Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 239

Full-Text Articles in Physical Sciences and Mathematics

An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley Mar 2024

An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley

LSU Master's Theses

The growing cybersecurity workforce gap underscores the urgent need to address deficiencies in cybersecurity education: the current education system is not producing competent cybersecurity professionals, and current efforts are not informing the non-technical general public of basic cybersecurity practices. We argue that this gap is compounded by a fundamental disconnect between cybersecurity education literature and established education theory. Our research addresses this issue by examining the alignment of cybersecurity education literature concerning educational methods and tools with education literature.

In our research, we endeavor to bridge this gap by critically analyzing the alignment of cybersecurity education literature with education theory. …


Sensor Analytics For Subsea Pipeline And Cable Inspection: A Review, Connor R. Vincent Mar 2024

Sensor Analytics For Subsea Pipeline And Cable Inspection: A Review, Connor R. Vincent

LSU Master's Theses

Submarine pipelines and cables are vital for transmitting physical and digital resources across bodies of water, necessitating regular inspection to assess maintenance needs. The safety of subsea pipelines and cables is paramount for sustaining industries such as telecommunications, power transmission, water supply, waste management, and oil and gas. Incidents like those involving the Nord Stream subsea pipeline and the SEA-ME-WE 4 subsea communications cable exemplify the severe economic and environmental consequences of damage to these critical infrastructures. Existing inspection methods often fail to meet accuracy requirements, emphasizing the need for advancements in inspection technologies. This comprehensive survey covers the sensors …


Performative Mixing For Immersive Audio, Brian A. Elizondo Nov 2023

Performative Mixing For Immersive Audio, Brian A. Elizondo

LSU Doctoral Dissertations

Immersive multichannel audio can be produced with specialized setups of loudspeakers, often surrounding the audience. These setups can feature as few as four loudspeakers or more than 300. Performative mixing in these environments requires a bespoke solution offering intuitive gestural control. Beyond the usual faders for gain control, advancements in multichannel sound demand interfaces capable of quickly positioning sounds between channels. The Quad Cartesian Positioner is such a solution in the form of a Eurorack module for surround mixing for use in live or studio performances.

Diffusion/mixing methods for live multichannel immersive music often rely on the repurposing of hardware …


Uavs And Deep Neural Networks: An Alternative Approach To Monitoring Waterfowl At The Site Level, Zachary J. Loken Nov 2023

Uavs And Deep Neural Networks: An Alternative Approach To Monitoring Waterfowl At The Site Level, Zachary J. Loken

LSU Master's Theses

Understanding how waterfowl respond to habitat restoration and management activities is crucial for evaluating and refining conservation delivery programs. However, site-specific waterfowl monitoring is challenging, especially in heavily forested systems such as the Mississippi Alluvial Valley (MAV)—a primary wintering region for ducks in North America. I hypothesized that using uncrewed aerial vehicles (UAVs) coupled with deep learning-based methods for object detection would provide an efficient and effective means for surveying non-breeding waterfowl on difficult-to-access restored wetland sites. Accordingly, during the winters of 2021 and 2022, I surveyed wetland restoration easements in the MAV using a UAV equipped with a dual …


Evaluating Attack Surface Management In An Industrial Control System (Ics) Environment: Leveraging A Recon Ftw For Threat Classification And Incident Response, Nathalia De Sa Soares Nov 2023

Evaluating Attack Surface Management In An Industrial Control System (Ics) Environment: Leveraging A Recon Ftw For Threat Classification And Incident Response, Nathalia De Sa Soares

LSU Master's Theses

Protecting Industrial Control Systems (ICS) from cyber threats is paramount to
ensure the reliability and security of critical infrastructure. Organizations must proactively identify vulnerabilities and strengthen their incident response capabilities as attack vectors evolve. This research explores implementing an Attack Surface Management (ASM) approach, utilizing Recon FTW, to assess an operating ICS environment’s security posture comprehensively.
The primary objective of this research is to develop a tool for performing recon-
naissance in an ICS environment with a non-intrusive approach, enabling the realistic simulation of potential threat scenarios and the identification of critical areas requiring immediate attention and remediation. We aim …


Autonomous Shipwreck Detection & Mapping, William Ard Aug 2023

Autonomous Shipwreck Detection & Mapping, William Ard

LSU Master's Theses

This thesis presents the development and testing of Bruce, a low-cost hybrid Remote Operated Vehicle (ROV) / Autonomous Underwater Vehicle (AUV) system for the optical survey of marine archaeological sites, as well as a novel sonar image augmentation strategy for semantic segmentation of shipwrecks. This approach takes side-scan sonar and bathymetry data collected using an EdgeTech 2205 AUV sensor integrated with an Harris Iver3, and generates augmented image data to be used for the semantic segmentation of shipwrecks. It is shown that, due to the feature enhancement capabilities of the proposed shipwreck detection strategy, correctly identified areas have a 15% …


Domain Specific Analysis Of Privacy Practices And Concerns In The Mobile Application Market, Fahimeh Ebrahimi Meymand Apr 2023

Domain Specific Analysis Of Privacy Practices And Concerns In The Mobile Application Market, Fahimeh Ebrahimi Meymand

LSU Doctoral Dissertations

Mobile applications (apps) constantly demand access to sensitive user information in exchange for more personalized services. These-mostly unjustified-data collection tactics have raised major privacy concerns among mobile app users. Existing research on mobile app privacy aims to identify these concerns, expose apps with malicious data collection practices, assess the quality of apps' privacy policies, and propose automated solutions for privacy leak detection and prevention. However, existing solutions are generic, frequently missing the contextual characteristics of different application domains. To address these limitations, in this dissertation, we study privacy in the app store at a domain level. Our objective is to …


Beyond Machine Learning: An Fmri Domain Adaptation Model For Multi-Study Integration, Lauryn Michelle Burleigh Mar 2023

Beyond Machine Learning: An Fmri Domain Adaptation Model For Multi-Study Integration, Lauryn Michelle Burleigh

LSU Doctoral Dissertations

Traditional machine learning analyses are challenging with functional magnetic
resonance imaging (fMRI) data, not only because of the amount of data that needs to be
collected, adding a particular challenge for human fMRI research, but also due to the change in
hypothesis being addressed with various analytical techniques. Domain adaptation is a type of
transfer learning, a step beyond machine learning which allows for multiple related, but not
identical, data to contribute to a model, can be beneficial to overcome the limitation of data
needed but may address different hypothesis questions than anticipated given the analysis
computation. This dissertation assesses …


Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr. Jan 2023

Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr.

LSU Master's Theses

A branch of cyber security known as memory forensics focuses on extracting meaningful evidence from system memory. This analysis is often referred to as volatile memory analysis, and is generally performed on memory captures acquired from target systems. Inside of a memory capture is the complete state of a system under investigation, including the contents of currently running as well as previously executed applications. Analysis of this data can reveal a significant amount of activity that occurred on a system since the last reboot. For this research, the Windows operating system is targeted. In particular, the graphical user interface component …


Visual Analytics And Modeling Of Materials Property Data, Diwas Bhattarai Jan 2023

Visual Analytics And Modeling Of Materials Property Data, Diwas Bhattarai

LSU Doctoral Dissertations

Due to significant advancements in experimental and computational techniques, materials data are abundant. To facilitate data-driven research, it calls for a system for managing and sharing data and supporting a set of tools for effective data analysis and modeling. Generally, a given material property M can be considered as a multivariate data problem. The dimensions of M are the values of the property itself, the conditions (pressure P, temperature T, and multi-component composition X) that control the concerned property, and relevant metadata I (source, date).

Here we present a comprehensive database considering both experimental and computational sources …


Compilation Optimizations To Enhance Resilience Of Big Data Programs And Quantum Processors, Travis D. Lecompte Nov 2022

Compilation Optimizations To Enhance Resilience Of Big Data Programs And Quantum Processors, Travis D. Lecompte

LSU Doctoral Dissertations

Modern computers can experience a variety of transient errors due to the surrounding environment, known as soft faults. Although the frequency of these faults is low enough to not be noticeable on personal computers, they become a considerable concern during large-scale distributed computations or systems in more vulnerable environments like satellites. These faults occur as a bit flip of some value in a register, operation, or memory during execution. They surface as either program crashes, hangs, or silent data corruption (SDC), each of which can waste time, money, and resources. Hardware methods, such as shielding or error correcting memory (ECM), …


Enabling The Human Perception Of A Working Camera In Web Conferences Via Its Movement, Anish Shrestha Nov 2022

Enabling The Human Perception Of A Working Camera In Web Conferences Via Its Movement, Anish Shrestha

LSU Master's Theses

In recent years, video conferencing has seen a significant increase in its usage due to the COVID-19 pandemic. When casting user’s video to other participants, the videoconference applications (e.g. Zoom, FaceTime, Skype, etc.) mainly leverage 1) webcam’s LED-light indicator, 2) user’s video feedback in the software and 3) the software’s video on/off icons to remind the user whether the camera is being used. However, these methods all impose the responsibility on the user itself to check the camera status, and there have been numerous cases reported when users expose their privacy inadvertently due to not realizing that their camera is …


Computational Imaging For Shape Understanding, Yuqi Ding Aug 2022

Computational Imaging For Shape Understanding, Yuqi Ding

LSU Doctoral Dissertations

Geometry is the essential property of real-world scenes. Understanding the shape of the object is critical to many computer vision applications. In this dissertation, we explore using computational imaging approaches to recover the geometry of real-world scenes. Computational imaging is an emerging technique that uses the co-designs of image hardware and computational software to expand the capacity of traditional cameras. To tackle face recognition in the uncontrolled environment, we study 2D color image and 3D shape to deal with body movement and self-occlusion. Especially, we use multiple RGB-D cameras to fuse the varying pose and register the front face in …


2-Dimensional String Problems: Data Structures And Quantum Algorithms, Dhrumilkumar Patel Jul 2022

2-Dimensional String Problems: Data Structures And Quantum Algorithms, Dhrumilkumar Patel

LSU Master's Theses

The field of stringology studies algorithms and data structures used for processing strings efficiently. The goal of this thesis is to investigate 2-dimensional (2D) variants of some fundamental string problems, including \textit{Exact Pattern Matching} and \textit{Longest Common Substring}.

In the 2D pattern matching problem, we are given a matrix $\M[1\dd n,1\dd n]$ that consists of $N = n \times n$ symbols drawn from an alphabet $\Sigma$ of size $\sigma$. The query consists of a $ m \times m$ square matrix $\PP[1\dd m, 1\dd m]$ drawn from the same alphabet, and the task is to find all the locations of $\PP$ …


Scheduling Many-Task Computing Applications For A Hybrid Cloud, Shifat Perveen Mithila Jul 2022

Scheduling Many-Task Computing Applications For A Hybrid Cloud, Shifat Perveen Mithila

LSU Doctoral Dissertations

A centralized scheduler can become a bottleneck for placing the tasks of a many-task application on heterogeneous cloud resources. Previously, it was demonstrated that a decentralized vector scheduling approach based on performance measurements can be used successfully for this task placement scenario. In this dissertation, we extend this approach to task placement based on latency measurements. Each node collects performance metrics from its neighbors on an overlay graph, measures the communication latency, and then makes local decisions on where to move tasks. We present a decentralized and a centralized algorithm for configuring the overlay graph based on latency measurements and …


Control And Planning For Mobile Manipulators Used In Large Scale Manufacturing Processes, Joshua T. Nguyen Jul 2022

Control And Planning For Mobile Manipulators Used In Large Scale Manufacturing Processes, Joshua T. Nguyen

LSU Master's Theses

Sanding operations in industry is one of the few manufacturing tasks that has yet to achieve automation. Sanding tasks require skilled operators that have developed a sense of when a work piece is sufficiently sanded. In order to achieve automation in sanding with robotic systems, this developed sense, or intelligence, that human operators have needs to be understood and implemented in order to achieve, at the minimum, the same quality of work. The system will also need to have the equivalent reach of a human operator and not be constrained to a single, small workspace. This thesis developed solutions for …


Neutron Interferometry Using A Single Modulated Phase Grating, Ivan J. Hidrovo Giler Jul 2022

Neutron Interferometry Using A Single Modulated Phase Grating, Ivan J. Hidrovo Giler

LSU Master's Theses

Neutron grating interferometry provides information on phase and small-angle scatter in addition to attenuation. Previously, phase grating moiré interferometers (PGMI) with two or three phase gratings have been developed. These phase-grating systems use the moiré far-field technique to avoid the need for high-aspect absorption gratings used in Talbot-Lau interferometers (TLI) which reduce the neutron flux reaching the detector. We demonstrate through simulations a novel phase grating interferometer system for cold neutrons that requires a single modulated phase grating (MPG) for phase-contrast imaging, as opposed to the two or three phase gratings in previously employed PGMI systems. We compare the MPG …


Optimizing The Performance Of Parallel And Concurrent Applications Based On Asynchronous Many-Task Runtimes, Weile Wei Jun 2022

Optimizing The Performance Of Parallel And Concurrent Applications Based On Asynchronous Many-Task Runtimes, Weile Wei

LSU Doctoral Dissertations

Nowadays, High-performance Computing (HPC) scientific applications often face per- formance challenges when running on heterogeneous supercomputers, so do scalability, portability, and efficiency issues. For years, supercomputer architectures have been rapidly changing and becoming more complex, and this challenge will become even more com- plicated as we enter the exascale era, where computers will exceed one quintillion cal- culations per second. Software adaption and optimization are needed to address these challenges. Asynchronous many-task (AMT) systems show promise against the exascale challenge as they combine advantages of multi-core architectures with light-weight threads, asynchronous executions, smart scheduling, and portability across diverse architectures.

In …


From Equal-Mass To Extreme-Mass-Ratio Binary Inspirals: Simulation Tools For Next Generation Gravitational Wave Detectors, Samuel Douglas Cupp Jun 2022

From Equal-Mass To Extreme-Mass-Ratio Binary Inspirals: Simulation Tools For Next Generation Gravitational Wave Detectors, Samuel Douglas Cupp

LSU Doctoral Dissertations

Current numerical codes can successfully evolve similar-mass binary black holes systems, and these numerical waveforms contributed to the success of the LIGO Collaboration's detection of gravitational waves. LIGO requires high resolution numerical waveforms for detection and parameter estimation of the source. Great effort was expended over several decades to produce the numerical methods used today. However, future detectors will require further improvements to numerical techniques to take full advantage of their detection capabilities. For example, the Laser Interferometer Space Antenna (LISA) will require higher resolution simulations of similar-mass-ratio systems than LIGO. LISA will also be able to detect extreme-mass-ratio inspiral …


Improving Kernel Artifact Extraction In Linux Memory Samples Using The Slub Allocator, Daniel A. Donze Apr 2022

Improving Kernel Artifact Extraction In Linux Memory Samples Using The Slub Allocator, Daniel A. Donze

LSU Master's Theses

Memory forensics allows an investigator to analyze the volatile memory (RAM) of a computer, providing a view into the system state of the machine as it was running. Examples of items found in memory samples that are of interest to investigators are kernel data structures which can represent processes, files, and sockets. The SLUB allocator is the default small-request memory allocator for modern Linux systems. SLUB allocates “slabs”, which are contiguous sections of pre-allocated memory that are used to efficiently service allocation requests. The predecessor to SLUB, the SLAB allocator, tracked every slab it allocated, allowing extraction of allocated slabs …


Malware And Memory Forensics On M1 Macs, Charles E. Glass Apr 2022

Malware And Memory Forensics On M1 Macs, Charles E. Glass

LSU Master's Theses

As malware continues to evolve, infection mechanisms that can only be seen in memory are increasingly commonplace. These techniques evade traditional forensic analysis, requiring the use of memory forensics. Memory forensics allows for the recovery of historical data created by running malware, including information that it tries to hide. Memory analysis capabilities have lagged behind on Apple's new M1 architecture while the number of malicious programs only grows. To make matters worse, Apple has developed Rosetta 2, the translation layer for running x86_64 binaries on an M1 Mac. As a result, all malware compiled for Intel Macs is theoretically functional …


Improving Memory Forensics Capabilities On Apple M1 Computers, Raphaela Santos Mettig Rocha Apr 2022

Improving Memory Forensics Capabilities On Apple M1 Computers, Raphaela Santos Mettig Rocha

LSU Master's Theses

Malware threats are rapidly evolving to use more sophisticated attacks. By abusing rich application APIs such as Objective-C’s, they are able to gather information about user activity, launch background processes without the user’s knowledge as well as perform other malicious activities. In some cases, memory forensics is the only way to recover artifacts related to this malicious activity, as is the case with memory-only execution. The introduction of the Rosetta 2 on the Apple M1 introduces a completely new attack surface by allowing binaries of both Intel x86 64 and ARM64 architecture to run in userland. For this reason it …


Rethinking The Design Of Online Professor Reputation Systems, Haley Tatum Apr 2022

Rethinking The Design Of Online Professor Reputation Systems, Haley Tatum

LSU Master's Theses

Online Professor Reputation (OPR) systems, such as RateMyProfessors.com (RMP), are frequently used by college students to post and access peer evaluations of their pro- fessors. However, recent evidence has shown that these platforms suffer from major bias problems. Failing to address bias in online professor ratings not only leads to negative expectations and experiences in class, but also poor performance on exams. To address these concerns, in this thesis, we study bias in OPR systems from a software design point of view. At the first phase of our analysis, we conduct a systematic literature review of 23 interdisciplinary studies on …


Practical Considerations And Applications For Autonomous Robot Swarms, Rory Alan Hector Apr 2022

Practical Considerations And Applications For Autonomous Robot Swarms, Rory Alan Hector

LSU Doctoral Dissertations

In recent years, the study of autonomous entities such as unmanned vehicles has begun to revolutionize both military and civilian devices. One important research focus of autonomous entities has been coordination problems for autonomous robot swarms. Traditionally, robot models are used for algorithms that account for the minimum specifications needed to operate the swarm. However, these theoretical models also gloss over important practical details. Some of these details, such as time, have been considered before (as epochs of execution). In this dissertation, we examine these details in the context of several problems and introduce new performance measures to capture practical …


Generative Adversarial Networks Take On Hand Drawn Sketches: An Application To Louisiana Culture And Mardi Gras Fashion, Stephanie Hines Apr 2022

Generative Adversarial Networks Take On Hand Drawn Sketches: An Application To Louisiana Culture And Mardi Gras Fashion, Stephanie Hines

Honors Theses

No abstract provided.


Performance Analysis And Improvement For Scalable And Distributed Applications Based On Asynchronous Many-Task Systems, Nanmiao Wu Mar 2022

Performance Analysis And Improvement For Scalable And Distributed Applications Based On Asynchronous Many-Task Systems, Nanmiao Wu

LSU Doctoral Dissertations

As the complexity of recent and future large-scale data and exascale systems architectures grows, so do productivity, portability, software scalability, and efficient utilization of system resources challenges presented to both industry and the research community. Software solutions and applications are expected to scale in performance on such complex systems. Asynchronous many-task (AMT) systems, taking advantage of multi-core architectures with light-weight threads, asynchronous executions, and smart scheduling, are showing promise in addressing these challenges.

In this research, we implement several scalable and distributed applications based on HPX, an exemplar AMT runtime system. First, a distributed HPX implementation for a parameterized benchmark …


Digital Discrimination In The Sharing Economy: Evidence, Policy, And Feature Analysis, Miroslav Tushev Mar 2022

Digital Discrimination In The Sharing Economy: Evidence, Policy, And Feature Analysis, Miroslav Tushev

LSU Doctoral Dissertations

Applications (apps) of the Digital Sharing Economy (DSE), such as Uber, Airbnb, and TaskRabbit, have become a main facilitator of economic growth and shared prosperity in modern-day societies. However, recent research has revealed that the participation of minority groups in DSE activities is often hindered by different forms of bias and discrimination. Evidence of such behavior has been documented across almost all domains of DSE, including ridesharing, lodging, and freelancing. However, little is known about the under- lying design decisions of DSE systems which allow certain demographics of the market to gain unfair advantage over others. To bridge this knowledge …


90snet:, Seth Richard Mar 2022

90snet:, Seth Richard

Honors Theses

No abstract provided.


Using Memory Forensics To Analyze Programming Language Runtimes, Modhuparna Manna Jan 2022

Using Memory Forensics To Analyze Programming Language Runtimes, Modhuparna Manna

LSU Doctoral Dissertations

The continued increase in the use of computer systems in recent times has led to a significant rise in the capabilities of malware and attacker toolkits that target different operating systems and their users. Over the last several years, cybersecurity threat reports have documented numerous instances of users that were targeted by governments, intelligence agencies, and criminal groups, and the result was that the victims ended up having highly sophisticated malware installed on their systems. Unfortunately, the rise of these threats has not been met with equal research and development of defensive mechanisms that can detect and analyze such malware. …


Application Of Gravity Data For Hydrocarbon Exploration Using Machine Learning Assisted Workflow, Oluwafemi Temidayo Alaofin Jan 2022

Application Of Gravity Data For Hydrocarbon Exploration Using Machine Learning Assisted Workflow, Oluwafemi Temidayo Alaofin

LSU Master's Theses

Gravity survey has played an essential role in many geoscience fields ever since it was conducted, especially as an early screening tool for subsurface hydrocarbon exploration. With continued improvement in data processing techniques and gravity survey accuracy, in-depth gravity anomaly studies, such as characterization of Bouguer and isostatic residual anomalies, have the potential to delineate prolific regional structures and hydrocarbon basins. In this study, we focus on developing a cost-effective, quick, and computationally efficient screening tool for hydrocarbon exploration using gravity data employing machine learning techniques. Since land-based gravity surveys are often expensive and difficult to obtain in remote places, …