Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Physical Sciences and Mathematics

Enabling Iov Communication Through Secure Decentralized Clustering Using Federated Deep Reinforcement Learning, Chandler Scott Aug 2024

Enabling Iov Communication Through Secure Decentralized Clustering Using Federated Deep Reinforcement Learning, Chandler Scott

Electronic Theses and Dissertations

The Internet of Vehicles (IoV) holds immense potential for revolutionizing transporta- tion systems by facilitating seamless vehicle-to-vehicle and vehicle-to-infrastructure communication. However, challenges such as congestion, pollution, and security per- sist, particularly in rural areas with limited infrastructure. Existing centralized solu- tions are impractical in such environments due to latency and privacy concerns. To address these challenges, we propose a decentralized clustering algorithm enhanced with Federated Deep Reinforcement Learning (FDRL). Our approach enables low- latency communication, competitive packet delivery ratios, and cluster stability while preserving data privacy. Additionally, we introduce a trust-based security framework for IoV environments, integrating a central authority …


Enhanced Content-Based Fake News Detection Methods With Context-Labeled News Sources, Duncan Arnfield Dec 2023

Enhanced Content-Based Fake News Detection Methods With Context-Labeled News Sources, Duncan Arnfield

Electronic Theses and Dissertations

This work examined the relative effectiveness of multilayer perceptron, random forest, and multinomial naïve Bayes classifiers, trained using bag of words and term frequency-inverse dense frequency transformations of documents in the Fake News Corpus and Fake and Real News Dataset. The goal of this work was to help meet the formidable challenges posed by proliferation of fake news to society, including the erosion of public trust, disruption of social harmony, and endangerment of lives. This training included the use of context-categorized fake news in an effort to enhance the tools’ effectiveness. It was found that term frequency-inverse dense frequency provided …


A Programmatic Geographic Information Systems Analysis Of Plant Hardiness Zones, Andrew Bowen May 2023

A Programmatic Geographic Information Systems Analysis Of Plant Hardiness Zones, Andrew Bowen

Electronic Theses and Dissertations

The Plant Hardiness Zone Map consists of thirteen geographical zones that describe whether a plant can survive based on average annual minimal temperatures. As climate change progresses, minimum temperatures in all regions are expected to change. This work programmatically evaluates predicted future climate projection data and converts it to United States Department of Agriculture-defined hardiness zones. Through the next 80 years, hardiness zones are projected to move poleward; in effect, colder zones will lose area and warmer zones will gain area globally. Some implications include changes in crop growing degree days, which could alter crop productivity, migration and settlement of …


Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau May 2023

Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau

Undergraduate Honors Theses

Access control models and implementation guidelines for determining, provisioning, and de-provisioning user permissions are challenging due to the differing approaches, unique for each organization, the lack of information provided by case studies concerning the organization’s security policies, and no standard means of implementation procedures or best practices. Although there are multiple access control models, one stands out, role-based access control (RBAC). RBAC simplifies maintenance by enabling administrators to group users with similar permissions. This approach to managing user permissions supports the principle of least privilege and separation of duties, which are needed to ensure an organization maintains acceptable user access …


Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt Aug 2022

Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt

Electronic Theses and Dissertations

Vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication enable the sharing, in real time, of vehicular locations and speeds with other vehicles, traffic signals, and traffic control centers. This shared information can help traffic to better traverse intersections, road segments, and congested neighborhoods, thereby reducing travel times, increasing driver safety, generating data for traffic planning, and reducing vehicular pollution. This study, which focuses on vehicular pollution, used an analysis of data from NREL, BTS, and the EPA to determine that the widespread use of V2V-based truck platooning—the convoying of trucks in close proximity to one another so as to reduce air drag …


Detecting The Intensity Of Denial-Of-Service Cyber Attacks Using Supervised Machine Learning, Abigail Hubbard May 2022

Detecting The Intensity Of Denial-Of-Service Cyber Attacks Using Supervised Machine Learning, Abigail Hubbard

Undergraduate Honors Theses

Denial-of-Service (DoS) attacks are aimed at shutting a machine or network down to block users from accessing it. These attacks can be difficult to detect and can cost millions in damages or lost earnings. Since the first DoS attack occurred in 1999, the way DoS attacks have been launched has become more complicated, making them more elusive and harder to detect. The first step to detect and mitigate a DoS attack is for a system to identify the malicious traffic.

In this experiment, we aim to identify the malicious traffic within ten seconds. To do this the project was divided …


Stumbling Into Virtual Worlds. How Resolution Affects Users’ Immersion In Virtual Reality And Implications For Virtual Reality In Therapeutic Applications, Brianna Martinson May 2022

Stumbling Into Virtual Worlds. How Resolution Affects Users’ Immersion In Virtual Reality And Implications For Virtual Reality In Therapeutic Applications, Brianna Martinson

Undergraduate Honors Theses

Studies of how users experience Virtual Reality (VR) have thus far failed to address the extent to which rendering resolution and rendering frame rate affect users’ sense of immersion in VR, including applications of VR involving simulators, treatments for psychological and mental disorders, explorations of new and nonexistent structures, and ways to better understand the human body in medical applications.

This study investigated if rendering resolution affected users’ sense of immersion in VR. This was conducted by comparing the responses of two groups, relative to two measures of participant immersion: (a) participant’s sense of presence and (b) participant’s sense of …


On Utilizing Prunable Blockchains For Secure Message Dissemination In Vanets, Edgar Bowlin Iii` May 2021

On Utilizing Prunable Blockchains For Secure Message Dissemination In Vanets, Edgar Bowlin Iii`

Undergraduate Honors Theses

Blockchain's use in Vehicular Ad-Hoc Networks (VANETs) research demonstrates that the technology provides useful attributes to allow for the safe and secure operation of VANET applications. The growth of blockchain applications pose a threat to the efficient operation of the MANET-like environment found within VANETs. Floating Genesis Blocks (FGB) can be used to preserve the state of the blockchain up to a certain point, and allows for the safe pruning of the chain without information loss. The early work presented here demonstrates two pruning techniques and compares the effects of each blockchain through simulation measurement of the chain's space requirements. …


Knot Flow Classification And Its Applications In Vehicular Ad-Hoc Networks (Vanet), David Schmidt May 2020

Knot Flow Classification And Its Applications In Vehicular Ad-Hoc Networks (Vanet), David Schmidt

Electronic Theses and Dissertations

Intrusion detection systems (IDSs) play a crucial role in the identification and mitigation for attacks on host systems. Of these systems, vehicular ad hoc networks (VANETs) are difficult to protect due to the dynamic nature of their clients and their necessity for constant interaction with their respective cyber-physical systems. Currently, there is a need for a VANET-specific IDS that meets this criterion. To this end, a spline-based intrusion detection system has been pioneered as a solution. By combining clustering with spline-based general linear model classification, this knot flow classification method (KFC) allows for robust intrusion detection to occur. Due its …


Fm Radio Signal Propagation Evaluation And Creating Statistical Models For Signal Strength Prediction In Differing Topographic Environments, Timothy Land May 2018

Fm Radio Signal Propagation Evaluation And Creating Statistical Models For Signal Strength Prediction In Differing Topographic Environments, Timothy Land

Electronic Theses and Dissertations

Radio wave signal strength and associated propagation models are rarely analyzed across individual geographic provinces. This study evaluates the effectiveness of the Radio Mobile model to predict radio wave signal strength in the Blue Ridge and Valley and Ridge physiographic provinces. A spectrum analyzer was used on 19 FM transmitters to determine model accuracy. Statistical analysis determined the significance between different terrain factors and signal strength. Field signal strength was found to be related to test site elevation, transmitter azimuth, elevation angle, transmitter elevation, path loss, and distance. Using 76 signal strength receiver sites, Ordinary Least Square regression models predicted …


File Fragment Classification Using Neural Networks With Lossless Representations, Luke Hiester May 2018

File Fragment Classification Using Neural Networks With Lossless Representations, Luke Hiester

Undergraduate Honors Theses

This study explores the use of neural networks as universal models for classifying file fragments. This approach differs from previous work in its lossless feature representation, with fragments’ bits as direct input, and its use of feedforward, recurrent, and convolutional networks as classifiers, whereas previous work has only tested feedforward networks. Due to the study’s exploratory nature, the models were not directly evaluated in a practical setting; rather, easily reproducible experiments were performed to attempt to answer the initial question of whether this approach is worthwhile to pursue further, especially due to its high computational cost. The experiments tested classification …


Ranking Methods For Global Optimization Of Molecular Structures, John Norman Mcmeen Jr Dec 2014

Ranking Methods For Global Optimization Of Molecular Structures, John Norman Mcmeen Jr

Electronic Theses and Dissertations

This work presents heuristics for searching large sets of molecular structures for low-energy, stable systems. The goal is to find the globally optimal structures in less time or by consuming less computational resources. The strategies intermittently evaluate and rank structures during molecular dynamics optimizations, culling possible weaker solutions from evaluations earlier, leaving better solutions to receive more simulation time. Although some imprecision was introduced from not allowing all structures to fully optimize before ranking, the strategies identify metrics that can be used to make these searches more efficient when computational resources are limited.


Client/Server Data Synchronization In Ios Development, Dmitry Tumanov Nov 2014

Client/Server Data Synchronization In Ios Development, Dmitry Tumanov

Undergraduate Honors Theses

Electronic gadgets such as touchpads and smartphones are becoming more popular in business and everyday life. The main advantage of mobile devices over personal computers is their portability. Cellular data plans allow Internet access without having permanent access point. There is a number of web-based applications available for gadgets. The primary goal of these apps is to provide their services through constant Internet access. However, it may affect the operation of both devices and applications. The objective of this thesis is to find a better way of client/server data synchronization in iOS development that can reduce the negative consequences of …


Development Of Etsu Student Life Android Application, Tyler L. Cox May 2014

Development Of Etsu Student Life Android Application, Tyler L. Cox

Undergraduate Honors Theses

In this thesis, the author gives a description his journey creating and developing a Student Life Application for East Tennessee State University. This thesis will document his process with development as well as reflect on the struggles and victories in creation of this application.