Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 54

Full-Text Articles in Physical Sciences and Mathematics

Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte Jan 2023

Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte

Browse all Theses and Dissertations

Modern web development has grown increasingly reliant on scripting languages such as PHP. The complexities of an interpreted language means it is very difficult to account for every use case as unusual interactions can cause unintended side effects. Automatically generating test input to detect bugs or fuzzing, has proven to be an effective technique for JavaScript engines. By extending this concept to PHP, existing vulnerabilities that have since gone undetected can be brought to light. While PHP fuzzers exist, they are limited to testing a small quantity of test seeds per second. In this thesis, we propose a solution for …


Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams Jan 2023

Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams

Browse all Theses and Dissertations

Obtaining accurate inferences from deep neural networks is difficult when models are trained on instances with conflicting labels. Algorithmic recognition of online hate speech illustrates this. No human annotator is perfectly reliable, so multiple annotators evaluate and label online posts in a corpus. Labeling scheme limitations, differences in annotators' beliefs, and limits to annotators' honesty and carefulness cause some labels to disagree. Consequently, decisive and accurate inferences become less likely. Some practical applications such as social research can tolerate some indecisiveness. However, an online platform using an indecisive classifier for automated content moderation could create more problems than it solves. …


Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula Jan 2023

Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula

Browse all Theses and Dissertations

Malware detection is a critical task in ensuring the security of computer systems. Due to a surge in malware and the malware program sophistication, machine learning methods have been developed to perform such a task with great success. To further learn structural semantics, Graph Neural Networks abbreviated as GNNs have emerged as a recent practice for malware detection by modeling the relationships between various components of a program as a graph, which deliver promising detection performance improvement. However, this line of research attends to individual programs while overlooking program interactions; also, these GNNs tend to perform feature aggregation from neighbors …


Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams Jan 2023

Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams

Browse all Theses and Dissertations

Most of today’s time series data contain anomalies and multiple seasonalities, and accurate anomaly detection in these data is critical to almost any type of business. However, most mainstream forecasting models used for anomaly detection can only incorporate one or no seasonal component into their forecasts and cannot capture every known seasonal pattern in time series data. In this thesis, we propose a new multi-seasonal forecasting model for anomaly detection in time series data that extends the popular Seasonal Autoregressive Integrated Moving Average (SARIMA) model. Our model, named multi-SARIMA, utilizes a time series dataset’s multiple pre-determined seasonal trends to increase …


A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham Jan 2023

A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham

Browse all Theses and Dissertations

The Industrial Internet of Things (IIoT) refers to a set of smart devices, i.e., actuators, detectors, smart sensors, and autonomous systems connected throughout the Internet to help achieve the purpose of various industrial applications. Unfortunately, IIoT applications are increasingly integrated into insecure physical environments leading to greater exposure to new cyber and physical system attacks. In the current IIoT security realm, effective anomaly detection is crucial for ensuring the integrity and reliability of critical infrastructure. Traditional security solutions may not apply to IIoT due to new dimensions, including extreme energy constraints in IIoT devices. Deep learning (DL) techniques like Convolutional …


Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee Jan 2023

Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee

Browse all Theses and Dissertations

This research explores data-driven AI techniques to extract insights from relevant medical data for pain management in patients with Sickle Cell Disease (SCD). SCD is an inherited red blood cell disorder that can cause a multitude of complications throughout an individual’s life. Most patients with SCD experience repeated, unpredictable episodes of severe pain. Arguably, the most challenging aspect of treating pain episodes in SCD is assessing and interpreting the patient’s pain intensity level due to the subjective nature of pain. In this study, we leverage multiple data-driven AI techniques to improve pain management in patients with SCD. The proposed approaches …


Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula Jan 2023

Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula

Browse all Theses and Dissertations

Machine learning techniques utilize training data samples to help understand, predict, classify, and make valuable decisions for different applications such as medicine, email filtering, speech recognition, agriculture, and computer vision, where it is challenging or unfeasible to produce traditional algorithms to accomplish the needed tasks. Unsupervised ML-based approaches have emerged for building groups of data samples known as data clusters for driving necessary decisions about these data samples and helping solve challenges in critical applications. Data clustering is used in multiple fields, including health, finance, social networks, education, and science. Sequential processing of clustering algorithms, like the K-Means, Minibatch K-Means, …


Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal Jan 2023

Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal

Browse all Theses and Dissertations

Heart failure is a syndrome which effects a patient’s quality of life adversely. It can be caused by different underlying conditions or abnormalities and involves both cardiovascular and non-cardiovascular comorbidities. Heart failure cannot be cured but a patient’s quality of life can be improved by effective treatment through medicines and surgery, and lifestyle management. As effective treatment of heart failure incurs cost for the patients and resource allocation for the hospitals, predicting length of stay of these patients during each hospitalization becomes important. Heart failure can be classified into two types: left sided heart failure and right sided heart failure. …


Contributors To Pathologic Depolarization In Myotonia Congenita, Jessica Hope Myers Jan 2023

Contributors To Pathologic Depolarization In Myotonia Congenita, Jessica Hope Myers

Browse all Theses and Dissertations

Myotonia congenita is an inherited skeletal muscle disorder caused by loss-of-function mutation in the CLCN1 gene. This gene encodes the ClC-1 chloride channel, which is almost exclusively expressed in skeletal muscle where it acts to stabilize the resting membrane potential. Loss of this chloride channel leads to skeletal muscle hyperexcitability, resulting in involuntary muscle action potentials (myotonic discharges) seen clinically as muscle stiffness (myotonia). Stiffness affects the limb and facial muscles, though specific muscle involvement can vary between patients. Interestingly, respiratory distress is not part of this disease despite muscles of respiration such as the diaphragm muscle also carrying this …


Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh Jan 2023

Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh

Browse all Theses and Dissertations

The Internet of Things (IoT) is used in many fields that generate sensitive data, such as healthcare and surveillance. Increased reliance on IoT raised serious information security concerns. This dissertation presents three systems for analyzing and classifying IoT traffic using Deep Learning (DL) models, and a large dataset is built for systems training and evaluation. The first system studies the effect of combining raw data and engineered features to optimize the classification of encrypted and compressed IoT traffic using Engineered Features Classification (EFC), Raw Data Classification (RDC), and combined Raw Data and Engineered Features Classification (RDEFC) approaches. Our results demonstrate …


Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani Jan 2023

Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani

Browse all Theses and Dissertations

Identifying the version of the Solidity compiler used to create an Ethereum contract is a challenging task, especially when the contract bytecode is obfuscated and lacks explicit metadata. Ethereum bytecode is highly complex, as it is generated by the Solidity compiler, which translates high-level programming constructs into low-level, stack-based code. Additionally, the Solidity compiler undergoes frequent updates and modifications, resulting in continuous evolution of bytecode patterns. To address this challenge, we propose using deep learning models to analyze Ethereum bytecodes and infer the compiler version that produced them. A large number of Ethereum contracts and the corresponding compiler versions is …


Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha Jan 2023

Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha

Browse all Theses and Dissertations

Smart cities have emerged to tackle many critical problems that can thwart the overwhelming urbanization process, such as traffic jams, environmental pollution, expensive health care, and increasing energy demand. This Master thesis proposes efficient and high-quality cloud-based machine-learning solutions for efficient and sustainable smart cities environment. Different supervised machine-learning models for air quality predication (AQP) in efficient and sustainable smart cities environment is developed. For that, ML-based techniques are implemented using cloud-based solutions. For example, regression and classification methods are implemented using distributed cloud computing to forecast air execution time and accuracy of the implemented ML solution. These models are …


Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan Jan 2023

Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan

Browse all Theses and Dissertations

Deploying Mandatory Access Controls (MAC) is a popular way to provide host protection against malware. Unfortunately, current implementations lack the flexibility to adapt to emergent malware threats and are known for being difficult to configure. A core tenet of MAC security systems is that the policies they are deployed with are immutable from the host while they are active. This work looks at deploying a MAC system that leverages using encrypted security tokens to allow for redeploying policy configurations in real-time without the need to stop a running process. This is instrumental in developing an adaptive framework for security systems …


The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii Jan 2023

The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii

Browse all Theses and Dissertations

The widespread expansion of Electric Vehicles (EV) throughout the world creates a requirement for charging stations. While Cybersecurity research is rapidly expanding in the field of Electric Vehicle Infrastructure, efforts are impacted by the availability of testing platforms. This paper presents a solution called the “Open Charge Point Protocol (OCPP) Cyber Range.” Its purpose is to conduct Cybersecurity research against vulnerabilities in the OCPP v1.6 protocol. The OCPP Cyber Range can be used to enable current or future research and to train operators and system managers of Electric Charge Vehicle Supply Equipment (EVSE). This paper demonstrates this solution using three …


Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman Jan 2023

Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman

Browse all Theses and Dissertations

Insider threats to information security have become a burden for organizations. Understanding insider activities leads to an effective improvement in identifying insider attacks and limits their threats. This dissertation presents three systems to detect insider threats effectively. The aim is to reduce the false negative rate (FNR), provide better dataset use, and reduce dimensionality and zero padding effects. The systems developed utilize deep learning techniques and are evaluated using the CERT 4.2 dataset. The dataset is analyzed and reformed so that each row represents a variable length sample of user activities. Two data representations are implemented to model extracted features …


Merit Study Of Battery Or Hydrogen Energy Storage For Large Scale, Combined Wind And Solar Electricity Generation, Ashley K. Moore Jan 2023

Merit Study Of Battery Or Hydrogen Energy Storage For Large Scale, Combined Wind And Solar Electricity Generation, Ashley K. Moore

Browse all Theses and Dissertations

In the past several years, the energy sector has experienced a rapid increase in renewable energy installations due to declining capital costs for wind turbines, solar panels, and batteries. Wind and solar electricity generation are intermittent in nature which must be considered in an economic analysis if a fair comparison is to be made between electricity supplied from renewables and electricity purchased from the grid. Energy storage reduces curtailment of wind and solar and minimizes electricity purchases from the grid by storing excess electricity and deploying the energy at times when demand exceeds the renewable energy supply. The objective of …


Accelerating Precision Station Keeping For Automated Aircraft, James D. Anderson Jan 2023

Accelerating Precision Station Keeping For Automated Aircraft, James D. Anderson

Browse all Theses and Dissertations

Automated vehicles pose challenges in various research domains, including robotics, machine learning, computer vision, public safety, system certification, and beyond. These vehicles autonomously handle navigation and locomotion, often requiring minimal user interaction, and can operate on land, in water, or in the air. In the context of aircraft, one specific application is Automated Aerial Refueling (AAR). Traditional aerial refueling involves a "tanker" aircraft using a mechanism, such as a rigid boom arm or a flexible hose, to transfer fuel to another aircraft designated as the "receiver". For AAR, the boom arm may be maneuvered automatically, or in certain instances the …


Computer Enabled Interventions To Communication And Behavioral Problems In Collaborative Work Environments, Ashutosh Shivakumar Jan 2022

Computer Enabled Interventions To Communication And Behavioral Problems In Collaborative Work Environments, Ashutosh Shivakumar

Browse all Theses and Dissertations

Task success in co-located and distributed collaborative work settings is characterized by clear and efficient communication between participating members. Communication issues like 1) Unwanted interruptions and 2) Delayed feedback in collaborative work based distributed scenarios have the potential to impede task coordination and significantly decrease the probability of accomplishing task objective. Research shows that 1) Interrupting tasks at random moments can cause users to take up to 30% longer to resume tasks, commit up to twice the errors, and experience up to twice the negative effect than when interrupted at boundaries 2) Skill retention in collaborative learning tasks improves with …


Ethical Issues In Graduate Research, William J. Frey Sep 2009

Ethical Issues In Graduate Research, William J. Frey

Ethics in Science and Engineering National Clearinghouse

(Caution! This module is being published in an incomplete, preliminary version. Later edited and fuller versions will follow.) "Graduate Education in Research Ethics for Scientists and Engineers" is a project funded by the National Science Foundation (SES 0629377) to design a pilot program in research ethics for graduate students in science and engineering. This project is built around three workshops: (1) a Graduate Awareness Workshop introduces students to fundamental ethical issues in research, (2) a Moral Deliberation Workshop acquaints students with the skills of moral deliberation, (3) a Case Analysis Workshop uses realistic scenarios to allow students to practice decision-making …


Professional Ethics-Responsible Conduct Of Research Training: Making Sense Of Complex Problems, Michael D. Mumford, Shane Connelly, Ryan P. Brown, Lynn D. Devenport, Stephen T. Murphy, Alison L. Antes Sep 2009

Professional Ethics-Responsible Conduct Of Research Training: Making Sense Of Complex Problems, Michael D. Mumford, Shane Connelly, Ryan P. Brown, Lynn D. Devenport, Stephen T. Murphy, Alison L. Antes

Ethics in Science and Engineering National Clearinghouse

General Course Abstract

This two-day seminar format course exposes students to the complexities involved in real-world ethical decision-making. It provides students with strategies, or tools, for understanding and thinking through ethical problems to arrive at a decision. Students practice working with these strategies by applying them to realistic, complex cases.

Day 1 Abstract

During the first day of the course, guidelines and principles for ethical research practices are discussed. It is emphasized that students must apply guidelines in a context to arrive at a decision, and the course provides guidance on this decision-making process. Next, students learn about the personal …


Federal Register: National Science Foundation, Responsible Conduct Of Research, National Science Foundation Aug 2009

Federal Register: National Science Foundation, Responsible Conduct Of Research, National Science Foundation

Ethics in Science and Engineering National Clearinghouse

The National Science Foundation (NSF) is announcing its implementation of Section 7009 of the America Creating Opportunities to Meaningfully Promote Excellence in Technology, Education, and Science (COMPETES) Act (42 U.S.C. 1862o–1). This section of the Act requires that ‘‘each institution that applies for financial assistance from the Foundation for science and engineering research or education describe in its grant proposal a plan to provide appropriate training and oversight in the responsible and ethical conduct of research to undergraduate students, graduate students, and postdoctoral researchers participating in the proposed research project.’’

[Abstract by author]


Role-Play Scenarios For Teaching Responsible Conduct Of Research: Assessment Of Outcomes, Stephanie N. Seiler, Michael C. Loui, Kerri L. Kristich, Kyoung Jin Kim, C. K. Gunsalus, Bradley J. Brummel May 2009

Role-Play Scenarios For Teaching Responsible Conduct Of Research: Assessment Of Outcomes, Stephanie N. Seiler, Michael C. Loui, Kerri L. Kristich, Kyoung Jin Kim, C. K. Gunsalus, Bradley J. Brummel

Ethics in Science and Engineering National Clearinghouse

No abstract provided.


Responsible Conduct Of Research Role-Plays: Conflict Of Interest, C. K. Gunsalus, M. C. Loui, C. K. Gunsalus, M. C. Loui, And Their Students At The University Of Illinois At Urbana-Champaign May 2009

Responsible Conduct Of Research Role-Plays: Conflict Of Interest, C. K. Gunsalus, M. C. Loui, C. K. Gunsalus, M. C. Loui, And Their Students At The University Of Illinois At Urbana-Champaign

Ethics in Science and Engineering National Clearinghouse

This faculty adviser in this role-play has a major conflict of interest, which puts the student in an awkward situation. If the conflict oversight committee hasn’t contacted the student already (an unfortunately common situation), they should have. In an ideal situation, every student affected by a potential conflict of interest should have some written guidance about what to expect and how to get advice if concerns arise.

One useful step is to find out if there are any written policies or guidelines about what students can expect in situations like this: for example, is there a meeting annually or every …


Federal Register: National Science Foundation, Responsible Conduct Of Research, National Science Foundation Feb 2009

Federal Register: National Science Foundation, Responsible Conduct Of Research, National Science Foundation

Ethics in Science and Engineering National Clearinghouse

The National Science Foundation (NSF) is soliciting public comment on the agency’s proposed implementation of Section 7009 of the America Creating Opportunities to Meaningfully Promote Excellence in Technology, Education, and Science (COMPETES) Act (42 U.S.C. 1862o–1). This section of the Act requires that ‘‘each institution that applies for financial assistance from the Foundation for science and engineering research or education describe in its grant proposal a plan to provide appropriate training and oversight in the responsible and ethical conduct of research to undergraduate students, graduate students, and postdoctoral researchers participating in the proposed research project.’’

[Abstract by author]


Ethical Issues In Peer Review Of Research, Michael C. Loui Feb 2009

Ethical Issues In Peer Review Of Research, Michael C. Loui

Ethics in Science and Engineering National Clearinghouse

No abstract provided.


Responsible Conduct Of Research Role-Plays: Whistleblowing Data Management, C. K. Gunsalus, M. C. Loui, C. K. Gunsalus, M. C. Loui, And Their Students At The University Of Illinois At Urbana-Champaign Feb 2009

Responsible Conduct Of Research Role-Plays: Whistleblowing Data Management, C. K. Gunsalus, M. C. Loui, C. K. Gunsalus, M. C. Loui, And Their Students At The University Of Illinois At Urbana-Champaign

Ethics in Science and Engineering National Clearinghouse

This role-play involves data mismanagement in a research lab. The graduate students suspects that the post-doc fabricated experimental results, which is a form of research misconduct. The realization or suspicion that someone has engaged in research misconduct is one of the most difficult situations researchers face. However, someone who has witnessed misconduct has an obligation to act and report this behavior. Reporting the misconduct, which also known as whistle-blowing, should be done in a cautious and responsible way. Ideally, whistle-blowers should never be afraid to come forward with questions of misconduct, as they should be supported by their institutions and …


Responsible Conduct Of Research Role-Plays: Hazardous Substances, C. K. Gunsalus, M. C. Loui, C. K. Gunsalus, M. C. Loui, And Their Students At The University Of Illinois At Urbana-Champaign Feb 2009

Responsible Conduct Of Research Role-Plays: Hazardous Substances, C. K. Gunsalus, M. C. Loui, C. K. Gunsalus, M. C. Loui, And Their Students At The University Of Illinois At Urbana-Champaign

Ethics in Science and Engineering National Clearinghouse

This role-play focuses on the dilemmas in balancing regulatory requirements, personal relationships and a natural reluctance to “cause trouble.” These dilemmas arise in many settings, and can be particularly acute in laboratories that handle hazardous substances because of the serious safety implications of violations. In addition, violations can carry fines and penalties for laboratories and universities where they occur. The worries of the graduate student in the role-play about potential laboratory shut-downs and corresponding research delays are all too real. Specifics of regulations vary according to the materials being handled. The underlying principles regarding human and environmental safety stay the …


Responsible Conduct Of Research Role-Plays: Human Subjects, C. K. Gunsalus, M. C. Loui, C. K. Gunsalus, M. C. Loui, And Their Students At The University Of Illinois At Urbana-Champaign Feb 2009

Responsible Conduct Of Research Role-Plays: Human Subjects, C. K. Gunsalus, M. C. Loui, C. K. Gunsalus, M. C. Loui, And Their Students At The University Of Illinois At Urbana-Champaign

Ethics in Science and Engineering National Clearinghouse

This role-play addresses issues involved with human subject research and working with an Institutional Review Board (IRB).

The Belmont Report (1979) identifies three basic ethical principles that underlie all human subject research. These principles are Respect for persons, Beneficence, and Justice. Respect for persons requires us to treat individuals as autonomous human beings and not to use people as a means to an end. We must allow people to choose for themselves and provide extra protection to those with limited ability to choose, such as children. Rules derived from the principle of respect for persons include the requirements to obtain …


Responsible Conduct Of Research Role-Plays: Peer Review, C. K. Gunsalus, M. C. Loui, C. K. Gunsalus, M. C. Loui, And Their Students At The University Of Illinois At Urbana-Champaign Feb 2009

Responsible Conduct Of Research Role-Plays: Peer Review, C. K. Gunsalus, M. C. Loui, C. K. Gunsalus, M. C. Loui, And Their Students At The University Of Illinois At Urbana-Champaign

Ethics in Science and Engineering National Clearinghouse

This scenario is based on “What is Responsible Peer Review?” http://ccnmtl.columbia.edu/projects/rcr/rcr_authorship/case/index.html#2, which is based on the “Confidentiality vs. Mentor Responsibilities: A Conflict of Obligations” scenario, http://onlineethics.org/reseth/appe/vol3/conflictobligations.html, which is based on a real incident.

This scenario highlights several issues in the peer review of manuscripts submitted for publication:

• Conflict of interest in the role of the reviewer

• Confidentiality of information in the manuscript

• Role of the adviser in the professional development of a graduate student

Although this scenario is not based on a single actual incident, each of the scenario’s elements occurs frequently in research in science and …


Responsible Conduct Of Research Role-Plays: Whistle-Blowing And Professional Relationships, C. K. Gunsalus, M. C. Loui, C. K. Gunsalus, M. C. Loui, And Their Students At The University Of Illinois At Urbana-Champaign Feb 2009

Responsible Conduct Of Research Role-Plays: Whistle-Blowing And Professional Relationships, C. K. Gunsalus, M. C. Loui, C. K. Gunsalus, M. C. Loui, And Their Students At The University Of Illinois At Urbana-Champaign

Ethics in Science and Engineering National Clearinghouse

This role-play focuses on a whistle-blowing scenario involving data management issues in a research lab, complicated by uncomfortable personal relationships. Whistle-blowing involves raising concerns or allegations of wrongdoing or misconduct. There is an obligation for whistle-blowers to do so in good faith, which means based on reasonable belief or facts. Suspecting that someone has engaged in research misconduct is one of the most difficult situations researchers face. This is especially true when relationships are strained for other reasons.

If you have the suspicion of research misconduct, the possible consequences for all involved can be serious. To handle the situation responsibly …