Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Department of Computer Science and Engineering

Computer Sciences

2017

Articles 1 - 30 of 35

Full-Text Articles in Computer Engineering

Efficient Reasoning Algorithms For Fragments Of Horn Description Logics, David Carral Jan 2017

Efficient Reasoning Algorithms For Fragments Of Horn Description Logics, David Carral

Browse all Theses and Dissertations

We characterize two fragments of Horn Description Logics and we define two specialized reasoning algorithms that effectively solve the standard reasoning tasks over each of such fragments. We believe our work to be of general interest since (1) a rather large proportion of real-world Horn ontologies belong to some of these two fragments and (2) the implementations based on our reasoning approach significantly outperform state-of-the-art reasoners. Claims (1) and (2) are extensively proven via empirically evaluation.


Multi-Class Classification Of Textual Data: Detection And Mitigation Of Cheating In Massively Multiplayer Online Role Playing Games, Naga Sai Nikhil Maguluri Jan 2017

Multi-Class Classification Of Textual Data: Detection And Mitigation Of Cheating In Massively Multiplayer Online Role Playing Games, Naga Sai Nikhil Maguluri

Browse all Theses and Dissertations

The success of any multiplayer game depends on the player’s experience. Cheating/Hacking undermines the player’s experience and thus the success of that game. Cheaters, who use hacks, bots or trainers are ruining the gaming experience of a player and are making him leave the game. As the video game industry is a constantly increasing multibillion dollar economy, it is crucial to assure and maintain a state of security. Players reflect their gaming experience in one of the following places: multiplayer chat, game reviews, and social media. This thesis is an exploratory study where our goal is to experiment and propose …


Characterizing Concepts In Taxonomy For Entity Recommendations, Siva Kumar Cheekula Jan 2017

Characterizing Concepts In Taxonomy For Entity Recommendations, Siva Kumar Cheekula

Browse all Theses and Dissertations

Entity recommendation systems are enormously popular on the Web. These systems harness manually crafted taxonomies for improving recommendations. For example, Yahoo created the Open Directory Project for search and recommendation, and Amazon utilizes its own product taxonomy. While these taxonomies are of high quality, it is a labor and time-intensive process to manually create and keep them up to date. Instead, in this era ofWeb 2.0 where users collaboratively create large amounts of information on the Web, it is possible to utilize user-generated content to automatically generate good quality taxonomies. However, harnessing such taxonomies for entity recommendations has not been …


Distance Learning And Attribute Importance Analysis By Linear Regression On Idealized Distance Functions, Rupesh Kumar Singh Jan 2017

Distance Learning And Attribute Importance Analysis By Linear Regression On Idealized Distance Functions, Rupesh Kumar Singh

Browse all Theses and Dissertations

A good distance metric is instrumental on the performance of many tasks including classification and data retrieval. However, designing an optimal distance function is very challenging, especially when the data has high dimensions.Recently, a number of algorithms have been proposed to learn an optimal distance function in a supervised manner, using data with class labels. In this thesis we proposed methods to learn an optimal distance function that can also indicate the importance of attributes. Specifically, we present several ways to define idealized distance functions, two of which involving distance error correction involving KNN classification, and another involving a two-constant …


Sched-Its: An Interactive Tutoring System To Teach Cpu Scheduling Concepts In An Operating Systems Course, Bharath Kumar Koya Jan 2017

Sched-Its: An Interactive Tutoring System To Teach Cpu Scheduling Concepts In An Operating Systems Course, Bharath Kumar Koya

Browse all Theses and Dissertations

Operating systems is an essential course in computer science curriculum, which helps students to develop a mental model of how computer operating systems work. The internal mechanisms and processes of an operating system (OS) are often complex, non-deterministic and intangible which makes them difficult for students to understand. One such concept is central processing unit (CPU) scheduling. CPU scheduling forms the basis of the multiprogramming in an OS. In practice, OS courses involve classroom lectures describing high-level abstractions of the concepts, and students complete programming assignments to apply the material in a more concrete way. Depending on the programming assignments, …


An Optimization Compiler Framework Based On Polyhedron Model For Gpgpus, Lifeng Liu Jan 2017

An Optimization Compiler Framework Based On Polyhedron Model For Gpgpus, Lifeng Liu

Browse all Theses and Dissertations

General purpose GPU (GPGPU) is an effective many-core architecture that can yield high throughput for many scientific applications with thread-level parallelism. However, several challenges still limit further performance improvements and make GPU programming challenging for programmers who lack the knowledge of GPU hardware architecture. In this dissertation, we describe an Optimization Compiler Framework Based on Polyhedron Model for GPGPUs to bridge the speed gap between the GPU cores and the off-chip memory and improve the overall performance of the GPU systems. The optimization compiler framework includes a detailed data reuse analyzer based on the extended polyhedron model for GPU kernels, …


Oclep+: One-Class Intrusion Detection Using Length Of Patterns, Sai Kiran Pentukar Jan 2017

Oclep+: One-Class Intrusion Detection Using Length Of Patterns, Sai Kiran Pentukar

Browse all Theses and Dissertations

In an earlier paper, a method called One-class Classification using Length statistics of (jumping) Emerging Patterns (OCLEP) was introduced for masquerader detection. Jumping emerging patterns (JEPs) for a test instance are minimal patterns that match the test instance but they do not match any normal instances. OCLEP was based on the observation that one needs long JEPs to differentiate an instance of one class from instances of the same class, but needs short JEPs to differentiate an instance of one class from instances of a different class. In this thesis, we present OCLEP+, One-class Classification using Length statistics of Emerging …


Conditional Correlation Analysis, Sanjeev Bhatta Jan 2017

Conditional Correlation Analysis, Sanjeev Bhatta

Browse all Theses and Dissertations

Correlation analysis is a frequently used statistical measure to examine the relationship among variables in different practical applications. However, the traditional correlation analysis uses an overly simplistic method to do so. It measures how two variables are related in an application by examining only their relationship in the entire underlying data space. As a result, traditional correlation analysis may miss a strong correlation between those variables especially when that relationship exists in the small subpopulation of the larger data space. This is no longer acceptable and may lose a fair share of information in this era of Big Data which …


Intelligent Tutoring System Effects On The Learning Process, Ali Talib Qasim Al-Aqbi Jan 2017

Intelligent Tutoring System Effects On The Learning Process, Ali Talib Qasim Al-Aqbi

Browse all Theses and Dissertations

The traditional education systems that have been used for several centuries have evolved very slowly and might be ineffective for addressing diverse learning styles and levels of preparation. This system is characterized by many students interacting with a single teacher, who is unable to address the individual needs of every student. Therefore, some students can become frustrated and fail to reach their educational potential. An Intelligent Tutoring System (ITS), which is a computer application used to provide students with one-to-one supplemental tutoring tailored to the student's learning style and pace, is of interest to educators for improving student learning. To …


Model Preparation And User Interface Aspects For Microsoft Hololens Medical Tutorial Applications, Andrew J. Mcnutt Jan 2017

Model Preparation And User Interface Aspects For Microsoft Hololens Medical Tutorial Applications, Andrew J. Mcnutt

Browse all Theses and Dissertations

Augmented Reality (AR) is the combination of computer vision and graphics to allow a device to derive context about the environment and to display relevant information to the user. The Microsoft Hololens is the latest wearable AR device that includes a series of infrared sensors to perform hand tracking and Simultaneous Localization and Mapping, a wave guide optics system to project holograms, and an independent untethered operating system. This thesis will explore the hardware and software capabilities of the device, prepare 3D graphical models, and understand the user interface. Specifically, in our research the target application is a tutorial on …


Diffusion Maps And Transfer Subspace Learning, Olga L. Mendoza-Schrock Jan 2017

Diffusion Maps And Transfer Subspace Learning, Olga L. Mendoza-Schrock

Browse all Theses and Dissertations

Transfer Subspace Learning has recently gained popularity for its ability to perform cross-dataset and cross-domain object recognition. The ability to leverage existing data without the need for additional data collections is attractive for Aided Target Recognition applications. For Aided Target Recognition (or object assessment) applications, Transfer Subspace Learning is particularly useful, as it enables the incorporation of sparse and dynamically collected data into existing systems that utilize large databases. In this dissertation, Manifold Learning and Transfer Subspace Learning are combined to create new Aided Target Recognition systems capable of achieving high target recognition rates for cross-dataset conditions and cross-domain applications. …


Detection Of Ddos Attacks Against The Sdn Controller Using Statistical Approaches, Basheer Husham Ali Al-Mafrachi Jan 2017

Detection Of Ddos Attacks Against The Sdn Controller Using Statistical Approaches, Basheer Husham Ali Al-Mafrachi

Browse all Theses and Dissertations

In traditional networks, switches and routers are very expensive, complex, and inflexible because forwarding and handling of packets are in the same device. However, Software Defined Networking (SDN) makes networks design more flexible, cheaper, and programmable because it separates the control plane from the data plane. SDN gives administrators of networks more flexibility to handle the whole network by using one device which is the controller. Unfortunately, SDN faces a lot of security problems that may severely affect the network operations if not properly addressed. Threat vectors may target main components of SDN such as the control plane, the data …


Detecting Information Leakage In Android Malware Using Static Taint Analysis, Soham P. Kelkar Jan 2017

Detecting Information Leakage In Android Malware Using Static Taint Analysis, Soham P. Kelkar

Browse all Theses and Dissertations

According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted attackers to use Android as a platform to conduct malicious activities. To achieve these malicious activities some attacker choose to develop malicious Apps to steal information from the Android users. As the modern day smartphones process, a lot of sensitive information, information security, and privacy becoming a potential target for the attacker. The malicious Apps steal information from the infected phone and send this information to the attacker-controlled URLs using various Android sink functions. Therefore, it necessary to protect data as it can prove detrimental …


Gait Analysis From Wearable Devices Using Image And Signal Processing, Bradley A. Schneider Jan 2017

Gait Analysis From Wearable Devices Using Image And Signal Processing, Bradley A. Schneider

Browse all Theses and Dissertations

We present the results of analyzing gait motion in-person video taken from a commercially available wearable camera embedded in a pair of glasses. The video is analyzed with three different computer vision methods to extract motion vectors from different gait sequences from four individuals for comparison against a manually annotated ground truth dataset. Using a combination of signal processing and computer vision techniques, gait features are extracted to identify the walking pace of the individual wearing the camera and are validated using the ground truth dataset. We perform an additional data collection with both the camera and a body-worn accelerometer …


Web-Delivered Assembly Language Interactive Training And Its Sequence Identification For Software Reverse Engineering, Sunethra Thimmapuram Jan 2017

Web-Delivered Assembly Language Interactive Training And Its Sequence Identification For Software Reverse Engineering, Sunethra Thimmapuram

Browse all Theses and Dissertations

The purpose of this research is to help the beginners of software reverse engineering, the process of extracting knowledge or design information from a product and reproducing it on basis of extracted information. Beginner users often find it difficult to use, as the task may be found daunting at first sight due to a lack of existing learning resources. We need a better way to present information to the novice reverse engineer about how to understand low-level sequences of assembly instructions. This is akin to how the key to learning a foreign language is based upon a fundamental knowledge of …


Harassment Detection On Twitter Using Conversations, Venkatesh Edupuganti Jan 2017

Harassment Detection On Twitter Using Conversations, Venkatesh Edupuganti

Browse all Theses and Dissertations

Social media has brought people closer than ever before, but the use of social media has also brought with it a risk of online harassment. Such harassment can have a serious impact on a person such as causing low self-esteem and depression. The past research on detecting harassment on social media is primarily based on the content of messages exchanged on social media. The lack of context when relying on a single social media post can result in a high degree of false alarms. In this study, I focus on the reliable detection of harassment on Twitter by better understanding …


Development Of A Performance Assessment System For Language Learning, Imen Kasrani Jan 2017

Development Of A Performance Assessment System For Language Learning, Imen Kasrani

Browse all Theses and Dissertations

Recent advances in computer-assisted, language-speaking, learning/training technology have demonstrated its promising potential to improve the outcome of language learning in early education, special education, English as a Second Language (ESL), and foreign language. The growing number of readily available mobile app-based solutions help encourage interest in learning to speak a foreign language, but their effectiveness is limited due to their lack of objective assessment and performance feedback resembling expert judgment. For example, it has been recognized that, in early education, students learn best with one-on-one instructions. Unfortunately, teachers do not have the time, and it is challenging to extend the …


Development Of An Android Based Performance Assessment System For Motivational Interviewing Training, Sowmya Pappu Jan 2017

Development Of An Android Based Performance Assessment System For Motivational Interviewing Training, Sowmya Pappu

Browse all Theses and Dissertations

Motivational Interviewing (MI) has been proved to be an effective Screening, Brief Intervention, and Referral to Treatment (SBIRT) technique. It is an evidence-based practice used to identify, reduce, and prevent problematic use, abuse, and dependence on alcohol and illicit drugs. It emphasizes on patient-centered counseling approach that can help resolve their ambivalence through a non-confrontational, goal-oriented style for eliciting behavior change from the patient, almost like patients talk themselves into change. This approach provokes less resistance and stimulates the progress of patients at their own pace towards deciding about planning, making and sustaining positive behavioral change. Thus, training medical professionals …


Implementation And Evaluation Of Goal Selection In A Cognitive Architecture, Sravya Kondrakunta Jan 2017

Implementation And Evaluation Of Goal Selection In A Cognitive Architecture, Sravya Kondrakunta

Browse all Theses and Dissertations

A cognitive system attempts to achieve its goals by utilizing the appropriate resources present to yield the best possible outcome within a short duration. To achieve the goals in such an efficient manner, it is important for the agent to manage its goals well. Goal management not only makes the agent efficient but also flexible, more durable to the sudden changes in the environment, and self-reliant. Goal Management consists of various goal operations including goal formulation, selection, change, delegation, achievement, and monitoring. Each operation is unique and has its own significance in aiding the performance of the agent. The thesis …


Visualization Of Carbon Monoxide Particles Released From Firearms, Sadan Suneesh Menon Jan 2017

Visualization Of Carbon Monoxide Particles Released From Firearms, Sadan Suneesh Menon

Browse all Theses and Dissertations

A number of soldiers have come forward to report discomfort, irritation and respiratory problems after taking part in a live firing session. These problems are caused due to the fumes and particulates emitted from the gun upon firing. There exists substantial research work focused on lead and other harmful metallic particulates expelled from a firearm, since they are the most harmful among the other emissions. However, our research focuses on visualizing the carbon monoxide (CO) particles released from a firearm in order to help understand adverse effects they may have on the human body. We use data provided by researchers …


Semantic Web Foundations For Representing, Reasoning, And Traversing Contextualized Knowledge Graphs, Vinh Thi Kim Nguyen Jan 2017

Semantic Web Foundations For Representing, Reasoning, And Traversing Contextualized Knowledge Graphs, Vinh Thi Kim Nguyen

Browse all Theses and Dissertations

Semantic Web technologies such as RDF and OWL have become World Wide Web Consortium (W3C) standards for knowledge representation and reasoning. RDF triples about triples, or meta triples, form the basis for a contextualized knowledge graph. They represent the contextual information about individual triples such as the source, the occurring time or place, or the certainty. However, an efficient RDF representation for such meta-knowledge of triples remains a major limitation of the RDF data model. The existing reification approach allows such meta-knowledge of RDF triples to be expressed in RDF by using four triples per reified triple. While reification is …


Development Of An Ultra-Portable Non-Contact Wound Measurement System, Anka Babu Billa Jan 2017

Development Of An Ultra-Portable Non-Contact Wound Measurement System, Anka Babu Billa

Browse all Theses and Dissertations

Continuous monitoring of changes in wound size is key to correctly predict whether wounds will heal readily with conventional treatment or require more aggressive treatment strategies. Unfortunately, existing wound measurement solutions don't meet the clinical demand due to their limitations in accuracy, operating complexity and time, acquisition and operation cost, or reproducibility, resulting in unnecessarily lengthy recovery or extra treatment procedures, incurring an excessively high financial cost, and in many cases extended usage of addictive painkillers. In this thesis, we proposed and developed a low cost, a portable non-contact solution that combines multi-spectral imaging and a portfolio of imaging processing …


Automated Rendering Of Schema Diagram For Ontologies, Nazifa Karima Jan 2017

Automated Rendering Of Schema Diagram For Ontologies, Nazifa Karima

Browse all Theses and Dissertations

Semantic Web extends the current web, using ontologies, metadata and other technologies to establish links between terms and concepts. This enables machines to automatically integrate information across different platforms utilizing the standard definitions. Furthermore, reasoning agents can infer new knowledge by gathering existing information and these additional connections between them. As a result of being designed and maintained independently, data sources exhibit highly heterogeneous nature. This increases the complexity of data integration and hinders interoperability. However, if we can align the overlapping concepts among different domains of knowledge, the prospect of achieving interoperability and integration without having any intermediate reasoning …


Data-Driven Network-Centric Threat Assessment, Dae Wook Kim Jan 2017

Data-Driven Network-Centric Threat Assessment, Dae Wook Kim

Browse all Theses and Dissertations

As the Internet has grown increasingly popular as a communication and information sharing platform, it has given rise to two major types of Internet security threats related to two primary entities: end-users and network services. First, information leakages from networks can reveal sensitive information about end-users. Second, end-users systems can be compromised through attacks on network services, such as scanning-and-exploit attacks, spamming, drive-by downloads, and fake anti-virus software. Designing threat assessments to detect these threats is, therefore, of great importance, and a number of the detection systems have been proposed. However, these existing threat assessment systems face significant challenges in …


Smart Ev Charging For Improved Sustainable Mobility, Ashutosh Shivakumar Jan 2017

Smart Ev Charging For Improved Sustainable Mobility, Ashutosh Shivakumar

Browse all Theses and Dissertations

The landscape of energy generation and utilization is witnessing an unprecedented change. We are at the threshold of a major shift in electricity generation from utilization of conventional sources of energy like coal to sustainable and renewable sources of energy like solar and wind. On the other hand, electricity consumption, especially in the field of transportation, due to advancements in the field of battery research and exponential technologies like vehicle telematics, is seeing a shift from carbon based to Lithium based fuel. Encouraged by 1. Decrease in the cost of Li – ion based batteries 2. Breakthroughs in battery chemistry …


Deep Learning Approach For Intrusion Detection System (Ids) In The Internet Of Things (Iot) Network Using Gated Recurrent Neural Networks (Gru), Manoj Kumar Putchala Jan 2017

Deep Learning Approach For Intrusion Detection System (Ids) In The Internet Of Things (Iot) Network Using Gated Recurrent Neural Networks (Gru), Manoj Kumar Putchala

Browse all Theses and Dissertations

The Internet of Things (IoT) is a complex paradigm where billions of devices are connected to a network. These connected devices form an intelligent system of systems that share the data without human-to-computer or human-to-human interaction. These systems extract meaningful data that can transform human lives, businesses, and the world in significant ways. However, the reality of IoT is prone to countless cyber-attacks in the extremely hostile environment like the internet. The recent hack of 2014 Jeep Cherokee, iStan pacemaker, and a German steel plant are a few notable security breaches. To secure an IoT system, the traditional high-end security …


Portable Motion Lab For Diagnostic And Rehabilitation Processes, Yogesh Laxman Chavan Jan 2017

Portable Motion Lab For Diagnostic And Rehabilitation Processes, Yogesh Laxman Chavan

Browse all Theses and Dissertations

In this thesis research, we have explored the capabilities of a household body-tracking device - Microsoft Xbox Kinect for motion analysis and assessment to assist patient’s rehabilitation after joint replacement and repair surgeries. In particular, we have combined the motion tracking capabilities of Kinect with the 3D modelling of human body for accurate and intuitive movement assessment and feedback. Our prototype system demonstrates the effective and efficient workflow of motion capturing, data processing and analyzing and augmented reality based presentation, resulting in a design which is not only accurate, reliable and robust, but also extremely cost- and space-efficient. Furthermore, we …


Settings Protection Add-On: A User-Interactive Browser Extension To Prevent The Exploitation Of Preferences, Venkata Naga Siva Seelam Jan 2017

Settings Protection Add-On: A User-Interactive Browser Extension To Prevent The Exploitation Of Preferences, Venkata Naga Siva Seelam

Browse all Theses and Dissertations

The abuse of browser preferences is a significant application security issue, despite numerous protections against automated software changing these preferences. Browser hijackers modify user’s desired preferences by injecting malicious software into the browser. Users are not aware of these modifications, and the unwanted changes can annoy the user and circumvent security preferences. Reverting these changes is not easy, and users often have to go through complicated sequences of steps to restore their preferences to the previous values. Tasks to resolve this issue include uninstalling and re-installing the browser, resetting browser preferences, and installing malware removal tools. This thesis describes a …


Collaboratively Detecting Http-Based Distributed Denial Of Service Attack Using Software Defined Network, Ademola A. Ikusan Jan 2017

Collaboratively Detecting Http-Based Distributed Denial Of Service Attack Using Software Defined Network, Ademola A. Ikusan

Browse all Theses and Dissertations

Over the years, there have been a lot of attacks on the web servers of critical companies and organization. As much as these organizations tighten their security, it always tends not to be enough to stop all the attacks towards their servers. These attack vectors are so difficult to stop because of the technicalities behind the attack. Furthermore, there are different classes of distributed denial of service(DDoS) attacks such as the high rates (SYN Flood attacks, ARP Flood attacks, etc), low-rate(HTTP-GET, HTTP-POST). Although there are different ways to stop high rate DDoS attacks by traffic sampling and detecting malformed packets …


Finding Street Gang Member Profiles On Twitter, Lakshika Balasuriya Jan 2017

Finding Street Gang Member Profiles On Twitter, Lakshika Balasuriya

Browse all Theses and Dissertations

The crime and violence street gangs introduce into neighborhoods is a growing epidemic in cities around the world. Today, over 1.4 million people, belonging to more than 33,000 gangs, are active in the United States, of which 88% identify themselves as being members of a street gang. With the recent popularity of social media, street gang members have established online presences coinciding with their physical occupation of neighborhoods. Recent studies report that approximately 45% of gang members participate in online offending activities such as threatening, harassing individuals, posting violent videos or attacking someone on the street for something they said …