features is critical for developing good deep learning methods. This dissertation demonstrates how focusing on this process can significantly improve the results of learning-based approaches. Specifically, this dissertation presents a series of different studies in which feature extraction and design was a significant factor for obtaining effective results. The first two studies are a content-based image retrieval system (CBIR) and a seagrass quantification study in which deep learning models were used to extract meaningful high-level features that significantly increased the performance of the approaches. Secondly, a method for change detection is proposed where the …


Onboard Autonomous Controllability Assessment For Fixed Wing Suavs, Brian Edward Duvall Dec 2020

Onboard Autonomous Controllability Assessment For Fixed Wing Suavs, Brian Edward Duvall

Mechanical & Aerospace Engineering Theses & Dissertations

Traditionally fixed-wing small Unmanned Arial Vehicles (sUAV) are flown while in direct line of sight with commands from a remote operator. However, this is changing with the increased popularity and ready availability of low-cost flight controllers. Flight controllers provide fixed-wing sUAVs with functions that either minimize or eliminate the need for a remote operator. Since the remote operator is no longer controlling the sUAV, it is impossible to determine if the fixed-wing sUAV has proper control authority. In this work, a controllability detection system was designed, built, and flight-tested using COTS hardware. The method features in-situ measurement and analysis of …


Parallelization Of The Advancing Front Local Reconnection Mesh Generation Software Using A Pseudo-Constrained Parallel Data Refinement Method, Kevin Mark Garner Jr. Dec 2020

Parallelization Of The Advancing Front Local Reconnection Mesh Generation Software Using A Pseudo-Constrained Parallel Data Refinement Method, Kevin Mark Garner Jr.

Computer Science Theses & Dissertations

Preliminary results of a long-term project entailing the parallelization of an industrial strength sequential mesh generator, called Advancing Front Local Reconnection (AFLR), are presented. AFLR has been under development for the last 25 years at the NSF/ERC center at Mississippi State University. The parallel procedure that is presented is called Pseudo-constrained (PsC) Parallel Data Refinement (PDR) and consists of the following steps: (i) use an octree data-decomposition scheme to divide the original geometry into subdomains (octree leaves), (ii) refine each subdomain with the proper adjustments of its neighbors using the given refinement code, and (iii) combine all subdomain data into …


Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning Aug 2020

Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning

Electrical & Computer Engineering Theses & Dissertations

Mobile devices are becoming smarter to satisfy modern user's increasing needs better, which is achieved by equipping divers of sensors and integrating the most cutting-edge Deep Learning (DL) techniques. As a sophisticated system, it is often vulnerable to multiple attacks (side-channel attacks, neural backdoor, etc.). This dissertation proposes solutions to maintain the cyber-hygiene of the DL-Based smartphone system by exploring possible vulnerabilities and developing countermeasures.

First, I actively explore possible vulnerabilities on the DL-Based smartphone system to develop proactive defense mechanisms. I discover a new side-channel attack on smartphones using the unrestricted magnetic sensor data. I demonstrate that attackers can …


Deep Cellular Recurrent Neural Architecture For Efficient Multidimensional Time-Series Data Processing, Lasitha S. Vidyaratne Apr 2020

Deep Cellular Recurrent Neural Architecture For Efficient Multidimensional Time-Series Data Processing, Lasitha S. Vidyaratne

Electrical & Computer Engineering Theses & Dissertations

Efficient processing of time series data is a fundamental yet challenging problem in pattern recognition. Though recent developments in machine learning and deep learning have enabled remarkable improvements in processing large scale datasets in many application domains, most are designed and regulated to handle inputs that are static in time. Many real-world data, such as in biomedical, surveillance and security, financial, manufacturing and engineering applications, are rarely static in time, and demand models able to recognize patterns in both space and time. Current machine learning (ML) and deep learning (DL) models adapted for time series processing tend to grow in …


Communication Capability For A Simulation-Based Test And Evaluation Framework For Autonomous Systems, Ntiana Sakioti Oct 2019

Communication Capability For A Simulation-Based Test And Evaluation Framework For Autonomous Systems, Ntiana Sakioti

Computational Modeling & Simulation Engineering Theses & Dissertations

The design and testing process for collaborative autonomous systems can be extremely complex and time-consuming, so it is advantageous to begin testing early in the design. A Test & Evaluation (T&E) Framework was previously developed to enable the testing of autonomous software at various levels of mixed reality. The Framework assumes a modular approach to autonomous software development, which introduces the possibility that components are not in the same stage of development. The T&E Framework allows testing to begin early in a simulated environment, with the autonomous software methodically migrating from virtual to augmented to physical environments as component development …


Cyber Security- A New Secured Password Generation Algorithm With Graphical Authentication And Alphanumeric Passwords Along With Encryption, Akash Rao Apr 2019

Cyber Security- A New Secured Password Generation Algorithm With Graphical Authentication And Alphanumeric Passwords Along With Encryption, Akash Rao

Electrical & Computer Engineering Theses & Dissertations

Graphical passwords are always considered as an alternative of alphanumeric passwords for their better memorability and usability [1]. Alphanumeric passwords provide an adequate amount of satisfaction, but they do not offer better memorability compared to graphical passwords [1].

On the other hand, graphical passwords are considered less secured and provide better memorability [1]. Therefore many researchers have researched on graphical passwords to overcome the vulnerability. One of the most significant weaknesses of the graphical passwords is "Shoulder Surfing Attack," which means, sneaking into a victim's computer to learn the whole password or part of password or some confidential information. Such …


A Framework For Test & Evaluation Of Autonomous Systems Along The Virtuality-Reality Spectrum, Nathan D. Gonda Apr 2019

A Framework For Test & Evaluation Of Autonomous Systems Along The Virtuality-Reality Spectrum, Nathan D. Gonda

Computational Modeling & Simulation Engineering Theses & Dissertations

Test & Evaluation of autonomous vehicles presents a challenge as the vehicles may have emergent behavior and it is frequently difficult to ascertain the reason for software decisions. Current Test & Evaluation approaches for autonomous systems place the vehicles in various operating scenarios to observe their behavior. However, this introduces dependencies between design and development lifecycle of the autonomous software and physical vehicle hardware. Simulation-based testing can alleviate the necessity to have physical hardware; however, it can be costly when transitioning the autonomous software to and from a simulation testing environment. The objective of this thesis is to develop a …


Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque Jul 2018

Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque

Computational Modeling & Simulation Engineering Theses & Dissertations

Critical infrastructure such as a Bulk Power System (BPS) should have some quantifiable measure of resiliency and definite rule-sets to achieve a certain resilience value. Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) networks are integral parts of BPS. BPS or ICS are themselves not vulnerable because of their proprietary technology, but when the control network and the corporate network need to have communications for performance measurements and reporting, the ICS or BPS become vulnerable to cyber-attacks. Thus, a systematic way of quantifying resiliency and identifying crucial nodes in the network is critical for addressing the cyber …


Identification And Optimal Linear Tracking Control Of Odu Autonomous Surface Vehicle, Nadeem Khan Jul 2018

Identification And Optimal Linear Tracking Control Of Odu Autonomous Surface Vehicle, Nadeem Khan

Mechanical & Aerospace Engineering Theses & Dissertations

Autonomous surface vehicles (ASVs) are being used for diverse applications of civilian and military importance such as: military reconnaissance, sea patrol, bathymetry, environmental monitoring, and oceanographic research. Currently, these unmanned tasks can accurately be accomplished by ASVs due to recent advancements in computing, sensing, and actuating systems. For this reason, researchers around the world have been taking interest in ASVs for the last decade. Due to the ever-changing surface of water and stochastic disturbances such as wind and tidal currents that greatly affect the path-following ability of ASVs, identification of an accurate model of inherently nonlinear and stochastic ASV system …


Design And Implementation Of An Artificial Neural Network Controller For Quadrotor Flight In Confined Environment, Ahmed Mekky Apr 2018

Design And Implementation Of An Artificial Neural Network Controller For Quadrotor Flight In Confined Environment, Ahmed Mekky

Mechanical & Aerospace Engineering Theses & Dissertations

Quadrotors offer practical solutions for many applications, such as emergency rescue, surveillance, military operations, videography and many more. For this reason, they have recently attracted the attention of research and industry. Even though they have been intensively studied, quadrotors still suffer from some challenges that limit their use, such as trajectory measurement, attitude estimation, obstacle avoidance, safety precautions, and land cybersecurity. One major problem is flying in a confined environment, such as closed buildings and tunnels, where the aerodynamics around the quadrotor are affected by close proximity objects, which result in tracking performance deterioration, and sometimes instability. To address this …


To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin Apr 2018

To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin

Computer Science Theses & Dissertations

When replaying an archived web page (known as a memento), the fundamental expectation is that the page should be viewable and function exactly as it did at archival time. However, this expectation requires web archives to modify the page and its embedded resources, so that they no longer reference (link to) the original server(s) they were archived from but back to the archive. Although these modifications necessarily change the state of the representation, it is understood that without them the replay of mementos from the archive would not be possible. Unfortunately, because the replay of mementos and the modifications made …