Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Department of Computer Science and Engineering

2018

Articles 1 - 19 of 19

Full-Text Articles in Computer Engineering

Threats And Mitigation Of Ddos Cyberattacks Against The U.S. Power Grid Via Ev Charging, Glenn Sean Morrison Jan 2018

Threats And Mitigation Of Ddos Cyberattacks Against The U.S. Power Grid Via Ev Charging, Glenn Sean Morrison

Browse all Theses and Dissertations

Cars are an ever changing and integral part of modern society. Two of the biggest changes in vehicles today are their heavy integration with wireless communication and the push toward battery powered Electric Vehicles (EV). EV and EV charging stations have become a part of the Internet of Things (IoT). While this connectedness increases the convenience and functionality of the vehicles and charging stations, it also opens them up to a wide range of cyber threats. This thesis examines the potential threats against the EV charging ecosystem through a historical analysis of past cyberattacks and identified vulnerabilities. As EV charging ...


A Twitter-Based Study For Understanding Public Reaction On Zika Virus, Roopteja Muppalla Jan 2018

A Twitter-Based Study For Understanding Public Reaction On Zika Virus, Roopteja Muppalla

Browse all Theses and Dissertations

In recent times, social media platforms like Twitter have become more popular and people have become more interactive and responsive than before. People often react to every news in real-time and within no-time, the information spreads rapidly. Even with viral diseases like Zika, people tend to share their opinions and concerns on social media. This can be leveraged by the health officials to track the disease in real-time thereby reducing the time lag due to traditional surveys. A faster and accurate detection of the disease can allow health officials to understand people's opinion of the disease and take necessary ...


A Model For Seasonal Dynamic Networks, Jace D. Robinson Jan 2018

A Model For Seasonal Dynamic Networks, Jace D. Robinson

Browse all Theses and Dissertations

Sociotechnological and geospatial processes exhibit time varying structure that make insight discovery challenging. This paper presents statistical model of systems with seasonal dynamics, modeled as a dynamic network, to address this challenge. It assumes the probability of edge formations depend on a type assigned to incident nodes and the current time. Time dependencies are modeled by unique seasonal processes. The model is studied on several synthetic and real datasets. Superior fidelity of this model on seasonal datasets compared to existing network models, while being able to remain equally accurate for networks with randomly changing structure, is shown. The model is ...


Virtual Doctor: An Intelligent Human-Computer Dialogue System For Quick Response To People In Need, Stavros Mallios Jan 2018

Virtual Doctor: An Intelligent Human-Computer Dialogue System For Quick Response To People In Need, Stavros Mallios

Browse all Theses and Dissertations

One of the challenges of our society is the existence of chronic-related conditions and diseases among the elderly and people at risk. Apart from the welfare of people, a significant impact of this phenomenon is the accumulation of high financial costs for both individuals and health care systems. In order to address this issue and to reduce its effects, many efforts have been made towards preventing, identifying in early stages and, generally, managing chronic-related medical conditions and diseases. As a result, there has been a keen research and market interest in health monitoring devices during the past few decades. Nevertheless ...


Content-Based Clustering And Visualization Of Social Media Text Messages, Sydney A. Barnard Jan 2018

Content-Based Clustering And Visualization Of Social Media Text Messages, Sydney A. Barnard

Browse all Theses and Dissertations

Although Twitter has been around for more than ten years, crisis management agencies and first response personnel are not able to fully use the information this type of data provides during a crisis or natural disaster. This thesis addresses clustering and visualizing social media data by textual similarity, rather than by only time and location, as a tool for first responders. This thesis presents a tool that automatically clusters geotagged text data based on their content and displays the clusters and their locations on the map. It allows at-a-glance information to be displayed throughout the evolution of a crisis. For ...


A Stochastic Petri Net Reverse Engineering Methodology For Deep Understanding Of Technical Documents, Giorgia Rematska Jan 2018

A Stochastic Petri Net Reverse Engineering Methodology For Deep Understanding Of Technical Documents, Giorgia Rematska

Browse all Theses and Dissertations

Systems Reverse Engineering has gained great attention over time and is associated with numerous different research areas. The importance of this research derives from several technological necessities. Security analysis and learning purposes are two of them and can greatly benefit from reverse engineering. More specifically, reverse engineering of technical documents for deeper automatic understanding is a research area where reverse engineering can contribute a lot. In this PhD dissertation we develop a novel reverse engineering methodology for deep understanding of architectural description of digital hardware systems that appear in technical documents. Initially, we offer a survey on reverse engineering of ...


A Multi-Formal Languages Collaborative Scheme For Complex Human Activity Recognition And Behavioral Patterns Extraction, Anargyros Angeleas Jan 2018

A Multi-Formal Languages Collaborative Scheme For Complex Human Activity Recognition And Behavioral Patterns Extraction, Anargyros Angeleas

Browse all Theses and Dissertations

Human Activity Recognition is an actively researched domain for the past few decades, and is one of the most eminent applications of today. It is already part of our life, but due to high level of uncertainty and challenges of human detection, we have only application specific solutions. Thus, the problem being very demanding and still remains unsolved. Within this PhD we delve into the problem, and approach it from a variety of viewpoints. At start, we present and evaluate different architectures and frameworks for activity recognition. Henceforward, the focal point of our attention is automatic human activity recognition. We ...


Implementation Of Unmanned Aerial Vehicles Reporting Plume Cloud Concentration Values In A 3d Simulation Environment, Emily Catherine Novak Jan 2018

Implementation Of Unmanned Aerial Vehicles Reporting Plume Cloud Concentration Values In A 3d Simulation Environment, Emily Catherine Novak

Browse all Theses and Dissertations

Unmanned aerial vehicles, or UAVs, have the potential to vastly improve plume cloud tracking at low cost. Plume clouds can be produced from blast mining, chemical warfare, unintended man-made disasters, and natural causes. This thesis provides implementation of the capability to simulate a 3D environment in which UAVs are individually controlled and each report a plume's concentration value at a specific location. It leverages existing industry standard technologies, including the PX4 autopilot system, the Gazebo simulation environment, the Robot Operating System (ROS), and QGroundControl. The provided system integrates the existing tools with a plume model plug-in that provides simulated ...


Development Of An Ios App For Learning Intonation Of Wind Instruments, Swathi Pamidi Jan 2018

Development Of An Ios App For Learning Intonation Of Wind Instruments, Swathi Pamidi

Browse all Theses and Dissertations

Learning music instrument is a challenging task for a beginner without constant guidance from an instructor. The primary objective of this thesis research is to design and develop an iOS mobile / iPad learning app that helps users to learn and practice intonation for a suite of wind instruments by themselves with comfort and ease through app-provided tuning and charting guidance and app-assisted self-assessment. Particularly, our successfully-implemented app provides the following features to enhance the user's learning experience: 1 ) Provides learners easy-to-access information for the fingering and tuning techniques of wind instruments by converting Dr. Shelley Jagow's book - "Tuning ...


Domain-Specific Knowledge Extraction From The Web Of Data, Sarasi Lalithsena Jan 2018

Domain-Specific Knowledge Extraction From The Web Of Data, Sarasi Lalithsena

Browse all Theses and Dissertations

Domain knowledge plays a significant role in powering a number of intelligent applications such as entity recommendation, question answering, data analytics, and knowledge discovery. Recent advances in Artificial Intelligence and Semantic Web communities have contributed to the representation and creation of this domain knowledge in a machine-readable form. This has resulted in a large collection of structured datasets on the Web which is commonly referred to as the Web of data. The Web of data continues to grow rapidly since its inception, which poses a number of challenges in developing intelligent applications that can benefit from its use. Majority of ...


Slim Embedding Layers For Recurrent Neural Language Models, Zhongliang Li Jan 2018

Slim Embedding Layers For Recurrent Neural Language Models, Zhongliang Li

Browse all Theses and Dissertations

Recurrent neural language (RNN) models are the state-of-the-art method for language modeling. When the vocabulary size is large, the space taken to store the model parameters becomes the bottleneck for the use of these type of models. We introduce a simple space compression method that stochastically shares the structured parameters at both the input and output embedding layers of RNN models to significantly reduce the size of model parameters, but still compactly represents the original input and the output embedding layers. The method is easy to implement and tune. Experiments on several data sets show that the new method achieves ...


Verifying Data-Oriented Gadgets In Binary Programs To Build Data-Only Exploits, Zachary David Sisco Jan 2018

Verifying Data-Oriented Gadgets In Binary Programs To Build Data-Only Exploits, Zachary David Sisco

Browse all Theses and Dissertations

Data-Oriented Programming (DOP) is a data-only code-reuse exploit technique that "stitches" together sequences of instructions to alter a program's data flow to cause harm. DOP attacks are difficult to mitigate because they respect the legitimate control flow of a program and by-pass memory protection schemes such as Address Space Layout Randomization, Data Execution Prevention, and Control Flow Integrity. Techniques that describe how to build DOP payloads rely on a program's source code. This research explores the feasibility of constructing DOP exploits without source code-that is, using only binary representations of programs. The lack of semantic and type information ...


Image Stitching And Matching Tool In The Automated Iterative Reverse Engineer (Aire) Integrated Circuit Analysis Suite, David C. Bowman Jan 2018

Image Stitching And Matching Tool In The Automated Iterative Reverse Engineer (Aire) Integrated Circuit Analysis Suite, David C. Bowman

Browse all Theses and Dissertations

Due to current market forces, leading-edge semiconductor fabrication plants have moved outside of the US. While this is not a problem at first glance, when it comes to security-sensitive applications, over-production, device cloning, or design alteration becomes a possibility. Since these vulnerabilities exist during the fabrication phase, a Reverse Engineering (RE) step must be introduced to help ensure secure device operation. This thesis proposes several unique methods and a collection of tools to ensure trust assurance in integrated circuit design by detecting fabrication flaws and possible hardware Trojans using several image processing techniques; fused into a singular view of the ...


Measuring Goal Similarity Using Concept, Context And Task Features, Vahid Eyorokon Jan 2018

Measuring Goal Similarity Using Concept, Context And Task Features, Vahid Eyorokon

Browse all Theses and Dissertations

Goals can be described as the user's desired state of the agent and the world and are satisfied when the agent and the world are altered in such a way that the present state matches the desired state. For physical agents, they must act in the world to alter it in a series of individual atomic actions. Traditionally, agents use planning to create a chain of actions each of which altering the current world state and yielding a new one until the final action yields the desired goal state. Once this goal state has been achieved, the goal is ...


Malware Analysis Skills Taught In University Courses, Swetha Gorugantu Jan 2018

Malware Analysis Skills Taught In University Courses, Swetha Gorugantu

Browse all Theses and Dissertations

Career opportunities for malware analysts are growing at a fast pace due to the evolving nature of cyber threats as well as the necessity to counter them. However, employers are often unable to hire analysts fast though due to a lack of the required skillset. Hence, the primary purpose of the thesis is to conduct a gap analysis between the binary analysis skills taught in universities with those that the recruiters are looking for. Malware can be analyzed using three main types of tools and techniques: high-level profiling, static analysis, and dynamic analysis. These methods provide detailed information about the ...


Use Of Adaptive Mobile Applications To Improve Mindfulness, Wiehan Boshoff Jan 2018

Use Of Adaptive Mobile Applications To Improve Mindfulness, Wiehan Boshoff

Browse all Theses and Dissertations

Mindfulness is the state of retaining awareness of what is happening at the current point in time. It has been used in multiple forms to reduce stress, anxiety, and even depression. Promoting Mindfulness can be done in various ways, but current research shows a trend towards preferential usage of breathing exercises over other methods to reach a mindful state. Studies have showcased that breathing can be used as a tool to promote brain control, specifically in the auditory cortex region. Research pertaining to disorders such as Tinnitus, the phantom awareness of sound, could potentially benefit from using these brain control ...


Sensor Data Streams Correlation Platform For Asthma Management, Vaikunth Sridharan Jan 2018

Sensor Data Streams Correlation Platform For Asthma Management, Vaikunth Sridharan

Browse all Theses and Dissertations

Asthma is a high-burden chronic inflammatory disease with prevalence in children with twice the rate compared to adults. It can be improved by continuously monitoring patients and their environment using the Internet of Things (IoT) based devices. These sensor data streams so obtained are essential to comprehend multiple factors triggering asthma symptoms. In order to support physicians in exploring causal associations and finding actionable insights, a visualization system with a scalable cloud infrastructure that can process multimodal sensor data and Patient Generated Health Data (PGHD) is necessary. In this thesis, we describe a cloud-based asthma management and visualization platform that ...


A Semantically Enhanced Approach To Identify Depression-Indicative Symptoms Using Twitter Data, Ankita Saxena Jan 2018

A Semantically Enhanced Approach To Identify Depression-Indicative Symptoms Using Twitter Data, Ankita Saxena

Browse all Theses and Dissertations

According to the World Health Organization, more than 300 million people suffer from Major Depressive Disorder (MDD) worldwide. PHQ-9 is used to screen and diagnose MDD clinically and identify its severity. With the unprecedented growth and enthusiastic acceptance of social media such as Twitter, a large number of people have come to share their feelings and emotions on it openly. Each tweet can indicate a user's opinion, thought or feeling. A tweet can also indicate multiple symptoms related to PHQ-9. Identifying PHQ-9 symptoms indicated by a tweet can provide crucial information about a user regarding his/her depression diagnosis ...


Building An Abstract-Syntax-Tree-Oriented Symbolic Execution Engine For Php Programs, Jin Huang Jan 2018

Building An Abstract-Syntax-Tree-Oriented Symbolic Execution Engine For Php Programs, Jin Huang

Browse all Theses and Dissertations

This thesis presents the design, implementation, and evaluation of an abstract-syntax-tree-oriented symbolic execution engine for the PHP programming language. As a symbolic execution engine, our system emulate the execution of a PHP program by assuming that all inputs are with symbolic rather than concrete values. While our system inherits the basic definition of symbolic execution, it fundamentally differs from existing symbolic execution implementations that mainly leverage intermediate representation (IRs) to operate. Specifically, our system directly takes the abstract syntax tree (AST) of a program as input and subsequently interprets this AST. Performing symbolic execution using AST offers unique advantages. First ...