Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 74

Full-Text Articles in Computer Engineering

Toward Smart And Efficient Scientific Data Management, Jinzhen Wang Aug 2023

Toward Smart And Efficient Scientific Data Management, Jinzhen Wang

Dissertations

Scientific research generates vast amounts of data, and the scale of data has significantly increased with advancements in scientific applications. To manage this data effectively, lossy data compression techniques are necessary to reduce storage and transmission costs. Nevertheless, the use of lossy compression introduces uncertainties related to its performance. This dissertation aims to answer key questions surrounding lossy data compression, such as how the performance changes, how much reduction can be achieved, and how to optimize these techniques for modern scientific data management workflows.

One of the major challenges in adopting lossy compression techniques is the trade-off between data accuracy …


Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba Oct 2022

Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba

Dissertations

Artificial Intelligence (AI) is changing every technology we deal with. Autonomy has been a sought-after goal in vehicles, and now more than ever we are very close to that goal. Vehicles before were dumb mechanical devices, now they are becoming smart, computerized, and connected coined as Autonomous Vehicles (AVs). Moreover, researchers found a way to make more use of these enormous capabilities and introduced Autonomous Vehicles Cloud Computing (AVCC). In these platforms, vehicles can lend their unused resources and sensory data to join AVCC.

In this dissertation, we investigate security and privacy issues in AVCC. As background, we built our …


Performance Analysis Of The Dominant Mode Rejection Beamformer, Enlong Hu Aug 2022

Performance Analysis Of The Dominant Mode Rejection Beamformer, Enlong Hu

Dissertations

In array signal processing over challenging environments, due to the non-stationarity nature of data, it is difficult to obtain enough number of data snapshots to construct an adaptive beamformer (ABF) for detecting weak signal embedded in strong interferences. One type of adaptive method targeting for such applications is the dominant mode rejection (DMR) method, which uses a reshaped eigen-decomposition of sample covariance matrix (SCM) to define a subspace containing the dominant interferers to be rejected, thereby allowing it to detect weak signal in the presence of strong interferences. The DMR weight vector takes a form similar to the adaptive minimum …


Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld May 2022

Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld

Dissertations

This dissertation focuses on the development of machine learning algorithms for spiking neural networks, with an emphasis on local three-factor learning rules that are in keeping with the constraints imposed by current neuromorphic hardware. Spiking neural networks (SNNs) are an alternative to artificial neural networks (ANNs) that follow a similar graphical structure but use a processing paradigm more closely modeled after the biological brain in an effort to harness its low power processing capability. SNNs use an event based processing scheme which leads to significant power savings when implemented in dedicated neuromorphic hardware such as Intel’s Loihi chip.

This work …


Dark Patterns: Effect On Overall User Experience And Site Revisitation, Deon Soul Calawen Jan 2022

Dark Patterns: Effect On Overall User Experience And Site Revisitation, Deon Soul Calawen

Dissertations

Dark patterns are user interfaces purposefully designed to manipulate users into doing something they might not otherwise do for the benefit of an online service. This study investigates the impact of dark patterns on overall user experience and site revisitation in the context of airline websites. In order to assess potential dark pattern effects, two versions of the same airline website were compared: a dark version containing dark pattern elements and a bright version free of manipulative interfaces. User experience for both websites were assessed quantitatively through a survey containing a User Experience Questionnaire (UEQ) and a System Usability Scale …


An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous Jan 2022

An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous

Dissertations

Botnets pose a significant and growing risk to modern networks. Detection of botnets remains an important area of open research in order to prevent the proliferation of botnets and to mitigate the damage that can be caused by botnets that have already been established. Botnet detection can be broadly categorised into two main categories: signature-based detection and anomaly-based detection. This paper sets out to measure the accuracy, false-positive rate, and false-negative rate of four algorithms that are available in Weka for anomaly-based detection of a dataset of HTTP and IRC botnet data. The algorithms that were selected to detect botnets …


Evaluating The Performance Of Vision Transformer Architecture For Deepfake Image Classification, Devesan Govindasamy Jan 2022

Evaluating The Performance Of Vision Transformer Architecture For Deepfake Image Classification, Devesan Govindasamy

Dissertations

Deepfake classification has seen some impressive results lately, with the experimentation of various deep learning methodologies, researchers were able to design some state-of-the art techniques. This study attempts to use an existing technology “Transformers” in the field of Natural Language Processing (NLP) which has been a de-facto standard in text processing for the purposes of Computer Vision. Transformers use a mechanism called “self-attention”, which is different from CNN and LSTM. This study uses a novel technique that considers images as 16x16 words (Dosovitskiy et al., 2021) to train a deep neural network with “self-attention” blocks to detect deepfakes. It creates …


Measuring And Comparing Social Bias In Static And Contextual Word Embeddings, Alan Cueva Mora Jan 2022

Measuring And Comparing Social Bias In Static And Contextual Word Embeddings, Alan Cueva Mora

Dissertations

Word embeddings have been considered one of the biggest breakthroughs of deep learning for natural language processing. They are learned numerical vector representations of words where similar words have similar representations. Contextual word embeddings are the promising second-generation of word embeddings assigning a representation to a word based on its context. This can result in different representations for the same word depending on the context (e.g. river bank and commercial bank). There is evidence of social bias (human-like implicit biases based on gender, race, and other social constructs) in word embeddings. While detecting bias in static (classical or non-contextual) word …


A Practical Approach To Automated Software Correctness Enhancement, Aleksandr Zakharchenko Dec 2021

A Practical Approach To Automated Software Correctness Enhancement, Aleksandr Zakharchenko

Dissertations

To repair an incorrect program does not mean to make it correct; it only means to make it more-correct, in some sense, than it is. In the absence of a concept of relative correctness, i.e. the property of a program to be more-correct than another with respect to a specification, the discipline of program repair has resorted to various approximations of absolute (traditional) correctness, with varying degrees of success. This shortcoming is concealed by the fact that most program repair tools are tested on basic cases, whence making them absolutely correct is not clearly distinguishable from making them relatively more-correct. …


Data-Driven Learning For Robot Physical Intelligence, Leidi Zhao Aug 2021

Data-Driven Learning For Robot Physical Intelligence, Leidi Zhao

Dissertations

The physical intelligence, which emphasizes physical capabilities such as dexterous manipulation and dynamic mobility, is essential for robots to physically coexist with humans. Much research on robot physical intelligence has achieved success on hyper robot motor capabilities, but mostly through heavily case-specific engineering. Meanwhile, in terms of robot acquiring skills in a ubiquitous manner, robot learning from human demonstration (LfD) has achieved great progress, but still has limitations handling dynamic skills and compound actions. In this dissertation, a composite learning scheme which goes beyond LfD and integrates robot learning from human definition, demonstration, and evaluation is proposed. This method tackles …


Intelligent And Secure Fog-Aided Internet Of Drones, Jingjing Yao May 2021

Intelligent And Secure Fog-Aided Internet Of Drones, Jingjing Yao

Dissertations

Internet of drones (IoD), which utilize drones as Internet of Things (IoT) devices, deploys several drones in the air to collect ground information and send them to the IoD gateway for further processing. Computing tasks are usually offloaded to the cloud data center for intensive processing. However, many IoD applications require real-time processing and event response (e.g., disaster response and virtual reality applications). Hence, data processing by the remote cloud may not satisfy the strict latency requirement. Fog computing attaches fog nodes, which are equipped with computing, storage and networking resources, to IoD gateways to assume a substantial amount of …


Deep Learning On Image Forensics And Anti-Forensics, Zhangyi Shen May 2021

Deep Learning On Image Forensics And Anti-Forensics, Zhangyi Shen

Dissertations

Image forensics protect the authenticity and integrity of digital images. On the contrary, as the countermeasures of digital forensics, anti-forensics is applied to expose the vulnerability of forensics tools. Consequently, forensics researchers could develop forensics tools against possible new attacks. This dissertation investigation demonstrates two image forensics methods based on convolutional neural network (CNN) and two image anti-forensics methods based on generative adversarial network (GAN).

Detecting unsharp masking (USM) sharpened image is the first study in this dissertation. A CNN architecture comprises four convolutional layers and a classification module is proposed to discriminate sharpened images and unsharpened images. The results …


Towards Improving The Security Of The Software Supply Chain, Hammad Afzali May 2021

Towards Improving The Security Of The Software Supply Chain, Hammad Afzali

Dissertations

A software supply chain comprises a series of steps performed to develop and distribute a software product. History has shown that each of these steps is vulnerable to attacks that can have serious repercussions and can affect many users at once. To address the attacks against the software supply chain, end users must be provided with verifiable guarantees about the individual steps of the chain and with assurances that the steps are securely chained together.

In this dissertation, the security of several individual steps in the software supply chain is enhanced. The first step of the chain, managing the source …


Improving Multi-Threaded Qos In Clouds, Weiwei Jia May 2021

Improving Multi-Threaded Qos In Clouds, Weiwei Jia

Dissertations

Multi-threading and resource sharing are pervasive and critical in clouds and data-centers. In order to ease management, save energy and improve resource utilization, multi-threaded applications from different tenants are often encapsulated in virtual machines (VMs) and consolidated on to the same servers. Unfortunately, despite much effort, it is still extremely challenging to maintain high quality of service (QoS) for multi-threaded applications of different tenants in clouds, and these applications often suffer severe performance degradation, poor scalability, unfair resource allocation, and so on.

The dissertation identifies the causes of the QoS problems and improves the QoS of multi-threaded execution with three …


Human Age And Gender Classification Using Convolutional Neural Networks, Eamon Kelliher Jan 2021

Human Age And Gender Classification Using Convolutional Neural Networks, Eamon Kelliher

Dissertations

In a world relying ever more on human classification, this papers aims to improve on age and gender image classification through the use of Convolutional Neural Networks (CNN). Age and gender classification has become a popular area of study in the past number of years however there are still improvements to be made, particularly in the area of age classification. This research paper aims to test the currently accepted fact that CNN models are the superior model type for image classification by comparing CNN performance against Support Vector Machine performance on the same dataset. Using the Adience image classification dataset, …


Identifying Roles Of Software Developers From Their Answers On Stack Overflow, Dean Power Jan 2021

Identifying Roles Of Software Developers From Their Answers On Stack Overflow, Dean Power

Dissertations

Stack Overflow is the world’s largest community of software developers. Users ask and answer questions on various tagged topics of software development. The set of questions a site user answers is representative of their knowledge base, or “wheelhouse”. It is proposed that clustering users by their wheelhouse yields communities of similar software developers by skill-set. These communities represent the different roles within software development and could be used as the basis to define roles at any point in time in an ever-evolving landscape of software development. A network graph of site users, linked if they answered questions on the same …


A Comparison Of Instructional Efficiency Models In Third Level Education, Murali Rajendran Jan 2021

A Comparison Of Instructional Efficiency Models In Third Level Education, Murali Rajendran

Dissertations

This study investigates the validity and sensitivity of a novel model of instructional efficiency: the parabolic model. The novel model is compared against state-of-the-art models present in instructional design today; Likelihood model, Deviational model and Multidimensional model. This models is based on the assumption that optimal mental workload and high performance leads to high efficiency, while other models assume that low mental workload and high performance leads to high efficiency. The investigation makes use of two instructional design conditions: a direct instructions approach to learning and its extension with a collaborative activity. A control group received the former instructional design …


Feature Augmentation For Improved Topic Modeling Of Youtube Lecture Videos Using Latent Dirichlet Allocation, Nakul Srikumar Jan 2021

Feature Augmentation For Improved Topic Modeling Of Youtube Lecture Videos Using Latent Dirichlet Allocation, Nakul Srikumar

Dissertations

Application of Topic Models in text mining of educational data and more specifically, the text data obtained from lecture videos, is an area of research which is largely unexplored yet holds great potential. This work seeks to find empirical evidence for an improvement in Topic Modeling by pre- extracting bigram tokens and adding them as additional features in the Latent Dirichlet Allocation (LDA) algorithm, a widely-recognized topic modeling technique. The dataset considered for analysis is a collection of transcripts of video lectures on Machine Learning scraped from YouTube. Using the cosine similarity distance measure as a metric, the experiment showed …


Can Generative Adversarial Networks Help Us Fight Financial Fraud?, Sean Mciver Jan 2021

Can Generative Adversarial Networks Help Us Fight Financial Fraud?, Sean Mciver

Dissertations

Transactional fraud datasets exhibit extreme class imbalance. Learners cannot make accurate generalizations without sufficient data. Researchers can account for imbalance at the data level, algorithmic level or both. This paper focuses on techniques at the data level. We evaluate the evidence of the optimal technique and potential enhancements. Global fraud losses totalled more than 80 % of the UK’s GDP in 2019. The improvement of preprocessing is inherently valuable in fighting these losses. Synthetic minority oversampling technique (SMOTE) and extensions of SMOTE are currently the most common preprocessing strategies. SMOTE oversamples the minority classes by randomly generating a point between …


Exploiting Bert And Roberta To Improve Performance For Aspect Based Sentiment Analysis, Gagan Reddy Narayanaswamy Jan 2021

Exploiting Bert And Roberta To Improve Performance For Aspect Based Sentiment Analysis, Gagan Reddy Narayanaswamy

Dissertations

Sentiment Analysis also known as opinion mining is a type of text research that analyses people’s opinions expressed in written language. Sentiment analysis brings together various research areas such as Natural Language Processing (NLP), Data Mining, and Text Mining, and is fast becoming of major importance to companies and organizations as it is started to incorporate online commerce data for analysis. Often the data on which sentiment analysis is performed will be reviews. The data can range from reviews of a small product to a big multinational corporation. The goal of performing sentiment analysis is to extract information from those …


Performance Comparison Between A Distributed Particle Swarm Algorithm And A Centralised Algorithm, Ciarán O’Loughlin Jan 2021

Performance Comparison Between A Distributed Particle Swarm Algorithm And A Centralised Algorithm, Ciarán O’Loughlin

Dissertations

Particle Swarm optimisation (PSO) is a particular form of swarm intelligence, which itself is an innovative intelligent paradigm for solving optimization problems. PSO is generally used to find a global optimum in a single optimisation function. This typically occurs on one node(machine) but there has been a significant body of research into creating distributed implementations of the PSO algorithm. Such research has often focused on the creation and performance of the distributed implementation in an isolated manner or compared to different distributed algorithms.

This research piece aims to bridge a gap in the existing literature, by testing a distributed implementation …


Stellar Classification Of Folded Spectra Using The Mk Classification Scheme And Convolutional Neural Networks, John Magee Jan 2021

Stellar Classification Of Folded Spectra Using The Mk Classification Scheme And Convolutional Neural Networks, John Magee

Dissertations

The year 1943 saw the introduction of the Morgan-Keenan (MK) classification scheme and this replaced the existing Harvard Classification scheme. Both stellar classification scheme are fundamentally grounded in the field of spectroscopy. The Harvard Classification scheme classified stars based on stellar surface temperature. The MK Classification scheme introduced the concept of a luminosity class that is intrinsically linked to the surface gravity of a star. Temperature and luminosity class values are estimated directly from the stellar spectrum.

Machine learning is a well-established technique in astronomy. Traditionally, a spectrum is treated as a one-dimensional sequence of data. Techniques such as artificial …


Event-Driven Servers Using Asynchronous, Non-Blocking Network I/O: Performance Evaluation Of Kqueue And Epoll, Lorcan Leonard Jan 2021

Event-Driven Servers Using Asynchronous, Non-Blocking Network I/O: Performance Evaluation Of Kqueue And Epoll, Lorcan Leonard

Dissertations

This research project evaluates the performance of kqueue and epoll in the context of event-driven servers. The evaluation is done through benchmarking and tracing which are used to measure throughput and execution time respectively. The experiment is repeated for both a virtualised and native server environment. The results from the experiment are statistically analysed and compared. These results show significant differences between kqueue and epoll, and a profound impact of virtualisation as a variable.


Improving A Network Intrusion Detection System’S Efficiency Using Model-Based Data Augmentation, Vinicius Waterkemper Lodetti Jan 2021

Improving A Network Intrusion Detection System’S Efficiency Using Model-Based Data Augmentation, Vinicius Waterkemper Lodetti

Dissertations

A network intrusion detection system (NIDS) is one important element to mitigate cybersecurity risks, the NIDS allow for detecting anomalies in a network which may be a cyberattack to a corporate network environment. A NIDS can be seen as a classification problem where the ultimate goal is to distinguish between malicious traffic among a majority of benign traffic. Researches on NIDS are often performed using outdated datasets that don’t represent the actual cyberspace. Datasets such as the CICIDS2018 address this gap by being generated from attacks and an infrastructure that reflects an up-to-date scenario.

A problem may arise when machine …


A Hybrid Neural Network For Stock Price Direction Forecasting, Daniel Devine Jan 2021

A Hybrid Neural Network For Stock Price Direction Forecasting, Daniel Devine

Dissertations

The volatility of stock markets makes them notoriously difficult to predict and is the reason that many investors sell out at the wrong time. Contrary to the efficient market hypothesis (EMH) and the random walk theory, contribution to the study of machine learning models for stock price forecasting has shown evidence of stock markets predictability with varying degrees of success. Contemporary approaches have sought to use a hybrid of convolutional neural network (CNN) for its feature extraction capabilities and long short-term memory (LSTM) neural network for its time series prediction. This comparative study aims to determine the predictability of stock …


Identifying Significant Features For Player Evaluation In Nfl Comparing Anns And Traditional Models, Ronan Walsh Jan 2021

Identifying Significant Features For Player Evaluation In Nfl Comparing Anns And Traditional Models, Ronan Walsh

Dissertations

The evaluation of player performance in sports is popular and important in modern sports, enabling teams to use real data in the construction of their rosters. This dissertation proposes to apply machine learning algorithms to predicting the player evaluations from a leading NFL analytics company who use a combination of statistics and expert evaluation. In addition, it will investigate what features are significant in the evaluation of a position. Data for the dissertation is obtained from multiple online sources - Pro Football Reference and Pro Football Focus (the the NFL analytics company). These data sets are combined and analysed before …


Evaluating The Performance Of Transformer Architecture Over Attention Architecture On Image Captioning, Deepti Balasubramaniam Jan 2021

Evaluating The Performance Of Transformer Architecture Over Attention Architecture On Image Captioning, Deepti Balasubramaniam

Dissertations

Over the last few decades computer vision and Natural Language processing has shown tremendous improvement in different tasks such as image captioning, video captioning, machine translation etc using deep learning models. However, there were not much researches related to image captioning based on transformers and how it outperforms other models that were implemented for image captioning. In this study will be designing a simple encoder-decoder model, attention model and transformer model for image captioning using Flickr8K dataset where will be discussing about the hyperparameters of the model, type of pre-trained model used and how long the model has been trained. …


Finetuning Bert And Xlnet For Sentiment Analysis Of Stock Market Tweets Using Mixout And Dropout Regularization, Shubham Jangir Jan 2021

Finetuning Bert And Xlnet For Sentiment Analysis Of Stock Market Tweets Using Mixout And Dropout Regularization, Shubham Jangir

Dissertations

Sentiment analysis is also known as Opinion mining or emotional mining which aims to identify the way in which sentiments are expressed in text and written data. Sentiment analysis combines different study areas such as Natural Language Processing (NLP), Data Mining, and Text Mining, and is quickly becoming a key concern for businesses and organizations, especially as online commerce data is being used for analysis. Twitter is also becoming a popular microblogging and social networking platform today for information among people as they contribute their opinions, thoughts, and attitudes on social media platforms over the years. Because of the large …


An Evaluation On The Performance Of Code Generated With Webassembly Compilers, Raymond Phelan Jan 2021

An Evaluation On The Performance Of Code Generated With Webassembly Compilers, Raymond Phelan

Dissertations

WebAssembly is a new technology that is revolutionizing the web. Essentially it is a low-level binary instruction set that can be run on browsers, servers or stand-alone environments. Many programming languages either currently have, or are working on, compilers that will compile the language into WebAssembly. This means that applications written in languages like C++ or Rust can now be run on the web, directly in a browser or other environment. However, as we will highlight in this research, the quality of code generated by the different WebAssembly compilers varies and causes performance issues. This research paper aims to evaluate …


Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao Dec 2020

Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao

Dissertations

Workflow techniques have been widely used as a major computing solution in many science domains. With the rapid deployment of cloud infrastructures around the globe and the economic benefits of cloud-based computing and storage services, an increasing number of scientific workflows have migrated or are in active transition to clouds. As the scale of scientific applications continues to grow, it is now common to deploy various data- and network-intensive computing workflows such as serial computing workflows, MapReduce/Spark-based workflows, and Storm-based stream data processing workflows in multi-cloud environments, where inter-cloud data transfer oftentimes plays a significant role in both workflow performance …