Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Physical Sciences and Mathematics

Optimizing Constraint Selection In A Design Verification Environment For Efficient Coverage Closure, Vanessa Cooper Jan 2023

Optimizing Constraint Selection In A Design Verification Environment For Efficient Coverage Closure, Vanessa Cooper

CCE Theses and Dissertations

No abstract provided.


Adversarial Training Of Deep Neural Networks, Anabetsy Termini Jan 2023

Adversarial Training Of Deep Neural Networks, Anabetsy Termini

CCE Theses and Dissertations

Deep neural networks used for image classification are highly susceptible to adversarial attacks. The de facto method to increase adversarial robustness is to train neural networks with a mixture of adversarial images and unperturbed images. However, this method leads to robust overfitting, where the network primarily learns to recognize one specific type of attack used to generate the images while remaining vulnerable to others after training. In this dissertation, we performed a rigorous study to understand whether combinations of state of the art data augmentation methods with Stochastic Weight Averaging improve adversarial robustness and diminish adversarial overfitting across a wide …


A Validity-Based Approach For Feature Selection In Intrusion Detection Systems, Eljilani Hmouda Jan 2022

A Validity-Based Approach For Feature Selection In Intrusion Detection Systems, Eljilani Hmouda

CCE Theses and Dissertations

Intrusion detection systems are tools that detect and remedy the presence of malicious activities. Intrusion detection systems face many challenges in terms of accurate analysis and evaluation. One such challenge is the involvement of many features during analysis, which leads to high data volume and ultimately excessive computational overhead. This research surrounds the development of a new intrusion detection system by employing an entropy-based measure called v-measure to select significant features and reduce dimensionality. After the development of the intrusion detection system, this feature reduction technique was tested on public datasets by applying machine learning classifiers such as Decision Tree, …


Feature Selection On Permissions, Intents And Apis For Android Malware Detection, Fred Guyton Jan 2021

Feature Selection On Permissions, Intents And Apis For Android Malware Detection, Fred Guyton

CCE Theses and Dissertations

Malicious applications pose an enormous security threat to mobile computing devices. Currently 85% of all smartphones run Android, Google’s open-source operating system, making that platform the primary threat vector for malware attacks. Android is a platform that hosts roughly 99% of known malware to date, and is the focus of most research efforts in mobile malware detection due to its open source nature. One of the main tools used in this effort is supervised machine learning. While a decade of work has made a lot of progress in detection accuracy, there is an obstacle that each stream of research is …


Neural Network Variations For Time Series Forecasting, David Ason Jan 2021

Neural Network Variations For Time Series Forecasting, David Ason

CCE Theses and Dissertations

Time series forecasting is an area of research within the discipline of machine learning. The ARIMA model is a well-known approach to this challenge. However, simple models such as ARIMA do not take into consideration complex relationships within the data and quite often fail to produce a satisfactory forecast. Neural networks have been presented in previous works as an alternative. Neural networks are able to capture non-linear relationships within the data and can deliver an improved forecast when compared to ARIMA models.

This dissertation takes neural network variations and applies them to a group of time series datasets found in …


Increasing Software Reliability Using Mutation Testing And Machine Learning, Michael Allen Stewart Jan 2021

Increasing Software Reliability Using Mutation Testing And Machine Learning, Michael Allen Stewart

CCE Theses and Dissertations

Mutation testing is a type of software testing proposed in the 1970s where program statements are deliberately changed to introduce simple errors so that test cases can be validated to determine if they can detect the errors. The goal of mutation testing was to reduce complex program errors by preventing the related simple errors. Test cases are executed against the mutant code to determine if one fails, detects the error and ensures the program is correct. One major issue with this type of testing was it became intensive computationally to generate and test all possible mutations for complex programs.

This …


Detecting Rogue Manipulation Of Smart Home Device Settings, David Zeichick Jan 2020

Detecting Rogue Manipulation Of Smart Home Device Settings, David Zeichick

CCE Theses and Dissertations

Smart home devices control a home’s environmental and security settings. This includes devices that control home thermostats, sprinkler systems, light bulbs, and home appliances. Malicious manipulation of the settings of these devices by an outside adversary has caused emotional distress and could even cause physical harm. For example, researchers have reported that there is a rise in domestic abuse perpetrated via smart home devices; victims have reported their thermostat settings being unwittingly manipulated and being locked out of their house due to their smart lock code being changed. Rapid adoption of smart home devices by consumers has led to an …


An Approach To Twitter Event Detection Using The Newsworthiness Metric, Jonathan Adkins Jan 2020

An Approach To Twitter Event Detection Using The Newsworthiness Metric, Jonathan Adkins

CCE Theses and Dissertations

No abstract provided.


A Hierarchical Temporal Memory Sequence Classifier For Streaming Data, Jeffrey Barnett Jan 2020

A Hierarchical Temporal Memory Sequence Classifier For Streaming Data, Jeffrey Barnett

CCE Theses and Dissertations

Real-world data streams often contain concept drift and noise. Additionally, it is often the case that due to their very nature, these real-world data streams also include temporal dependencies between data. Classifying data streams with one or more of these characteristics is exceptionally challenging. Classification of data within data streams is currently the primary focus of research efforts in many fields (i.e., intrusion detection, data mining, machine learning). Hierarchical Temporal Memory (HTM) is a type of sequence memory that exhibits some of the predictive and anomaly detection properties of the neocortex. HTM algorithms conduct training through exposure to a stream …


A Data Mining Framework For Improving Student Outcomes On Step 1 Of The United States Medical Licensing Examination, James Clark Jan 2019

A Data Mining Framework For Improving Student Outcomes On Step 1 Of The United States Medical Licensing Examination, James Clark

CCE Theses and Dissertations

Identifying the factors associated with medical students who fail Step 1 of the United States Medical Licensing Examination (USMLE) has been a focus of investigation for many years. Some researchers believe lower scores on the Medical Colleges Admissions Test (MCAT) are the sole factor used to identify failure. Other researchers believe lower course outcomes during the first two years of medical training are better indicators of failure. Yet, there are medical students who fail Step 1 of the USMLE who enter medical school with high MCAT scores, and conversely medical students with lower academic credentials who are expected to have …


Evaluation Of Machine Learning Techniques For Early Identification Of At-Risk Students, Mansour Hamoud Awaji Jan 2018

Evaluation Of Machine Learning Techniques For Early Identification Of At-Risk Students, Mansour Hamoud Awaji

CCE Theses and Dissertations

Student attrition is one of the long-standing problems facing higher education institutions despite the extensive research that has been undertaken to address it. To increase students’ success and retention rates, there is a need for early alert systems that facilitate the identification of at-risk students so that remedial measures may be taken in time to reduce the risk. However, incorporating ML predictive models into early warning systems face two main challenges: improving the accuracy of timely predictions and the generalizability of predictive models across on-campus and online courses. The goal of this study was to develop and evaluate predictive models …


Characterization Of Prose By Rhetorical Structure For Machine Learning Classification, James Java Jan 2015

Characterization Of Prose By Rhetorical Structure For Machine Learning Classification, James Java

CCE Theses and Dissertations

Measures of classical rhetorical structure in text can improve accuracy in certain types of stylistic classification tasks such as authorship attribution. This research augments the relatively scarce work in the automated identification of rhetorical figures and uses the resulting statistics to characterize an author's rhetorical style. These characterizations of style can then become part of the feature set of various classification models.

Our Rhetorica software identifies 14 classical rhetorical figures in free English text, with generally good precision and recall, and provides summary measures to use in descriptive or classification tasks. Classification models trained on Rhetorica's rhetorical measures paired with …