Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (20)
- Chulalongkorn University (19)
- University of Arkansas, Fayetteville (9)
- Old Dominion University (7)
- Louisiana State University (5)
-
- University of South Florida (5)
- New Jersey Institute of Technology (4)
- Air Force Institute of Technology (3)
- University of Massachusetts Amherst (3)
- University of Nevada, Las Vegas (3)
- West Virginia University (3)
- Michigan Technological University (2)
- South Dakota State University (2)
- University of New Orleans (2)
- University of Texas at El Paso (2)
- Walden University (2)
- Bowling Green State University (1)
- California Polytechnic State University, San Luis Obispo (1)
- City University of New York (CUNY) (1)
- Clemson University (1)
- Dakota State University (1)
- East Tennessee State University (1)
- Grand Valley State University (1)
- Northern Illinois University (1)
- Portland State University (1)
- Singapore Management University (1)
- Syracuse University (1)
- The University of Southern Mississippi (1)
- University of Central Florida (1)
- University of Denver (1)
- Keyword
-
- Computer Science (20)
- Department of Computer Science and Engineering (20)
- Machine Learning (10)
- Computer Engineering (8)
- Machine learning (8)
-
- Cybersecurity (7)
- Deep Learning (6)
- Robotics (5)
- Natural language processing (4)
- Artificial Intelligence (3)
- Computer vision (3)
- Critical Infrastructure (3)
- Health Care (3)
- Artificial intelligence (2)
- CAD (2)
- Communication (2)
- Cyberattack (2)
- Deep learning (2)
- Educational Software (2)
- Face Recognition (2)
- Information Technology (2)
- Online Learning (2)
- Optimization (2)
- PHP (2)
- Quantum computing (2)
- Reinforcement Learning (2)
- Security (2)
- Social Determinants of Health (2)
- Spiking neural networks (2)
- Sustainability (2)
- Publication
-
- Browse all Theses and Dissertations (20)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (19)
- Electronic Theses and Dissertations (6)
- Computer Science and Computer Engineering Undergraduate Honors Theses (5)
- USF Tampa Graduate Theses and Dissertations (5)
-
- Doctoral Dissertations (4)
- Theses and Dissertations (4)
- Dissertations (3)
- Graduate Theses, Dissertations, and Problem Reports (3)
- Honors Theses (3)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (3)
- Computational Modeling & Simulation Engineering Theses & Dissertations (2)
- Dissertations, Master's Theses and Master's Reports (2)
- Electrical & Computer Engineering Theses & Dissertations (2)
- Graduate Theses and Dissertations (2)
- LSU Doctoral Dissertations (2)
- Open Access Theses & Dissertations (2)
- Theses (2)
- University of New Orleans Theses and Dissertations (2)
- Walden Dissertations and Doctoral Studies (2)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
- All Theses (1)
- Civil & Environmental Engineering Theses & Dissertations (1)
- Computer Engineering (1)
- Computer Science Theses & Dissertations (1)
- Culminating Experience Projects (1)
- Dissertations - ALL (1)
- Dissertations and Theses (1)
- Dissertations and Theses Collection (Open Access) (1)
- Dissertations, Theses, and Capstone Projects (1)
Articles 31 - 60 of 115
Full-Text Articles in Computer Engineering
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Computer Engineering
This project examines the development of a smart boat which could serve as a possible marine research apparatus. The smart boat consists of a miniature vessel containing a low-cost microcontroller to live stream a camera feed, GPS telemetry, and compass data through its own WiFi access point. The smart boat also has the potential for autonomous navigation. My project captivated the interest of several members of California Polytechnic State University, San Luis Obispo’s (Cal Poly SLO) Marine Science Department faculty, who proposed a variety of fascinating and valuable smart boat applications.
Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld
Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld
Dissertations
This dissertation focuses on the development of machine learning algorithms for spiking neural networks, with an emphasis on local three-factor learning rules that are in keeping with the constraints imposed by current neuromorphic hardware. Spiking neural networks (SNNs) are an alternative to artificial neural networks (ANNs) that follow a similar graphical structure but use a processing paradigm more closely modeled after the biological brain in an effort to harness its low power processing capability. SNNs use an event based processing scheme which leads to significant power savings when implemented in dedicated neuromorphic hardware such as Intel’s Loihi chip.
This work …
Un-Fair Trojan: Targeted Backdoor Attacks Against Model Fairness, Nicholas Furth
Un-Fair Trojan: Targeted Backdoor Attacks Against Model Fairness, Nicholas Furth
Theses
Machine learning models have been shown to be vulnerable against various backdoor and data poisoning attacks that adversely affect model behavior. Additionally, these attacks have been shown to make unfair predictions with respect to certain protected features. In federated learning, multiple local models contribute to a single global model communicating only using local gradients, the issue of attacks become more prevalent and complex. Previously published works revolve around solving these issues both individually and jointly. However, there has been little study on the effects of attacks against model fairness. Demonstrated in this work, a flexible attack, which we call Un-Fair …
Middle School Students Communicating Computational Thinking: A Systemic Functional Linguistics-Case Study Of Bilingual, Collaborative Teaching/Learning Of Computer Programming In Python, Jose Antonio Lecea Yanguas
Middle School Students Communicating Computational Thinking: A Systemic Functional Linguistics-Case Study Of Bilingual, Collaborative Teaching/Learning Of Computer Programming In Python, Jose Antonio Lecea Yanguas
Language, Literacy, and Sociocultural Studies ETDs
This dissertation presents the first Systemic Functional Linguistics-based analysis of the teaching/learning of computational thinking through computer programming and comprehensive analysis of discourse of a whole computer programming course at any educational level. The current educational research raises questions about the nature of authentic computational
vii
thinking teaching/learning environments and how they happen moment-to-moment. In one such environment, I examined the discourse of a facilitator, three students, and their Language Arts teacher in an introductory middle school after-school course (approximately 30 hours) in spring 2017 as students created a video in Python.
Methodologically, I show how a Systemic Functional Linguistics-based …
Investigation Of Python Variable Privacy, Joshua Bartholomew
Investigation Of Python Variable Privacy, Joshua Bartholomew
Honors Theses
This study looks at the relative security of Python regarding private variables and functions used in most other programming languages. Python has only grown in popularity due to its simple syntax and developing capabilities. However, little research has been published about how secure Python code and programs compiled from Python code actually are. This research seeks to expose vulnerabilities in Python code and determine what must be done for these vulnerabilities to be exploited by hackers to abuse potentially sensitive information contained within the program.
The proposed methodology includes examining the private variable concept in other programming languages and conducting …
Understanding And Hardening Blockchain Network Security Against Denial Of Service Attacks, Kai Li
Understanding And Hardening Blockchain Network Security Against Denial Of Service Attacks, Kai Li
Dissertations - ALL
This thesis aims to examine the security of a blockchain's communication network. A blockchain relies on a communication network to deliver transactions. Understanding and hardening the security of the communication network against Denial-of-Service (DoS) attacks are thus critical to the well-being of blockchain participants. Existing research has examined blockchain system security in various system components, including mining incentives, consensus protocols, and applications such as smart contracts. However, the security of a blockchain's communication network remains understudied.
In practice, a blockchain's communication network typically consists of three services: RPC service, P2P network, and mempool. This thesis examines each service's designs and …
Privacy Assessment Breakthrough: A Design Science Approach To Creating A Unified Methodology, Lisa Mckee
Privacy Assessment Breakthrough: A Design Science Approach To Creating A Unified Methodology, Lisa Mckee
Masters Theses & Doctoral Dissertations
Recent changes have increased the need for and awareness of privacy assessments. Organizations focus primarily on Privacy Impact Assessments (PIA) and Data Protection Impact Assessments (DPIA) but rarely take a comprehensive approach to assessments or integrate the results into a privacy risk program. There are numerous industry standards and regulations for privacy assessments, but the industry lacks a simple unified methodology with steps to perform privacy assessments. The objectives of this research project are to create a new privacy assessment methodology model using the design science methodology, update industry standards and present training for conducting privacy assessments that can be …
Model Based Force Estimation And Stiffness Control For Continuum Robots, Vincent A. Aloi
Model Based Force Estimation And Stiffness Control For Continuum Robots, Vincent A. Aloi
Doctoral Dissertations
Continuum Robots are bio-inspired structures that mimic the motion of snakes, elephant trunks, octopus tentacles, etc. With good design, these robots can be naturally compliant and miniaturizable, which makes Continuum Robots ideal for traversing narrow complex environments. Their flexible design, however, prevents us from using traditional methods for controlling and estimating loading on rigid link robots.
In the first thrust of this research, we provided a novel stiffness control law that alters the behavior of an end effector during contact. This controller is applicable to any continuum robot where a method for sensing or estimating tip forces and pose exists. …
How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar
How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar
Information Systems Undergraduate Honors Theses
Since the founding of computers, data scientists have been able to engineer devices that increase individuals’ opportunities to communicate with each other. In the 1990s, the internet took over with many people not understanding its utility. Flash forward 30 years, and we cannot live without our connection to the internet. The internet of information is what we called early adopters with individuals posting blogs for others to read, this was known as Web 1.0. As we progress, platforms became social allowing individuals in different areas to communicate and engage with each other, this was known as Web 2.0. As Dr. …
Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover
Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover
Computer Science and Computer Engineering Undergraduate Honors Theses
Network Intrusion Detection Systems (NIDS) are one layer of defense that can be used to protect a network from cyber-attacks. They monitor a network for any malicious activity and send alerts if suspicious traffic is detected. Two of the most common open-source NIDS are Snort and Suricata. Snort was first released in 1999 and became the industry standard. The one major drawback of Snort has been its single-threaded architecture. Because of this, Suricata was released in 2009 and uses a multithreaded architecture. Snort released Snort 3 last year with major improvements from earlier versions, including implementing a new multithreaded architecture …
Monitoring The M-Dwarf Host Stars Of Tess Exoplanet Candidates: Stellar Flares And Habitability, Ashley Lieber
Monitoring The M-Dwarf Host Stars Of Tess Exoplanet Candidates: Stellar Flares And Habitability, Ashley Lieber
Physics Undergraduate Honors Theses
In the search for life beyond our solar system, the study of M-dwarfs has become increasingly important due to their unique characteristics including their small size, flaring capabilities, and long lifespans. Their small size allows for exoplanet detection due to observable gravitational interactions, and the stellar flares could potentially trigger prebiotic life on exoplanets in the system. Lastly, their long lifespans may provide the conditions necessary to foster prebiotic life and the development of more complex organisms over time. Flare rate is a critical factor in determining the habitability of the exoplanet due to its potential to damage or incubate …
Improving Intelligent Transportation Safety And Reliability Through Lowering Costs, Integrating Machine Learning, And Studying Model Sensitivity, Cavender Holt
All Theses
As intelligent transportation becomes increasingly prevalent in the domain of transportation, it is essential to understand the safety, reliability, and performance of these systems. We investigate two primary areas in the problem domain. The first area concerns increasing the feasibility and reducing the cost of deploying pedestrian detection systems to intersections in order to increase safety. By allowing pedestrian detection to be placed in intersections, the data can be better utilized to create systems to prevent accidents from occurring. By employing a dynamic compression scheme for pedestrian detection, we show the reduction of network bandwidth improved by 2.12× over the …
A Novel Data Lineage Model For Critical Infrastructure And A Solution To A Special Case Of The Temporal Graph Reachability Problem, Ian Moncur
Graduate Theses and Dissertations
Rapid and accurate damage assessment is crucial to minimize downtime in critical infrastructure. Dependency on modern technology requires fast and consistent techniques to prevent damage from spreading while also minimizing the impact of damage on system users. One technique to assist in assessment is data lineage, which involves tracing a history of dependencies for data items. The goal of this thesis is to present one novel model and an algorithm that uses data lineage with the goal of being fast and accurate. In function this model operates as a directed graph, with the vertices being data items and edges representing …
Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., Shruthi Ramakrishnan
Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., Shruthi Ramakrishnan
Graduate Theses and Dissertations
Critical infrastructures (CI) play a vital role in majority of the fields and sectors worldwide. It contributes a lot towards the economy of nations and towards the wellbeing of the society. They are highly coupled, interconnected and their interdependencies make them more complex systems. Thus, when a damage occurs in a CI system, its complex interdependencies make it get subjected to cascading effects which propagates faster from one infrastructure to another resulting in wide service degradations which in turn causes economic and societal effects. The propagation of cascading effects of disruptive events could be handled efficiently if the assessment and …
A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall
A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall
Computer Science and Computer Engineering Undergraduate Honors Theses
The ability to synthesize custom DNA molecules has led to the feasibility of DNA nanotechnology. Synthesis is time-consuming and expensive, so simulations of proposed DNA designs are necessary. Open-source simulators, such as oxDNA, are available but often difficult to configure and interface with. Packages such as oxdna-tile-binding pro- vide an interface for oxDNA which allows for the ability to create scripts that automate the configuration process. This project works to improve the scripts in oxdna-tile-binding to improve integration with job scheduling systems commonly used in high-performance computing environments, improve ease-of-use and consistency within the scripts compos- ing oxdna-tile-binding, and move …
Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan
Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan
Computer Science and Computer Engineering Undergraduate Honors Theses
The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.
Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague
Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague
Computer Science and Computer Engineering Undergraduate Honors Theses
The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor's Algorithm. NIST proposed a standardization effort in creating a new class of asymmetric cryptography named Post-Quantum Cryptography (PQC). These new algorithms will be resistant against both classical computers and sufficiently powerful quantum computers. Although the new algorithms seem mathematically secure, they can possibly be broken by a class of attacks known as side-channels attacks (SCA). Side-channel attacks involve exploiting the hardware that the algorithm runs on to figure out secret values that could break the security of the system. …
Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover
Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover
Computer Science and Computer Engineering Undergraduate Honors Theses
Graphics processing units (GPUs) have become a widely used technology for various purposes. While their intended use is accelerating graphics rendering, their parallel computing capabilities have expanded their use into other areas. They are used in computer gaming, deep learning for artificial intelligence and mining cryptocurrencies. Their rise in popularity led to research involving several security aspects, including this paper’s focus, memory vulnerabilities. Research documented many vulnerabilities, including GPUs not implementing address space layout randomization, not zeroing out memory after deallocation, and not initializing newly allocated memory. These vulnerabilities can lead to a victim’s sensitive data being leaked to an …
Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny
Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny
Civil & Environmental Engineering Theses & Dissertations
Ride-sourcing transportation services offered by transportation network companies (TNCs) like Uber and Lyft are disrupting the transportation landscape. The growing demand on these services, along with their potential short and long-term impacts on the environment, society, and infrastructure emphasize the need to further understand the ride-sourcing system. There were no sufficient data to fully understand the system and integrate it within regional multimodal transportation frameworks. This can be attributed to commercial and competition reasons, given the technology-enabled and innovative nature of the system. Recently, in 2019, the City of Chicago the released an extensive and complete ride-sourcing trip-level data for …
Radiomic Features To Predict Overall Survival Time For Patients With Glioblastoma Brain Tumors Based On Machine Learning And Deep Learning Methods, Lina Chato
UNLV Theses, Dissertations, Professional Papers, and Capstones
Machine Learning (ML) methods including Deep Learning (DL) Methods have been employed in the medical field to improve diagnosis process and patient’s prognosis outcomes. Glioblastoma multiforme is an extremely aggressive Glioma brain tumor that has a poor survival rate. Understanding the behavior of the Glioblastoma brain tumor is still uncertain and some factors are still unrecognized. In fact, the tumor behavior is important to decide a proper treatment plan and to improve a patient’s health. The aim of this dissertation is to develop a Computer-Aided-Diagnosis system (CADiag) based on ML/DL methods to automatically estimate the Overall Survival Time (OST) for …
Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger
Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger
Honors Projects
As global internet usage expands, websites are growing in both size and complexity. Contrary to the common belief that the internet is immaterial and “environmentally friendly”, web pages have significant negative environmental impacts (Frick, 2015). Websites contribute to global greenhouse gas (GHG) emissions and electricity consumption. Considering the current climate crisis, it is crucial that web developers be aware of the impact that their work has on the environment and actively work to improve site energy efficiency. With a lack of regulation and awareness, the environmental impact of websites has remained unchecked despite growing concerns for sustainability. Further research and …
Deep Learning For Load Forecasting With Smart Meter Data: Online And Federated Learning, Mohammad Navid Fekri
Deep Learning For Load Forecasting With Smart Meter Data: Online And Federated Learning, Mohammad Navid Fekri
Electronic Thesis and Dissertation Repository
Electricity load forecasting has been attracting increasing attention because of its importance for energy management, infrastructure planning, and budgeting. In recent years, the proliferation of smart meters has created new opportunities for forecasting on the building and even individual household levels. Machine learning (ML) has achieved great successes in this domain; however, conventional ML techniques require data transfer to a centralized location for model training, therefore, increasing network traffic and exposing data to privacy and security risks. Also, traditional approaches employ offline learning, which means that they are only trained once and miss out on the possibility to learn from …
Practical Considerations And Applications For Autonomous Robot Swarms, Rory Alan Hector
Practical Considerations And Applications For Autonomous Robot Swarms, Rory Alan Hector
LSU Doctoral Dissertations
In recent years, the study of autonomous entities such as unmanned vehicles has begun to revolutionize both military and civilian devices. One important research focus of autonomous entities has been coordination problems for autonomous robot swarms. Traditionally, robot models are used for algorithms that account for the minimum specifications needed to operate the swarm. However, these theoretical models also gloss over important practical details. Some of these details, such as time, have been considered before (as epochs of execution). In this dissertation, we examine these details in the context of several problems and introduce new performance measures to capture practical …
Generative Adversarial Networks Take On Hand Drawn Sketches: An Application To Louisiana Culture And Mardi Gras Fashion, Stephanie Hines
Generative Adversarial Networks Take On Hand Drawn Sketches: An Application To Louisiana Culture And Mardi Gras Fashion, Stephanie Hines
Honors Theses
No abstract provided.
Quadratic Neural Network Architecture As Evaluated Relative To Conventional Neural Network Architecture, Reid Taylor
Quadratic Neural Network Architecture As Evaluated Relative To Conventional Neural Network Architecture, Reid Taylor
Senior Theses
Current work in the field of deep learning and neural networks revolves around several variations of the same mathematical model for associative learning. These variations, while significant and exceptionally applicable in the real world, fail to push the limits of modern computational prowess. This research does just that: by leveraging high order tensors in place of 2nd order tensors, quadratic neural networks can be developed and can allow for substantially more complex machine learning models which allow for self-interactions of collected and analyzed data. This research shows the theorization and development of mathematical model necessary for such an idea to …
On The Reliability Of Wearable Sensors For Assessing Movement Disorder-Related Gait Quality And Imbalance: A Case Study Of Multiple Sclerosis, Steven Díaz Hernández
On The Reliability Of Wearable Sensors For Assessing Movement Disorder-Related Gait Quality And Imbalance: A Case Study Of Multiple Sclerosis, Steven Díaz Hernández
USF Tampa Graduate Theses and Dissertations
Approximately 33 million American adults had a movement disorder associated with medication use, ear infections, injury, or neurological disorders in 2008, with over 18 million people affected by neurological disorders worldwide. Physical therapists assist people with movement disorders by providing interventions to reduce pain, improve mobility, avoid surgeries, and prevent falls and secondary complications of neurodegenerative disorders. Current gait assessments used by physical therapists, such as the Multiple Sclerosis Walking Scale, provide only semi-quantitative data, and cannot assess walking quality in detail or describe how one’s walking quality changes over time. As a result, quantitative systems have grownas useful tools …
Analyzing Decision-Making In Robot Soccer For Attacking Behaviors, Justin Rodney
Analyzing Decision-Making In Robot Soccer For Attacking Behaviors, Justin Rodney
USF Tampa Graduate Theses and Dissertations
In robotics soccer, decision-making is critical to the performance of a team’s SoftwareSystem. The University of South Florida’s (USF) RoboBulls team implements behavior for the robots by using traditional methods such as analytical geometry to path plan and determine whether an action should be taken. In recent works, Machine Learning (ML) and Reinforcement Learning (RL) techniques have been used to calculate the probability of success for a pass or goal, and even train models for performing low-level skills such as traveling towards a ball and shooting it towards the goal[1, 2]. Open-source frameworks have been created for training Reinforcement Learning …
90snet:, Seth Richard
Securing Infiniband Networks With End-Point Encryption, Noah B. Diamond
Securing Infiniband Networks With End-Point Encryption, Noah B. Diamond
Theses and Dissertations
The NVIDIA-Mellanox Bluefield-2 is a 100 Gbps high-performance network interface which offers hardware offload and acceleration features that can operate directly on network traffic without routine involvement from the ARM CPU. This allows the ARM multi-core CPU to orchestrate the hardware to perform operations on both Ethernet and RDMA traffic at high rates rather than processing all the traffic directly. A testbed called TNAP was created for performance testing and a MiTM verification process called MiTMVMP is used to ensure proper network configuration. The hardware accelerators of the Bluefield-2 support a throughput of nearly 86 Gbps when using IPsec to …
Exploiting The Iot Through Network-Based Covert Channels, Kyle S. Harris
Exploiting The Iot Through Network-Based Covert Channels, Kyle S. Harris
Theses and Dissertations
Information leaks are a top concern to industry and government leaders. The IoT is a technology capable of sensing real-world events. A method for exfiltrating data from these devices is by covert channel. This research designs a novel IoT CTC without the need for inter-packet delays to encode data. Instead, it encodes data within preexisting network information, namely ports or addresses. Additionally, the CTC can be implemented in two different modes: Stealth and Bandwidth. Performance is measured using throughput and detectability. The Stealth methods mimic legitimate traffic captures while the Bandwidth methods forgo this approach for maximum throughput. Detection results …