Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Computer Engineering

Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba Oct 2022

Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba

Dissertations

Artificial Intelligence (AI) is changing every technology we deal with. Autonomy has been a sought-after goal in vehicles, and now more than ever we are very close to that goal. Vehicles before were dumb mechanical devices, now they are becoming smart, computerized, and connected coined as Autonomous Vehicles (AVs). Moreover, researchers found a way to make more use of these enormous capabilities and introduced Autonomous Vehicles Cloud Computing (AVCC). In these platforms, vehicles can lend their unused resources and sensory data to join AVCC.

In this dissertation, we investigate security and privacy issues in AVCC. As background, we built our …


Performance Analysis Of The Dominant Mode Rejection Beamformer, Enlong Hu Aug 2022

Performance Analysis Of The Dominant Mode Rejection Beamformer, Enlong Hu

Dissertations

In array signal processing over challenging environments, due to the non-stationarity nature of data, it is difficult to obtain enough number of data snapshots to construct an adaptive beamformer (ABF) for detecting weak signal embedded in strong interferences. One type of adaptive method targeting for such applications is the dominant mode rejection (DMR) method, which uses a reshaped eigen-decomposition of sample covariance matrix (SCM) to define a subspace containing the dominant interferers to be rejected, thereby allowing it to detect weak signal in the presence of strong interferences. The DMR weight vector takes a form similar to the adaptive minimum …


Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld May 2022

Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld

Dissertations

This dissertation focuses on the development of machine learning algorithms for spiking neural networks, with an emphasis on local three-factor learning rules that are in keeping with the constraints imposed by current neuromorphic hardware. Spiking neural networks (SNNs) are an alternative to artificial neural networks (ANNs) that follow a similar graphical structure but use a processing paradigm more closely modeled after the biological brain in an effort to harness its low power processing capability. SNNs use an event based processing scheme which leads to significant power savings when implemented in dedicated neuromorphic hardware such as Intel’s Loihi chip.

This work …


Dark Patterns: Effect On Overall User Experience And Site Revisitation, Deon Soul Calawen Jan 2022

Dark Patterns: Effect On Overall User Experience And Site Revisitation, Deon Soul Calawen

Dissertations

Dark patterns are user interfaces purposefully designed to manipulate users into doing something they might not otherwise do for the benefit of an online service. This study investigates the impact of dark patterns on overall user experience and site revisitation in the context of airline websites. In order to assess potential dark pattern effects, two versions of the same airline website were compared: a dark version containing dark pattern elements and a bright version free of manipulative interfaces. User experience for both websites were assessed quantitatively through a survey containing a User Experience Questionnaire (UEQ) and a System Usability Scale …


An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous Jan 2022

An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous

Dissertations

Botnets pose a significant and growing risk to modern networks. Detection of botnets remains an important area of open research in order to prevent the proliferation of botnets and to mitigate the damage that can be caused by botnets that have already been established. Botnet detection can be broadly categorised into two main categories: signature-based detection and anomaly-based detection. This paper sets out to measure the accuracy, false-positive rate, and false-negative rate of four algorithms that are available in Weka for anomaly-based detection of a dataset of HTTP and IRC botnet data. The algorithms that were selected to detect botnets …


Evaluating The Performance Of Vision Transformer Architecture For Deepfake Image Classification, Devesan Govindasamy Jan 2022

Evaluating The Performance Of Vision Transformer Architecture For Deepfake Image Classification, Devesan Govindasamy

Dissertations

Deepfake classification has seen some impressive results lately, with the experimentation of various deep learning methodologies, researchers were able to design some state-of-the art techniques. This study attempts to use an existing technology “Transformers” in the field of Natural Language Processing (NLP) which has been a de-facto standard in text processing for the purposes of Computer Vision. Transformers use a mechanism called “self-attention”, which is different from CNN and LSTM. This study uses a novel technique that considers images as 16x16 words (Dosovitskiy et al., 2021) to train a deep neural network with “self-attention” blocks to detect deepfakes. It creates …


Measuring And Comparing Social Bias In Static And Contextual Word Embeddings, Alan Cueva Mora Jan 2022

Measuring And Comparing Social Bias In Static And Contextual Word Embeddings, Alan Cueva Mora

Dissertations

Word embeddings have been considered one of the biggest breakthroughs of deep learning for natural language processing. They are learned numerical vector representations of words where similar words have similar representations. Contextual word embeddings are the promising second-generation of word embeddings assigning a representation to a word based on its context. This can result in different representations for the same word depending on the context (e.g. river bank and commercial bank). There is evidence of social bias (human-like implicit biases based on gender, race, and other social constructs) in word embeddings. While detecting bias in static (classical or non-contextual) word …