Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 106

Full-Text Articles in Computer Sciences

Beyond Algorithms: A User-Centered Evaluation Of A Feature Recommender System In Requirements Engineering, Oluwatobi Lasisi May 2023

Beyond Algorithms: A User-Centered Evaluation Of A Feature Recommender System In Requirements Engineering, Oluwatobi Lasisi

Theses and Dissertations

Several studies have applied recommender technologies to support requirements engineering activities. As in other application areas of recommender systems (RS), many studies have focused on the algorithms’ prediction accuracy, while there have been limited discussions around users’ interactions with the systems. Since recommender systems are designed to aid users in information retrieval, they should be assessed not just as recommendation algorithms but also from the users’ perspective. In contrast to accuracy measures, user-related issues can only be effectively investigated via empirical studies involving real users. Furthermore, researchers are becoming increasingly aware that the effectiveness of the systems goes beyond recommendation …


An Enhanced Cloud-Native Deep Learning Pipeline For The Classification Of Network Traffic, Ahmed Sobhy Elkenawy Feb 2023

An Enhanced Cloud-Native Deep Learning Pipeline For The Classification Of Network Traffic, Ahmed Sobhy Elkenawy

Theses and Dissertations

In a rapidly changing world, the way of solving real-world problems has changed to leverage the power of the advancements in multiple fields. Cloud-native computing approaches can be utilized with deep learning techniques to provide solutions in several important areas. For instance, with the emergence of the pandemic, much dependence on modern technologies came out as a replacement for face-to-face interaction. Deep learning can reach a high level of accuracy, which makes it very effective in the support of modern services and technologies. However, there are some challenging issues because deep learning requires many large-scale experiments, which demand a lot …


Face Anti-Spoofing And Deep Learning Based Unsupervised Image Recognition Systems, Enoch Solomon Jan 2023

Face Anti-Spoofing And Deep Learning Based Unsupervised Image Recognition Systems, Enoch Solomon

Theses and Dissertations

One of the main problems of a supervised deep learning approach is that it requires large amounts of labeled training data, which are not always easily available. This PhD dissertation addresses the above-mentioned problem by using a novel unsupervised deep learning face verification system called UFace, that does not require labeled training data as it automatically, in an unsupervised way, generates training data from even a relatively small size of data. The method starts by selecting, in unsupervised way, k-most similar and k-most dissimilar images for a given face image. Moreover, this PhD dissertation proposes a new loss function to …


Design Of Ethical Autonomous Agents For Unmanned Aerial Vehicles Using Fuzzy Logic, Gavin Giovanni Smith Dec 2022

Design Of Ethical Autonomous Agents For Unmanned Aerial Vehicles Using Fuzzy Logic, Gavin Giovanni Smith

Theses and Dissertations

Autonomous systems have, over the years become part of our everyday lives. These systems have been deployed to executed a diverse range of applications in different industries; finance, healthcare, military, and in particular, the flight industry. With the rise of UAVs, new opportunities arose, but with those opportunities came new pitfalls within any industry. For UAVs, one of the pitfalls came in the form of ethical decisionmaking, which led to a variety of questions. Can the Autonomous systems within UAVs be designed with ethics in mind? Which ethical guidelines would we use to implement such a system? How would we …


Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt Aug 2022

Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt

Theses and Dissertations

Irregular applications, such as unstructured mesh operations, do not easily map onto the typical GPU programming paradigms endorsed by GPU manufacturers, which mostly focus on maximizing concurrency for latency hiding. In this work, we show how alternative techniques focused on latency amortization can be used to control overall latency while requiring less concurrency. We used a custom-built microbenchmarking framework to test several GPU kernels and show how the GPU behaves under relevant workloads. We demonstrate that coalescing is not required for efficacious performance; an uncoalesced access pattern can achieve high bandwidth - even over 80% of the theoretical global memory …


A Tool-Supported Metamodel For Program Bugfix Analysis In Empirical Software Engineering, Manal Zneit Aug 2022

A Tool-Supported Metamodel For Program Bugfix Analysis In Empirical Software Engineering, Manal Zneit

Theses and Dissertations

This thesis describes a software modeling approach aimed at addressing empirical studies in software engineering. We build a metamodel that provides an overview of the taxonomy of program bugfixes in deep learning programs. For modeling purposes, we present a prototype tool that is an implementation of the model-driven techniques presented.


Development Of Software Tools For Efficient And Sustainable Process Development And Improvement, Jake P. Stengel Jun 2022

Development Of Software Tools For Efficient And Sustainable Process Development And Improvement, Jake P. Stengel

Theses and Dissertations

Infrastructure is a key component in the well-being of our society that leads to its growth, development, and productive operations. A well-built infrastructure allows the community to be more competitive and promotes economic advancement. In 2021, the ASCE (American Society of Civil Engineers) ranked the American infrastructure as substandard, with an overall grade of C-. The overall ranking suffers when key infrastructure categories are not maintained according to the needs of the population. Therefore, there is a need to consider alternative methods to improve our infrastructure and make it more sustainable to enhance the overall grade. One of the challenges …


An Entity-Component System Based, Ieee Dis Interoperability Interface, Noah W. Scott Mar 2022

An Entity-Component System Based, Ieee Dis Interoperability Interface, Noah W. Scott

Theses and Dissertations

In practice, there are several different methods of organizing data within a given software to fulfil its function. The method known as the Entity-Component System (ECS) is a software architecture where data components define entities. These components are stored as organized lists which are operated upon by systems to inject the system's desired behavior. Data is sent across the networks to communicate between simulation nodes as Protocol Data Units (PDUs). When sending PDUs across a network protocol, each simulation represents a common understanding of the world at the desired level of detail. DIS-compliant simulations are commonly written using an Object-Oriented …


An Investigation Of Data Storage In Entity-Component Systems, Bailey V. Compton Mar 2022

An Investigation Of Data Storage In Entity-Component Systems, Bailey V. Compton

Theses and Dissertations

Entity-Component Systems (ECS) have grown vastly in application since their introduction more than 20 years ago. Providing the ability to efficiently manage data and optimize program execution, ECSs, as well as the wider field of data-oriented design, have attained popularity in the realms of modeling, simulation, and gaming. This manuscript aims to elucidate and document the storage frameworks commonly found in ECSs, as well as suggesting conceptual connections between ECSs and relational databases. This formal documentation of the in-memory storage formats of entity-component systems affords the United States Air Force, the Department of Defense, and the software engineering community a …


Investigating Collaboration In Software Reverse Engineering, Allison M. Wong Mar 2022

Investigating Collaboration In Software Reverse Engineering, Allison M. Wong

Theses and Dissertations

Reverse engineering (RE) is a rigorous process of exploration and analysis to support software design recovery and exploit development. The process is often conducted in teams to divide the workload and take full advantage of engineers' individual expertise and strengths. Collaboration in RE requires versatile and reliable tools that can match the environment's unpredictable and fluid nature. While studies on collaborative software development have indicated common best practices and implementations, similar standards have not been explored in reverse engineering. This research conducts semi-structured interviews with reverse engineering experts to understand their needs and solutions while working in a team. The …


Formal Spark Verification Of Various Resampling Methods In Particle Filters, Osiris J. Terry Mar 2022

Formal Spark Verification Of Various Resampling Methods In Particle Filters, Osiris J. Terry

Theses and Dissertations

The software verification in this thesis concentrates on verifying a particle filter for use in tracking and estimation, a key application area for the Air Force. The development and verification process described in this thesis is a demonstration of the power, limitation, and compromises involved in applying automated software verification tools to critical embedded software applications.


Formal Verification For High Assurance Software: A Case Study Using The Spark Auto-Active Verification Toolset, Ryan M. Baity Mar 2021

Formal Verification For High Assurance Software: A Case Study Using The Spark Auto-Active Verification Toolset, Ryan M. Baity

Theses and Dissertations

Software is an increasingly integral and sophisticated part of safety- and mission-critical systems. Poorly written software can lead to information leakage, undetected cyber breaches, and even human injury in cases where the software directly interfaces with components of a physical system. These systems may range from power facilities to remotely piloted aircraft. Software bugs and vulnerabilities can lead to severe economic hardships and loss of life in these domains. As fast as software spreads to automate many facets of our lives, it also grows in complexity. The complexity of software systems combined with the nature of the critical domains dependent …


Two Published Flight Dynamics Models Rewritten In Rust And Structures As An Ecs, Chad A. Willis Mar 2021

Two Published Flight Dynamics Models Rewritten In Rust And Structures As An Ecs, Chad A. Willis

Theses and Dissertations

This thesis explores using the Entity-Component System (ECS) architecture to implement a Flight Dynamics Model (FDM) by re-implementing two published versions in the Rust programming language using the Specs Parallel ECS (SPECS) [1] for military simulation advancement. One FDM is based on Grant Palmers published textbook titled Physics for Game Programmers [2], and another is based on David Bourgs textbook titled Physics for Game Developers [3]. Furthermore, this thesis uses these models within an interactive flight simulator.The ECS architecture is based on the Data-Oriented Design (DOD) paradigm, where Components contain the data and the Systems implement the behavior which transforms …


Refinements Of The Concept Of Privacy In Distributed Computing, Entisar Seedi Alshammry Dec 2020

Refinements Of The Concept Of Privacy In Distributed Computing, Entisar Seedi Alshammry

Theses and Dissertations

In light of the tremendous development of technology in the modern world in which we live, privacy concerns are increasing, especially after the massive spread of distributed computing systems and the technologies that depend on it, whether in personal devices or public services. Hence, this research proposes refinements on the concept of privacy for enhancing the development of privacy-related strategies in distributed computing systems to address the elements of privacy. In particular, the study introduces the new concept of Privacy Appetite to describe and model the nature of the relationship between the intended disclosure of private information and gained value …


Analytic Provenance For Software Reverse Engineers, Wayne C. Henry Sep 2020

Analytic Provenance For Software Reverse Engineers, Wayne C. Henry

Theses and Dissertations

Reverse engineering is a time-consuming process essential to software-security tasks such as malware analysis and vulnerability discovery. During the process, an engineer will follow multiple leads to determine how the software functions. The combination of time and possible explanations makes it difficult for the engineers to maintain a context of their findings within the overall task. Analytic provenance tools have demonstrated value in similarly complex fields that require open-ended exploration and hypothesis vetting. However, they have not been explored in the reverse engineering domain. This dissertation presents SensorRE, the first analytic provenance tool designed to support software reverse engineers. A …


Sliver: Simulation-Based Logic Bomb Identification/Verification For Unmanned Aerial Vehicles, Jake M. Magness Mar 2020

Sliver: Simulation-Based Logic Bomb Identification/Verification For Unmanned Aerial Vehicles, Jake M. Magness

Theses and Dissertations

This research introduces SLIVer, a Simulation-based Logic Bomb Identification/Verification methodology, for finding logic bombs hidden within Unmanned Aerial Vehicle (UAV) autopilot code without having access to the device source code. Effectiveness is demonstrated by executing a series of test missions within a high-fidelity software-in-the-loop (SITL) simulator. In the event that a logic bomb is not detected, this methodology defines safe operating areas for UAVs to ensure to a high degree of confidence the UAV operates normally on the defined flight plan. SLIVer uses preplanned flight paths as the baseline input space, greatly reducing the input space that must be searched …


Assume-Guarantee Reasoning Using A Cyber Security Ontology, Ali Abdurhman Alfageeh May 2019

Assume-Guarantee Reasoning Using A Cyber Security Ontology, Ali Abdurhman Alfageeh

Theses and Dissertations

Design of a network is a challenging problem as it involves the integration of several complex components such as routers, servers, computers, smart devices. This is further complicated by the need to have robust security policies implemented to prevent violation of confidentiality as the networked devices interact. The design of such complex networked systems demand a more rigorous approach to the modeling and analysis, which can be inherited from the field of Software engineering. Presently, network or security engineers do not use a system/software engineering approach to design and build cybersecurity systems. Thus, we propose a system/software engineering approach to …


The Effect Of Modeling Simultaneous Events On Simulation Results, John M. Carboni Mar 2019

The Effect Of Modeling Simultaneous Events On Simulation Results, John M. Carboni

Theses and Dissertations

This thesis explores the method that governs the prioritizing process for simultaneous events in relation to simulation results for discrete-event simulations. Specifically, it contrasts typical discrete-event simulation (DES) execution algorithms with how events are selected and ordered by the discrete-event system specification (DEVS) formalism. The motivation for this research stems from a desire to understand how the selection of events affects simulation output (i.e., response). As a particular use case, we briefly investigate the processing of simultaneous events by the Advanced Framework for Simulation, Integration and Modeling (AFSIM), a military discrete-event combat modeling and simulation package. To facilitate the building …


Instantaneous Bandwidth Expansion Using Software Defined Radios, Nicholas D. Everett Mar 2019

Instantaneous Bandwidth Expansion Using Software Defined Radios, Nicholas D. Everett

Theses and Dissertations

The Stimulated Unintended Radiated Emissions (SURE) process has been proven capable of classifying a device (e.g. a loaded antenna) as either operational or defective. Currently, the SURE process utilizes a specialized noise radar which is bulky, expensive and not easily supported. With current technology advancements, Software Defined Radios (SDRs) have become more compact, more readily available and significantly cheaper. The research here examines whether multiple SDRs can be integrated to replace the current specialized ultra-wideband noise radar used with the SURE process. The research specifically targets whether or not multiple SDR sub-band collections can be combined to form a wider …


Near Real-Time Rf-Dna Fingerprinting For Zigbee Devices Using Software Defined Radios, Frankie A. Cruz Mar 2019

Near Real-Time Rf-Dna Fingerprinting For Zigbee Devices Using Software Defined Radios, Frankie A. Cruz

Theses and Dissertations

Low-Rate Wireless Personal Area Network(s) (LR-WPAN) usage has increased as more consumers embrace Internet of Things (IoT) devices. ZigBee Physical Layer (PHY) is based on the Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 specification designed to provide a low-cost, low-power, and low-complexity solution for Wireless Sensor Network(s) (WSN). The standard’s extended battery life and reliability makes ZigBee WSN a popular choice for home automation, transportation, traffic management, Industrial Control Systems (ICS), and cyber-physical systems. As robust and versatile as the standard is, ZigBee remains vulnerable to a myriad of common network attacks. Previous research involving Radio Frequency-Distinct Native Attribute …


Assessing The Quality Of Software Development Tutorials Available On The Web, Manziba A. Nishi Jan 2019

Assessing The Quality Of Software Development Tutorials Available On The Web, Manziba A. Nishi

Theses and Dissertations

Both expert and novice software developers frequently access software development resources available on the Web in order to lookup or learn new APIs, tools and techniques. Software quality is affected negatively when developers fail to find high-quality information relevant to their problem. While there is a substantial amount of freely available resources that can be accessed online, some of the available resources contain information that suffers from error proneness, copyright infringement, security concerns, and incompatible versions. Use of such toxic information can have a strong negative effect on developer’s efficacy. This dissertation focuses specifically on software tutorials, aiming to automatically …


Progressive Network Deployment, Performance, And Control With Software-Defined Networking, Daniel J. Casey Mar 2018

Progressive Network Deployment, Performance, And Control With Software-Defined Networking, Daniel J. Casey

Theses and Dissertations

The inflexible nature of traditional computer networks has led to tightly-integrated systems that are inherently difficult to manage and secure. New designs move low-level network control into software creating software-defined networks (SDN). Augmenting an existing network with these enhancements can be expensive and complex. This research investigates solutions to these problems. It is hypothesized that an add-on device, or "shim" could be used to make a traditional switch behave as an OpenFlow SDN switch while maintaining reasonable performance. A design prototype is found to cause approximately 1.5% reduction in throughput for one ow and less than double increase in latency, …


Quality Of Service Impacts Of A Moving Target Defense With Software-Defined Networking, Samuel A. Mayer Mar 2018

Quality Of Service Impacts Of A Moving Target Defense With Software-Defined Networking, Samuel A. Mayer

Theses and Dissertations

An analysis of the impact a defensive network technique implemented with software-defined networking has upon quality of service experienced by legitimate users. The research validates previous work conducted at AFIT to verify claims of defensive efficacy and then tests network protocols in common use (FTP, HTTP, IMAP, POP, RTP, SMTP, and SSH) on a network that uses this technique. Metrics that indicate the performance of the protocols under test are reported with respect to data gathered in a control network. The conclusions of these experiments enable network engineers to determine if this defensive technique is appropriate for the quality of …


An Analysis Of Multi-Domain Command And Control And The Development Of Software Solutions Through Devops Toolsets And Practices, Mason R. Bruza Mar 2018

An Analysis Of Multi-Domain Command And Control And The Development Of Software Solutions Through Devops Toolsets And Practices, Mason R. Bruza

Theses and Dissertations

Multi-Domain Command and Control (MDC2) is the exercise of command and control over forces in multiple operational domains (namely air, land, sea, space, and cyberspace) in order to produce synergistic effects in the battlespace, and enhancing this capability has become a major focus area for the United States Air Force (USAF). In order to meet demands for MDC2 software, solutions need to be acquired and/or developed in a timely manner, information technology infrastructure needs to be adaptable to new software requirements, and user feedback needs to drive iterative updates to fielded software. In commercial organizations, agile software development methodologies and …


A Behavior-Driven Recommendation System For Stack Overflow Posts, Chase D. Greco Jan 2018

A Behavior-Driven Recommendation System For Stack Overflow Posts, Chase D. Greco

Theses and Dissertations

Developers are often tasked with maintaining complex systems. Regardless of prior experience, there will inevitably be times in which they must interact with parts of the system with which they are unfamiliar. In such cases, recommendation systems may serve as a valuable tool to assist the developer in implementing a solution. Many recommendation systems in software engineering utilize the Stack Overflow knowledge-base as the basis of forming their recommendations. Traditionally, these systems have relied on the developer to explicitly invoke them, typically in the form of specifying a query. However, there may be cases in which the developer is in …


Consuming Digital Debris In The Plasticene, Stephen R. Parks Jan 2018

Consuming Digital Debris In The Plasticene, Stephen R. Parks

Theses and Dissertations

Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D …


High Volume Test Automation With Yeager, Casey Doran Dec 2017

High Volume Test Automation With Yeager, Casey Doran

Theses and Dissertations

High Volume Automated Testing is a powerful family of software testing techniques which enable a variety of testing goals, including the discovery of hard-to-reproduce bugs, which can enable new levels of quality assurance when applied correctly. This thesis presents a software tool, Yeager, which may be used in conjunction with existing test code to execute tests similar to Long Sequence Regression Tests based on an inferred state-model of the system under test as provided by tester annotations of state transitions caused by individual test code snippets. The usefulness of the package is evaluated through the development and deployment of a …


A Tree Locality-Sensitive Hash For Secure Software Testing, Camdon J. Cady Sep 2017

A Tree Locality-Sensitive Hash For Secure Software Testing, Camdon J. Cady

Theses and Dissertations

Bugs in software that make it through testing can cost tens of millions of dollars each year, and in some cases can even result in the loss of human life. In order to eliminate bugs, developers may use symbolic execution to search through possible program states looking for anomalous states. Most of the computational effort to search through these states is spent solving path constraints in order to determine the feasibility of entering each state. State merging can make this search more efficient by combining program states, allowing multiple execution paths to be analyzed at the same time. However, a …


A Survey Of Impact Analysis Tools For Effective Code Evolution, Stephanie Perez Day Galbo Apr 2017

A Survey Of Impact Analysis Tools For Effective Code Evolution, Stephanie Perez Day Galbo

Theses and Dissertations

Background: Software maintenance and evolution are becoming noticeably more im- portant activities in the software development process, with the growing popularity of Agile/SCRUM and continuous integration. Impact analysis, the activity of identifying the consequences of a change before the change is made, can help the developer under- stand the consequences of their potential changes and therefore make informed decisions about incremental changes, with the ultimate goal of minimizing negative impacts on the current baseline. To aid developers with impact analysis, there are a number of tools with a variety of capabilities to facilitate this process. Aim: In order to help …


Analysis Of Software Design Patterns In Human Cognitive Performance Experiments, Alexander C. Roosma Mar 2016

Analysis Of Software Design Patterns In Human Cognitive Performance Experiments, Alexander C. Roosma

Theses and Dissertations

As Air Force operations continue to move toward the use of more autonomous systems and more human-machine teaming in general, there is a corresponding need to swiftly evaluate systems with these capabilities. We support this development through software design improvements of the execution of human cognitive performance experiments. This thesis sought to answer the following two research questions addressing the core functionality that these experiments rely on for execution and analysis: 1) What data infrastructure software requirements are necessary to execute the experimental design of human cognitive performance experiments? 2) How effectively does a central data mediator design pattern meet …