Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

2017

Department of Computer Science and Engineering

Articles 31 - 35 of 35

Full-Text Articles in Physical Sciences and Mathematics

Finding Street Gang Member Profiles On Twitter, Lakshika Balasuriya Jan 2017

Finding Street Gang Member Profiles On Twitter, Lakshika Balasuriya

Browse all Theses and Dissertations

The crime and violence street gangs introduce into neighborhoods is a growing epidemic in cities around the world. Today, over 1.4 million people, belonging to more than 33,000 gangs, are active in the United States, of which 88% identify themselves as being members of a street gang. With the recent popularity of social media, street gang members have established online presences coinciding with their physical occupation of neighborhoods. Recent studies report that approximately 45% of gang members participate in online offending activities such as threatening, harassing individuals, posting violent videos or attacking someone on the street for something they said …


Adapting The Search Space While Limiting Damage During Learning In A Simulated Flapping Wing Micro Air Vehicle, Monica Sam Jan 2017

Adapting The Search Space While Limiting Damage During Learning In A Simulated Flapping Wing Micro Air Vehicle, Monica Sam

Browse all Theses and Dissertations

Cyber-Physical Systems (CPS) are characterized by closely coupled physical and software components that operate simultaneously on different spatial and temporal scales; exhibit multiple and distinct behavioral modalities; and interact with one another in ways not entirely predictable at the time of design. A commonly appearing type of CPS are systems that contain one or more smart components that adapt locally in response to global measurements of whole system performance. An example of a smart component robotic CPS system is a Flapping Wing Micro Air Vehicle (FW-MAV) that contains wing motion oscillators that control their wing flapping patterns to enable the …


Semantic Web Foundations For Representing, Reasoning, And Traversing Contextualized Knowledge Graphs, Vinh Thi Kim Nguyen Jan 2017

Semantic Web Foundations For Representing, Reasoning, And Traversing Contextualized Knowledge Graphs, Vinh Thi Kim Nguyen

Browse all Theses and Dissertations

Semantic Web technologies such as RDF and OWL have become World Wide Web Consortium (W3C) standards for knowledge representation and reasoning. RDF triples about triples, or meta triples, form the basis for a contextualized knowledge graph. They represent the contextual information about individual triples such as the source, the occurring time or place, or the certainty. However, an efficient RDF representation for such meta-knowledge of triples remains a major limitation of the RDF data model. The existing reification approach allows such meta-knowledge of RDF triples to be expressed in RDF by using four triples per reified triple. While reification is …


Settings Protection Add-On: A User-Interactive Browser Extension To Prevent The Exploitation Of Preferences, Venkata Naga Siva Seelam Jan 2017

Settings Protection Add-On: A User-Interactive Browser Extension To Prevent The Exploitation Of Preferences, Venkata Naga Siva Seelam

Browse all Theses and Dissertations

The abuse of browser preferences is a significant application security issue, despite numerous protections against automated software changing these preferences. Browser hijackers modify user’s desired preferences by injecting malicious software into the browser. Users are not aware of these modifications, and the unwanted changes can annoy the user and circumvent security preferences. Reverting these changes is not easy, and users often have to go through complicated sequences of steps to restore their preferences to the previous values. Tasks to resolve this issue include uninstalling and re-installing the browser, resetting browser preferences, and installing malware removal tools. This thesis describes a …


Harassment Detection On Twitter Using Conversations, Venkatesh Edupuganti Jan 2017

Harassment Detection On Twitter Using Conversations, Venkatesh Edupuganti

Browse all Theses and Dissertations

Social media has brought people closer than ever before, but the use of social media has also brought with it a risk of online harassment. Such harassment can have a serious impact on a person such as causing low self-esteem and depression. The past research on detecting harassment on social media is primarily based on the content of messages exchanged on social media. The lack of context when relying on a single social media post can result in a high degree of false alarms. In this study, I focus on the reliable detection of harassment on Twitter by better understanding …