Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Florida Institute of Technology

Theses/Dissertations

2022

Articles 1 - 14 of 14

Full-Text Articles in Physical Sciences and Mathematics

Representation Learning For Open Set Recognition And Novel Category Discovery, Jingyun Jia Dec 2022

Representation Learning For Open Set Recognition And Novel Category Discovery, Jingyun Jia

Theses and Dissertations

As machine learning models have achieved great success in various research and industry fields, the success of these models heavily relies on the massive amount of data collection and human annotations. While the real world is an open set, the daily emerged categories and the lacking of annotations have become new challenges for machine learning models. The absence of newly emerged categories in training samples can be captured by Open Set Recognition (OSR). Then, given the newly emerged samples, the process of automatically identifying the novel categories is called Novel Category Discovery (NCD). In this dissertation, we focused on learning …


Non-Negative Matrix Factorization In The Identification Of Co-Mutations, Michael Robert Kolar Dec 2022

Non-Negative Matrix Factorization In The Identification Of Co-Mutations, Michael Robert Kolar

Theses and Dissertations

One of the difficulties of genetic research is the asymmetrical relationship between data collection techniques and data analysis techniques. The goal of this research was to test a novel application of non-negative matrix factorization, which would allow researchers to more easily identify co-mutations. Those co-mutations then can then be further verified by frequency analysis. This pruning process allows researchers to identify more fruitful research opportunities, saving time, energy, and funding. Past research has utilized non-negative matrix factorization to extract factors which meaningfully express underlying data features. This study extends the depth of non-negative matrix factorization knowledge in various ways. First, …


Design Of Ethical Autonomous Agents For Unmanned Aerial Vehicles Using Fuzzy Logic, Gavin Giovanni Smith Dec 2022

Design Of Ethical Autonomous Agents For Unmanned Aerial Vehicles Using Fuzzy Logic, Gavin Giovanni Smith

Theses and Dissertations

Autonomous systems have, over the years become part of our everyday lives. These systems have been deployed to executed a diverse range of applications in different industries; finance, healthcare, military, and in particular, the flight industry. With the rise of UAVs, new opportunities arose, but with those opportunities came new pitfalls within any industry. For UAVs, one of the pitfalls came in the form of ethical decisionmaking, which led to a variety of questions. Can the Autonomous systems within UAVs be designed with ethics in mind? Which ethical guidelines would we use to implement such a system? How would we …


A Machine Learning Approach To Forecasting Sep Intensity And Times Based On Cme And Other Solar Activities, Peter John Thomas Jul 2022

A Machine Learning Approach To Forecasting Sep Intensity And Times Based On Cme And Other Solar Activities, Peter John Thomas

Theses and Dissertations

High intensity Solar Energetic Particle (SEP) events pose severe risks for astronauts and critical infrastructure. The ability to accurately forecast the peak intensity and times of these events would enable preparatory measures to mitigate much of this risk. Machine learning approaches have the potential to use characteristics of CMEs and other space weather phenomena to predict SEP intensities and times. However, the severe sparsity of SEP events in current datasets poses a problem to traditional machine learning techniques. In this work, we present a dataset of proton event intensities and times, as well as features for corresponding CMEs and space …


Predicting The Impact Of Iot Data Gathering On User’S Privacy Preferences, Ghassen Kilani Jul 2022

Predicting The Impact Of Iot Data Gathering On User’S Privacy Preferences, Ghassen Kilani

Theses and Dissertations

The proliferation of Internet of Things (IoT) devices has increased data sharing, profiling, and manipulation on various networks. The rapid growth of information disclosure has caused system users to lose motivation to enhance their data privacy. The repeated breaches on different networks worldwide have made people feel discouraged, as they perceive privacy schemes as futile. IoT systems introduce another dimension of privacy leakage due to their expendability nature and information collection features. The situation worsens when users have to manage multiple IoT devices, each following different security protocols, leading to poor decision-making and privacy leakage. This tremendous flow of unsecured …


Asynchronous Messaging In A P2p System: Defending Against A Storage Exhaustion Attack On Kademlia Dht, Maxim Biro Jul 2022

Asynchronous Messaging In A P2p System: Defending Against A Storage Exhaustion Attack On Kademlia Dht, Maxim Biro

Theses and Dissertations

An instant messaging service designed using a peer to peer distributed network architecture has many appealing properties it gets for free: high scalability, cheap operational cost and no reliance on a third party to provide the service. However, the nature of the distributed network architecture makes implementing some of the instant messaging features rather challenging, asynchronous messaging being one of them. The asynchronous messaging requires that peers store arbitrary data on behalf of other peers for prolonged periods of time, often measured in days, which, if not kept in check, can be easily abused by malicious actors by spamming the …


Advancing Human-Agent Teamwork, Vijayanth Tummala Jul 2022

Advancing Human-Agent Teamwork, Vijayanth Tummala

Theses and Dissertations

Progress in the use of Artificial Intelligence (AI) has been made in many different fields. We are now reaching a point in AI development typical AI implementations are not enough: where we would need humans and AI systems to actively collaborate with each other, basing their actions on the actions and capabilities of each other. This collaboration could be in the form of agents assisting humans processing and analyzing information, assisting humans with smaller physical tasks or working with humans as an equal team member – having the same goals and performing the same tasks – to accomplish a goal. …


A Machine Learning Approach To Forecasting Sep Intensity And Times Based On Cme And Other Solar Activities, Peter John Thomas Jul 2022

A Machine Learning Approach To Forecasting Sep Intensity And Times Based On Cme And Other Solar Activities, Peter John Thomas

Theses and Dissertations

High intensity Solar Energetic Particle (SEP) events pose severe risks for astronauts and critical infrastructure. The ability to accurately forecast the peak intensity and times of these events would enable preparatory measures to mitigate much of this risk. Machine learning approaches have the potential to use characteristics of CMEs and other space weather phenomena to predict SEP intensities and times. However, the severe sparsity of SEP events in current datasets poses a problem to traditional machine learning techniques. In this work, we present a dataset of proton event intensities and times, as well as features for corresponding CMEs and space …


Process For Designing And Implementing Provably Verifiable Voting Systems, Kholud Alghamdi Jul 2022

Process For Designing And Implementing Provably Verifiable Voting Systems, Kholud Alghamdi

Theses and Dissertations

This research aims to explore processes for designing verifiable voting systems in which certain properties can be proven, exemplified with systems applicable to election processes in Saudi Arabia. The electronic government model has become a substantial channel for governments to connect to businesses and citizens, to develop services, and provide general information. E-voting and in particular online voting is one of the important tools that can be used in political and administrative places where information and communications technology devices and tools are utilized to simplify people’s lives and facilitate the election process and decision making. Election processes let a population …


Toward A Labeled Dataset Of Iot Malware Features, Stian Hagboe Olsen May 2022

Toward A Labeled Dataset Of Iot Malware Features, Stian Hagboe Olsen

Theses and Dissertations

IoT malware has accompanied the rapid growth of embedded devices over the last decade. The last few years have seen increased work on static and dynamic detection and classification techniques for IoT malware. However, this work requires a very diverse and fine-grained set of malware-specific characteristics. This paper takes a step toward constructing a large-scale, diverse, and open-source IoT malware dataset. To demonstrate the depth of the dataset, we propose an approach for recovering symbol tables and detecting the intent of stripped IoT malware binaries using function signature libraries and 14 defining Linux malware features with corresponding regular expressions. We …


Cross-Gender And 1-To-N Face Recognition Error Analysis Of Gender Misclassified Images, Paloma Vela Achu May 2022

Cross-Gender And 1-To-N Face Recognition Error Analysis Of Gender Misclassified Images, Paloma Vela Achu

Theses and Dissertations

A number of recent research studies have shown that face recognition accuracy is meaningfully worse for females than males. Gender classification algorithms also perform worse: one commercial classifier gives a 7% error rate for African-American females vs. 0.5% for Caucasian males. In response to these observations, we consider one primary question: do errors in gender classification lead to errors in facial recognition? We approach this question by focusing on two main areas (1) do gender-misclassified images generate higher similarity scores with different individuals from the false-gender category versus their true-gender category? (2) What is the impact of gender misclassified images …


A Method To Evaluate The Impact Of Assistive Displays On The Comfort And Safety Of Driving In Low Visibility Conditions, Hussain Talal Alatiyyah May 2022

A Method To Evaluate The Impact Of Assistive Displays On The Comfort And Safety Of Driving In Low Visibility Conditions, Hussain Talal Alatiyyah

Theses and Dissertations

Natural phenomena may affect car drivers in terms of having a clear view. It may hinder or distract the driver’s eyesight from essential objects, such as traffic signs, people, or other obstacles in the street. A poor view for a driver could cause accidents that lead to significant harm. Fog is one of these natural phenomena that could impact a driver’s concentration. This study aims to test a methodology for evaluating the use of an assistive computer display, especially in fog situations. An experiment is performed with participants who perform simulated driving under controlled fog conditions with or without an …


Iot Security For Iotmon Attacks Based On Devices’ App Description, Raghad Jameel A. Alhazmi May 2022

Iot Security For Iotmon Attacks Based On Devices’ App Description, Raghad Jameel A. Alhazmi

Theses and Dissertations

There are concerns associated with ”inter-app” interactions, which occur when many independently developed home automation apps interact and affect one another, causing possibly dangerous unexpected app action. We extended a security tool named IoTMon, an IoT device management system capable of identifying all potential cross-app communication paths and analyzing their danger status. As part of our work, we keep an eye on the app description and safeguard IoTMon from being altered in any way that could obscure the real interaction related to another app action. We validate the IoTMon system’s integrity by applying the hash algorithm SHA512 with digital signature …


A Co-Evolutionary Approach To Test Case Generation For Safety-Critical Systems, Brad Thomas Costa May 2022

A Co-Evolutionary Approach To Test Case Generation For Safety-Critical Systems, Brad Thomas Costa

Theses and Dissertations

Safety-critical software development is a costly and time-consuming process that involves thousands of hours dedicated to test development. Tests must meet stringent developmental guidelines to verify the correct and complete implementation of their parent requirements. Further compounding any such effort is the tendency towards requirement churn or the frequent change to the software and other system requirements. This thesis presents a solution, PyTcGen, that alleviates these challenges by processing natural language requirements and programmatically generating the requisite test cases to ensure the software meets all of the conditions of that requirement. The solution uses template matching to marry requirements to …