Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Physical Sciences and Mathematics

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King Jan 2021

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King

CCE Theses and Dissertations

It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …


Deep Learning Methods For Fingerprint-Based Indoor And Outdoor Positioning, Fahad Alhomayani Jan 2021

Deep Learning Methods For Fingerprint-Based Indoor And Outdoor Positioning, Fahad Alhomayani

Electronic Theses and Dissertations

Outdoor positioning systems based on the Global Navigation Satellite System have several shortcomings that have deemed their use for indoor positioning impractical. Location fingerprinting, which utilizes machine learning, has emerged as a viable method and solution for indoor positioning due to its simple concept and accurate performance. In the past, shallow learning algorithms were traditionally used in location fingerprinting. Recently, the research community started utilizing deep learning methods for fingerprinting after witnessing the great success and superiority these methods have over traditional/shallow machine learning algorithms. The contribution of this dissertation is fourfold:

First, a Convolutional Neural Network (CNN)-based method for …


A Comprehensive Security Framework For Securing Sensors In Smart Devices And Applications, Amit Kumar Sikder Jul 2020

A Comprehensive Security Framework For Securing Sensors In Smart Devices And Applications, Amit Kumar Sikder

FIU Electronic Theses and Dissertations

This doctoral dissertation introduces novel security frameworks to detect sensor-based threats on smart devices and applications in smart settings such as smart home, smart office, etc. First, we present a formal taxonomy and in-depth impact analysis of existing sensor-based threats to smart devices and applications based on attack characteristics, targeted components, and capabilities. Then, we design a novel context-aware intrusion detection system, 6thSense, to detect sensor-based threats in standalone smart devices (e.g., smartphone, smart watch, etc.). 6thSense considers user activity-sensor co-dependence in standalone smart devices to learn the ongoing user activity contexts and builds a context-aware model to distinguish malicious …


Human Facial Emotion Recognition System In A Real-Time, Mobile Setting, Claire Williamson Jun 2020

Human Facial Emotion Recognition System In A Real-Time, Mobile Setting, Claire Williamson

Honors Theses

The purpose of this project was to implement a human facial emotion recognition system in a real-time, mobile setting. There are many aspects of daily life that can be improved with a system like this, like security, technology and safety.

There were three main design requirements for this project. The first was to get an accuracy rate of 70%, which must remain consistent for people with various distinguishing facial features. The second goal was to have one execution of the system take no longer than half of a second to keep it as close to real time as possible. Lastly, …


A Probabilistic Machine Learning Framework For Cloud Resource Selection On The Cloud, Syeduzzaman Khan Jan 2020

A Probabilistic Machine Learning Framework For Cloud Resource Selection On The Cloud, Syeduzzaman Khan

University of the Pacific Theses and Dissertations

The execution of the scientific applications on the Cloud comes with great flexibility, scalability, cost-effectiveness, and substantial computing power. Market-leading Cloud service providers such as Amazon Web service (AWS), Azure, Google Cloud Platform (GCP) offer various general purposes, memory-intensive, and compute-intensive Cloud instances for the execution of scientific applications. The scientific community, especially small research institutions and undergraduate universities, face many hurdles while conducting high-performance computing research in the absence of large dedicated clusters. The Cloud provides a lucrative alternative to dedicated clusters, however a wide range of Cloud computing choices makes the instance selection for the end-users. This thesis …


Cloud Workload Allocation Approaches For Quality Of Service Guarantee And Cybersecurity Risk Management, Soamar Homsi Mar 2019

Cloud Workload Allocation Approaches For Quality Of Service Guarantee And Cybersecurity Risk Management, Soamar Homsi

FIU Electronic Theses and Dissertations

It has become a dominant trend in industry to adopt cloud computing --thanks to its unique advantages in flexibility, scalability, elasticity and cost efficiency -- for providing online cloud services over the Internet using large-scale data centers. In the meantime, the relentless increase in demand for affordable and high-quality cloud-based services, for individuals and businesses, has led to tremendously high power consumption and operating expense and thus has posed pressing challenges on cloud service providers in finding efficient resource allocation policies.

Allowing several services or Virtual Machines (VMs) to commonly share the cloud's infrastructure enables cloud providers to optimize resource …


The Rock 2018, School Of Engineering And Computer Science Jan 2018

The Rock 2018, School Of Engineering And Computer Science

The Rock

No abstract provided.


The Rock 2017, School Of Engineering And Computer Science Jan 2017

The Rock 2017, School Of Engineering And Computer Science

The Rock

No abstract provided.


Automated Rendering Of Schema Diagram For Ontologies, Nazifa Karima Jan 2017

Automated Rendering Of Schema Diagram For Ontologies, Nazifa Karima

Browse all Theses and Dissertations

Semantic Web extends the current web, using ontologies, metadata and other technologies to establish links between terms and concepts. This enables machines to automatically integrate information across different platforms utilizing the standard definitions. Furthermore, reasoning agents can infer new knowledge by gathering existing information and these additional connections between them. As a result of being designed and maintained independently, data sources exhibit highly heterogeneous nature. This increases the complexity of data integration and hinders interoperability. However, if we can align the overlapping concepts among different domains of knowledge, the prospect of achieving interoperability and integration without having any intermediate reasoning …


Adapting The Search Space While Limiting Damage During Learning In A Simulated Flapping Wing Micro Air Vehicle, Monica Sam Jan 2017

Adapting The Search Space While Limiting Damage During Learning In A Simulated Flapping Wing Micro Air Vehicle, Monica Sam

Browse all Theses and Dissertations

Cyber-Physical Systems (CPS) are characterized by closely coupled physical and software components that operate simultaneously on different spatial and temporal scales; exhibit multiple and distinct behavioral modalities; and interact with one another in ways not entirely predictable at the time of design. A commonly appearing type of CPS are systems that contain one or more smart components that adapt locally in response to global measurements of whole system performance. An example of a smart component robotic CPS system is a Flapping Wing Micro Air Vehicle (FW-MAV) that contains wing motion oscillators that control their wing flapping patterns to enable the …


Adaptive Graph Construction For Isomap Manifold Learning, Loc Tran, Zezhong Zheng, Guoquing Zhou, Jiang Li, Karen O. Egiazarian (Ed.), Sos S. Agaian (Ed.), Atanas P. Gotchev (Ed.) Jan 2015

Adaptive Graph Construction For Isomap Manifold Learning, Loc Tran, Zezhong Zheng, Guoquing Zhou, Jiang Li, Karen O. Egiazarian (Ed.), Sos S. Agaian (Ed.), Atanas P. Gotchev (Ed.)

Electrical & Computer Engineering Faculty Publications

Isomap is a classical manifold learning approach that preserves geodesic distance of nonlinear data sets. One of the main drawbacks of this method is that it is susceptible to leaking, where a shortcut appears between normally separated portions of a manifold. We propose an adaptive graph construction approach that is based upon the sparsity property of the ℓ1 norm. The ℓ1 enhanced graph construction method replaces k-nearest neighbors in the classical approach. The proposed algorithm is first tested on the data sets from the UCI data base repository which showed that the proposed approach performs better than …


Multi-Label Segmentation Propagation For Materials Science Images Incorporating Topology And Interactivity, Jarrell Waggoner Jan 2013

Multi-Label Segmentation Propagation For Materials Science Images Incorporating Topology And Interactivity, Jarrell Waggoner

Theses and Dissertations

Segmentation propagation is the problem of transferring the segmentation of an image to a neighboring image in a sequence. This problem is of particular importance to materials science, where the accurate segmentation of a series of 2D serial-sectioned images of multiple, contiguous 3D structures has important applications. Such structures may have prior-known shape, appearance, and/or topology among the underlying structures which can be considered to improve segmentation accuracy. For example, some materials images may have structures with a specific shape or appearance in each serial section slice, which only changes minimally from slice to slice; and some materials may exhibit …


Front Burner Jul 2012

Front Burner

Syracuse University Magazine

No abstract provided.


The Rock 2012, School Of Engineering And Computer Science Jan 2012

The Rock 2012, School Of Engineering And Computer Science

The Rock

No abstract provided.


The Rock 2011, School Of Engineering And Computer Science Jan 2011

The Rock 2011, School Of Engineering And Computer Science

The Rock

No abstract provided.


Precise Measurement Of The Neutron Magnetic Form Factor Gnm In The Few-Gev² Region, Clas Collaboration, J. Lachniet, H. Bagdasaryan, S. Bültmann, N. Kalantarians, G. E. Dodge, T. A. Forest, G. Gavalian, C. E. Hyde-Wright, A. Klien, S. E. Kuhn, M. R. Niroula, R. A. Niyazov, L. M. Qin, L. B. Weinstein, J. Zhang Jan 2009

Precise Measurement Of The Neutron Magnetic Form Factor Gnm In The Few-Gev² Region, Clas Collaboration, J. Lachniet, H. Bagdasaryan, S. Bültmann, N. Kalantarians, G. E. Dodge, T. A. Forest, G. Gavalian, C. E. Hyde-Wright, A. Klien, S. E. Kuhn, M. R. Niroula, R. A. Niyazov, L. M. Qin, L. B. Weinstein, J. Zhang

Physics Faculty Publications

The neutron elastic magnetic form factor was extracted from quasielastic electron scattering on deuterium over the range Q2 = 1.0–4.8  GeV2 with the CLAS detector at Jefferson Lab. High precision was achieved with a ratio technique and a simultaneous in situ calibration of the neutron detection efficiency. Neutrons were detected with electromagnetic calorimeters and time-of-flight scintillators at two beam energies. The dipole parametrization gives a good description of the data


Optimal Layout Of Multicast Groups Using Network Embedded Multicast Security In Ad Hoc Sensor Networks, Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti Jan 2007

Optimal Layout Of Multicast Groups Using Network Embedded Multicast Security In Ad Hoc Sensor Networks, Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti

Computer Science Faculty Publications

This paper considers the security of sensor network applications. Our approach creates multicast regions that use symmetric key cryptography for communications. Each multicast region contains a single keyserver that is used to perform key management and maintain the integrity of a multicast region. Communications between two multicast regions is performed by nodes that belong to both regions. To ease the network management burden, it is desirable for the networks to self-organize into regions and dynamically select their keyservers. This paper shows how to determine the number of keyservers (k) to use and the size in the number of hops (h) …