Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Computer Sciences

A Neural Analysis-Synthesis Approach To Learning Procedural Audio Models, Danzel Serrano Dec 2022

A Neural Analysis-Synthesis Approach To Learning Procedural Audio Models, Danzel Serrano

Theses

The effective sound design of environmental sounds is crucial to demonstrating an immersive experience. Classical Procedural Audio (PA) models have been developed to give the sound designer a fast way to synthesize a specific class of environmental sounds in a physically accurate and computationally efficient manner. These models are controllable due to the choice of parameters from analyzing a class of sound. However, the resulting synthesis lacks the fidelity for the preferred immersive experience; thus, the sound designer would rather search through an extensive database for real recordings of a target sound class. This thesis proposes the Procedural audio Variational …


A Data Driven Model To Promote Preparedness And Respond Intelligently To Pandemic Outbreaks, Safea Mohammed Al Senani Nov 2022

A Data Driven Model To Promote Preparedness And Respond Intelligently To Pandemic Outbreaks, Safea Mohammed Al Senani

Theses

The COVID-19 pandemic has had a major effect on various vital sectors of the economy, including education healthcare, and the industry. Governments have imposed strict regulations to reduce the spread of this global disease outbreak. Consequently, working from home, online learning, social distancing and various control measures were enforced. In response, many schools shifted to distance learning, although most of these schools were neither technically ready nor administratively prepared for the online transition. Despite recent progress, countries are still experiencing daunting challenges to control the infection rate and magnitude, stabilize the economy, and relax socialization and public life activities. Decision-makers …


A Blockchain Based Policy Framework For The Management Of Electronic Health Record (Ehrs), Aysha Ali Mohammed Murad Qambar Nov 2022

A Blockchain Based Policy Framework For The Management Of Electronic Health Record (Ehrs), Aysha Ali Mohammed Murad Qambar

Theses

The rapid development of information technology during the last decade has greatly influenced all aspects of society, including individuals and enterprise organizations. Adopting new technologies by individuals and organizations depends on several factors, such as usability, available resources, support needed for adoption benefits, and return on investment, to mention a few. When it comes to the adoption of new technologies, one of the main challenges faced by organizations is the ability to effectively incorporate such technologies into their enterprise solutions to maximize the expected benefits. For the last several years, Blockchain technology has become a popular trend in a variety …


Efficient And Scalable Triangle Centrality Algorithms In The Arkouda Framework, Joseph Thomas Patchett Aug 2022

Efficient And Scalable Triangle Centrality Algorithms In The Arkouda Framework, Joseph Thomas Patchett

Theses

Graph data structures provide a unique challenge for both analysis and algorithm development. These data structures are irregular in that memory accesses are not known a priori and accesses to these structures tend to lack locality.

Despite these challenges, graph data structures are a natural way to represent relationships between entities and to exhibit unique features about these relationships. The network created from these relationships can create unique local structures that can describe the behavior between members of these structures. Graphs can be analyzed in a number of different ways including at a high level in community detection and at …


Determining Knowledge From Student Performance Prediction Using Machine Learning, Wala El Rashied Mohamed Jun 2022

Determining Knowledge From Student Performance Prediction Using Machine Learning, Wala El Rashied Mohamed

Theses

Recent years have seen a rapid development in the field of educational data mining (EDM), enhancing the ability to trace student knowledge. Data from intelligent tutoring systems (ITS) have been analyzed and interpreted by multiple researchers seeking to measure students’ knowledge as it evolves. Human nature, as well as other factors, makes it difficult to determine whether or not students are knowledgeable. This thesis sets out to examine the level of students’ knowledge by predicting their current and future academic performance based on records of their historical interactions. By restructuring data and considering a student perspective, we can gain insight …


A Multi-Criteria Decision-Making (Mcdm) Approach For Data-Driven Distance Learning Recommendations, Aysha Meshaal Alshamsi Jun 2022

A Multi-Criteria Decision-Making (Mcdm) Approach For Data-Driven Distance Learning Recommendations, Aysha Meshaal Alshamsi

Theses

Distance learning has been adopted as an alternative learning strategy to the dominant face-to-face teaching methodology. It has been largely implemented by many governments worldwide due to the spread of the COVID-19 pandemic and the implication in enforcing lockdown and social distancing. In emergency situations distance learning is referred to as Emergency Remote Teaching (ERT). Due to this dynamic, sudden shift, and scaling demand in distance learning, many challenges have been accentuated. These include technological adoption, student commitments, parent involvement, and teacher extra burden management, changes in the organization methodology, in addition to government development of new guidelines and regulations …


Un-Fair Trojan: Targeted Backdoor Attacks Against Model Fairness, Nicholas Furth May 2022

Un-Fair Trojan: Targeted Backdoor Attacks Against Model Fairness, Nicholas Furth

Theses

Machine learning models have been shown to be vulnerable against various backdoor and data poisoning attacks that adversely affect model behavior. Additionally, these attacks have been shown to make unfair predictions with respect to certain protected features. In federated learning, multiple local models contribute to a single global model communicating only using local gradients, the issue of attacks become more prevalent and complex. Previously published works revolve around solving these issues both individually and jointly. However, there has been little study on the effects of attacks against model fairness. Demonstrated in this work, a flexible attack, which we call Un-Fair …


Eye-Tracking Using Deep Learning, Sam Trenter Apr 2022

Eye-Tracking Using Deep Learning, Sam Trenter

Theses

Eye-tracking can be valuable for researchers in many domains. Most eye-tracking technologies require an extra piece of costly hardware. Several other available eye-tracking solutions are usually not very accurate and require a costly subscription. Our project was oriented at creating a free and open-source alternative that does not require additional equipment. We developed a deep learning-based solution as a prototype for this project. Specifically, we developed a deep learning model to predict a user’s gaze position on the screen. We created our training data set using a commercially available eye-tracker to train the model. Each training sample consists of a …


Authenticated Key Establishment Protocol For Constrained Smart Healthcare Systems Based On Physical Unclonable Function, Abdalla Saleh Elkushli Apr 2022

Authenticated Key Establishment Protocol For Constrained Smart Healthcare Systems Based On Physical Unclonable Function, Abdalla Saleh Elkushli

Theses

Smart healthcare systems are one of the critical applications of the internet of things. They benefit many categories of the population and provide significant improvement to healthcare services. Smart healthcare systems are also susceptible to many threats and exploits because they run without supervision for long periods of time and communicate via open channels. Moreover, in many implementations, healthcare sensor nodes are implanted or miniaturized and are resource-constrained. The potential risks on patients/individuals’ life from the threats necessitate that securing the connections in these systems is of utmost importance. This thesis provides a solution to secure end-to-end communications in such …


Design And Implementation Of Photovoltaic Energy Harvesting Automaton, Iskandar Askarov Jan 2022

Design And Implementation Of Photovoltaic Energy Harvesting Automaton, Iskandar Askarov

Theses

Global domestic electricity consumption has been rapidly increasing in the past three decades. In fact, from 1990 to 2020, consumption has more than doubled from 10,120 TWh to 23,177 TWh [1]. Moreover, consumers have been turning more towards clean, renewable energy sources such as Photovoltaic. According to International Energy Agency, global Solar power generation alone in 2019 has reached almost 3% [4] of the electricity supply. Even though the efficiency of photovoltaic panels has been growing, presently, the highest efficiency solar panels available to an average consumer range only from 20%-22% [14]. Many research papers have been published to increase …