Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (5)
- California State University, San Bernardino (2)
- University of Louisville (2)
- University of New Orleans (2)
- Clemson University (1)
-
- La Salle University (1)
- Louisiana State University (1)
- The University of Akron (1)
- The University of Southern Mississippi (1)
- University of Arkansas, Fayetteville (1)
- University of Massachusetts Amherst (1)
- University of New Mexico (1)
- University of South Alabama (1)
- University of Tennessee, Knoxville (1)
- University of the Pacific (1)
- Western University (1)
- World Maritime University (1)
- Keyword
-
- Android (2)
- Computer Science (2)
- Distributed computing (2)
- Energy efficiency (2)
- Machine Learning (2)
-
- Machine learning (2)
- Security (2)
- 3D (1)
- AI (1)
- Adaboost (1)
- Adaptive experiences (1)
- Android NDK (1)
- Android Operating System (1)
- Application Security (1)
- Applied sciences (1)
- Autonomic Management (1)
- Autonomous driving ships (1)
- Big data (1)
- Bird detection (1)
- Bird recognition (1)
- CNNs (1)
- Cloud Computing (1)
- Cloud computing (1)
- Cloud resource selection (1)
- Collaborative Management (1)
- Computer Vision (1)
- Computer engineering (1)
- Concept drift (1)
- Concussion detection (1)
- Cyber (1)
- Publication Year
- Publication
-
- Computer Engineering (4)
- Doctoral Dissertations (2)
- Electronic Theses and Dissertations (2)
- Electronic Theses, Projects, and Dissertations (2)
- Master's Theses (2)
-
- University of New Orleans Theses and Dissertations (2)
- All Dissertations (1)
- Computer Science ETDs (1)
- Electronic Thesis and Dissertation Repository (1)
- Graduate Theses and Dissertations (1)
- HON499 projects (1)
- Honors Theses (1)
- LSU Master's Theses (1)
- Maritime Safety & Environment Management Dissertations (Dalian) (1)
- University of the Pacific Theses and Dissertations (1)
- Williams Honors College, Honors Research Projects (1)
Articles 1 - 24 of 24
Full-Text Articles in Other Computer Engineering
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Honors Theses
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Hypothyroid Disease Analysis By Using Machine Learning, Sanjana Seelam
Hypothyroid Disease Analysis By Using Machine Learning, Sanjana Seelam
Electronic Theses, Projects, and Dissertations
Thyroid illness frequently manifests as hypothyroidism. It is evident that people with hypothyroidism are primarily female. Because the majority of people are unaware of the illness, it is quickly becoming more serious. It is crucial to catch it early on so that medical professionals can treat it more effectively and prevent it from getting worse. Machine learning illness prediction is a challenging task. Disease prediction is aided greatly by machine learning. Once more, unique feature selection strategies have made the process of disease assumption and prediction easier. To properly monitor and cure this illness, accurate detection is essential. In order …
Understanding The Role Of Interactivity And Explanation In Adaptive Experiences, Lijie Guo
Understanding The Role Of Interactivity And Explanation In Adaptive Experiences, Lijie Guo
All Dissertations
Adaptive experiences have been an active area of research in the past few decades, accompanied by advances in technology such as machine learning and artificial intelligence. Whether the currently ongoing research on adaptive experiences has focused on personalization algorithms, explainability, user engagement, or privacy and security, there is growing interest and resources in developing and improving these research focuses. Even though the research on adaptive experiences has been dynamic and rapidly evolving, achieving a high level of user engagement in adaptive experiences remains a challenge. %????? This dissertation aims to uncover ways to engage users in adaptive experiences by incorporating …
A Data-Driven Multi-Regime Approach For Predicting Real-Time Energy Consumption Of Industrial Machines., Abdulgani Kahraman
A Data-Driven Multi-Regime Approach For Predicting Real-Time Energy Consumption Of Industrial Machines., Abdulgani Kahraman
Electronic Theses and Dissertations
This thesis focuses on methods for improving energy consumption prediction performance in complex industrial machines. Working with real-world industrial machines brings several challenges, including data access, algorithmic bias, data privacy, and the interpretation of machine learning algorithms. To effectively manage energy consumption in the industrial sector, it is essential to develop a framework that enhances prediction performance, reduces energy costs, and mitigates air pollution in heavy industrial machine operations. This study aims to assist managers in making informed decisions and driving the transition towards green manufacturing. The energy consumption of industrial machinery is substantial, and the recent increase in CO2 …
Convolutional Neural Networks For Deflate Data Encoding Classification Of High Entropy File Fragments, Nehal Ameen
Convolutional Neural Networks For Deflate Data Encoding Classification Of High Entropy File Fragments, Nehal Ameen
University of New Orleans Theses and Dissertations
Data reconstruction is significantly improved in terms of speed and accuracy by reliable data encoding fragment classification. To date, work on this problem has been successful with file structures of low entropy that contain sparse data, such as large tables or logs. Classifying compressed, encrypted, and random data that exhibit high entropy is an inherently difficult problem that requires more advanced classification approaches. We explore the ability of convolutional neural networks and word embeddings to classify deflate data encoding of high entropy file fragments after establishing ground truth using controlled datasets. Our model is designed to either successfully classify file …
An Analysis Of Modern Password Manager Security And Usage On Desktop And Mobile Devices, Timothy Oesch
An Analysis Of Modern Password Manager Security And Usage On Desktop And Mobile Devices, Timothy Oesch
Doctoral Dissertations
Security experts recommend password managers to help users generate, store, and enter strong, unique passwords. Prior research confirms that managers do help users move towards these objectives, but it also identified usability and security issues that had the potential to leak user data or prevent users from making full use of their manager. In this dissertation, I set out to measure to what extent modern managers have addressed these security issues on both desktop and mobile environments. Additionally, I have interviewed individuals to understand their password management behavior.
I begin my analysis by conducting the first security evaluation of the …
A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi
A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi
Master's Theses
An important feature of an Autonomous Surface Vehicles (ASV) is its capability of automatic object detection to avoid collisions, obstacles and navigate on their own.
Deep learning has made some significant headway in solving fundamental challenges associated with object detection and computer vision. With tremendous demand and advancement in the technologies associated with ASVs, a growing interest in applying deep learning techniques in handling challenges pertaining to autonomous ship driving has substantially increased over the years.
In this thesis, we study, design, and implement an object recognition framework that detects and recognizes objects found in the sea. We first curated …
Design Project: Smart Headband, John Michel, Jack Durkin, Noah Lewis
Design Project: Smart Headband, John Michel, Jack Durkin, Noah Lewis
Williams Honors College, Honors Research Projects
Concussion in sports is a prevalent medical issue. It can be difficult for medical professionals to diagnose concussions. With the fast pace nature of many sports, and the damaging effects of concussions, it is important that any concussion risks are assessed immediately. There is a growing trend of wearable technology that collects data such as steps and provides the wearer with in-depth information regarding their performance. The Smart Headband project created a wearable that can record impact data and provide the wearer with a detailed analysis on their risk of sustaining a concussion. The Smart Headband uses accelerometers and gyroscopes …
A Probabilistic Machine Learning Framework For Cloud Resource Selection On The Cloud, Syeduzzaman Khan
A Probabilistic Machine Learning Framework For Cloud Resource Selection On The Cloud, Syeduzzaman Khan
University of the Pacific Theses and Dissertations
The execution of the scientific applications on the Cloud comes with great flexibility, scalability, cost-effectiveness, and substantial computing power. Market-leading Cloud service providers such as Amazon Web service (AWS), Azure, Google Cloud Platform (GCP) offer various general purposes, memory-intensive, and compute-intensive Cloud instances for the execution of scientific applications. The scientific community, especially small research institutions and undergraduate universities, face many hurdles while conducting high-performance computing research in the absence of large dedicated clusters. The Cloud provides a lucrative alternative to dedicated clusters, however a wide range of Cloud computing choices makes the instance selection for the end-users. This thesis …
Function And Dissipation In Finite State Automata - From Computing To Intelligence And Back, Natesh Ganesh
Function And Dissipation In Finite State Automata - From Computing To Intelligence And Back, Natesh Ganesh
Doctoral Dissertations
Society has benefited from the technological revolution and the tremendous growth in computing powered by Moore's law. However, we are fast approaching the ultimate physical limits in terms of both device sizes and the associated energy dissipation. It is important to characterize these limits in a physically grounded and implementation-agnostic manner, in order to capture the fundamental energy dissipation costs associated with performing computing operations with classical information in nano-scale quantum systems. It is also necessary to identify and understand the effect of quantum in-distinguishability, noise, and device variability on these dissipation limits. Identifying these parameters is crucial to designing …
Grammar-Based Procedurally Generated Village Creation Tool, Kevin Matthew Graves
Grammar-Based Procedurally Generated Village Creation Tool, Kevin Matthew Graves
Computer Engineering
This project is a 3D village generator tool for Unity. It consists of three components: a building, mountain, and river generator. All of these generators use grammar-based procedural generation in order to create a unique and logical village and landscape each time the program is run.
Identifying Hourly Traffic Patterns With Python Deep Learning, Christopher L. Leavitt
Identifying Hourly Traffic Patterns With Python Deep Learning, Christopher L. Leavitt
Computer Engineering
This project was designed to explore and analyze the potential abilities and usefulness of applying machine learning models to data collected by parking sensors at a major metro shopping mall. By examining patterns in rates at which customer enter and exit parking garages on the campus of the Bellevue Collection shopping mall in Bellevue, Washington, a recurrent neural network will use data points from the previous hours will be trained to forecast future trends.
A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab
A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab
Electronic Theses and Dissertations
The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order …
Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel
Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel
LSU Master's Theses
A tremendous amount of data is generated every day from a wide range of sources such as social networks, sensors, and application logs. Among them, graph data is one type that represents valuable relationships between various entities. Analytics of large graphs has become an essential part of business processes and scientific studies because it leads to deep and meaningful insights into the related domain based on the connections between various entities. However, the optimal processing of large-scale iterative graph computations is very challenging due to the issues like fault tolerance, high memory requirement, parallelization, and scalability. Most of the contemporary …
Research On Improving Navigation Safety Based On Big Data And Cloud Computing Technology For Qiongzhou Strait, Rui Wang
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni
Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni
Computer Science ETDs
In the era of new technologies, computer scientists deal with massive data of size hundreds of terabytes. Smart cities, social networks, health care systems, large sensor networks, etc. are constantly generating new data. It is non-trivial to extract knowledge from big datasets because traditional data mining algorithms run impractically on such big datasets. However, distributed systems have come to aid this problem while introducing new challenges in designing scalable algorithms. The transition from traditional algorithms to the ones that can be run on a distributed platform should be done carefully. Researchers should design the modern distributed algorithms based on the …
Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto
Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto
Computer Engineering
The Underwater Computer Vision – Fish Recognition project includes the design and implementation of a device that can withstand staying underwater for a duration of time, take pictures of underwater creatures, such as fish, and be able to identify certain fish. The system is meant to be cheap to create, yet still able to process the images it takes and identify the objects in the pictures with some accuracy. The device can output its results to another device or an end user.
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
HON499 projects
The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information includes …
Developing Java Programs On Android Mobile Phones Using Speech Recognition, Santhrushna Gande
Developing Java Programs On Android Mobile Phones Using Speech Recognition, Santhrushna Gande
Electronic Theses, Projects, and Dissertations
Nowadays Android operating system based mobile phones and tablets are widely used and had millions of users around the world. The popularity of this operating system is due to its multi-tasking, ease of access and diverse device options. “Java Programming Speech Recognition Application” is an Android application used for handicapped individuals who are not able or have difficultation to type on a keyboard. This application allows the user to write a compute program (in Java Language) by dictating the words and without using a keyboard. The user needs to speak out the commands and symbols required for his/her program. The …
A Comparison Of Image Processing Techniques For Bird Detection, Elsa Reyes
A Comparison Of Image Processing Techniques For Bird Detection, Elsa Reyes
Master's Theses
Orchard fruits and vegetable crops are vulnerable to wild birds and animals. These wild birds and animals can cause critical damage to the produce. Traditional methods of scaring away birds such as scarecrows are not long-term solutions but short-term solutions. This is a huge problem especially near areas like San Luis Obispo where there are vineyards. Bird damage can be as high as 50% for grapes being grown in vineyards. The total estimated revenue lost annually in the 10 counties in California due to bird and rodent damage to 22 selected crops ranged from $168 million to $504 million (in …
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Electronic Thesis and Dissertation Repository
With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
University of New Orleans Theses and Dissertations
Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …
Gesture Based Home Automation For The Physically Disabled, Alexander Hugh Nelson
Gesture Based Home Automation For The Physically Disabled, Alexander Hugh Nelson
Graduate Theses and Dissertations
Paralysis and motor-impairments can greatly reduce the autonomy and quality of life of a patient while presenting a major recurring cost in home-healthcare. Augmented with a non-invasive wearable sensor system and home-automation equipment, the patient can regain a level of autonomy at a fraction of the cost of home nurses. A system which utilizes sensor fusion, low-power digital components, and smartphone cellular capabilities can extend the usefulness of such a system to allow greater adaptivity for patients with various needs. This thesis develops such a system as a Bluetooth enabled glove device which communicates with a remote web server to …
Check Image Processing: Webp Conversion And Micr Scan Android Application, Trevor Bliss
Check Image Processing: Webp Conversion And Micr Scan Android Application, Trevor Bliss
Computer Engineering
As more users favor smartphones over computers for simple tasks, small businesses are constantly exploring mobile options to present to their customers. This write-up documents an Android application designed for a small company, which allows users to send pictures of checks to the company’s servers for processing. The picture is taken with the devices built-in camera and is converted to Google’s new image format, WebP. The company’s server processes the check and returns the check’s MICR code as a response. This application leverages the Android NDK and JNI to use Google’s open source image conversion libraries as well as socket …