Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences

PDF

<strong> Theses and Dissertations </strong>

Theses/Dissertations

Publication Year

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

Examining Outcomes Of Privacy Risk And Brand Trust On The Adoption Of Consumer Smart Devices, Marianne C. Loes May 2024

Examining Outcomes Of Privacy Risk And Brand Trust On The Adoption Of Consumer Smart Devices, Marianne C. Loes

<strong> Theses and Dissertations </strong>

With more connected devices on earth than there are people, Internet of Things (IoT) is arguably just as innovative as the original introduction of the Internet. Though much of the research on technology acceptance and adoption has been conducted in organizational settings, the consumer use of IoT technologies, such as smart devices, is becoming a fertile field of research. The merger of these research streams is especially relevant from a societal perspective as smart devices become more embedded in consumer’s daily lives, particularly with the introduction of the “meta verse.” While original technology acceptance research is limited to two system-specific …


Multi-Script Handwriting Identification By Fragmenting Strokes, Joshua Jude Thomas May 2024

Multi-Script Handwriting Identification By Fragmenting Strokes, Joshua Jude Thomas

<strong> Theses and Dissertations </strong>

This study tests the effectiveness of Multi-Script Handwriting Identification after simplifying character strokes, by segmenting them into sub-parts. Character simplification is performed through splitting the character by branching-points and end-points, a process called stroke fragmentation in this study. The resulting sub-parts of the character are called stroke fragments and are evaluated individually to identify the writer. This process shares similarities with the concept of stroke decomposition in Optical Character Recognition which attempts to recognize characters through the writing strokes that make them up. The main idea of this study is that the characters of different writing‑scripts (English, Chinese, etc.) may …


Explainable Artificial Intelligence: Approaching It From The Lowest Level, Ralf P. Riedel Dec 2023

Explainable Artificial Intelligence: Approaching It From The Lowest Level, Ralf P. Riedel

<strong> Theses and Dissertations </strong>

The increasing complexity of artificial intelligence models has given rise to extensive work toward understanding the inner workings of neural networks. Much of that work, however, has focused on manipulating input data feeding the network to assess their affects on network output or pruning model components after the often-extensive time-consuming training. It is postulated in this study that understanding of neural network can benefit from model structure simplification. In turn, it is shown that model simplification can benefit from investigating network node, the most fundamental unit of neural networks, evolving trends during training. Whereas studies on simplification of model structure …


Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett Dec 2023

Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett

<strong> Theses and Dissertations </strong>

Over the last two decades, side-channel vulnerabilities have shown to be a major threat to embedded devices. Most side-channel research has developed our understanding of the vulnerabilities to cryptographic devices due to their implementation and how we can protect them. However, side-channel leakage can yield useful information about many other processes that run on the device. One promising area that has received little attention is the side-channel leakage due to the execution of assembly instructions. There has been some work in this area that has demonstrated the idea’s potential, but so far, this research has assumed the adversary has physical …


Epileptic Seizure Classification Using Image-Based Data Representation, Amber Surles Aug 2023

Epileptic Seizure Classification Using Image-Based Data Representation, Amber Surles

<strong> Theses and Dissertations </strong>

Epilepsy is a recurrence of seizures caused by a disorder of the brain in over 3.4 million people nationwide. Some people are able to predict their seizures based off prodrome, which is an early sign or symptom that usually resembles mood changes or a euphoric feeling even days to an hour before occurrence. Consequently, the natural instincts of the body to react to an upcoming attack lends credence to the existence of a pre-ictal state that precedes seizure episodes. Physicians and researchers have thus sought for an automated approach for predicting or detecting seizures.

In this research, we evaluate the …


Analyzing Business-Focused Social Networks In Hiring: The Influence Of A Job Candidate's Network On A Recruiter's Hiring Recommendation, Hannah V. Kibby Dec 2022

Analyzing Business-Focused Social Networks In Hiring: The Influence Of A Job Candidate's Network On A Recruiter's Hiring Recommendation, Hannah V. Kibby

<strong> Theses and Dissertations </strong>

Social media has altered the ways in which people interact. Business-focused social media profiles, such as those on LinkedIn, can act as a proxy for a traditional resume. However, these websites differ from a traditional resume in that information presented is sometimes informal, personal, and irrelevant to the member’s career. Furthermore, HR employees are able to view a job candidate’s social network. This research investigates the influence of a recruiter’s knowledge of an applicant’s professional network on the recruiter’s perception of the applicant’s trustworthiness and hence their willingness to take risk in the hiring relationship. A review of the literature …


Detecting Selfish Mining Attacks Against A Blockchain Using Machine Learing, Matthew A. Peterson Dec 2022

Detecting Selfish Mining Attacks Against A Blockchain Using Machine Learing, Matthew A. Peterson

<strong> Theses and Dissertations </strong>

Selfish mining is an attack against a blockchain where miners hide newly discovered blocks instead of publishing them to the rest of the network. Selfish mining has been a potential issue for blockchains since it was first discovered by Eyal and Sirer. It can be used by malicious miners to earn a disproportionate share of the mining rewards or in conjunction with other attacks to steal money from network users. Several of these attacks were launched in 2018, 2019, and 2020 with the attackers stealing as much as $18 Million. Developers made several different attempts to fix this issue, but …