Open Access. Powered by Scholars. Published by Universities.®
Articles 121 - 150 of 255
Full-Text Articles in Computer Engineering
Data-Driven Network-Centric Threat Assessment, Dae Wook Kim
Data-Driven Network-Centric Threat Assessment, Dae Wook Kim
Browse all Theses and Dissertations
As the Internet has grown increasingly popular as a communication and information sharing platform, it has given rise to two major types of Internet security threats related to two primary entities: end-users and network services. First, information leakages from networks can reveal sensitive information about end-users. Second, end-users systems can be compromised through attacks on network services, such as scanning-and-exploit attacks, spamming, drive-by downloads, and fake anti-virus software. Designing threat assessments to detect these threats is, therefore, of great importance, and a number of the detection systems have been proposed. However, these existing threat assessment systems face significant challenges in …
Smart Ev Charging For Improved Sustainable Mobility, Ashutosh Shivakumar
Smart Ev Charging For Improved Sustainable Mobility, Ashutosh Shivakumar
Browse all Theses and Dissertations
The landscape of energy generation and utilization is witnessing an unprecedented change. We are at the threshold of a major shift in electricity generation from utilization of conventional sources of energy like coal to sustainable and renewable sources of energy like solar and wind. On the other hand, electricity consumption, especially in the field of transportation, due to advancements in the field of battery research and exponential technologies like vehicle telematics, is seeing a shift from carbon based to Lithium based fuel. Encouraged by 1. Decrease in the cost of Li – ion based batteries 2. Breakthroughs in battery chemistry …
Deep Learning Approach For Intrusion Detection System (Ids) In The Internet Of Things (Iot) Network Using Gated Recurrent Neural Networks (Gru), Manoj Kumar Putchala
Deep Learning Approach For Intrusion Detection System (Ids) In The Internet Of Things (Iot) Network Using Gated Recurrent Neural Networks (Gru), Manoj Kumar Putchala
Browse all Theses and Dissertations
The Internet of Things (IoT) is a complex paradigm where billions of devices are connected to a network. These connected devices form an intelligent system of systems that share the data without human-to-computer or human-to-human interaction. These systems extract meaningful data that can transform human lives, businesses, and the world in significant ways. However, the reality of IoT is prone to countless cyber-attacks in the extremely hostile environment like the internet. The recent hack of 2014 Jeep Cherokee, iStan pacemaker, and a German steel plant are a few notable security breaches. To secure an IoT system, the traditional high-end security …
Portable Motion Lab For Diagnostic And Rehabilitation Processes, Yogesh Laxman Chavan
Portable Motion Lab For Diagnostic And Rehabilitation Processes, Yogesh Laxman Chavan
Browse all Theses and Dissertations
In this thesis research, we have explored the capabilities of a household body-tracking device - Microsoft Xbox Kinect for motion analysis and assessment to assist patient’s rehabilitation after joint replacement and repair surgeries. In particular, we have combined the motion tracking capabilities of Kinect with the 3D modelling of human body for accurate and intuitive movement assessment and feedback. Our prototype system demonstrates the effective and efficient workflow of motion capturing, data processing and analyzing and augmented reality based presentation, resulting in a design which is not only accurate, reliable and robust, but also extremely cost- and space-efficient. Furthermore, we …
Settings Protection Add-On: A User-Interactive Browser Extension To Prevent The Exploitation Of Preferences, Venkata Naga Siva Seelam
Settings Protection Add-On: A User-Interactive Browser Extension To Prevent The Exploitation Of Preferences, Venkata Naga Siva Seelam
Browse all Theses and Dissertations
The abuse of browser preferences is a significant application security issue, despite numerous protections against automated software changing these preferences. Browser hijackers modify user’s desired preferences by injecting malicious software into the browser. Users are not aware of these modifications, and the unwanted changes can annoy the user and circumvent security preferences. Reverting these changes is not easy, and users often have to go through complicated sequences of steps to restore their preferences to the previous values. Tasks to resolve this issue include uninstalling and re-installing the browser, resetting browser preferences, and installing malware removal tools. This thesis describes a …
Collaboratively Detecting Http-Based Distributed Denial Of Service Attack Using Software Defined Network, Ademola A. Ikusan
Collaboratively Detecting Http-Based Distributed Denial Of Service Attack Using Software Defined Network, Ademola A. Ikusan
Browse all Theses and Dissertations
Over the years, there have been a lot of attacks on the web servers of critical companies and organization. As much as these organizations tighten their security, it always tends not to be enough to stop all the attacks towards their servers. These attack vectors are so difficult to stop because of the technicalities behind the attack. Furthermore, there are different classes of distributed denial of service(DDoS) attacks such as the high rates (SYN Flood attacks, ARP Flood attacks, etc), low-rate(HTTP-GET, HTTP-POST). Although there are different ways to stop high rate DDoS attacks by traffic sampling and detecting malformed packets …
Finding Street Gang Member Profiles On Twitter, Lakshika Balasuriya
Finding Street Gang Member Profiles On Twitter, Lakshika Balasuriya
Browse all Theses and Dissertations
The crime and violence street gangs introduce into neighborhoods is a growing epidemic in cities around the world. Today, over 1.4 million people, belonging to more than 33,000 gangs, are active in the United States, of which 88% identify themselves as being members of a street gang. With the recent popularity of social media, street gang members have established online presences coinciding with their physical occupation of neighborhoods. Recent studies report that approximately 45% of gang members participate in online offending activities such as threatening, harassing individuals, posting violent videos or attacking someone on the street for something they said …
Adapting The Search Space While Limiting Damage During Learning In A Simulated Flapping Wing Micro Air Vehicle, Monica Sam
Browse all Theses and Dissertations
Cyber-Physical Systems (CPS) are characterized by closely coupled physical and software components that operate simultaneously on different spatial and temporal scales; exhibit multiple and distinct behavioral modalities; and interact with one another in ways not entirely predictable at the time of design. A commonly appearing type of CPS are systems that contain one or more smart components that adapt locally in response to global measurements of whole system performance. An example of a smart component robotic CPS system is a Flapping Wing Micro Air Vehicle (FW-MAV) that contains wing motion oscillators that control their wing flapping patterns to enable the …
Virtuo-Its: An Interactive Tutoring System To Teach Virtual Memory Concepts Of An Operating System, Venkata Krishna Kanth Musunuru
Virtuo-Its: An Interactive Tutoring System To Teach Virtual Memory Concepts Of An Operating System, Venkata Krishna Kanth Musunuru
Browse all Theses and Dissertations
Interactive tutoring systems are software applications that help individuals to learn difficult concepts. They can allow students to interact with ideas from essential mathematics to more complicated subjects like software engineering. This thesis concentrates on one such interactive tutoring system (ITS) designed for teaching concepts related to operating system virtual memory. Operating system concepts can be troublesome to learn without having someone or something to explain them. Even when an instructor is able to provide detailed explanations, it is still exceptionally difficult for students without a computer science foundation to comprehend these concepts. Students require a sophisticated set of mental …
Semantics-Based Summarization Of Entities In Knowledge Graphs, Kalpa Gunaratna
Semantics-Based Summarization Of Entities In Knowledge Graphs, Kalpa Gunaratna
Browse all Theses and Dissertations
The processing of structured and semi-structured content on the Web has been gaining attention with the rapid progress in the Linking Open Data project and the development of commercial knowledge graphs. Knowledge graphs capture domain-specific or encyclopedic knowledge in the form of a data layer and add rich and explicit semantics on top of the data layer to infer additional knowledge. The data layer of a knowledge graph represents entities and their descriptions. The semantic layer on top of the data layer is called the schema (ontology), where relationships of the entity descriptions, their classes, and the hierarchy of the …
Exploiting Alignments In Linked Data For Compression And Query Answering, Amit Krishna Joshi
Exploiting Alignments In Linked Data For Compression And Query Answering, Amit Krishna Joshi
Browse all Theses and Dissertations
Linked data has experienced accelerated growth in recent years due to its interlinking ability across disparate sources, made possible via machine-processable RDF data. Today, a large number of organizations, including governments and news providers, publish data in RDF format, inviting developers to build useful applications through reuse and integration of structured data. This has led to tremendous increase in the amount of RDF data on the web. Although the growth of RDF data can be viewed as a positive sign for semantic web initiatives, it causes performance bottlenecks for RDF data management systems that store and provide access to data. …
Rendering Owl In Latex For Improved Readability: Extensions To The Owlapi, Cogan M. Shimizu
Rendering Owl In Latex For Improved Readability: Extensions To The Owlapi, Cogan M. Shimizu
Browse all Theses and Dissertations
As ontology engineering is inherently a multidisciplinary process, it is necessary to utilize multiple vehicles to present an ontology to a user. In order to examine the content of an ontology, formal logic renderings of the axioms appear to be a very helpful approach for some. This thesis introduces a number of incremental improvements to the OWLAPI's \LaTeX{} rendering framework in order to improve the readability, concision, and correctness of OWL files translated into Description Logic and First Order Logic. In addition, we examine the efficacy of these renderings as vehicles for understanding an ontology.
Private Record Linkage: A Comparison Of Selected Techniques For Name Matching, Pawel B. Grzebala
Private Record Linkage: A Comparison Of Selected Techniques For Name Matching, Pawel B. Grzebala
Browse all Theses and Dissertations
The rise of Big Data Analytics has shown the utility of analyzing all aspects of a problem by bringing together disparate data sets. Efficient and accurate private record linkage algorithms are necessary to achieve this. However, records are often linked based on personally identifiable information, and protecting the privacy of individuals is critical. This work contributes to this field by studying an important component of the private record linkage problem: linking based on names while keeping those names encrypted, both on disk and in memory. We explore the applicability, accuracy, speed and security of three different primary approaches to this …
Wikimatcher: Leveraging Wikipedia For Ontology Alignment, Helena Brooke Mccurdy
Wikimatcher: Leveraging Wikipedia For Ontology Alignment, Helena Brooke Mccurdy
Browse all Theses and Dissertations
As the Semantic Web grows, so does the number of ontologies used to structure the data within it. Aligning these ontologies is critical to fully realizing the potential of the web. Previous work in ontology alignment has shown that even alignment systems utilizing basic string similarity metrics can produce useful matches. Researchers speculate that including semantic as well as syntactic information inherent in entity labels can further improve alignment results. This paper examines that hypothesis by exploring the utility of using Wikipedia as a source of semantic information. Various elements of Wikipedia are considered, including article content, page terms, and …
A Closed Loop Research Platform That Enables Dynamic Control Of Wing Gait Patterns In A Vertically Constrained Flapping Wing - Micro Air Vehicle, Hermanus Van Botha
A Closed Loop Research Platform That Enables Dynamic Control Of Wing Gait Patterns In A Vertically Constrained Flapping Wing - Micro Air Vehicle, Hermanus Van Botha
Browse all Theses and Dissertations
Research in Flapping Wing - Micro Air Vehicles(FW-MAVs) has been growing in recent years. Work ranging from mechanical designs to adaptive control algorithms are being developed in pursuit of mimicking natural flight. FW-MAV technology can be applied in a variety of use cases such a military application and surveillance, studying natural ecological systems, and hobbyist commercialization. Recent work has produced small scale FW-MAVs that are capable of hovering and maneuvering. Researchers control maneuvering in various ways, some of which involve making small adjustments to the core wing motion patterns (wing gaits) which determine how the wings flap. Adaptive control algorithms …
A Stochastic Petri Net Based Nlu Scheme For Technical Documents Understanding, Adamantia Psarologou
A Stochastic Petri Net Based Nlu Scheme For Technical Documents Understanding, Adamantia Psarologou
Browse all Theses and Dissertations
Natural Language Understanding (NLU) is a very old research field, which deals with machine reading comprehension. Despite the many years of work and the numerous accomplishments by several researchers in the field, there is still place for significant improvements. Here, our goal is to develop a novel NLU methodology for detecting and extracting event/action associations in technical documents. In order to achieve this goal we present a synergy of methods (Kernel extraction, Formal Language Modeling, Stochastic Petri-nets (SPN) mapping and Event Representation via SPN graph synthesis). In particular, the basic meaning of a natural language sentence is given by its …
Software Defined Secure Ad Hoc Wireless Networks, Maha Alqallaf
Software Defined Secure Ad Hoc Wireless Networks, Maha Alqallaf
Browse all Theses and Dissertations
Software defined networking (SDN), a new networking paradigm that separates the network data plane from the control plane, has been considered as a flexible, layered, modular, and efficient approach to managing and controlling networks ranging from wired, infrastructure-based wireless (e.g., cellular wireless networks, WiFi, wireless mesh net- works), to infrastructure-less wireless networks (e.g. mobile ad-hoc networks, vehicular ad-hoc networks) as well as to offering new types of services and to evolving the Internet architecture. Most work has focused on the SDN application in traditional and wired and/or infrastructure based networks. Wireless networks have become increasingly more heterogeneous. Secure and collab- …
Knowledge-Empowered Probabilistic Graphical Models For Physical-Cyber-Social Systems, Pramod Anantharam
Knowledge-Empowered Probabilistic Graphical Models For Physical-Cyber-Social Systems, Pramod Anantharam
Browse all Theses and Dissertations
There is a rapid intertwining of sensors and mobile devices into the fabric of our lives. This has resulted in unprecedented growth in the number of observations from the physical and social worlds reported in the cyber world. Sensing and computational components embedded in the physical world constitute a Cyber-Physical System (CPS). Current science of CPS is yet to effectively integrate citizen observations in CPS analysis. We demonstrate the role of citizen observations in CPS and propose a novel approach to perform a holistic analysis of machine and citizen sensor observations. Specifically, we demonstrate the complementary, corroborative, and timely aspects …
Knowledge Driven Search Intent Mining, Ashutosh Jadhav
Knowledge Driven Search Intent Mining, Ashutosh Jadhav
Browse all Theses and Dissertations
Understanding users' latent intents behind search queries is essential for satisfying a user's search needs. Search intent mining can help search engines to enhance its ranking of search results, enabling new search features like instant answers, personalization, search result diversification, and the recommendation of more relevant ads. Hence, there has been increasing attention on studying how to effectively mine search intents by analyzing search engine query logs. While state-of-the-art techniques can identify the domain of the queries (e.g. sports, movies, health), identifying domain-specific intent is still an open problem. Among all the topics available on the Internet, health is one …
Personalized And Adaptive Semantic Information Filtering For Social Media, Pavan Kapanipathi
Personalized And Adaptive Semantic Information Filtering For Social Media, Pavan Kapanipathi
Browse all Theses and Dissertations
Social media has experienced immense growth in recent times. These platforms are becoming increasingly common for information seeking and consumption, and as part of its growing popularity, information overload pose a significant challenge to users. For instance, Twitter alone generates around 500 million tweets per day and it is impractical for users to have to parse through such an enormous stream to find information that are interesting to them. This situation necessitates efficient personalized filtering mechanisms for users to consume relevant, interesting information from social media. Building a personalized filtering system involves understanding users' interests and utilizing these interests to …
Mining And Analyzing Subjective Experiences In User Generated Content, Lu Chen
Mining And Analyzing Subjective Experiences In User Generated Content, Lu Chen
Browse all Theses and Dissertations
Web 2.0 and social media enable people to create, share and discover information instantly anywhere, anytime. A great amount of this information is subjective information -- the information about people's subjective experiences, ranging from feelings of what is happening in our daily lives to opinions on a wide variety of topics. Subjective information is useful to individuals, businesses, and government agencies to support decision making in areas such as product purchase, marketing strategy, and policy making. However, much useful subjective information is buried in ever-growing user generated data on social media platforms, it is still difficult to extract high quality …
Knowledge-Driven Implicit Information Extraction, Pathirage Dinindu Perera
Knowledge-Driven Implicit Information Extraction, Pathirage Dinindu Perera
Browse all Theses and Dissertations
Natural language is a powerful tool developed by humans over hundreds of thousands of years. The extensive usage, flexibility of the language, creativity of the human beings, and social, cultural, and economic changes that have taken place in daily life have added new constructs, styles, and features to the language. One such feature of the language is its ability to express ideas, opinions, and facts in an implicit manner. This is a feature that is used extensively in day to day communications in situations such as: 1) expressing sarcasm, 2) when trying to recall forgotten things, 3) when required to …
Detecting Php-Based Cross-Site Scripting Vulnerabilities Using Static Program Analysis, Steven M. Kelbley
Detecting Php-Based Cross-Site Scripting Vulnerabilities Using Static Program Analysis, Steven M. Kelbley
Browse all Theses and Dissertations
With the widespread adoption of dynamic web applications in recent years, a number of threats to the security of these applications have emerged as significant challenges for application developers. The security of developed applications has become a higher priority for both developers and their employers as cyber attacks become increasingly more prevalent and damaging. Some of the most used web application frameworks are written in PHP and have become major targets due to the large number of servers running these applications worldwide. A number of tools exist to evaluate PHP code for issues, however most of these applications are not …
Measures Of User Interactions, Conversations, And Attacks In A Crowdsourced Platform Offering Emotional Support., Samir Yelne
Measures Of User Interactions, Conversations, And Attacks In A Crowdsourced Platform Offering Emotional Support., Samir Yelne
Browse all Theses and Dissertations
Online social systems have emerged as a popular medium for people in society to communicate with each other. Among the most important reasons why people communicate is to share emotional problems, but most online social systems are uncomfortable or unsafe spaces for this purpose. This has led to the rise of online emotional support systems, where users needing to speak to someone can anonymously connect to a crowd of trained listeners for a one-on-one conversation. To better understand who, how and when users utilize these systems, and to evaluate their safety, this thesis offers a comprehensive examination of the characteristics …
Educational Methods For Inverted-Lecture Computer Science And Engineering Classrooms To Overcome Common Barriers To Stem Student Success, Kathleen Timmerman
Educational Methods For Inverted-Lecture Computer Science And Engineering Classrooms To Overcome Common Barriers To Stem Student Success, Kathleen Timmerman
Browse all Theses and Dissertations
New educational pedagogies are emerging in an effort to increase the number of new engineers available to enter the workforce in the coming years. One of the re-occurring themes in these pedagogies is variations of the flipped classroom. Often the additional classroom time gained from flipping is used to reinforce learning objectives. It is hypothesized that it might be more beneficial to students if a portion of that time is used to address common non-cognitive barriers that prevent students from succeeding in the major. In a freshman Introductory Computer Science course, three different pedagogies are compared: a hybrid lecture-active learning …
De-Anonymization Attack Anatomy And Analysis Of Ohio Nursing Workforce Data Anonymization, Jacob M. Miracle
De-Anonymization Attack Anatomy And Analysis Of Ohio Nursing Workforce Data Anonymization, Jacob M. Miracle
Browse all Theses and Dissertations
Data generalization (anonymization) is a widely misunderstood technique for preserving individual privacy in non-interactive data publishing. Easily avoidable anonymization failures are still occurring 14 years after the discovery of basic techniques to protect against them. Identities of individuals in anonymized datasets are at risk of being disclosed by cyber attackers who exploit these failures. To demonstrate the importance of proper data anonymization we present three perspectives on data anonymization. First, we examine several de-anonymization attacks to formalize the anatomy used to conduct attacks on anonymous data. Second, we examine the vulnerabilities of an anonymous nursing workforce survey to convey how …
Computer Graphics And Visualization Based Analysis And Record System For Hand Surgery And Therapy Practice, Venkatamanikanta Subrahmanyakartheek Gokavarapu
Computer Graphics And Visualization Based Analysis And Record System For Hand Surgery And Therapy Practice, Venkatamanikanta Subrahmanyakartheek Gokavarapu
Browse all Theses and Dissertations
In this thesis, we have designed and developed a computer graphics and visualization based analysis and record system for hand surgery and therapy practice. In particular, we have designed and developed three novel technologies: (i) model-based data compression for hand motion records (ii) model-based surface area estimation of a human hand and (iii) an emulated study of hand wound area estimation. First, we have presented a new data compression technique to better address the needs of electronic health record systems, such as file storage and privacy. In our proposed approach, we will extract the patient's hand motion information and store …
Dynamic Level-2 Cache Memory Locking By Utilizing Multiple Miss Tables, Andrew Louis Mocniak
Dynamic Level-2 Cache Memory Locking By Utilizing Multiple Miss Tables, Andrew Louis Mocniak
Browse all Theses and Dissertations
Cache memory plays a vital role in a system's performance by acting as a buffer to quickly supply requested instruction/data blocks from the main memory to the central processing unit (CPU). Cache management techniques may increase or decrease a system's performance. The results vary from process to process, depending on how well optimized the cache management technique is for a particular process. The inclusion of level-2 (L2) cache locking has been shown in previous studies to be beneficial in increasing a system's performance. This is further improved upon through the inclusion of a miss table (MT), which keeps track of …
Intelligent Caching To Mitigate The Impact Of Web Robots On Web Servers, Howard Nathan Rude
Intelligent Caching To Mitigate The Impact Of Web Robots On Web Servers, Howard Nathan Rude
Browse all Theses and Dissertations
With an ever increasing amount of data that is shared and posted on the Web, the desire and necessity to automatically glean this information has led to an increase in the sophistication and volume of software agents called web robots or crawlers. Recent measurements, including our own across the entire logs of Wright State University Web servers over the past two years, suggest that at least 60\% of all requests originate from robots rather than humans. Web robots display different statistical and behavioral patterns in their traffic compared to humans, yet present Web server optimizations presume that traffic exhibits predominantly …
Identifying Offensive Videos On Youtube, Rajeshwari Kandakatla
Identifying Offensive Videos On Youtube, Rajeshwari Kandakatla
Browse all Theses and Dissertations
Harassment on social media has become a critical problem and social media content depicting harassment is becoming common place. Video-sharing websites such as YouTube contain content that may be offensive to certain community, insulting to certain religion, race etc., or make fun of disabilities. These videos can also provoke and promote altercations leading to online harassment of individuals and groups. In this thesis, we present a system that identifies offensive videos on YouTube. Our goal is to determine features that can be used to detect offensive videos efficiently and reliably. We conducted experiments using content and metadata available for each …