Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- San Jose State University (19)
- The University of Akron (5)
- Clemson University (4)
- University of South Alabama (4)
- East Tennessee State University (3)
-
- University of Arkansas, Fayetteville (3)
- University of Denver (3)
- Western University (3)
- California State University, San Bernardino (2)
- Columbus State University (2)
- James Madison University (2)
- Michigan Technological University (2)
- University of Kentucky (2)
- University of Nebraska at Omaha (2)
- West Virginia University (2)
- American University in Cairo (1)
- Central Washington University (1)
- Dartmouth College (1)
- DePaul University (1)
- Duquesne University (1)
- Georgia Southern University (1)
- Grand Valley State University (1)
- Louisiana State University (1)
- Loyola Marymount University and Loyola Law School (1)
- Missouri State University (1)
- New Jersey Institute of Technology (1)
- Seattle Pacific University (1)
- Texas A&M University-San Antonio (1)
- The University of Maine (1)
- University of Louisville (1)
- Keyword
-
- Cybersecurity (6)
- Computer Science (4)
- Machine Learning (4)
- Machine learning (4)
- Blockchain (3)
-
- Daniel Felix Ritchie School of Engineering and Computer Science (3)
- Deep Learning (3)
- Natural language processing (3)
- Python (3)
- Algorithms (2)
- Artificial Intelligence (2)
- Ethics (2)
- Neural Networks (2)
- Penetration Testing (2)
- Simulation (2)
- SpartanGold (2)
- AI (1)
- API (1)
- Adaptive experiences (1)
- Adaptive feedback (1)
- Additive manufacturing (1)
- Affect detection (1)
- Air Traffic Control (1)
- Airport Assignment (1)
- Algorand (1)
- Algorithm (1)
- Algorithmic bias (1)
- Algorithmic justice (1)
- Analysis (1)
- Android (1)
- Publication
-
- Master's Projects (19)
- Electronic Theses and Dissertations (8)
- Williams Honors College, Honors Research Projects (5)
- Theses and Dissertations (4)
- <strong> Theses and Dissertations </strong> (3)
-
- All Dissertations (3)
- Computer Science and Computer Engineering Undergraduate Honors Theses (3)
- Electronic Thesis and Dissertation Repository (3)
- Masters Theses (3)
- Undergraduate Honors Theses (3)
- Dissertations, Master's Theses and Master's Reports (2)
- Electronic Theses, Projects, and Dissertations (2)
- Graduate Theses, Dissertations, and Problem Reports (2)
- Senior Honors Projects, 2020-current (2)
- Theses and Dissertations--Computer Science (2)
- Theses/Capstones/Creative Projects (2)
- All Master's Theses (1)
- All Theses (1)
- College of Computing and Digital Media Dissertations (1)
- Computer Science ETDs (1)
- Dartmouth College Ph.D Dissertations (1)
- Dissertations (1)
- Honors College Theses (1)
- Honors Projects (1)
- Honors Theses (1)
- Honors Thesis (1)
- LSU Doctoral Dissertations (1)
- MSU Graduate Theses (1)
Articles 1 - 30 of 78
Full-Text Articles in Physical Sciences and Mathematics
Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System For Efficient, Sustainable, And Self-Adaptive Urban Environments, Elham Okhovat
Electronic Thesis and Dissertation Repository
This thesis proposes the concept of the Policy-based Autonomic Smart City Management System, an innovative framework designed to comprehensively manage diverse aspects of urban environments, ranging from environmental conditions such as temperature and air quality to the infrastructure which comprises multiple layers of infrastructure, from sensors and devices to advanced IoT platforms and applications. Efficient management requires continuous monitoring of devices and infrastructure, data analysis, and real-time resource assessment to ensure seamless city operations and improve residents' quality of life. Automating data monitoring is essential due to the vast array of hardware and data exchanges, and round-the-clock monitoring is critical. …
Computational Study Of The Effect Of Geometry On Molecular Interactions, Sarika Kumar
Computational Study Of The Effect Of Geometry On Molecular Interactions, Sarika Kumar
Computer Science ETDs
The specificity and predictability of DNA make it an excellent programmable material and have allowed bio-programmers to build sophisticated molecular circuits. These molecular devices should be precise, correct, and function as intended. In order to implement these circuits, the challenge is to build a robust, reliable, and scalable logic circuit with ideally minimum unwanted signal release. Performing experiments are expensive and time-consuming, so modeling and analyzing these bio-molecular systems become crucial in designing molecular circuits. This dissertation aimed to develop algorithms and build computational tools for automated analysis of molecular circuits that incorporate the molecular geometry of nanostructures. Molecular circuits …
Overcoming Foreign Language Anxiety In An Emotionally Intelligent Tutoring System, Daneih Ismail
Overcoming Foreign Language Anxiety In An Emotionally Intelligent Tutoring System, Daneih Ismail
College of Computing and Digital Media Dissertations
Learning a foreign language entails cognitive and emotional obstacles. It involves complicated mental processes that affect learning and emotions. Positive emotions such as motivation, encouragement, and satisfaction increase learning achievement, while negative emotions like anxiety, frustration, and confusion may reduce performance. Foreign Language Anxiety (FLA) is a specific type of anxiety accompanying learning a foreign language. It is considered a main impediment that hinders learning, reduces achievements, and diminishes interest in learning.
Detecting FLA is the first step toward reducing and eventually overcoming it. Previously, researchers have been detecting FLA using physical measurements and self-reports. Using physical measures is direct …
Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett
Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett
<strong> Theses and Dissertations </strong>
Over the last two decades, side-channel vulnerabilities have shown to be a major threat to embedded devices. Most side-channel research has developed our understanding of the vulnerabilities to cryptographic devices due to their implementation and how we can protect them. However, side-channel leakage can yield useful information about many other processes that run on the device. One promising area that has received little attention is the side-channel leakage due to the execution of assembly instructions. There has been some work in this area that has demonstrated the idea’s potential, but so far, this research has assumed the adversary has physical …
Hypothyroid Disease Analysis By Using Machine Learning, Sanjana Seelam
Hypothyroid Disease Analysis By Using Machine Learning, Sanjana Seelam
Electronic Theses, Projects, and Dissertations
Thyroid illness frequently manifests as hypothyroidism. It is evident that people with hypothyroidism are primarily female. Because the majority of people are unaware of the illness, it is quickly becoming more serious. It is crucial to catch it early on so that medical professionals can treat it more effectively and prevent it from getting worse. Machine learning illness prediction is a challenging task. Disease prediction is aided greatly by machine learning. Once more, unique feature selection strategies have made the process of disease assumption and prediction easier. To properly monitor and cure this illness, accurate detection is essential. In order …
Explainable Artificial Intelligence: Approaching It From The Lowest Level, Ralf P. Riedel
Explainable Artificial Intelligence: Approaching It From The Lowest Level, Ralf P. Riedel
<strong> Theses and Dissertations </strong>
The increasing complexity of artificial intelligence models has given rise to extensive work toward understanding the inner workings of neural networks. Much of that work, however, has focused on manipulating input data feeding the network to assess their affects on network output or pruning model components after the often-extensive time-consuming training. It is postulated in this study that understanding of neural network can benefit from model structure simplification. In turn, it is shown that model simplification can benefit from investigating network node, the most fundamental unit of neural networks, evolving trends during training. Whereas studies on simplification of model structure …
Review Classification Using Natural Language Processing And Deep Learning, Brian Nazareth
Review Classification Using Natural Language Processing And Deep Learning, Brian Nazareth
Electronic Theses, Projects, and Dissertations
Sentiment Analysis is an ongoing research in the field of Natural Language Processing (NLP). In this project, I will evaluate my testing against an Amazon Reviews Dataset, which contains more than 100 thousand reviews from customers. This project classifies the reviews using three methods – using a sentiment score by comparing the words of the reviews based on every positive and negative word that appears in the text with the Opinion Lexicon dataset, by considering the text’s variating sentiment polarity scores with a Python library called TextBlob, and with the help of neural network training. I have created a neural …
Enhanced Content-Based Fake News Detection Methods With Context-Labeled News Sources, Duncan Arnfield
Enhanced Content-Based Fake News Detection Methods With Context-Labeled News Sources, Duncan Arnfield
Electronic Theses and Dissertations
This work examined the relative effectiveness of multilayer perceptron, random forest, and multinomial naïve Bayes classifiers, trained using bag of words and term frequency-inverse dense frequency transformations of documents in the Fake News Corpus and Fake and Real News Dataset. The goal of this work was to help meet the formidable challenges posed by proliferation of fake news to society, including the erosion of public trust, disruption of social harmony, and endangerment of lives. This training included the use of context-categorized fake news in an effort to enhance the tools’ effectiveness. It was found that term frequency-inverse dense frequency provided …
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Honors Theses
Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …
Performative Mixing For Immersive Audio, Brian A. Elizondo
Performative Mixing For Immersive Audio, Brian A. Elizondo
LSU Doctoral Dissertations
Immersive multichannel audio can be produced with specialized setups of loudspeakers, often surrounding the audience. These setups can feature as few as four loudspeakers or more than 300. Performative mixing in these environments requires a bespoke solution offering intuitive gestural control. Beyond the usual faders for gain control, advancements in multichannel sound demand interfaces capable of quickly positioning sounds between channels. The Quad Cartesian Positioner is such a solution in the form of a Eurorack module for surround mixing for use in live or studio performances.
Diffusion/mixing methods for live multichannel immersive music often rely on the repurposing of hardware …
Enhancing Search Engine Results: A Comparative Study Of Graph And Timeline Visualizations For Semantic And Temporal Relationship Discovery, Muhammad Shahiq Qureshi
Enhancing Search Engine Results: A Comparative Study Of Graph And Timeline Visualizations For Semantic And Temporal Relationship Discovery, Muhammad Shahiq Qureshi
Electronic Theses and Dissertations
In today’s digital age, search engines have become indispensable tools for finding information among the corpus of billions of webpages. The standard that most search engines follow is to display search results in a list-based format arranged according to a ranking algorithm. Although this format is good for presenting the most relevant results to users, it fails to represent the underlying relations between different results. These relations, among others, can generally be of either a temporal or semantic nature. A user who wants to explore the results that are connected by those relations would have to make a manual effort …
Local Model Agnostic Xai Methodologies Applied To Breast Cancer Malignancy Predictions, Heather Hartley
Local Model Agnostic Xai Methodologies Applied To Breast Cancer Malignancy Predictions, Heather Hartley
Electronic Thesis and Dissertation Repository
This thesis examines current state-of-the-art Explainable Artificial Intelligence (XAI) methodologies applicable to breast cancer diagnostics, as well as local model-agnostic XAI methodologies more broadly. It is well known that AI is underutilized in healthcare due to the fact that black box AI methods are largely uninterpretable. The potential for AI to positively affect health care outcomes is massive, and AI adoption by medical practitioners and the community at large will translate to more desirable patient outcomes. The development of XAI is crucial to furthering the integration of AI within healthcare, as it will allow medical practitioners and regulatory bodies to …
Smart Homes And You: Iot Device Data Risks In An Ever-Changing World, Autumn Person
Smart Homes And You: Iot Device Data Risks In An Ever-Changing World, Autumn Person
Theses and Dissertations
Social media applications are increasingly seen as a national security threat and a cause for concern because they can be used to create user profiles on government personnel and on US citizens. These profiles could be used for big data and artificial intelligence purposes of interest to foreign governments. With the rise of big data and AI being used, foreign governments could use this data for a variety of purposes that can affect normal everyday citizens, not just high value personnel. IoT (Internet of Things) devices that the population uses everyday can also pose the same threat. These devices can …
Docker Technology For Small Scenario-Based Excercises In Cybersecurity, Zeinab Ahmed
Docker Technology For Small Scenario-Based Excercises In Cybersecurity, Zeinab Ahmed
Theses and Dissertations
This study aims to better prepare students for cybersecurity roles by providing practical tools that bridge the gap between theory and real-world applications. We investigate the role of small scenario-based exercises for students’ understanding of cybersecurity concepts. In particular, we assess the use of Docker technology to deliver training that includes a simple small scenario on html code injection. The effectiveness of scenario-based learning has long been defined and by using SBL, we are going to create hands-on activity that involves the fundamental topics in cybersecurity using Docker technology, allowing students to see the exploitation of the vulnerabilities and defense …
Diversification And Fairness In Top-K Ranking Algorithms, Mahsa Asadi
Diversification And Fairness In Top-K Ranking Algorithms, Mahsa Asadi
Dissertations
Given a user query, the typical user interfaces, such as search engines and recommender systems, only allow a small number of results to be returned to the user. Hence, figuring out what would be the top-k results is an important task in information retrieval, as it helps to ensure that the most relevant results are presented to the user. There exists an extensive body of research that studies how to score the records and return top-k to the user. Moreover, there exists an extensive set of criteria that researchers identify to present the user with top-k results, and result diversification …
Intrusion Detection: Machine Learning Techniques For Software Defined Networks, Jacob S. Rodriguez
Intrusion Detection: Machine Learning Techniques For Software Defined Networks, Jacob S. Rodriguez
Masters Theses
In recent years, software defined networking (SDN) has gained popularity as a novel approach towards network management and architecture. Compared to traditional network architectures, this software-based approach offers greater flexibility, programmability, and automation. However, despite the advantages of this system, there still remains the possibility that it could be compromised. As we continue to explore new approaches to network management, we must also develop new ways of protecting those systems from threats. Throughout this paper, I will describe and test a network intrusion detection system (NIDS), and how it can be implemented within a software defined network. This system will …
Self-Supervised Pretraining And Transfer Learning On Fmri Data With Transformers, Sean Paulsen
Self-Supervised Pretraining And Transfer Learning On Fmri Data With Transformers, Sean Paulsen
Dartmouth College Ph.D Dissertations
Transfer learning is a machine learning technique founded on the idea that knowledge acquired by a model during “pretraining” on a source task can be transferred to the learning of a target task. Successful transfer learning can result in improved performance, faster convergence, and reduced demand for data. This technique is particularly desirable for the task of brain decoding in the domain of functional magnetic resonance imaging (fMRI), wherein even the most modern machine learning methods can struggle to decode labelled features of brain images. This challenge is due to the highly complex underlying signal, physical and neurological differences between …
Proposing A Measure Of Ethicality For Humans And Ai, Alejandro Jorge Napolitano Jawerbaum
Proposing A Measure Of Ethicality For Humans And Ai, Alejandro Jorge Napolitano Jawerbaum
Electronic Theses and Dissertations
Smarter people or intelligent machines are able to make more accurate inferences about their environment and other agents more efficiently than less intelligent agents. Formally: ‘Intelligence measures an agent’s ability to achieve goals in a wide range of environments.’ (Legg, 2008)
In this dissertation we extend this definition to include ethical behaviour and we will offer a mathematical formalism and a way to estimate how ethical an action is or will be, both for a human and for a computer, by calculating the expected values of random variables. Formally, we propose the following measure of ethicality, which is computable, or …
All Hands On Deck: Choosing Virtual End Effector Representations To Improve Near Field Object Manipulation Interactions In Extended Reality, Roshan Venkatakrishnan
All Hands On Deck: Choosing Virtual End Effector Representations To Improve Near Field Object Manipulation Interactions In Extended Reality, Roshan Venkatakrishnan
All Dissertations
Extended reality, or "XR", is the adopted umbrella term that is heavily gaining traction to collectively describe Virtual reality (VR), Augmented reality (AR), and Mixed reality (MR) technologies. Together, these technologies extend the reality that we experience either by creating a fully immersive experience like in VR or by blending in the virtual and "real" worlds like in AR and MR.
The sustained success of XR in the workplace largely hinges on its ability to facilitate efficient user interactions. Similar to interacting with objects in the real world, users in XR typically interact with virtual integrants like objects, menus, windows, …
Epileptic Seizure Classification Using Image-Based Data Representation, Amber Surles
Epileptic Seizure Classification Using Image-Based Data Representation, Amber Surles
<strong> Theses and Dissertations </strong>
Epilepsy is a recurrence of seizures caused by a disorder of the brain in over 3.4 million people nationwide. Some people are able to predict their seizures based off prodrome, which is an early sign or symptom that usually resembles mood changes or a euphoric feeling even days to an hour before occurrence. Consequently, the natural instincts of the body to react to an upcoming attack lends credence to the existence of a pre-ictal state that precedes seizure episodes. Physicians and researchers have thus sought for an automated approach for predicting or detecting seizures.
In this research, we evaluate the …
The Effects Of Primary And Secondary Task Workloads On Cybersickness In Immersive Virtual Active Exploration Experiences, Rohith Venkatakrishnan
The Effects Of Primary And Secondary Task Workloads On Cybersickness In Immersive Virtual Active Exploration Experiences, Rohith Venkatakrishnan
All Dissertations
Virtual reality (VR) technology promises to transform humanity. The technology enables users to explore and interact with computer-generated environments that can be simulated to approximate or deviate from reality. This creates an endless number of ways to propitiously apply the technology in our lives. It follows that large technological conglomerates are pushing for the widespread adoption of VR, financing the creation of the Metaverse - a hypothetical representation of the next iteration of the internet.
Even with VR technology's continuous growth, its widespread adoption remains long overdue. This can largely be attributed to an affliction called cybersickness, an analog to …
Understanding The Role Of Interactivity And Explanation In Adaptive Experiences, Lijie Guo
Understanding The Role Of Interactivity And Explanation In Adaptive Experiences, Lijie Guo
All Dissertations
Adaptive experiences have been an active area of research in the past few decades, accompanied by advances in technology such as machine learning and artificial intelligence. Whether the currently ongoing research on adaptive experiences has focused on personalization algorithms, explainability, user engagement, or privacy and security, there is growing interest and resources in developing and improving these research focuses. Even though the research on adaptive experiences has been dynamic and rapidly evolving, achieving a high level of user engagement in adaptive experiences remains a challenge. %????? This dissertation aims to uncover ways to engage users in adaptive experiences by incorporating …
A Data-Driven Multi-Regime Approach For Predicting Real-Time Energy Consumption Of Industrial Machines., Abdulgani Kahraman
A Data-Driven Multi-Regime Approach For Predicting Real-Time Energy Consumption Of Industrial Machines., Abdulgani Kahraman
Electronic Theses and Dissertations
This thesis focuses on methods for improving energy consumption prediction performance in complex industrial machines. Working with real-world industrial machines brings several challenges, including data access, algorithmic bias, data privacy, and the interpretation of machine learning algorithms. To effectively manage energy consumption in the industrial sector, it is essential to develop a framework that enhances prediction performance, reduces energy costs, and mitigates air pollution in heavy industrial machine operations. This study aims to assist managers in making informed decisions and driving the transition towards green manufacturing. The energy consumption of industrial machinery is substantial, and the recent increase in CO2 …
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Electronic Thesis and Dissertation Repository
In today’s data-driven world, Information Systems, particularly the ones operating in regulated industries, require comprehensive security frameworks to protect against loss of confidentiality, integrity, or availability of data, whether due to malice, accident or otherwise. Once such a security framework is in place, an organization must constantly monitor and assess the overall compliance of its systems to detect and rectify any issues found. This thesis presents a technique and a supporting toolkit to first model dependencies between security policies (referred to as controls) and, second, devise models that associate risk with policy violations. Third, devise algorithms that propagate risk when …
A Multimodal Immune System Inspired Defense Architecture For Detecting And Deterring Digital Pathogens In Container Hosted Web Services, Islam Khalil
Theses and Dissertations
With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down …
An Investigation Into Machine Learning Techniques For Designing Dynamic Difficulty Agents In Real-Time Games, Ryan Adare Dunagan
An Investigation Into Machine Learning Techniques For Designing Dynamic Difficulty Agents In Real-Time Games, Ryan Adare Dunagan
Electronic Theses and Dissertations
Video games are an incredibly popular pastime enjoyed by people of all ages world wide. Many different kinds of games exist, but most games feature some elements of the player overcoming some challenge, usually through gameplay. These challenges are insurmountable for some people and may turn them off to video games as a pastime. Games can be made more accessible to players of little skill and/or experience through the use of Dynamic Difficulty Adjustment (DDA) systems that adjust the difficulty of the game in response to the player’s performance. This research seeks to establish the effectiveness of machine learning techniques …
Novel Approach For Non-Invasive Prediction Of Body Shape And Habitus, Emma Young
Novel Approach For Non-Invasive Prediction Of Body Shape And Habitus, Emma Young
Electronic Theses and Dissertations
While marker-based motion capture remains the gold standard in measuring human movement, accuracy is influenced by soft-tissue artifacts, particularly for subjects with high body mass index (BMI) where markers are not placed close to the underlying bone. Obesity influences joint loads and motion patterns, and BMI may not be sufficient to capture the distribution of a subject’s weight or to differentiate differences between subjects. Subjects in need of a joint replacement are more likely to have mobility issues or pain, which prevents exercise. Obesity also increases the likelihood of needing a total joint replacement. Accurate movement data for subjects with …
Algorithmic Bias: Causes And Effects On Marginalized Communities, Katrina M. Baha
Algorithmic Bias: Causes And Effects On Marginalized Communities, Katrina M. Baha
Undergraduate Honors Theses
Individuals from marginalized backgrounds face different healthcare outcomes due to algorithmic bias in the technological healthcare industry. Algorithmic biases, which are the biases that arise from the set of steps used to solve or analyze a problem, are evident when people from marginalized communities use healthcare technology. For example, many pulse oximeters, which are the medical devices used to measure oxygen saturation in the blood, are not able to accurately read people who have darker skin tones. Thus, people with darker skin tones are not able to receive proper health care due to their pulse oximetry data being inaccurate. This …
Creating Project Contrast: A Video Game Exploring Consciousness And Qualia, Pierce Papke
Creating Project Contrast: A Video Game Exploring Consciousness And Qualia, Pierce Papke
Honors Projects
Project Contrast is a video game that explores how the unique traits inherent to video games might engage reflective player responses to qualitative experience. Project Contrast does this through suspension of disbelief, avatar projection, presence, player agency in storytelling, visual perception, functional gameplay, and art. Considering the difficulty in researching qualitative experience due to its subjectivity and circular explanations, I created Project Contrast not to analyze qualia, though that was my original hope. I instead created Project Contrast as an avenue for player self-reflection and learning about qualitative experience. While video games might be just code and art on a …
Detecting Ai Generated Text Using Neural Networks, Jesus Guerrero
Detecting Ai Generated Text Using Neural Networks, Jesus Guerrero
Masters Theses
For humans, distinguishing machine generated text from human written text is men- tally taxing and slow. NLP models have been created to do this more effectively and faster. But, what if some adversarial changes have been added to the machine generated text? This thesis discusses this issue and text detectors in general.
The primary goal of this thesis is to describe the current state of text detectors in research and to discuss a key adversarial issue in modern NLP transformers. To describe the current state of text detectors a Systematic Literature Review was done on 50 relevant papers to machine-centric …