Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (148)
- Databases and Information Systems (96)
- Graphics and Human Computer Interfaces (90)
- Computer Engineering (84)
- Artificial Intelligence and Robotics (82)
-
- Other Computer Sciences (75)
- Theory and Algorithms (72)
- Systems Architecture (67)
- Programming Languages and Compilers (55)
- Information Security (44)
- Electrical and Computer Engineering (43)
- Numerical Analysis and Scientific Computing (43)
- Social and Behavioral Sciences (34)
- Education (33)
- OS and Networks (33)
- Computer and Systems Architecture (30)
- Data Science (29)
- Medicine and Health Sciences (26)
- Business (25)
- Arts and Humanities (23)
- Life Sciences (19)
- Digital Communications and Networking (18)
- Other Computer Engineering (18)
- Adult and Continuing Education (15)
- Statistics and Probability (14)
- Mathematics (13)
- Operations Research, Systems Engineering and Industrial Engineering (13)
- Institution
-
- California Polytechnic State University, San Luis Obispo (86)
- Air Force Institute of Technology (84)
- California State University, San Bernardino (84)
- Western University (61)
- Edith Cowan University (40)
-
- Singapore Management University (33)
- University of Arkansas, Fayetteville (33)
- University of Tennessee, Knoxville (22)
- San Jose State University (19)
- The University of Akron (16)
- CCT College Dublin (15)
- Old Dominion University (14)
- Louisiana State University (12)
- United Arab Emirates University (12)
- University of Massachusetts Amherst (12)
- University of North Florida (12)
- Bard College (11)
- Dakota State University (11)
- Florida Institute of Technology (11)
- Governors State University (11)
- University of Kentucky (10)
- Kennesaw State University (9)
- Marquette University (9)
- Portland State University (9)
- University of Denver (9)
- University of New Orleans (9)
- Western Michigan University (9)
- Claremont Colleges (8)
- Munster Technological University (8)
- Boise State University (7)
- Keyword
-
- Software engineering (43)
- Computer Science (32)
- Machine Learning (26)
- Android (21)
- Software (19)
-
- Machine learning (18)
- Software Engineering (17)
- Mobile Application (15)
- Research Project (14)
- Computer science (13)
- Mobile (13)
- Application (12)
- Computer software -- Development (12)
- Deep learning (11)
- Software development (11)
- Deep Learning (10)
- Java (Computer program language) (10)
- Python (10)
- Security (10)
- Algorithms (9)
- Computer Vision (9)
- Computer software Development (9)
- Daniel Felix Ritchie School of Engineering and Computer Science (9)
- Software maintenance (9)
- Artificial Intelligence (8)
- Computer software (8)
- Java (8)
- Proton beams Therapeutic use (8)
- Thesis; University of North Florida; UNF; Dissertations (8)
- Virtual Reality (8)
- Publication Year
- Publication
-
- Theses and Dissertations (105)
- Theses Digitization Project (73)
- Electronic Thesis and Dissertation Repository (61)
- Master's Theses (36)
- Theses : Honours (28)
-
- Computer Science and Software Engineering (25)
- Dissertations and Theses Collection (Open Access) (25)
- Computer Engineering (24)
- Doctoral Dissertations (20)
- Electronic Theses and Dissertations (19)
- Honors Theses (19)
- Master's Projects (18)
- Theses (18)
- Computer Science and Computer Engineering Undergraduate Honors Theses (17)
- Williams Honors College, Honors Research Projects (16)
- ICT (15)
- Graduate Theses and Dissertations (14)
- Theses: Doctorates and Masters (12)
- UNF Graduate Theses and Dissertations (12)
- All Capstone Projects (11)
- Computer Science Theses & Dissertations (11)
- Dissertations (11)
- Electronic Theses, Projects, and Dissertations (11)
- Masters Theses & Doctoral Dissertations (11)
- LSU Doctoral Dissertations (10)
- Masters Theses (10)
- Theses and Dissertations--Computer Science (10)
- University of New Orleans Theses and Dissertations (9)
- Dissertations and Theses Collection (8)
- Boise State University Theses and Dissertations (7)
Articles 1 - 30 of 866
Full-Text Articles in Software Engineering
A Nlp Approach To Automating The Generation Of Surveys For Market Research, Anav Chug
A Nlp Approach To Automating The Generation Of Surveys For Market Research, Anav Chug
Honors College Theses
Market Research is vital but includes activities that are often laborious and time consuming. Survey questionnaires are one possible output of the process and market researchers spend a lot of time manually developing questions for focus groups. The proposed research aims to develop a software prototype that utilizes Natural Language Processing (NLP) to automate the process of generating survey questions for market research. The software uses a pre-trained Open AI language model to generate multiple choice survey questions based on a given product prompt, send it to a targeted email list, and also provides a real-time analysis of the responses …
Improving Automatic Transcription Using Natural Language Processing, Anna Kiefer
Improving Automatic Transcription Using Natural Language Processing, Anna Kiefer
Master's Theses
Digital Democracy is a CalMatters and California Polytechnic State University initia-
tive to promote transparency in state government by increasing access to the Califor-
nia legislature. While Digital Democracy is made up of many resources, one founda-
tional step of the project is obtaining accurate, timely transcripts of California Senate
and Assembly hearings. The information extracted from these transcripts provides
crucial data for subsequent steps in the pipeline. In the context of Digital Democracy,
upleveling is when humans verify, correct, and annotate the transcript results after
the legislative hearings have been automatically transcribed. The upleveling process
is done with the …
Escape The Planet: Revolutionizing Game Design With Novel Oop Techniques, Qusai Kamal Fannoun
Escape The Planet: Revolutionizing Game Design With Novel Oop Techniques, Qusai Kamal Fannoun
All Graduate Theses, Dissertations, and Other Capstone Projects
Mobile devices are continuously evolving and greater computing power and graphics capabilities are being introduced every year. As a result, there is an increasing demand for challenging and engaging mobile games that leverage these advanced features. This project explores best design practices using the development of Escape the Planet, which is an intricate maze game for mobile devices in which players navigate using a spaceship that is trapped in a hostile planet’s maze while avoiding obstacles and enemy attacks. The goal is to safely guide the spaceship out of the maze without colliding into walls or taking bullets from defensive …
Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System For Efficient, Sustainable, And Self-Adaptive Urban Environments, Elham Okhovat
Electronic Thesis and Dissertation Repository
This thesis proposes the concept of the Policy-based Autonomic Smart City Management System, an innovative framework designed to comprehensively manage diverse aspects of urban environments, ranging from environmental conditions such as temperature and air quality to the infrastructure which comprises multiple layers of infrastructure, from sensors and devices to advanced IoT platforms and applications. Efficient management requires continuous monitoring of devices and infrastructure, data analysis, and real-time resource assessment to ensure seamless city operations and improve residents' quality of life. Automating data monitoring is essential due to the vast array of hardware and data exchanges, and round-the-clock monitoring is critical. …
Cm-Ii Meditation As An Intervention To Reduce Stress And Improve Attention: A Study Of Ml Detection, Spectral Analysis, And Hrv Metrics, Sreekanth Gopi
Cm-Ii Meditation As An Intervention To Reduce Stress And Improve Attention: A Study Of Ml Detection, Spectral Analysis, And Hrv Metrics, Sreekanth Gopi
Master of Science in Computer Science Theses
Students frequently face heightened stress due to academic and social pressures, particularly in de- manding fields like computer science and engineering. These challenges are often associated with serious mental health issues, including ADHD (Attention Deficit Hyperactivity Disorder), depression, and an increased risk of suicide. The average student attention span has notably decreased from 21⁄2 minutes to just 47 seconds, and now it typically takes about 25 minutes to switch attention to a new task (Mark, 2023). Research findings suggest that over 95% of individuals who die by suicide have been diagnosed with depression (Shahtahmasebi, 2013), and almost 20% of students …
Towards Safer Code Reuse: Investigating And Mitigating Security Vulnerabilities And License Violations In Copy-Based Reuse Scenarios, David Reid
Doctoral Dissertations
Background: A key benefit of open source software is the ability to copy code to reuse in other projects. Code reuse provides benefits such as faster development time, lower cost, and improved quality. There are several ways to reuse open source software in new projects including copy-based reuse, library reuse, and the use of package managers. This work specifically looks at copy-based code reuse.
Motivation: Code reuse has many benefits, but also has inherent risks, including security and legal risks. The reused code may contain security vulnerabilities, license violations, or other issues. Security vulnerabilities may persist in projects that copy …
Impact Of Covid-19 On Security Vulnerabilities Of Learning Management Systems: A Study Towards Security And Sustainability Enhancement, Souheil Abdel-Latif Akacha
Impact Of Covid-19 On Security Vulnerabilities Of Learning Management Systems: A Study Towards Security And Sustainability Enhancement, Souheil Abdel-Latif Akacha
Theses
The rapid adoption of Learning Management Systems (LMSs) like Moodle, Chamilo, and Ilias became essential for online education due to the Coronavirus Disease 2019 (COVID-19) pandemic, revolutionizing online learning while exposing security vulnerabilities. This thesis explores security concerns within these LMSs across different pandemic periods. By analyzing existing patches, security measures, and emerging cybersecurity technologies, recommendations are formulated to enhance LMS security against evolving cyber threats, providing actionable insights for educational institutions to ensure secure online education continuity. The numerical findings highlight the increasing need for proactive security measures in Moodle, the fluctuating nature of vulnerabilities in Chamilo, and the …
A Novel Multi-Model Patient Similarity Network Driven By Federated Data Quality And Resource Profiling, Alramzana Nujum Navaz
A Novel Multi-Model Patient Similarity Network Driven By Federated Data Quality And Resource Profiling, Alramzana Nujum Navaz
Dissertations
Smart and Connected Health (SCH) is revolutionizing healthcare by leveraging extensive healthcare data for precise, personalized medicine. At its core, SCH relies on the concept of patient similarity, which involves the comparative analysis of newly encountered patients with those who exhibit comparable similarities from the existing patient cohort. Yet, this approach faces significant challenges, including data heterogeneity and dimensionality. Our research introduces a multi-dimensional Patient Similarity Network (PSN) Fusion model tailored to handle both static and dynamic features. The static data analysis focuses on extracting contextual information using Bidirectional Encoder Representations from Transformers (BERT), while dynamic features are captured through …
Enhancing Autism Education: Exploring Interactive Videos And Ai Integration For Effective Teaching, Fatima Ahmed Alraeesi
Enhancing Autism Education: Exploring Interactive Videos And Ai Integration For Effective Teaching, Fatima Ahmed Alraeesi
Theses
This research focuses on enhancing autism education by integrating interactive videos and AI solutions to improve teacher training. As the number of autistic students rises, it becomes crucial for special education teachers to employ effective teaching strategies tailored to individual needs. The most effective teaching methods for autistic students involve understanding the condition and incorporating customized instruction strategies, such as adapting assignments to suit the student's needs, assisting those with difficulty speaking, and employing visual aids for better organization. The proposed solution involves utilizing interactive video technology to train teachers, bridging the gap between research and practical implementation of educational …
Learning Representations For Effective And Explainable Software Bug Detection And Fixing, Yi Li
Learning Representations For Effective And Explainable Software Bug Detection And Fixing, Yi Li
Dissertations
Software has an integral role in modern life; hence software bugs, which undermine software quality and reliability, have substantial societal and economic implications. The advent of machine learning and deep learning in software engineering has led to major advances in bug detection and fixing approaches, yet they fall short of desired precision and recall. This shortfall arises from the absence of a 'bridge,' known as learning code representations, that can transform information from source code into a suitable representation for effective processing via machine and deep learning.
This dissertation builds such a bridge. Specifically, it presents solutions for effectively learning …
Program Analysis For Android Security And Reliability, Sydur Rahaman
Program Analysis For Android Security And Reliability, Sydur Rahaman
Dissertations
The recent, widespread growth and adoption of mobile devices have revolutionized the way users interact with technology. As mobile apps have become increasingly prevalent, concerns regarding their security and reliability have gained significant attention. The ever-expanding mobile app ecosystem presents unique challenges in ensuring the protection of user data and maintaining app robustness. This dissertation expands the field of program analysis with techniques and abstractions tailored explicitly to enhancing Android security and reliability. This research introduces approaches for addressing critical issues related to sensitive information leakage, device and user fingerprinting, mobile medical score calculators, as well as termination-induced data loss. …
Form Auto Generation: An Analysis Of Gui Generation, Jedadiah Mcfarland
Form Auto Generation: An Analysis Of Gui Generation, Jedadiah Mcfarland
Theses/Capstones/Creative Projects
Graphical User Interfaces (GUIs) have transformed how we interact with computers, offering visually appealing and intuitive systems. This paper explores the origins and evolution of GUIs, explicitly focusing on form auto-generation in modern GUI-driven environments. Form auto-generation has emerged as a prominent practice, enabling automatic form creation based on predefined models. To better understand form auto-generation, I investigate SurveyJS, an open-source form auto-generation library known for its active development and support. This investigation aims to understand how SurveyJS recognizes and renders objects from a JSON model. The methodology involves a trial and error examination of the library, exploring its live …
Optimizing Collective Communication For Scalable Scientific Computing And Deep Learning, Jiali Li
Optimizing Collective Communication For Scalable Scientific Computing And Deep Learning, Jiali Li
Doctoral Dissertations
In the realm of distributed computing, collective operations involve coordinated communication and synchronization among multiple processing units, enabling efficient data exchange and collaboration. Scientific applications, such as simulations, computational fluid dynamics, and scalable deep learning, require complex computations that can be parallelized across multiple nodes in a distributed system. These applications often involve data-dependent communication patterns, where collective operations are critical for achieving high performance in data exchange. Optimizing collective operations for scientific applications and deep learning involves improving the algorithms, communication patterns, and data distribution strategies to minimize communication overhead and maximize computational efficiency.
Within the context of this …
Contactless Food Ordering System, Rishivar Kumar Goli
Contactless Food Ordering System, Rishivar Kumar Goli
Electronic Theses, Projects, and Dissertations
Contactless food ordering has revolutionized the way a customer interacts with restaurants by allowing them to place orders and make transactions. Through these web-based platforms, customers can now browse menus, customize orders, and make payments seamlessly. By scanning the restaurant’s QR code, customers can reserve a table. If the table is available, then automatically it will be reserved. However, if the table is occupied the customer will be added to the waiting list. Once the customer selects desired food then they can securely make payments based on ordered food items. The food will be delivered straight to the customer's table. …
Web Based Management System For Housing Society, Likhitha Reddy Eddala
Web Based Management System For Housing Society, Likhitha Reddy Eddala
Electronic Theses, Projects, and Dissertations
Web Based Management System for Housing Society plays a major role in our day-to-day life. We develop a global web dependent application using AngularJS, Node JS and MySQL, with Xampp as the server to make an effective management system. This system is designed to provide a user-friendly and efficient platform for managing all the details of daily notices, monthly meetings, events, payments, maids etc., This system mainly consists of three modules, they are: Admin, User and Security. Each module here serves specific features and functionalities present within society. Admin module provides the features for managing user, houses, security, maids, notices, …
Restaurant Management Website, Akhil Sai Gollapudi
Restaurant Management Website, Akhil Sai Gollapudi
Electronic Theses, Projects, and Dissertations
In the ever-evolving corporate landscape of today, it is crucial to respond to customer needs as efficiently and in a timely manner as possible. The project's primary objective is to create a method for clients to make reservations for restaurants online. This makes life easier for busy customers in their daily life.
Today, people are looking for comfort thanks to rapidly developing technology. As we can see, people invent and implement new technologies in all fields according to customer needs.
We got a unique restaurant idea that helps people save time. People prefer quick methods to get things done. With …
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Electronic Thesis and Dissertation Repository
In today’s data-driven world, Information Systems, particularly the ones operating in regulated industries, require comprehensive security frameworks to protect against loss of confidentiality, integrity, or availability of data, whether due to malice, accident or otherwise. Once such a security framework is in place, an organization must constantly monitor and assess the overall compliance of its systems to detect and rectify any issues found. This thesis presents a technique and a supporting toolkit to first model dependencies between security policies (referred to as controls) and, second, devise models that associate risk with policy violations. Third, devise algorithms that propagate risk when …
Evaluating The Likelihood Of Bug Inducing Commits Using Metrics Trend Analysis, Parul Parul
Evaluating The Likelihood Of Bug Inducing Commits Using Metrics Trend Analysis, Parul Parul
Electronic Thesis and Dissertation Repository
Continuous software engineering principles advocate a release-small, release-often process model, where new functionality is added to a system, in small increments and very frequently. In such a process model, every time a change is introduced it is important to identify as early as possible, whether the system has entered a state where faults are more likely to occur. In this paper, we present a method that is based on process, quality, and source code metrics to evaluate the likelihood that an imminent bug-inducing commit is highly probable. More specifically, the method analyzes the correlations and the rate of change of …
Job Management Portal Software Review, Ruchir Elukurthy
Job Management Portal Software Review, Ruchir Elukurthy
University Honors Theses
This essay provides an overview of a computer science capstone project focused on developing a website for Abilities At Work, a non-profit organization. The website aims to assist employment specialists in managing clients' information and tracking their job application in finding meaningful employment. The essay highlights the various stages of the project, understanding requirements, selecting tools and technologies, creating an application architecture, and writing code. Also, this essay focuses on the challenges encountered during the project, along with the valuable lessons learned. This essay emphasizes how the project closely resembles real-world software development, offering insights for prospective students and professionals. …
Stream-Evolving Bot Detection Framework Using Graph-Based And Feature-Based Approaches For Identifying Social Bots On Twitter, Eiman Alothali
Stream-Evolving Bot Detection Framework Using Graph-Based And Feature-Based Approaches For Identifying Social Bots On Twitter, Eiman Alothali
Dissertations
This dissertation focuses on the problem of evolving social bots in online social networks, particularly Twitter. Such accounts spread misinformation and inflate social network content to mislead the masses. The main objective of this dissertation is to propose a stream-based evolving bot detection framework (SEBD), which was constructed using both graph- and feature-based models. It was built using Python, a real-time streaming engine (Apache Kafka version 3.2), and our pretrained model (bot multi-view graph attention network (Bot-MGAT)). The feature-based model was used to identify predictive features for bot detection and evaluate the SEBD predictions. The graph-based model was used to …
Blockchain-Enabled Ehr Sharing In Healthcare Federation: Sharding And Interblockchain Communication, Faiza Hashim
Blockchain-Enabled Ehr Sharing In Healthcare Federation: Sharding And Interblockchain Communication, Faiza Hashim
Dissertations
Electronic Health Records (EHRs) are crucial components of the healthcare system, facilitating accurate and efficient diagnosis. Blockchain technology has emerged as a promising solution to improve EHRs sharing among medical practitioners while ensuring privacy and security. By leveraging its decentralized, distributed, immutable, and secure architecture, blockchain has the potential to revolutionize the healthcare system. However, due to security concerns, blockchain networks in healthcare typically operate in private or consortium modes, resulting in isolated networks within a federation. Scalability remains a significant challenge for blockchain networks, as the number of participating nodes increases within each network of the federation. Consensus mechanisms …
Mapping Programs To Equations, Hessamaldin Mohammadi
Mapping Programs To Equations, Hessamaldin Mohammadi
Dissertations
Extracting the function of a program from a static analysis of its source code is a valuable capability in software engineering; at a time when there is increasing talk of using AI (Artificial Intelligence) to generate software from natural language specifications, it becomes increasingly important to determine the exact function of software as written, to figure out what AI has understood the natural language specification to mean. For all its criticality, the ability to derive the domain-to-range function of a program has proved to be an elusive goal, due primarily to the difficulty of deriving the function of iterative statements. …
Algorithmic Bias: Causes And Effects On Marginalized Communities, Katrina M. Baha
Algorithmic Bias: Causes And Effects On Marginalized Communities, Katrina M. Baha
Undergraduate Honors Theses
Individuals from marginalized backgrounds face different healthcare outcomes due to algorithmic bias in the technological healthcare industry. Algorithmic biases, which are the biases that arise from the set of steps used to solve or analyze a problem, are evident when people from marginalized communities use healthcare technology. For example, many pulse oximeters, which are the medical devices used to measure oxygen saturation in the blood, are not able to accurately read people who have darker skin tones. Thus, people with darker skin tones are not able to receive proper health care due to their pulse oximetry data being inaccurate. This …
Visualized Algorithm Engineering On Two Graph Partitioning Problems, Zizhen Chen
Visualized Algorithm Engineering On Two Graph Partitioning Problems, Zizhen Chen
Computer Science and Engineering Theses and Dissertations
Concepts of graph theory are frequently used by computer scientists as abstractions when modeling a problem. Partitioning a graph (or a network) into smaller parts is one of the fundamental algorithmic operations that plays a key role in classifying and clustering. Since the early 1970s, graph partitioning rapidly expanded for applications in wide areas. It applies in both engineering applications, as well as research. Current technology generates massive data (“Big Data”) from business interactions and social exchanges, so high-performance algorithms of partitioning graphs are a critical need.
This dissertation presents engineering models for two graph partitioning problems arising from completely …
Beyond Algorithms: A User-Centered Evaluation Of A Feature Recommender System In Requirements Engineering, Oluwatobi Lasisi
Beyond Algorithms: A User-Centered Evaluation Of A Feature Recommender System In Requirements Engineering, Oluwatobi Lasisi
Theses and Dissertations
Several studies have applied recommender technologies to support requirements engineering activities. As in other application areas of recommender systems (RS), many studies have focused on the algorithms’ prediction accuracy, while there have been limited discussions around users’ interactions with the systems. Since recommender systems are designed to aid users in information retrieval, they should be assessed not just as recommendation algorithms but also from the users’ perspective. In contrast to accuracy measures, user-related issues can only be effectively investigated via empirical studies involving real users. Furthermore, researchers are becoming increasingly aware that the effectiveness of the systems goes beyond recommendation …
Procedural Level Generation For A Top-Down Roguelike Game, Kieran Ahn, Tyler Edmiston
Procedural Level Generation For A Top-Down Roguelike Game, Kieran Ahn, Tyler Edmiston
Honors Thesis
In this file, I present a sequence of algorithms that handle procedural level generation for the game Fragment, a game designed for CMSI 4071 and CMSI 4071 in collaboration with students from the LMU Animation department. I use algorithms inspired by graph theory and implementing best practices to the best of my ability. The full level generation sequence is comprised of four algorithms: the terrain generation, boss room placement, player spawn point selection, and enemy population. The terrain generation algorithm takes advantage of tree traversal methods to create a connected graph of walkable tiles. The boss room placement algorithm randomly …
Interactive Data Analysis Of Multi-Run Performance Data, Vanessa Lama
Interactive Data Analysis Of Multi-Run Performance Data, Vanessa Lama
Masters Theses
Multi-dimensional performance data analysis presents challenges for programmers, and users. Developers have to choose library and compiler options for each platform, analyze raw performance data, and keep up with new technologies. Users run codes on different platforms, validate results with collaborators, and analyze performance data as applications scale up. Site operators use multiple profiling tools to optimize performance, requiring the analysis of multiple sources and data types. There is currently no comprehensive tool to support the structured analysis of unstructured data, when holistic performance data analysis can offer actionable insights and improve performance. In this work, we present thicket, a …
Code Generation Based On Inference And Controlled Natural Language Input, Howard R. Dittmer
Code Generation Based On Inference And Controlled Natural Language Input, Howard R. Dittmer
College of Computing and Digital Media Dissertations
Over time the level of abstraction embodied in programming languages has continued to grow. Paradoxically, most programming languages still require programmers to conform to the language's rigid constructs. These constructs have been implemented in the name of efficiency for the computer. However, the continual increase in computing power allows us to consider techniques not so limited. To this end, we have created CABERNET, a Controlled Natural Language (CNL) based approach to program creation. CABERNET allows programmers to use a simple outline-based syntax. This syntax enables increased programmer efficiency.
CNLs have previously been used to document requirements. We have taken this …
Domain Specific Analysis Of Privacy Practices And Concerns In The Mobile Application Market, Fahimeh Ebrahimi Meymand
Domain Specific Analysis Of Privacy Practices And Concerns In The Mobile Application Market, Fahimeh Ebrahimi Meymand
LSU Doctoral Dissertations
Mobile applications (apps) constantly demand access to sensitive user information in exchange for more personalized services. These-mostly unjustified-data collection tactics have raised major privacy concerns among mobile app users. Existing research on mobile app privacy aims to identify these concerns, expose apps with malicious data collection practices, assess the quality of apps' privacy policies, and propose automated solutions for privacy leak detection and prevention. However, existing solutions are generic, frequently missing the contextual characteristics of different application domains. To address these limitations, in this dissertation, we study privacy in the app store at a domain level. Our objective is to …
Defining Safe Training Datasets For Machine Learning Models Using Ontologies, Lynn C. Vonder Haar
Defining Safe Training Datasets For Machine Learning Models Using Ontologies, Lynn C. Vonder Haar
Doctoral Dissertations and Master's Theses
Machine Learning (ML) models have been gaining popularity in recent years in a wide variety of domains, including safety-critical domains. While ML models have shown high accuracy in their predictions, they are still considered black boxes, meaning that developers and users do not know how the models make their decisions. While this is simply a nuisance in some domains, in safetycritical domains, this makes ML models difficult to trust. To fully utilize ML models in safetycritical domains, there needs to be a method to improve trust in their safety and accuracy without human experts checking each decision. This research proposes …