Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- San Jose State University (125)
- California Polytechnic State University, San Luis Obispo (63)
- Western University (63)
- Dakota State University (24)
- City University of New York (CUNY) (22)
-
- University of Tennessee, Knoxville (22)
- University of New Orleans (21)
- The University of Akron (20)
- University of Arkansas, Fayetteville (20)
- Bard College (18)
- Portland State University (15)
- East Tennessee State University (14)
- Louisiana State University (14)
- Dartmouth College (13)
- University of Denver (13)
- Boise State University (12)
- Claremont Colleges (12)
- Louisiana Tech University (11)
- Air Force Institute of Technology (10)
- California State University, San Bernardino (10)
- Nova Southeastern University (10)
- University of South Alabama (10)
- Virginia Commonwealth University (10)
- Clemson University (9)
- Chapman University (8)
- Georgia Southern University (8)
- Michigan Technological University (8)
- University of Louisville (8)
- West Virginia University (8)
- Eastern Washington University (7)
- Keyword
-
- Machine Learning (37)
- Machine learning (36)
- Computer Science (32)
- Deep learning (17)
- Natural language processing (16)
-
- Cybersecurity (14)
- Deep Learning (14)
- Android (12)
- Computer vision (12)
- Daniel Felix Ritchie School of Engineering and Computer Science (12)
- Classification (11)
- Education (10)
- Bioinformatics (9)
- Blockchain (9)
- Computer science (9)
- Music (9)
- Software (9)
- Applied sciences (8)
- Data mining (8)
- Natural Language Processing (8)
- Simulation (8)
- Visualization (8)
- Computer Vision (7)
- Optimization (7)
- CNN (6)
- IoT (6)
- Mobile (6)
- Neural Networks (6)
- Neural networks (6)
- Python (6)
- Publication Year
- Publication
-
- Master's Projects (125)
- Electronic Thesis and Dissertation Repository (63)
- Electronic Theses and Dissertations (39)
- Master's Theses (32)
- Theses and Dissertations (27)
-
- Masters Theses & Doctoral Dissertations (24)
- Doctoral Dissertations (21)
- University of New Orleans Theses and Dissertations (21)
- Williams Honors College, Honors Research Projects (20)
- Dissertations, Theses, and Capstone Projects (17)
- Computer Science and Computer Engineering Undergraduate Honors Theses (15)
- Computer Science and Software Engineering (14)
- Honors Theses (13)
- Undergraduate Honors Theses (13)
- Boise State University Theses and Dissertations (12)
- Computer Engineering (12)
- Dissertations and Theses (12)
- Masters Theses (12)
- CCE Theses and Dissertations (10)
- Electronic Theses, Projects, and Dissertations (10)
- Dissertations, Master's Theses and Master's Reports (8)
- Graduate Theses, Dissertations, and Problem Reports (8)
- <strong> Theses and Dissertations </strong> (7)
- All Dissertations (7)
- CMC Senior Theses (7)
- EWU Masters Thesis Collection (7)
- LSU Doctoral Dissertations (7)
- LSU Master's Theses (7)
- Theses and Dissertations--Computer Science (7)
- Graduate Student Theses, Dissertations, & Professional Papers (6)
Articles 1 - 30 of 762
Full-Text Articles in Physical Sciences and Mathematics
Open-Source Forensics Tools Are Great Tools For Critical Used Machines, Erik Herrera
Open-Source Forensics Tools Are Great Tools For Critical Used Machines, Erik Herrera
Electronic Theses and Dissertations
Open-Source software exists on everything from operating systems to daily productivity applications. In digital forensics, a very popular tool that is used to learn on and expand is Autopsy. Autopsy is known in the digital world due to its potential and wide usage. It is in many built packages of software inside the open-source world of applications. It is built into premade operating systems that are involved in Digital Forensics and Penetration Testing. Prebuilt OS includes Kali Linux and Computer Aided Investigative Environment (CAINE).
In the application to defend Open-Source software being just as good as closed-source software, I will …
Container Migration: A Perfomance Evaluation Between Migrror And Pre-Copy, Xinwen Liang
Container Migration: A Perfomance Evaluation Between Migrror And Pre-Copy, Xinwen Liang
Electronic Thesis and Dissertation Repository
The concept of migration and checkpoint/restore has been a very important topic in research for many types of applications including any distributed systems/applications or single massive systems/applications; and low latency vehicular use cases, augmented reality(AR) and virtual reality(VR) applications. Migrating a service requires that the state of the service is preserved. This requires checkpointing the state and restoring it on a different server in multiple rounds to avoid a total loss of all data in case of a failure, fault or error. There are many different types of migration techniques utilized such as cold migration, pre-copy migration, post-copy migration.
Compared …
Enabling Iov Communication Through Secure Decentralized Clustering Using Federated Deep Reinforcement Learning, Chandler Scott
Enabling Iov Communication Through Secure Decentralized Clustering Using Federated Deep Reinforcement Learning, Chandler Scott
Electronic Theses and Dissertations
The Internet of Vehicles (IoV) holds immense potential for revolutionizing transporta- tion systems by facilitating seamless vehicle-to-vehicle and vehicle-to-infrastructure communication. However, challenges such as congestion, pollution, and security per- sist, particularly in rural areas with limited infrastructure. Existing centralized solu- tions are impractical in such environments due to latency and privacy concerns. To address these challenges, we propose a decentralized clustering algorithm enhanced with Federated Deep Reinforcement Learning (FDRL). Our approach enables low- latency communication, competitive packet delivery ratios, and cluster stability while preserving data privacy. Additionally, we introduce a trust-based security framework for IoV environments, integrating a central authority …
Enabling Reproducibility, Scalability, And Orchestration Of Scientific Workflows In Hpc And Cloud-Converged Infrastructure, Paula Fernanda Olaya
Enabling Reproducibility, Scalability, And Orchestration Of Scientific Workflows In Hpc And Cloud-Converged Infrastructure, Paula Fernanda Olaya
Doctoral Dissertations
Scientific communities across different domains increasingly run complex workflows for their scientific discovery. Scientists require that these workflows ensure robustness; where workflows must be reproducible, scale in performance; and exhibit trustworthiness in terms of the computational techniques, infrastructures, and people. However, as scientists leverage advanced techniques (big data analytics, AI, and ML) and infrastructure (HPC and cloud), their workflows grow in complexity, leading to new challenges in scientific computing; hindering robustness.
In this dissertation, we address the needs of diverse scientific communities across different fields to identify three main challenges that hinder the robustness of workflows: (i) lack of traceability, …
Offensive Content Detection In Online Social Platforms, Ebuka Okpala
Offensive Content Detection In Online Social Platforms, Ebuka Okpala
All Dissertations
Online social platforms enable users to connect with large, diverse audiences and the ability for a message or content to flow from one user to another user, user to followers, followers to user, and followers to followers. Of course, the advantages of this are apparent, and the dangers are also clearly obvious. The user-generated content could be abusive, offensive, or hateful to other users, possibly leading to adverse health effects or offline harm. As more of society's public discourse and interaction move online and these platforms grow and increase their reach, it is inherently important to protect the safety of …
Ensuring The Privacy Compliance Of Voice Personal Assistant Applications, Song Liao
Ensuring The Privacy Compliance Of Voice Personal Assistant Applications, Song Liao
All Dissertations
Voice Personal Assistants (VPA) such as Amazon Alexa and Google Assistant are quickly and seamlessly integrating into people’s daily lives. Meanwhile, the increased reliance on VPA services raises privacy concerns, such as the leakage of private conversations and sensitive information. Privacy policies play an important role in addressing users’ privacy concerns and developers are required to provide privacy policies to disclose their apps’ data practices. In addition, voice apps targeting users in European countries are required to comply with the GDPR (General Data Protection Regulation). However, little is known about whether these privacy policies are informative and trustworthy on emerging …
Trust, Transparency, And Transport: The Impact Of Privacy Protection On The Acceptance Of Last-Mile Drone Delivery, Jurgen Heinz Famula
Trust, Transparency, And Transport: The Impact Of Privacy Protection On The Acceptance Of Last-Mile Drone Delivery, Jurgen Heinz Famula
Electronic Theses and Dissertations
A common set of problems commercial delivery companies face is finding ways to increase the efficiency and reliability of the “last mile” of a package’s journey, all while reducing operating costs. This need for efficiency has driven many companies to explore using unmanned aerial vehicles (UAVs), or drones, to get packages to their final destination. Although UAVs have great potential to help increase efficiency in commercial package delivery, this comes at a potential cost to the privacy of people who intersect the flight paths of these unmanned vehicles. This thesis explores the effect of a mobile phone application for commercial …
Cards With Class: Formalizing A Simplified Collectible Card Game, Dan Ha
Cards With Class: Formalizing A Simplified Collectible Card Game, Dan Ha
University Honors Theses
Collectible card games (CCGs) have been a wildly popular game genre since the release of Wizards of the Coast's Magic: The Gathering. These games revolve around their thousands of cards and the hundreds of thousands of interactions they can create with their many effects. For designers, it is an incredibly demanding task to ensure that every single card works properly and that each card's text unambiguously conveys its intended behavior in all cases. The task only grows more difficult over time as the number of cards in the game grows and card effects become more complex or experimental. If the …
The Institutional Challenges Of A Quantified Self Study: An Attempt To Ascertain How Data Collected From A Mobile Device Can Be An Indicator Of Personal Mental Health Over Time, Julian Lazaras
University Honors Theses
The adoption of an application of new technology always comes with a bias, this is never more true for the case of human behavioral analytics within higher education. While movements such as the quantified self movement make strides to reinterpret the realm of data analytics, psychology, and computer science, there are inevitably limitations to the adoption and application of such approaches within the standard realm of research. Herein is presented a case where an effort to evaluate the prospect of use of mobile phone data as secondary indicators of personal mental health through the lens of data analysis was put …
Context In Computer Vision: A Taxonomy, Multi-Stage Integration, And A General Framework, Xuan Wang
Context In Computer Vision: A Taxonomy, Multi-Stage Integration, And A General Framework, Xuan Wang
Dissertations, Theses, and Capstone Projects
Contextual information has been widely used in many computer vision tasks, such as object detection, video action detection, image classification, etc. Recognizing a single object or action out of context could be sometimes very challenging, and context information may help improve the understanding of a scene or an event greatly. However, existing approaches design specific contextual information mechanisms for different detection tasks.
In this research, we first present a comprehensive survey of context understanding in computer vision, with a taxonomy to describe context in different types and levels. Then we proposed MultiCLU, a new multi-stage context learning and utilization framework, …
Combining Cloud Architecting With Education, Sharon P. Pagidipati
Combining Cloud Architecting With Education, Sharon P. Pagidipati
Liberal Arts and Engineering Studies
I pursued the AWS Solutions Architect Professional Certification while applying my knowledge to build and revise technical solutions for an educational company known as EDFX.
Toward The Integration Of Behavioral Sensing And Artificial Intelligence, Subigya K. Nepal
Toward The Integration Of Behavioral Sensing And Artificial Intelligence, Subigya K. Nepal
Dartmouth College Ph.D Dissertations
The integration of behavioral sensing and Artificial Intelligence (AI) has increasingly proven invaluable across various domains, offering profound insights into human behavior, enhancing mental health monitoring, and optimizing workplace productivity. This thesis presents five pivotal studies that employ smartphone, wearable, and laptop-based sensing to explore and push the boundaries of what these technologies can achieve in real-world settings. This body of work explores the innovative and practical applications of AI and behavioral sensing to capture and analyze data for diverse purposes. The first part of the thesis comprises longitudinal studies on behavioral sensing, providing a detailed, long-term view of how …
An Exploration Of Procedural Methods In Game Level Design, Hector Salinas
An Exploration Of Procedural Methods In Game Level Design, Hector Salinas
Computer Science and Computer Engineering Undergraduate Honors Theses
Video games offer players immersive experiences within intricately crafted worlds, and the integration of procedural methods in game level designs extends this potential by introducing dynamic, algorithmically generated content that could stand on par with handcrafted environments. This research highlights the potential to provide players with engaging experiences through procedural level generation, while potentially reducing development time for game developers.
Through a focused exploration on two-dimensional cave generation techniques, this paper aims to provide efficient solutions tailored to this specific environment. This exploration encompasses several procedural generation methods, including Midpoint Displacement, Random Walk, Cellular Automata, Perlin Worms, and Binary Space …
Automated Cinematographer For Vr Viewing Experiences, Zihan Wu
Automated Cinematographer For Vr Viewing Experiences, Zihan Wu
Dartmouth College Master’s Theses
As the virtual reality (VR) industry continues to evolve, the question of how to effectively capture VR experiences for an audience remains a challenge. The predominant method of showcasing VR applications through first-person recordings lacks cinematic interest, failing to capture other viewpoints and the essence of the moment. Meanwhile, manually setting up cameras and editing videos requires technical expertise on behalf of the user. In this paper, we propose the use of machine learning (ML) to automatically select the most compelling predefined viewpoint in a VR environment, at any given moment. Our models, trained on actor motion and voice volume, …
Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy
Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy
Theses/Capstones/Creative Projects
Cryptocurrencies rely on a distributed public ledger (record of transactions) in order to perform their intended functions. However, the public’s ability to audit the network is both its greatest strength and greatest weakness: Anyone can see what address sent currency, and to whom the currency was sent. If cryptocurrency is ever going to take some of the responsibility of fiat currency, then there needs to be a certain level of confidentiality. Thus far, Monero has come out on top as the preferred currency for embodying the ideas of privacy and confidentiality. Through numerous cryptographic procedures, Monero is able to obfuscate …
Improving The Scalability Of Neural Network Surface Code Decoders, Kevin Wu
Improving The Scalability Of Neural Network Surface Code Decoders, Kevin Wu
Undergraduate Honors Theses
Quantum computers have recently gained significant recognition due to their ability to solve problems intractable to classical computers. However, due to difficulties in building actual quantum computers, they have large error rates. Thus, advancements in quantum error correction are urgently needed to improve both their reliability and scalability. Here, we first present a type of topological quantum error correction code called the surface code, and we discuss recent developments and challenges of creating neural network decoders for surface codes. In particular, the amount of training data needed to reach the performance of algorithmic decoders grows exponentially with the size of …
Comparative Predictive Analysis Of Stock Performance In The Tech Sector, Asaad Sendi
Comparative Predictive Analysis Of Stock Performance In The Tech Sector, Asaad Sendi
University of New Orleans Theses and Dissertations
This study compares the performance of deep learning models, including Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), and Transformer, in predicting stock prices across five companies (AAPL, CSCO, META, MSFT, and TSLA) from July 2019 to July 2023. Key findings reveal that GRU models generally exhibit the lowest Mean Absolute Error (MAE), indicating higher precision, particularly notable for CSCO with a remarkably low MAE. While LSTM models often show slightly higher MAE values, they outperform Transformer models in capturing broader trends and variance in stock prices, as evidenced by higher R-squared (R2) values. Transformer models generally exhibit higher MAE …
Choreographing The Rhythms Of Observation: Dynamics For Ranged Observer Bipartite-Unipartite Spatiotemporal (Robust) Networks, Edward A. Holmberg Iv
Choreographing The Rhythms Of Observation: Dynamics For Ranged Observer Bipartite-Unipartite Spatiotemporal (Robust) Networks, Edward A. Holmberg Iv
University of New Orleans Theses and Dissertations
Existing network analysis methods struggle to optimize observer placements in dynamic environments with limited visibility. This dissertation introduces the novel ROBUST (Ranged Observer Bipartite-Unipartite SpatioTemporal) framework, offering a significant advancement in modeling, analyzing, and optimizing observer networks within complex spatiotemporal domains. ROBUST leverages a unique bipartite-unipartite approach, distinguishing between observer and observable entities while incorporating spatial constraints and temporal dynamics.
This research extends spatiotemporal network theory by introducing novel graph-based measures, including myopic degree, spatial closeness centrality, and edge length proportion. These measures, coupled with advanced clustering techniques like Proximal Recurrence, provide insights into network structure, resilience, and the effectiveness …
The Pawn System: How Procedurally Adaptive Webbed Narratives Create Stories, Steven T. Bordelon
The Pawn System: How Procedurally Adaptive Webbed Narratives Create Stories, Steven T. Bordelon
University of New Orleans Theses and Dissertations
This thesis describes the design, implementation, and testing of a novel procedural narrative system called the Procedurally Adaptive Webbed Narrative (PAWN) system. PAWN procedurally generates characters and, responding to choices made by the player, produces more responsive characters and relationships involving the player and these narrative agents. Initially, this thesis discusses other interactive narrative types that exist, such as emergent or event-driven narratives, along with their strengths and weaknesses. It then examines each aspect of PAWN, starting with initial actor generation, then moving to the capturing of game events and translating them into logical objects called Occurrences. These Occurrences are …
Classification Of Remote Sensing Image Data Using Rsscn-7 Dataset, Satya Priya Challa
Classification Of Remote Sensing Image Data Using Rsscn-7 Dataset, Satya Priya Challa
Electronic Theses, Projects, and Dissertations
A novel technique for remote sensing image scene classification is employed using the Compact Vision Transformer (CVT) architecture. This model strengthens the power of deep learning and self-attention algorithms to significantly intensify the accuracy and efficiency of scene classification in remote sensing imagery. Through extensive training and evaluation of the RSSCNN7 dataset, our CVT-based model has achieved an impressive accuracy rate of 87.46% on the original dataset. This remarkable result underscores the prospect of CVT models in the domain of remote sensing and underscores their applicability in real-world scenarios. Our report furnishes an elaborate account of the model's architecture, training …
Crash Detecting System Using Deep Learning, Yogesh Reddy Muddam
Crash Detecting System Using Deep Learning, Yogesh Reddy Muddam
Electronic Theses, Projects, and Dissertations
Accidents pose a significant risk to both individual and property safety, requiring effective detection and response systems. This work introduces an accident detection system using a convolutional neural network (CNN), which provides an impressive accuracy of 86.40%. Trained on diverse data sets of images and videos from various online sources, the model exhibits complex accident detection and classification and is known for its prowess in image classification and visualization.
CNN ensures better accident detection in various scenarios and road conditions. This example shows its adaptability to a real-world accident scenario and enhances its effectiveness in detecting early events. A key …
Multi-Script Handwriting Identification By Fragmenting Strokes, Joshua Jude Thomas
Multi-Script Handwriting Identification By Fragmenting Strokes, Joshua Jude Thomas
<strong> Theses and Dissertations </strong>
This study tests the effectiveness of Multi-Script Handwriting Identification after simplifying character strokes, by segmenting them into sub-parts. Character simplification is performed through splitting the character by branching-points and end-points, a process called stroke fragmentation in this study. The resulting sub-parts of the character are called stroke fragments and are evaluated individually to identify the writer. This process shares similarities with the concept of stroke decomposition in Optical Character Recognition which attempts to recognize characters through the writing strokes that make them up. The main idea of this study is that the characters of different writing‑scripts (English, Chinese, etc.) may …
Examining Outcomes Of Privacy Risk And Brand Trust On The Adoption Of Consumer Smart Devices, Marianne C. Loes
Examining Outcomes Of Privacy Risk And Brand Trust On The Adoption Of Consumer Smart Devices, Marianne C. Loes
<strong> Theses and Dissertations </strong>
With more connected devices on earth than there are people, Internet of Things (IoT) is arguably just as innovative as the original introduction of the Internet. Though much of the research on technology acceptance and adoption has been conducted in organizational settings, the consumer use of IoT technologies, such as smart devices, is becoming a fertile field of research. The merger of these research streams is especially relevant from a societal perspective as smart devices become more embedded in consumer’s daily lives, particularly with the introduction of the “meta verse.” While original technology acceptance research is limited to two system-specific …
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Honors Theses
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Graph-Based Learning, Jason Gronn
Graph-Based Learning, Jason Gronn
Honors Projects
An educational approach to teaching students based on prerequisite knowledge they may or may not have is presented. This approach represents educational content in the form of a graph, where edges link each topic to the prerequisites of that topic. A proof-of-concept website is created based on this approach, where qualitative results are observed and a number of conclusions are drawn. Some of the findings are that, while it can prevent users from being confused by lacked prior knowledge, the users may instead be confused by the presentation of the graph structure. The work finds that the approach is workable, …
A Survey Of The Murray State University Csis Department Of Student And Instructor Attitudes In Relation To Earlier Introduction Of Version Control Systems, Gavin Johnson
Honors College Theses
Over the previous 20 years, the software development industry has overseen an evolution in application of Version Control Systems (VCS) from a Centralized Version Control System (CVCS) format to a Decentralized Version Control Format (DVCS). Examples of the former include Perforce and Subversion whilst the latter of the two include Github and BitBucket. As DVCS models allow software contributors to maintain their respective local repositories of relevant code bases, developers are able to work offline and maintain their work with relative fault tolerance. This contrasts to CVCS models, which require software contributors to be connected online to a main server. …
A System Of Communication Between Two Computers Using Novel Frequency Shift Keying Techniques, Jared Reyes
A System Of Communication Between Two Computers Using Novel Frequency Shift Keying Techniques, Jared Reyes
Honors Thesis
Frequency shift keying (FSK) is an old but powerful form of modulation that powered much of the early modems of the 1960’s, and the author felt inspired to make his own version of audio binary FSK modulation. He researched the general history and legacy of the Bell 103, a modem using FSK that defined telecommunication for the next few decades. Using research of the most common English characters of recent emails to determine which English characters should have the shortest bit length, a novel character encoding standard was created using variable bit rate. In addition, he has created a modulation …
Gradual Memory Safety, Jack Phillips
Gradual Memory Safety, Jack Phillips
All NMU Master's Theses
This paper extends the theory of Gradual Types to include memory safe Region-Types and Region-Based Memory Management. It also makes advancements in the capabilities of Region-Based systems. Lastly, it presents the Svejk language and Hasek Type System.
Sensor Analytics For Subsea Pipeline And Cable Inspection: A Review, Connor R. Vincent
Sensor Analytics For Subsea Pipeline And Cable Inspection: A Review, Connor R. Vincent
LSU Master's Theses
Submarine pipelines and cables are vital for transmitting physical and digital resources across bodies of water, necessitating regular inspection to assess maintenance needs. The safety of subsea pipelines and cables is paramount for sustaining industries such as telecommunications, power transmission, water supply, waste management, and oil and gas. Incidents like those involving the Nord Stream subsea pipeline and the SEA-ME-WE 4 subsea communications cable exemplify the severe economic and environmental consequences of damage to these critical infrastructures. Existing inspection methods often fail to meet accuracy requirements, emphasizing the need for advancements in inspection technologies. This comprehensive survey covers the sensors …
An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley
An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley
LSU Master's Theses
The growing cybersecurity workforce gap underscores the urgent need to address deficiencies in cybersecurity education: the current education system is not producing competent cybersecurity professionals, and current efforts are not informing the non-technical general public of basic cybersecurity practices. We argue that this gap is compounded by a fundamental disconnect between cybersecurity education literature and established education theory. Our research addresses this issue by examining the alignment of cybersecurity education literature concerning educational methods and tools with education literature.
In our research, we endeavor to bridge this gap by critically analyzing the alignment of cybersecurity education literature with education theory. …