Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (420)
- TÜBİTAK (268)
- Selected Works (119)
- University of Texas at El Paso (89)
- City University of New York (CUNY) (84)
-
- San Jose State University (77)
- University for Business and Technology in Kosovo (66)
- Technological University Dublin (65)
- University of Nebraska - Lincoln (65)
- Embry-Riddle Aeronautical University (63)
- Chulalongkorn University (58)
- Wright State University (57)
- China Simulation Federation (52)
- Walden University (49)
- Kennesaw State University (47)
- Missouri University of Science and Technology (43)
- Air Force Institute of Technology (42)
- Old Dominion University (41)
- Dartmouth College (40)
- Nova Southeastern University (40)
- Edith Cowan University (33)
- University of Kentucky (33)
- University of Nebraska at Omaha (33)
- University of Nevada, Las Vegas (32)
- University of South Florida (29)
- California Polytechnic State University, San Luis Obispo (28)
- Marquette University (28)
- Portland State University (28)
- Florida Institute of Technology (27)
- Western University (26)
- Keyword
-
- Machine learning (72)
- Machine Learning (58)
- Deep learning (43)
- Security (42)
- Cybersecurity (38)
-
- Computer Science (37)
- Classification (35)
- Computer science (35)
- Intro to Data Science (33)
- Artificial intelligence (30)
- Deep Learning (29)
- Department of Computer Science and Engineering (29)
- Cloud computing (25)
- Data mining (24)
- Optimization (23)
- Technology (23)
- Privacy (20)
- Social media (18)
- Blockchain (17)
- Algorithms (16)
- Android (16)
- Big data (16)
- Computer Vision (15)
- Internet of Things (15)
- Neural Networks (15)
- Information technology (14)
- Malware (14)
- Programming (14)
- Clustering (13)
- Computer vision (13)
- Publication
-
- Research Collection School Of Computing and Information Systems (392)
- Turkish Journal of Electrical Engineering and Computer Sciences (268)
- Theses and Dissertations (137)
- Departmental Technical Reports (CS) (80)
- Master's Projects (62)
-
- Chulalongkorn University Theses and Dissertations (Chula ETD) (58)
- Electronic Theses and Dissertations (54)
- Journal of System Simulation (52)
- Open Educational Resources (49)
- Walden Dissertations and Doctoral Studies (48)
- Ronald Greenberg (46)
- Dissertations (43)
- CCE Theses and Dissertations (39)
- Computer Science Faculty Publications (39)
- International Journal of Business and Technology (36)
- Journal of Digital Forensics, Security and Law (35)
- Faculty Publications (34)
- Browse all Theses and Dissertations (31)
- 3-D Printed Model Structural Files (28)
- USF Tampa Graduate Theses and Dissertations (28)
- Computer Science Faculty Publications and Presentations (24)
- Conference papers (24)
- Doctoral Dissertations (23)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (23)
- Computer Science and Information Technology Grants Collections (22)
- Masters Theses (22)
- Publications and Research (21)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (20)
- KSU Proceedings on Cybersecurity Education, Research and Practice (19)
- Annual ADFSL Conference on Digital Forensics, Security and Law (18)
- Publication Type
- File Type
Articles 2911 - 2940 of 2941
Full-Text Articles in Physical Sciences and Mathematics
Human-Intelligence And Machine-Intelligence Decision Governance Formal Ontology, Faisal Mahmud
Human-Intelligence And Machine-Intelligence Decision Governance Formal Ontology, Faisal Mahmud
Engineering Management & Systems Engineering Theses & Dissertations
Since the beginning of the human race, decision making and rational thinking played a pivotal role for mankind to either exist and succeed or fail and become extinct. Self-awareness, cognitive thinking, creativity, and emotional magnitude allowed us to advance civilization and to take further steps toward achieving previously unreachable goals. From the invention of wheels to rockets and telegraph to satellite, all technological ventures went through many upgrades and updates. Recently, increasing computer CPU power and memory capacity contributed to smarter and faster computing appliances that, in turn, have accelerated the integration into and use of artificial intelligence (AI) in …
Deep Recurrent Learning For Efficient Image Recognition Using Small Data, Mahbubul Alam
Deep Recurrent Learning For Efficient Image Recognition Using Small Data, Mahbubul Alam
Electrical & Computer Engineering Theses & Dissertations
Recognition is fundamental yet open and challenging problem in computer vision. Recognition involves the detection and interpretation of complex shapes of objects or persons from previous encounters or knowledge. Biological systems are considered as the most powerful, robust and generalized recognition models. The recent success of learning based mathematical models known as artificial neural networks, especially deep neural networks, have propelled researchers to utilize such architectures for developing bio-inspired computational recognition models. However, the computational complexity of these models increases proportionally to the challenges posed by the recognition problem, and more importantly, these models require a large amount of data …
Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy
Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy
Computer Science Theses & Dissertations
Many new devices, such as phones and tablets as well as traditional computer systems, rely on wireless connections to the Internet and are susceptible to attacks. Two important types of attacks are the use of malware and exploiting Internet protocol vulnerabilities in devices and network systems. These attacks form a threat on many levels and therefore any approach to dealing with these nefarious attacks will take several methods to counter. In this research, we utilize machine learning to detect and classify malware, visualize, detect and classify worms, as well as detect deauthentication attacks, a form of Denial of Service (DoS). …
A Model For Seasonal Dynamic Networks, Jace D. Robinson
A Model For Seasonal Dynamic Networks, Jace D. Robinson
Browse all Theses and Dissertations
Sociotechnological and geospatial processes exhibit time varying structure that make insight discovery challenging. This paper presents statistical model of systems with seasonal dynamics, modeled as a dynamic network, to address this challenge. It assumes the probability of edge formations depend on a type assigned to incident nodes and the current time. Time dependencies are modeled by unique seasonal processes. The model is studied on several synthetic and real datasets. Superior fidelity of this model on seasonal datasets compared to existing network models, while being able to remain equally accurate for networks with randomly changing structure, is shown. The model is …
Content-Based Clustering And Visualization Of Social Media Text Messages, Sydney A. Barnard
Content-Based Clustering And Visualization Of Social Media Text Messages, Sydney A. Barnard
Browse all Theses and Dissertations
Although Twitter has been around for more than ten years, crisis management agencies and first response personnel are not able to fully use the information this type of data provides during a crisis or natural disaster. This thesis addresses clustering and visualizing social media data by textual similarity, rather than by only time and location, as a tool for first responders. This thesis presents a tool that automatically clusters geotagged text data based on their content and displays the clusters and their locations on the map. It allows at-a-glance information to be displayed throughout the evolution of a crisis. For …
A Multi-Formal Languages Collaborative Scheme For Complex Human Activity Recognition And Behavioral Patterns Extraction, Anargyros Angeleas
A Multi-Formal Languages Collaborative Scheme For Complex Human Activity Recognition And Behavioral Patterns Extraction, Anargyros Angeleas
Browse all Theses and Dissertations
Human Activity Recognition is an actively researched domain for the past few decades, and is one of the most eminent applications of today. It is already part of our life, but due to high level of uncertainty and challenges of human detection, we have only application specific solutions. Thus, the problem being very demanding and still remains unsolved. Within this PhD we delve into the problem, and approach it from a variety of viewpoints. At start, we present and evaluate different architectures and frameworks for activity recognition. Henceforward, the focal point of our attention is automatic human activity recognition. We …
Development Of An Ios App For Learning Intonation Of Wind Instruments, Swathi Pamidi
Development Of An Ios App For Learning Intonation Of Wind Instruments, Swathi Pamidi
Browse all Theses and Dissertations
Learning music instrument is a challenging task for a beginner without constant guidance from an instructor. The primary objective of this thesis research is to design and develop an iOS mobile / iPad learning app that helps users to learn and practice intonation for a suite of wind instruments by themselves with comfort and ease through app-provided tuning and charting guidance and app-assisted self-assessment. Particularly, our successfully-implemented app provides the following features to enhance the user's learning experience: 1 ) Provides learners easy-to-access information for the fingering and tuning techniques of wind instruments by converting Dr. Shelley Jagow's book - …
Malware Analysis Skills Taught In University Courses, Swetha Gorugantu
Malware Analysis Skills Taught In University Courses, Swetha Gorugantu
Browse all Theses and Dissertations
Career opportunities for malware analysts are growing at a fast pace due to the evolving nature of cyber threats as well as the necessity to counter them. However, employers are often unable to hire analysts fast though due to a lack of the required skillset. Hence, the primary purpose of the thesis is to conduct a gap analysis between the binary analysis skills taught in universities with those that the recruiters are looking for. Malware can be analyzed using three main types of tools and techniques: high-level profiling, static analysis, and dynamic analysis. These methods provide detailed information about the …
Sensor Data Streams Correlation Platform For Asthma Management, Vaikunth Sridharan
Sensor Data Streams Correlation Platform For Asthma Management, Vaikunth Sridharan
Browse all Theses and Dissertations
Asthma is a high-burden chronic inflammatory disease with prevalence in children with twice the rate compared to adults. It can be improved by continuously monitoring patients and their environment using the Internet of Things (IoT) based devices. These sensor data streams so obtained are essential to comprehend multiple factors triggering asthma symptoms. In order to support physicians in exploring causal associations and finding actionable insights, a visualization system with a scalable cloud infrastructure that can process multimodal sensor data and Patient Generated Health Data (PGHD) is necessary. In this thesis, we describe a cloud-based asthma management and visualization platform that …
Building An Abstract-Syntax-Tree-Oriented Symbolic Execution Engine For Php Programs, Jin Huang
Building An Abstract-Syntax-Tree-Oriented Symbolic Execution Engine For Php Programs, Jin Huang
Browse all Theses and Dissertations
This thesis presents the design, implementation, and evaluation of an abstract-syntax-tree-oriented symbolic execution engine for the PHP programming language. As a symbolic execution engine, our system emulate the execution of a PHP program by assuming that all inputs are with symbolic rather than concrete values. While our system inherits the basic definition of symbolic execution, it fundamentally differs from existing symbolic execution implementations that mainly leverage intermediate representation (IRs) to operate. Specifically, our system directly takes the abstract syntax tree (AST) of a program as input and subsequently interprets this AST. Performing symbolic execution using AST offers unique advantages. First, …
Quantitative Forecasting Of Risk For Ptsd Using Ecological Factors: A Deep Learning Application, Nuriel S. Mor, Kathryn L. Dardeck
Quantitative Forecasting Of Risk For Ptsd Using Ecological Factors: A Deep Learning Application, Nuriel S. Mor, Kathryn L. Dardeck
Journal of Social, Behavioral, and Health Sciences
Forecasting the risk for mental disorders from early ecological information holds benefits for the individual and society. Computational models used in psychological research, however, are barriers to making such predictions at the individual level. Preexposure identification of future soldiers at risk for posttraumatic stress disorder (PTSD) and other individuals, such as humanitarian aid workers and journalists intending to be potentially exposed to traumatic events, is important for guiding decisions about exposure. The purpose of the present study was to evaluate a machine learning approach to identify individuals at risk for PTSD using readily collected ecological risk factors, which makes scanning …
My.Eskwela: Designing An Enterprise Learning Management System To Increase Social Network And Reduce Cognitive Load, Ma. Regina Justina E. Estuar, Orven E. Llantos
My.Eskwela: Designing An Enterprise Learning Management System To Increase Social Network And Reduce Cognitive Load, Ma. Regina Justina E. Estuar, Orven E. Llantos
Department of Information Systems & Computer Science Faculty Publications
A typical learning management system (LMS) provides a tool for teachers to upload and create links to resources, create online assessments and provide immediate evaluation to students. As much as it tries to be student centered, most LMS remains a tool for instruction rather than learning. In a learning generation that is bound by very high online social capital, connectedness to the family weakens. my.Eskwela (My School) redefines LMS to include a parent component to address the need for inclusive participation of parents in the teaching-learning process. Basis for re-design came from the low user acceptance of teachers in using …
The Efficacy Of An Emr-Enabled Text Messaging System To The Expanded Health Beliefs, Diabetes Care Profile And Hba1c Of Diabetes Mellitus Patients, Ma. Regina Justina E. Estuar, John Noel Victorino, Razel Custodio
The Efficacy Of An Emr-Enabled Text Messaging System To The Expanded Health Beliefs, Diabetes Care Profile And Hba1c Of Diabetes Mellitus Patients, Ma. Regina Justina E. Estuar, John Noel Victorino, Razel Custodio
Department of Information Systems & Computer Science Faculty Publications
As diabetes mellitus (DM) becomes a global emergency, there is a need to explore novel interventions to address problems in self – management. Literature agree in the potential of mobile phones to carry-out self-care for a wide-array of disease conditions. Diabetes Self – Management Support and Education Through Text – Messaging (DSMSET) is a low-cost, two-way text messaging system designed to deliver self - help, educational messages based on the nine (9) dimensions of health management. DSMSET serves as a plugin to SHINE OS+, an open – source electronic medical record (EMR) system. The research is also based on the …
Ontologies And The Semantic Web For Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, Tom Narock
Ontologies And The Semantic Web For Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, Tom Narock
Department of Information Technology Faculty Publications
The nascent field of digital forensics is heavily influenced by practice. Much digital forensics research involves the use, evaluation, and categorization of the multitude of tools available to researchers and practitioners. As technology evolves at an increasingly rapid pace, the digital forensics field must constantly adapt by creating and evaluating new tools and techniques to perform forensic analysis on many disparate systems such as desktops, notebook computers, mobile devices, cloud, and personal wearable sensor devices, among many others. While researchers have attempted to use ontologies to classify the digital forensics domain on various dimensions, no ontology of digital forensic tools …
The Feasibility Of Dementia Caregiver Task Performance Measurement Using Smart Gaming Technology, Garrett G. Goodman
The Feasibility Of Dementia Caregiver Task Performance Measurement Using Smart Gaming Technology, Garrett G. Goodman
Browse all Theses and Dissertations
Dementia caregiver burnout is detrimental to both the familial caregiver and their loved ones with dementia. As the population of older adults increases, both the number of individuals with dementia and their corresponding caregivers increase as well. Thus, we are interested in developing a potential tool to non-invasively detect signs of caregiver burnout using a mobile application combined with machine learning. Hence, the mobile application "Caregiver Assessment using Smart Technology" (CAST) was developed which personalizes a word scramble game. The CAST application utilizes a heuristically constructed Fuzzy Inference System (FIS) optimized via a Genetic Algorithm (GA) to provide an individualized …
Anatomy Of Online Hate: Developing A Taxonomy And Machine Learning Models For Identifying And Classifying Hate In Online News Media, Joni Salminen, Hind Almerekhi, Milica Milenkovic, Soon-Gyu Jung, Haewoon Kwak, Haewoon Kwak, Bernard J. Jansen
Anatomy Of Online Hate: Developing A Taxonomy And Machine Learning Models For Identifying And Classifying Hate In Online News Media, Joni Salminen, Hind Almerekhi, Milica Milenkovic, Soon-Gyu Jung, Haewoon Kwak, Haewoon Kwak, Bernard J. Jansen
Research Collection School Of Computing and Information Systems
Online social media platforms generally attempt to mitigate hateful expressions, as these comments can be detrimental to the health of the community. However, automatically identifying hateful comments can be challenging. We manually label 5,143 hateful expressions posted to YouTube and Facebook videos among a dataset of 137,098 comments from an online news media. We then create a granular taxonomy of different types and targets of online hate and train machine learning models to automatically detect and classify the hateful comments in the full dataset. Our contribution is twofold: 1) creating a granular taxonomy for hateful online comments that includes both …
Skylens: Visual Analysis Of Skyline On Multi-Dimensional Data, Xun Zhao, Yanhong Wu, Weiwei Cui, Xinnan Du, Yuan Chen, Yong Wang, Dik Lun Lee, Huamin Qu
Skylens: Visual Analysis Of Skyline On Multi-Dimensional Data, Xun Zhao, Yanhong Wu, Weiwei Cui, Xinnan Du, Yuan Chen, Yong Wang, Dik Lun Lee, Huamin Qu
Research Collection School Of Computing and Information Systems
Skyline queries have wide-ranging applications in fields that involve multi-criteria decision making, including tourism, retail industry, and human resources. By automatically removing incompetent candidates, skyline queries allow users to focus on a subset of superior data items (i.e.. the skyline), thus reducing the decision-making overhead. However, users are still required to interpret and compare these superior items manually before making a successful choice. This task is challenging because of two issues. First, people usually have fuzzy, unstable, and inconsistent preferences when presented with multiple candidates. Second, skyline queries do not reveal the reasons for the superiority of certain skyline points …
Uncertainty Estimation Of Deep Neural Networks, Chao Chen
Uncertainty Estimation Of Deep Neural Networks, Chao Chen
Theses and Dissertations
Normal neural networks trained with gradient descent and back-propagation have received great success in various applications. On one hand, point estimation of the network weights is prone to over-fitting problems and lacks important uncertainty information associated with the estimation. On the other hand, exact Bayesian neural network methods are intractable and non-applicable for real-world applications. To date, approximate methods have been actively under development for Bayesian neural networks, including but not limited to: stochastic variational methods, Monte Carlo dropouts, and expectation propagation. Though these methods are applicable for current large networks, there are limits to these approaches with either underestimation …
Defense In Depth Network Perimeter Security, Anuoluwapo Ope Fatokun
Defense In Depth Network Perimeter Security, Anuoluwapo Ope Fatokun
Masters Theses
Defense in depth network perimeter security has always be a topic of discussion for a long time as an efficient way of mitigating cyber-attacks. While there are no 100% mitigating method against cyber-attacks, a layered defense in depth network perimeter security can be used to mitigate against cyber-attacks. Research have shown a massive growth in cyber-crimes and there are limited number of cyber security expert to counter this attacks. EIU as an institution is taking up the responsibility of producing cyber security graduates with the new Master of Science in Cyber Security program that started in Fall 2017.
This research …
Spike-Based Classification Of Uci Datasets With Multi-Layer Resume-Like Tempotron, Sami Abdul-Wahid
Spike-Based Classification Of Uci Datasets With Multi-Layer Resume-Like Tempotron, Sami Abdul-Wahid
All Master's Theses
Spiking neurons are a class of neuron models that represent information in timed sequences called ``spikes.'' Though predominantly used in neuro-scientific investigations, spiking neural networks (SNN) can be applied to machine learning problems such as classification and regression. SNN are computationally more powerful per neuron than traditional neural networks. Though training time is slow on general purpose computers, spike-based hardware implementations are faster and have shown capability for ultra-low power consumption. Additionally, various SNN training algorithms have achieved comparable performance with the State of the Art on the Fisher Iris dataset. Our main contribution is a software implementation of the …
Old English Character Recognition Using Neural Networks, Sattajit Sutradhar
Old English Character Recognition Using Neural Networks, Sattajit Sutradhar
Electronic Theses and Dissertations
Character recognition has been capturing the interest of researchers since the beginning of the twentieth century. While the Optical Character Recognition for printed material is very robust and widespread nowadays, the recognition of handwritten materials lags behind. In our digital era more and more historical, handwritten documents are digitized and made available to the general public. However, these digital copies of handwritten materials lack the automatic content recognition feature of their printed materials counterparts. We are proposing a practical, accurate, and computationally efficient method for Old English character recognition from manuscript images. Our method relies on a modern machine learning …
Isolated Mobile Malware Observation, Augustine Paul
Isolated Mobile Malware Observation, Augustine Paul
Electronic Theses and Dissertations
The idea behind Bring Your Own Device (BYOD) it that personal mobile devices can be used in the workplace to enhance convenience and flexibility. This development encourages organizations to allow access of personal mobile devices to business information and systems for businesses operation. However, BYOD opens a firm to various security risks such as data contamination and the exposure of user interest to criminal activities. Mobile devices were not designed to handle intense data security and advanced security features are frequently turned off. Using personal mobile devices can also expose a system to various forms of security threats like malware. …
Exploratory Data Analysis And Crime Prediction In San Francisco, Isha Pradhan
Exploratory Data Analysis And Crime Prediction In San Francisco, Isha Pradhan
Master's Projects
Crime has been prevalent in our society for a very long time and it continues to be so even today. The San Francisco Police Department has continued to register numerous such crime cases daily and has released this data to the public as a part of the open data initiative. In this paper, Big Data analysis is used on this dataset and a tool that predicts crime in San Francisco is provided. The focus of the project is to perform an in-depth analysis of the major types of crimes that occurred in the city, observe the trend over the years, …
Segmenting Human Trajectory Data By Movement States While Addressing Signal Loss And Signal Noise, Sungsoon Hwang, Cynthia Vandemark, Navdeep Dhatt, Sai Yalla, Ryan Crews
Segmenting Human Trajectory Data By Movement States While Addressing Signal Loss And Signal Noise, Sungsoon Hwang, Cynthia Vandemark, Navdeep Dhatt, Sai Yalla, Ryan Crews
Sungsoon Hwang
The Evolution Of Requirements Practices In Software Startups, Catarina Gralha, Daniela Damian, Anthony Wasserman, Miguel Goulão, João Araújo
The Evolution Of Requirements Practices In Software Startups, Catarina Gralha, Daniela Damian, Anthony Wasserman, Miguel Goulão, João Araújo
Tony Wasserman
Stacked Generalization: An Introduction To Super Learning, Ashley Naimi, Laura Balzer
Stacked Generalization: An Introduction To Super Learning, Ashley Naimi, Laura Balzer
Laura B. Balzer
Informing Students About Academic Integrity In Programming., Simple Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, Jane Sinclair
Informing Students About Academic Integrity In Programming., Simple Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, Jane Sinclair
Amber Settle
Artificial Intelligence And Role-Reversible Judgment, Stephen E. Henderson, Kiel Brennan-Marquez
Artificial Intelligence And Role-Reversible Judgment, Stephen E. Henderson, Kiel Brennan-Marquez
Stephen E Henderson
Amilcar Aponte.Jpg, Amilcar Aponte
Amilcar Aponte.Jpg, Amilcar Aponte
Amilcar Aponte
Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais