Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Physical Sciences and Mathematics

Local Radiance, Scott Peter Britell Dec 2019

Local Radiance, Scott Peter Britell

Dissertations and Theses

Recent years have seen a proliferation of web applications based on content management systems (CMS). Using a CMS, non-technical content authors are able to define custom content types to support their needs. These content type names and the attribute names in each content type are typically domain-specific and meaningful to the content authors. The ability of a CMS to support a multitude of content types allows for endless creation and customization but also leads to a large amount of heterogeneity within a single application. While this meaningful heterogeneity is beneficial, it introduces the problem of how to write reusable functionality …


A Longitudinal Study Of Mammograms Utilizing The Automated Wavelet Transform Modulus Maxima Method, Brian C. Toner Dec 2019

A Longitudinal Study Of Mammograms Utilizing The Automated Wavelet Transform Modulus Maxima Method, Brian C. Toner

Electronic Theses and Dissertations

Breast cancer is a disease which predominatly affects women. About 1 in 8 women are diagnosed with breast cancer during their lifetime. Early detection is key to increasing the survival rate of breast cancer patients since the longer the tumor goes undetected, the more deadly it can become. The modern approach for diagnosing breast cancer relies on a combination of self-breast exams and mammography to detect the formation of tumors. However, this approach only accounts for tumors which are either detectable by touch or are large enough to be observed during a screening mammogram. For some individuals, by the time …


Versatile Binary-Level Concolic Testing, Bo Chen Jul 2019

Versatile Binary-Level Concolic Testing, Bo Chen

Dissertations and Theses

Computing systems are experiencing an explosive growth, both in complexities and diversities, ushered in by the proliferation of cloud computing, mobile computing, and Internet of Things. This growth has also exposed the consequences of unsafe, insecure, and unreliable computing systems. These all point to the great needs of sophisticated system validation techniques. Recent advances in research on symbolic execution has shown great promises for automated software analysis, e.g., generating test cases, finding bugs, and detecting security vulnerabilities. However, symbolic execution is mostly adopted to analyze user applications, while modern computing systems in practice consist of many components shipped by various …


Design And Experimental Evaluation Of Deepmarket: An Edge Computing Marketplace With Distributed Tensorflow Execution Capability, Soyoung Kim Jul 2019

Design And Experimental Evaluation Of Deepmarket: An Edge Computing Marketplace With Distributed Tensorflow Execution Capability, Soyoung Kim

Dissertations and Theses

There is a rise in demand among machine learning researchers for powerful computational resources to train complex machine learning models, e.g., deep learning models. In order to train these models in a reasonable amount of time, the training is often distributed among multiple machines; yet paying for such machines (either through renting them on cloud data centers or building a local infrastructure) is costly. DeepMarket attempts to reduce these costs by creating a marketplace that integrates multiple computational resources over a distributed TensorFlow framework. Instead of requiring users to rent expensive GPU/CPUs from a third-party cloud provider, DeepMarket allows users …


Crumpled And Abraded Encryption: Implementation And Provably Secure Construction, Scott Sherlock Griffy May 2019

Crumpled And Abraded Encryption: Implementation And Provably Secure Construction, Scott Sherlock Griffy

Dissertations and Theses

Abraded and crumpled encryption allows communication software such as messaging platforms to ensure privacy for their users while still allowing for some investigation by law enforcement. Crumpled encryption ensures that each decryption is costly and prevents law enforcement from performing mass decryption of messages. Abrasion ensures that only large organizations like law enforcement are able to access any messages. The current abrasion construction uses public key parameters such as prime numbers which makes the abrasion scheme difficult to analyze and allows possible backdoors. In this thesis, we introduce a new abrasion construction which uses hash functions to avoid the problems …


Mobile Solar Energy Environmental Control System With Remote Accessibility, Luis S. Garay May 2019

Mobile Solar Energy Environmental Control System With Remote Accessibility, Luis S. Garay

Theses and Dissertations

The proposed system, Mobile Solar Energy Environmental Control System with Remote Accessibility (mSEECS w/ RA), is based on the utilization of an already available Energy Storage Unit (ESU) in a Transport Unit System (TUS) to harness solar energy to provide a system to enhance the environment, safety and security of a TUS in a stationary or a mobile state by monitoring and controlling the operation of its onboard systems, and provide remote accessibility to know the state of affairs at any time. To relate to a real world application, the battery (ESU) of a vehicle (TUS) is underutilized …


Concept Building Web Application, Jaime Becker Apr 2019

Concept Building Web Application, Jaime Becker

Computer Science

In this thesis, I have ported a python software application that is used for the collection of information for functional learning classifications into a web application. I have analyzed the problems in the previous software and created the new web application to address these problems using Flask, AppEngine, and Bootstrap. This web application mirrors the original software look and feel but adds several functionalities and improvements like support for multiple input modalities and a separate administrative and user view. I also present a proposed evaluation of the web application.


Knowing Without Knowing: Real-Time Usage Identification Of Computer Systems, Leila Mohammed Hawana Jan 2019

Knowing Without Knowing: Real-Time Usage Identification Of Computer Systems, Leila Mohammed Hawana

Dissertations and Theses

Contemporary computers attempt to understand a user's actions and preferences in order to make decisions that better serve the user. In pursuit of this goal, computers can make observations that range from simple pattern recognition to listening in on conversations without the device being intentionally active. While these developments are incredibly useful for customization, the inherent security risks involving personal data are not always worth it. This thesis attempts to tackle one issue in this domain, computer usage identification, and presents a solution that identifies high-level usage of a system at any given moment without looking into any personal data. …


A Semester Long Classroom Course Mimicking A Software Company And A New Hire Experience For Computer Science Students Preparing To Enter The Software Industry, David A. Chamberlain Jan 2019

A Semester Long Classroom Course Mimicking A Software Company And A New Hire Experience For Computer Science Students Preparing To Enter The Software Industry, David A. Chamberlain

Master’s Theses and Projects

Students in a Computer Science degree programs must learn to code before they can be taught Software Engineering skills. This core skill set is how to program and consists of the constructs of various languages, how to create short programs or applications, independent assignments, and arrive at solutions that utilize the skills being covered in the language for that course (Chatley & Field, 2017). As an upperclassman, students will often be allowed to apply these skills in newer ways and have the opportunity to work on longer, more involved assignments although frequently still independent or in small groups of two …


Adaptive Strategies Of Multi-Objective Optimization For Greener Networks, Hatem Yazbek Jan 2019

Adaptive Strategies Of Multi-Objective Optimization For Greener Networks, Hatem Yazbek

CCE Theses and Dissertations

Increasing energy costs and environmental issues related to the Internet and wired networks continue to be a major concern. Energy-efficient or power-aware networks continue to gain interest in the research community. Existing energy reduction approaches do not fully address all aspects of the problem. We consider the problem of reducing energy by turning off network links, while achieving acceptable load balance, by adjusting link weights. Changing link weights frequently can cause network oscillation or instability in measuring the resulting traffic load, which is a situation to be avoided. In this research, we optimize two objectives, which are minimizing network power …


Reduction Of False Positives In Intrusion Detection Based On Extreme Learning Machine With Situation Awareness, Donald A. Burgio Jan 2019

Reduction Of False Positives In Intrusion Detection Based On Extreme Learning Machine With Situation Awareness, Donald A. Burgio

CCE Theses and Dissertations

Protecting computer networks from intrusions is more important than ever for our privacy, economy, and national security. Seemingly a month does not pass without news of a major data breach involving sensitive personal identity, financial, medical, trade secret, or national security data. Democratic processes can now be potentially compromised through breaches of electronic voting systems. As ever more devices, including medical machines, automobiles, and control systems for critical infrastructure are increasingly networked, human life is also more at risk from cyber-attacks. Research into Intrusion Detection Systems (IDSs) began several decades ago and IDSs are still a mainstay of computer and …


Assessing The Presence Of Mindfulness Within Cyber And Non-Cybersecurity Groups, Christopher Wilder Jan 2019

Assessing The Presence Of Mindfulness Within Cyber And Non-Cybersecurity Groups, Christopher Wilder

CCE Theses and Dissertations

Corporations and individuals continue to be under Phishing attack. Researchers categorizes methods corporations and individuals can employ to reduce the impact of being caught in a Phishing scheme. Corporation enable technical mechanisms such as automated filtering, URL blacklisting, and manipulation of browser warning messages to reduce phishing susceptibility costing billions of dollars annually. However, even with robust efforts to educate employees about phishing techniques through security awareness training the abundance of attacks continues to plague organizations. This study aims to identify whether a correlation exists between mindfulness and phishing susceptibility. The goal of this research is to determine if mindful …


Content Management System, Raymond Gines Jan 2019

Content Management System, Raymond Gines

Williams Honors College, Honors Research Projects

The Imprint CMS (Content Management System) aims to emulate the key features of popular existing CMS applications such as Wordpress, Drupal, Magento, etc. This will be a lightweight alternative that can be used to kick start a digital presence by producing landing pages, product pages, and blog posts with ease. Individuals will be able to register and create their own account that will be secured in a database that they can use to login and manage their pages and posts. In addition, they will have the option of changing multiple settings such as the theme and color scheme of their …


U.S. Census Explorer: A Gui And Visualization Tool For The U.S. Census Data Api, Timothy Snyder Jan 2019

U.S. Census Explorer: A Gui And Visualization Tool For The U.S. Census Data Api, Timothy Snyder

Williams Honors College, Honors Research Projects

U.S. Census Explorer is a software application that is designed to provide tools for intuitive exploration and analysis of United States census data for non-technical users. The application serves as an interface into the U.S. Census Bureau’s data API that enables a complete workflow from data acquisition to data visualization without the need for technical intervention from the user. The suite of tools provided include a graphical user interface for dynamically querying U.S. census data, geographic visualizations, and the ability to download your work to common spreadsheet and image formats for inclusion in external works.


Visual Programming Language With Natural User Interface, Matthew Britton Jan 2019

Visual Programming Language With Natural User Interface, Matthew Britton

Williams Honors College, Honors Research Projects

One of the fastest-growing fields of interest in computer science, fueled primarily by gaming, is the Natural User Interface (NUI). NUI encompasses technologies which would replace the typical mouse-and-keyboard approach to interaction with computer systems, with the goal of making human-computer interactions more similar to face-to-face interpersonal interactions. This is done by using technologies such as gesture recognition or speech recognition and speech synthesis, which use interpersonal skills we learn and practice on a daily basis. Visual Programming Languages (VPLs) are languages that allow the creation of a program by arranging graphical representations of program behavior, rather than textual program …


Gms - Guest Management System, Ethan Clark Jan 2019

Gms - Guest Management System, Ethan Clark

Williams Honors College, Honors Research Projects

This paper examines the benefits of custom built as opposed to licensed software, using a guest management system as a comparison. The University of Akron employs a web application that allows residents to check guests into each residence hall on campus. In addition to this paper, a custom web application was built to contrast against the university's current system and to recognize the issues raised by its employee staff. This paper is written using the software development lifecycle as its main structure; the planning and analysis through the development process is discussed at length.


Improving Random Forests By Feature Dependence Analysis, Silu Zhang Jan 2019

Improving Random Forests By Feature Dependence Analysis, Silu Zhang

Electronic Theses and Dissertations

Random forests (RFs) have been widely used for supervised learning tasks because of their high prediction accuracy good model interpretability and fast training process. However they are not able to learn from local structures as convolutional neural networks (CNNs) do when there exists high dependency among features. They also cannot utilize features that are jointly dependent on the label but marginally independent of it. In this dissertation we present two approaches to address these two problems respectively by dependence analysis. First a local feature sampling (LFS) approach is proposed to learn and use the locality information of features to group …