Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine Learning (5)
- Deep Learning (3)
- Machine learning (3)
- Brain-Computer Interface (2)
- Cluster (2)
-
- Computer (2)
- Internet of Vehicles (2)
- Intrusion Detection (2)
- Nessus (2)
- Network security (2)
- Nmap (2)
- Security audit (2)
- Sentiment Analysis (2)
- Simulation (2)
- Software engineering (2)
- Stigmergy (2)
- System security (2)
- Wavelet (2)
- ALS (1)
- ALSA (1)
- ANNs (1)
- AOP (1)
- AP Modularization (1)
- AUC (1)
- Academic data warehouse (1)
- Activation function (1)
- Adaptive disk rearrangement (1)
- Advanced driver assistance (1)
- Algorithms (1)
- Analysis (1)
Articles 1 - 30 of 66
Full-Text Articles in Physical Sciences and Mathematics
Enabling Iov Communication Through Secure Decentralized Clustering Using Federated Deep Reinforcement Learning, Chandler Scott
Enabling Iov Communication Through Secure Decentralized Clustering Using Federated Deep Reinforcement Learning, Chandler Scott
Electronic Theses and Dissertations
The Internet of Vehicles (IoV) holds immense potential for revolutionizing transporta- tion systems by facilitating seamless vehicle-to-vehicle and vehicle-to-infrastructure communication. However, challenges such as congestion, pollution, and security per- sist, particularly in rural areas with limited infrastructure. Existing centralized solu- tions are impractical in such environments due to latency and privacy concerns. To address these challenges, we propose a decentralized clustering algorithm enhanced with Federated Deep Reinforcement Learning (FDRL). Our approach enables low- latency communication, competitive packet delivery ratios, and cluster stability while preserving data privacy. Additionally, we introduce a trust-based security framework for IoV environments, integrating a central authority …
Detection And Classification Of Diabetic Retinopathy Using Deep Learning Models, Aishat Olatunji
Detection And Classification Of Diabetic Retinopathy Using Deep Learning Models, Aishat Olatunji
Electronic Theses and Dissertations
Healthcare analytics leverages extensive patient data for data-driven decision-making, enhancing patient care and results. Diabetic Retinopathy (DR), a complication of diabetes, stems from damage to the retina’s blood vessels. It can affect both type 1 and type 2 diabetes patients. Ophthalmologists employ retinal images for accurate DR diagnosis and severity assessment. Early detection is crucial for preserving vision and minimizing risks. In this context, we utilized a Kaggle dataset containing patient retinal images, employing Python’s versatile tools. Our research focuses on DR detection using deep learning techniques. We used a publicly available dataset to apply our proposed neural network and …
Enhanced Content-Based Fake News Detection Methods With Context-Labeled News Sources, Duncan Arnfield
Enhanced Content-Based Fake News Detection Methods With Context-Labeled News Sources, Duncan Arnfield
Electronic Theses and Dissertations
This work examined the relative effectiveness of multilayer perceptron, random forest, and multinomial naïve Bayes classifiers, trained using bag of words and term frequency-inverse dense frequency transformations of documents in the Fake News Corpus and Fake and Real News Dataset. The goal of this work was to help meet the formidable challenges posed by proliferation of fake news to society, including the erosion of public trust, disruption of social harmony, and endangerment of lives. This training included the use of context-categorized fake news in an effort to enhance the tools’ effectiveness. It was found that term frequency-inverse dense frequency provided …
A Bridge Between Graph Neural Networks And Transformers: Positional Encodings As Node Embeddings, Bright Kwaku Manu
A Bridge Between Graph Neural Networks And Transformers: Positional Encodings As Node Embeddings, Bright Kwaku Manu
Electronic Theses and Dissertations
Graph Neural Networks and Transformers are very powerful frameworks for learning machine learning tasks. While they were evolved separately in diverse fields, current research has revealed some similarities and links between them. This work focuses on bridging the gap between GNNs and Transformers by offering a uniform framework that highlights their similarities and distinctions. We perform positional encodings and identify key properties that make the positional encodings node embeddings. We found that the properties of expressiveness, efficiency and interpretability were achieved in the process. We saw that it is possible to use positional encodings as node embeddings, which can be …
Predicting High-Cap Tech Stock Polarity: A Combined Approach Using Support Vector Machines And Bidirectional Encoders From Transformers, Ian L. Grisham
Predicting High-Cap Tech Stock Polarity: A Combined Approach Using Support Vector Machines And Bidirectional Encoders From Transformers, Ian L. Grisham
Electronic Theses and Dissertations
The abundance, accessibility, and scale of data have engendered an era where machine learning can quickly and accurately solve complex problems, identify complicated patterns, and uncover intricate trends. One research area where many have applied these techniques is the stock market. Yet, financial domains are influenced by many factors and are notoriously difficult to predict due to their volatile and multivariate behavior. However, the literature indicates that public sentiment data may exhibit significant predictive qualities and improve a model’s ability to predict intricate trends. In this study, momentum SVM classification accuracy was compared between datasets that did and did not …
Immersive Learning Environments For Computer Science Education, Dillon Buchanan
Immersive Learning Environments For Computer Science Education, Dillon Buchanan
Electronic Theses and Dissertations
This master's thesis explores the effectiveness of an educational intervention using an interactive notebook to support and supplement instruction in a foundational-level programming course. A quantitative, quasi-experimental group comparison method was employed, where students were placed into either a control or a treatment group. Data was collected from assignment and final grades, as well as self-reported time spent using the notebook. Independent t-tests and correlation were used for data analysis. Results were inconclusive but did indicate that the intervention had a possible effect. Further studies may explore better efficacy, implementation, and satisfaction of interactive notebooks across a larger population and …
A Programmatic Geographic Information Systems Analysis Of Plant Hardiness Zones, Andrew Bowen
A Programmatic Geographic Information Systems Analysis Of Plant Hardiness Zones, Andrew Bowen
Electronic Theses and Dissertations
The Plant Hardiness Zone Map consists of thirteen geographical zones that describe whether a plant can survive based on average annual minimal temperatures. As climate change progresses, minimum temperatures in all regions are expected to change. This work programmatically evaluates predicted future climate projection data and converts it to United States Department of Agriculture-defined hardiness zones. Through the next 80 years, hardiness zones are projected to move poleward; in effect, colder zones will lose area and warmer zones will gain area globally. Some implications include changes in crop growing degree days, which could alter crop productivity, migration and settlement of …
Opinion Mining Of Bird Preference In Wildlife Parks, Isiwat Adenopo
Opinion Mining Of Bird Preference In Wildlife Parks, Isiwat Adenopo
Electronic Theses and Dissertations
Opinion Mining is becoming the fastest growing area to extract useful and insightful information to support decision making. In the age of social media, user’s opinions and discussions have become a highly valuable source to look for users preferences, likes, and dislikes.
The industry of wildlife parks (or zoos) is a competitive domain that requires careful analysis of visitor’s opinions to understand and cater for their preferences when it comes to wildlife. In this thesis, an opinion mining approach was proposed and applied on textual posts on the social media platform, Twitter, to extract the popularity, polarity (sentiment), and emotions …
Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt
Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt
Electronic Theses and Dissertations
Vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication enable the sharing, in real time, of vehicular locations and speeds with other vehicles, traffic signals, and traffic control centers. This shared information can help traffic to better traverse intersections, road segments, and congested neighborhoods, thereby reducing travel times, increasing driver safety, generating data for traffic planning, and reducing vehicular pollution. This study, which focuses on vehicular pollution, used an analysis of data from NREL, BTS, and the EPA to determine that the widespread use of V2V-based truck platooning—the convoying of trucks in close proximity to one another so as to reduce air drag …
Risk Gameplay Analysis Using Stochastic Beam Search, Jacob Gillenwater
Risk Gameplay Analysis Using Stochastic Beam Search, Jacob Gillenwater
Electronic Theses and Dissertations
Hasbro’s RISK, first published in 1959, is a complex multiplayer strategy game that has received little attention from the scientific community. Training artificial intelligence (AI) agents using stochastic beam search gives insight into effective strategy when playing RISK. A comprehensive analysis of the systems of play challenges preconceptions about good strategy in some areas of the game while reinforcing those preconceptions in others. This study applies stochastic beam search to discover optimal strategies in RISK. Results of the search show both support for and challenges to traditionally held positions about RISK gameplay. While stochastic beam search competently investigates gameplay on …
Hybrid Machine And Deep Learning-Based Cyberattack Detection And Classification In Smart Grid Networks, Adedayo Aribisala
Hybrid Machine And Deep Learning-Based Cyberattack Detection And Classification In Smart Grid Networks, Adedayo Aribisala
Electronic Theses and Dissertations
Power grids have rapidly evolved into Smart grids and are heavily dependent on Supervisory Control and Data Acquisition (SCADA) systems for monitoring and control. However, this evolution increases the susceptibility of the remote (VMs, VPNs) and physical interfaces (sensors, PMUs LAN, WAN, sub-stations power lines, and smart meters) to sophisticated cyberattacks. The continuous supply of power is critical to power generation plants, power grids, industrial grids, and nuclear grids; the halt to global power could have a devastating effect on the economy's critical infrastructures and human life.
Machine Learning and Deep Learning-based cyberattack detection modeling have yielded promising results when …
A Machine Learning Approach For Reconnaissance Detection To Enhance Network Security, Rachel Bakaletz
A Machine Learning Approach For Reconnaissance Detection To Enhance Network Security, Rachel Bakaletz
Electronic Theses and Dissertations
Before cyber-crime can happen, attackers must research the targeted organization to collect vital information about the target and pave the way for the subsequent attack phases. This cyber-attack phase is called reconnaissance or enumeration. This malicious phase allows attackers to discover information about a target to be leveraged and used in an exploit. Information such as the version of the operating system and installed applications, open ports can be detected using various tools during the reconnaissance phase. By knowing such information cyber attackers can exploit vulnerabilities that are often unique to a specific version.
In this work, we develop an …
Electronic Evidence Locker: An Ontology For Electronic Evidence, Daniel Smith
Electronic Evidence Locker: An Ontology For Electronic Evidence, Daniel Smith
Electronic Theses and Dissertations
With the rapid growth of crime data, overwhelming amounts of electronic evidence need to be stored and shared with the relevant agencies. Without addressing this challenge, the sharing of crime data and electronic evidence will be highly inefficient, and the resource requirements for this task will continue to increase. Relational database solutions face size limitations in storing larger amounts of crime data where each instance has unique attributes with unstructured nature.
In this thesis, the Electronic Evidence Locker (EEL) was proposed and developed to address such problems. The EEL was built using a NoSQL database and a C# website for …
Applying Deep Learning To The Ice Cream Vendor Problem: An Extension Of The Newsvendor Problem, Gaffar Solihu
Applying Deep Learning To The Ice Cream Vendor Problem: An Extension Of The Newsvendor Problem, Gaffar Solihu
Electronic Theses and Dissertations
The Newsvendor problem is a classical supply chain problem used to develop strategies for inventory optimization. The goal of the newsvendor problem is to predict the optimal order quantity of a product to meet an uncertain demand in the future, given that the demand distribution itself is known. The Ice Cream Vendor Problem extends the classical newsvendor problem to an uncertain demand with unknown distribution, albeit a distribution that is known to depend on exogenous features. The goal is thus to estimate the order quantity that minimizes the total cost when demand does not follow any known statistical distribution. The …
Spatial Analyses Of Gray Fossil Site Vertebrate Remains: Implications For Depositional Setting And Site Formation Processes, David Carney
Spatial Analyses Of Gray Fossil Site Vertebrate Remains: Implications For Depositional Setting And Site Formation Processes, David Carney
Electronic Theses and Dissertations
This project uses exploratory 3D geospatial analyses to assess the taphonomy of the Gray Fossil Site (GFS). During the Pliocene, the GFS was a forested, inundated sinkhole that accumulated biological materials between 4.9-4.5 mya. This deposit contains fossils exhibiting different preservation modes: from low energy lacustrine settings to high energy colluvial deposits. All macro-paleontological materials have been mapped in situ using survey-grade instrumentation. Vertebrate skeletal material from the site is well-preserved, but the degree of skeletal articulation varies spatially within the deposit. This analysis uses geographic information systems (GIS) to analyze the distribution of mapped specimens at different spatial scales. …
Plprepare: A Grammar Checker For Challenging Cases, Jacob Hoyos
Plprepare: A Grammar Checker For Challenging Cases, Jacob Hoyos
Electronic Theses and Dissertations
This study investigates one of the Polish language’s most arbitrary cases: the genitive masculine inanimate singular. It collects and ranks several guidelines to help language learners discern its proper usage and also introduces a framework to provide detailed feedback regarding arbitrary cases. The study tests this framework by implementing and evaluating a hybrid grammar checker called PLPrepare. PLPrepare performs similarly to other grammar checkers and is able to detect genitive case usages and provide feedback based on a number of error classifications.
Machine Learning Approaches To Dribble Hand-Off Action Classification With Sportvu Nba Player Coordinate Data, Dembe Stephanos
Machine Learning Approaches To Dribble Hand-Off Action Classification With Sportvu Nba Player Coordinate Data, Dembe Stephanos
Electronic Theses and Dissertations
Recently, strategies of National Basketball Association teams have evolved with the skillsets of players and the emergence of advanced analytics. One of the most effective actions in dynamic offensive strategies in basketball is the dribble hand-off (DHO). This thesis proposes an architecture for a classification pipeline for detecting DHOs in an accurate and automated manner. This pipeline consists of a combination of player tracking data and event labels, a rule set to identify candidate actions, manually reviewing game recordings to label the candidates, and embedding player trajectories into hexbin cell paths before passing the completed training set to the classification …
Knot Flow Classification And Its Applications In Vehicular Ad-Hoc Networks (Vanet), David Schmidt
Knot Flow Classification And Its Applications In Vehicular Ad-Hoc Networks (Vanet), David Schmidt
Electronic Theses and Dissertations
Intrusion detection systems (IDSs) play a crucial role in the identification and mitigation for attacks on host systems. Of these systems, vehicular ad hoc networks (VANETs) are difficult to protect due to the dynamic nature of their clients and their necessity for constant interaction with their respective cyber-physical systems. Currently, there is a need for a VANET-specific IDS that meets this criterion. To this end, a spline-based intrusion detection system has been pioneered as a solution. By combining clustering with spline-based general linear model classification, this knot flow classification method (KFC) allows for robust intrusion detection to occur. Due its …
Hybrid Recommender Systems Via Spectral Learning And A Random Forest, Alyssa Williams
Hybrid Recommender Systems Via Spectral Learning And A Random Forest, Alyssa Williams
Electronic Theses and Dissertations
We demonstrate spectral learning can be combined with a random forest classifier to produce a hybrid recommender system capable of incorporating meta information. Spectral learning is supervised learning in which data is in the form of one or more networks. Responses are predicted from features obtained from the eigenvector decomposition of matrix representations of the networks. Spectral learning is based on the highest weight eigenvectors of natural Markov chain representations. A random forest is an ensemble technique for supervised learning whose internal predictive model can be interpreted as a nearest neighbor network. A hybrid recommender can be constructed by first …
Self-Organized Structures: Modeling Polistes Dominula Nest Construction With Simple Rules, Matthew Harrison
Self-Organized Structures: Modeling Polistes Dominula Nest Construction With Simple Rules, Matthew Harrison
Electronic Theses and Dissertations
The self-organized nest construction behaviors of European paper wasps (Polistes dominula) show potential for adoption in artificial intelligence and robotic systems where centralized control proves challenging. However, P. dominula nest construction mechanisms are not fully understood. This research investigated how nest structures stimulate P. dominula worker action at different stages of nest construction. A novel stochastic site selection model, weighted by simple rules for cell age, height, and wall count, was implemented in a three-dimensional, step-by-step nest construction simulation. The simulation was built on top of a hexagonal coordinate system to improve precision and performance. Real and idealized …
Fm Radio Signal Propagation Evaluation And Creating Statistical Models For Signal Strength Prediction In Differing Topographic Environments, Timothy Land
Electronic Theses and Dissertations
Radio wave signal strength and associated propagation models are rarely analyzed across individual geographic provinces. This study evaluates the effectiveness of the Radio Mobile model to predict radio wave signal strength in the Blue Ridge and Valley and Ridge physiographic provinces. A spectrum analyzer was used on 19 FM transmitters to determine model accuracy. Statistical analysis determined the significance between different terrain factors and signal strength. Field signal strength was found to be related to test site elevation, transmitter azimuth, elevation angle, transmitter elevation, path loss, and distance. Using 76 signal strength receiver sites, Ordinary Least Square regression models predicted …
Vertex Weighted Spectral Clustering, Mohammad Masum
Vertex Weighted Spectral Clustering, Mohammad Masum
Electronic Theses and Dissertations
Spectral clustering is often used to partition a data set into a specified number of clusters. Both the unweighted and the vertex-weighted approaches use eigenvectors of the Laplacian matrix of a graph. Our focus is on using vertex-weighted methods to refine clustering of observations. An eigenvector corresponding with the second smallest eigenvalue of the Laplacian matrix of a graph is called a Fiedler vector. Coefficients of a Fiedler vector are used to partition vertices of a given graph into two clusters. A vertex of a graph is classified as unassociated if the Fiedler coefficient of the vertex is close to …
An Investigation Into The Performance Evaluation Of Connected Vehicle Applications: From Real-World Experiment To Parallel Simulation Paradigm, Md Salman Ahmed
An Investigation Into The Performance Evaluation Of Connected Vehicle Applications: From Real-World Experiment To Parallel Simulation Paradigm, Md Salman Ahmed
Electronic Theses and Dissertations
A novel system was developed that provides drivers lane merge advisories, using vehicle trajectories obtained through Dedicated Short Range Communication (DSRC). It was successfully tested on a freeway using three vehicles, then targeted for further testing, via simulation. The failure of contemporary simulators to effectively model large, complex urban transportation networks then motivated further research into distributed and parallel traffic simulation. An architecture for a closed-loop, parallel simulator was devised, using a new algorithm that accounts for boundary nodes, traffic signals, intersections, road lengths, traffic density, and counts of lanes; it partitions a sample, Tennessee road network more efficiently than …
An Algorithm For The Machine Calculation Of Minimal Paths, Robert Whitinger
An Algorithm For The Machine Calculation Of Minimal Paths, Robert Whitinger
Electronic Theses and Dissertations
Problems involving the minimization of functionals date back to antiquity. The mathematics of the calculus of variations has provided a framework for the analytical solution of a limited class of such problems. This paper describes a numerical approximation technique for obtaining machine solutions to minimal path problems. It is shown that this technique is applicable not only to the common case of finding geodesics on parameterized surfaces in R3, but also to the general case of finding minimal functionals on hypersurfaces in Rn associated with an arbitrary metric.
Assessing The Physical Security Of Idfs With Psatool: A Case Study, Sulabh Bista
Assessing The Physical Security Of Idfs With Psatool: A Case Study, Sulabh Bista
Electronic Theses and Dissertations
PSATool is a checklist-based, web-based application for assessing the physical security of Intermediate Distribution Frameworks. IDFs, or wiring closets, are an integral if often neglected component of information security. Earlier work by Timbs (2013) identified 52 IDF-related security requirements based on federal and international standards for physical security. PSATool refines Timbs’ prototype application for IDF assessment, extending it with support for mobile-device-based data entry.
PSATool was used to assess 25 IDFs at a regional university, a college and a manufacturing corporation, with an average of 9 minutes per assessment. Network managers and assessors involved in the assessments characterized PSATool as …
Predicting Intraday Financial Market Dynamics Using Takens' Vectors; Incorporating Causality Testing And Machine Learning Techniques, Abubakar-Sadiq Bouda Abdulai
Predicting Intraday Financial Market Dynamics Using Takens' Vectors; Incorporating Causality Testing And Machine Learning Techniques, Abubakar-Sadiq Bouda Abdulai
Electronic Theses and Dissertations
Traditional approaches to predicting financial market dynamics tend to be linear and stationary, whereas financial time series data is increasingly nonlinear and non-stationary. Lately, advances in dynamical systems theory have enabled the extraction of complex dynamics from time series data. These developments include theory of time delay embedding and phase space reconstruction of dynamical systems from a scalar time series. In this thesis, a time delay embedding approach for predicting intraday stock or stock index movement is developed. The approach combines methods of nonlinear time series analysis with those of causality testing, theory of dynamical systems and machine learning (artificial …
A Study On The Efficacy Of Sentiment Analysis In Author Attribution, Michael J. Schneider
A Study On The Efficacy Of Sentiment Analysis In Author Attribution, Michael J. Schneider
Electronic Theses and Dissertations
The field of authorship attribution seeks to characterize an author’s writing style well enough to determine whether he or she has written a text of interest. One subfield of authorship attribution, stylometry, seeks to find the necessary literary attributes to quantify an author’s writing style. The research presented here sought to determine the efficacy of sentiment analysis as a new stylometric feature, by comparing its performance in attributing authorship against the performance of traditional stylometric features. Experimentation, with a corpus of sci-fi texts, found sentiment analysis to have a much lower performance in assigning authorship than the traditional stylometric features.
The Apprentices' Tower Of Hanoi, Cory Bh Ball
The Apprentices' Tower Of Hanoi, Cory Bh Ball
Electronic Theses and Dissertations
The Apprentices' Tower of Hanoi is introduced in this thesis. Several bounds are found in regards to optimal algorithms which solve the puzzle. Graph theoretic properties of the associated state graphs are explored. A brief summary of other Tower of Hanoi variants is also presented.
Ranking Methods For Global Optimization Of Molecular Structures, John Norman Mcmeen Jr
Ranking Methods For Global Optimization Of Molecular Structures, John Norman Mcmeen Jr
Electronic Theses and Dissertations
This work presents heuristics for searching large sets of molecular structures for low-energy, stable systems. The goal is to find the globally optimal structures in less time or by consuming less computational resources. The strategies intermittently evaluate and rank structures during molecular dynamics optimizations, culling possible weaker solutions from evaluations earlier, leaving better solutions to receive more simulation time. Although some imprecision was introduced from not allowing all structures to fully optimize before ranking, the strategies identify metrics that can be used to make these searches more efficient when computational resources are limited.
Physical Security Assessment Of A Regional University Computer Network, Nathan H. Timbs
Physical Security Assessment Of A Regional University Computer Network, Nathan H. Timbs
Electronic Theses and Dissertations
Assessing a network's physical security is an essential step in securing its data. This document describes the design, implementation, and validation of PSATool, a prototype application for assessing the physical security of a network's intermediate distribution frames, or IDFs (a.k.a. "wiring closets"). PSATool was created to address a lack of tools for IDF assessment. It implements a checklist-based protocol for assessing compliance with 52 security requirements compiled from federal and international standards. This checklist can be extended according to organizational needs.
PSATool was validated by using it to assess physical security at 135 IDFs at East Tennessee State University. …