Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Computer Science

Institution
Publication Year
Publication
Publication Type

Articles 31 - 60 of 586

Full-Text Articles in Entire DC Network

Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha Jan 2023

Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha

Browse all Theses and Dissertations

Smart cities have emerged to tackle many critical problems that can thwart the overwhelming urbanization process, such as traffic jams, environmental pollution, expensive health care, and increasing energy demand. This Master thesis proposes efficient and high-quality cloud-based machine-learning solutions for efficient and sustainable smart cities environment. Different supervised machine-learning models for air quality predication (AQP) in efficient and sustainable smart cities environment is developed. For that, ML-based techniques are implemented using cloud-based solutions. For example, regression and classification methods are implemented using distributed cloud computing to forecast air execution time and accuracy of the implemented ML solution. These models are …


Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan Jan 2023

Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan

Browse all Theses and Dissertations

Deploying Mandatory Access Controls (MAC) is a popular way to provide host protection against malware. Unfortunately, current implementations lack the flexibility to adapt to emergent malware threats and are known for being difficult to configure. A core tenet of MAC security systems is that the policies they are deployed with are immutable from the host while they are active. This work looks at deploying a MAC system that leverages using encrypted security tokens to allow for redeploying policy configurations in real-time without the need to stop a running process. This is instrumental in developing an adaptive framework for security systems …


The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii Jan 2023

The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii

Browse all Theses and Dissertations

The widespread expansion of Electric Vehicles (EV) throughout the world creates a requirement for charging stations. While Cybersecurity research is rapidly expanding in the field of Electric Vehicle Infrastructure, efforts are impacted by the availability of testing platforms. This paper presents a solution called the “Open Charge Point Protocol (OCPP) Cyber Range.” Its purpose is to conduct Cybersecurity research against vulnerabilities in the OCPP v1.6 protocol. The OCPP Cyber Range can be used to enable current or future research and to train operators and system managers of Electric Charge Vehicle Supply Equipment (EVSE). This paper demonstrates this solution using three …


Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee Jan 2023

Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee

Browse all Theses and Dissertations

This research explores data-driven AI techniques to extract insights from relevant medical data for pain management in patients with Sickle Cell Disease (SCD). SCD is an inherited red blood cell disorder that can cause a multitude of complications throughout an individual’s life. Most patients with SCD experience repeated, unpredictable episodes of severe pain. Arguably, the most challenging aspect of treating pain episodes in SCD is assessing and interpreting the patient’s pain intensity level due to the subjective nature of pain. In this study, we leverage multiple data-driven AI techniques to improve pain management in patients with SCD. The proposed approaches …


Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh Jan 2023

Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh

Browse all Theses and Dissertations

The Internet of Things (IoT) is used in many fields that generate sensitive data, such as healthcare and surveillance. Increased reliance on IoT raised serious information security concerns. This dissertation presents three systems for analyzing and classifying IoT traffic using Deep Learning (DL) models, and a large dataset is built for systems training and evaluation. The first system studies the effect of combining raw data and engineered features to optimize the classification of encrypted and compressed IoT traffic using Engineered Features Classification (EFC), Raw Data Classification (RDC), and combined Raw Data and Engineered Features Classification (RDEFC) approaches. Our results demonstrate …


Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman Jan 2023

Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman

Browse all Theses and Dissertations

Insider threats to information security have become a burden for organizations. Understanding insider activities leads to an effective improvement in identifying insider attacks and limits their threats. This dissertation presents three systems to detect insider threats effectively. The aim is to reduce the false negative rate (FNR), provide better dataset use, and reduce dimensionality and zero padding effects. The systems developed utilize deep learning techniques and are evaluated using the CERT 4.2 dataset. The dataset is analyzed and reformed so that each row represents a variable length sample of user activities. Two data representations are implemented to model extracted features …


A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham Jan 2023

A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham

Browse all Theses and Dissertations

The Industrial Internet of Things (IIoT) refers to a set of smart devices, i.e., actuators, detectors, smart sensors, and autonomous systems connected throughout the Internet to help achieve the purpose of various industrial applications. Unfortunately, IIoT applications are increasingly integrated into insecure physical environments leading to greater exposure to new cyber and physical system attacks. In the current IIoT security realm, effective anomaly detection is crucial for ensuring the integrity and reliability of critical infrastructure. Traditional security solutions may not apply to IIoT due to new dimensions, including extreme energy constraints in IIoT devices. Deep learning (DL) techniques like Convolutional …


Accelerating Precision Station Keeping For Automated Aircraft, James D. Anderson Jan 2023

Accelerating Precision Station Keeping For Automated Aircraft, James D. Anderson

Browse all Theses and Dissertations

Automated vehicles pose challenges in various research domains, including robotics, machine learning, computer vision, public safety, system certification, and beyond. These vehicles autonomously handle navigation and locomotion, often requiring minimal user interaction, and can operate on land, in water, or in the air. In the context of aircraft, one specific application is Automated Aerial Refueling (AAR). Traditional aerial refueling involves a "tanker" aircraft using a mechanism, such as a rigid boom arm or a flexible hose, to transfer fuel to another aircraft designated as the "receiver". For AAR, the boom arm may be maneuvered automatically, or in certain instances the …


Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams Jan 2023

Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams

Browse all Theses and Dissertations

Obtaining accurate inferences from deep neural networks is difficult when models are trained on instances with conflicting labels. Algorithmic recognition of online hate speech illustrates this. No human annotator is perfectly reliable, so multiple annotators evaluate and label online posts in a corpus. Labeling scheme limitations, differences in annotators' beliefs, and limits to annotators' honesty and carefulness cause some labels to disagree. Consequently, decisive and accurate inferences become less likely. Some practical applications such as social research can tolerate some indecisiveness. However, an online platform using an indecisive classifier for automated content moderation could create more problems than it solves. …


The Future Between Quantum Computing And Cybersecurity, Daniel Dorazio Jan 2023

The Future Between Quantum Computing And Cybersecurity, Daniel Dorazio

Williams Honors College, Honors Research Projects

Quantum computing, a novel branch of technology based on quantum theory, processes information in ways beyond the capabilities of classical computers. Traditional computers use binary digits [bits], but quantum computers use quantum binary digits [qubits] that can exist in multiple states simultaneously. Since developing the first two-qubit quantum computer in 1998, the quantum computing field has experienced rapid growth.

Cryptographic algorithms such as RSA and ECC, essential for internet security, rely on the difficulty of complex math problems that classical computers can’t solve. However, the advancement of quantum technology threatens these encryption systems. Algorithms, such as Shor’s, leverage the power …


Digital Archaeology: Detection Of Archaeological Structures Using Convolutional Neural Networks On Aerial Lidar Data, Katie Larue Jan 2023

Digital Archaeology: Detection Of Archaeological Structures Using Convolutional Neural Networks On Aerial Lidar Data, Katie Larue

WWU Honors College Senior Projects

Archaeology is a field that is mostly done by hand. Archaeologists explore remote and unknown areas of the world to find undiscovered civilizations that will give us any idea about how people lived in the past. To speed up this process, Airborne light detection and ranging or LiDAR systems have been used to great effect to speed up this processing. However, we still require domain experts to annotate this information to confirm structures. Deep learning has the potential to speed up this process and the following presentation is a basic overview of machine learning, popular types of deep learning models, …


Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn Dec 2022

Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn

Culminating Experience Projects

This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …


Wordmuse, John M. Nelson Dec 2022

Wordmuse, John M. Nelson

Computer Science and Software Engineering

Wordmuse is an application that allows users to enter a song and a list of keywords to create a new song. Built on Spotify's API, this project showcases the fusion of music composition and artificial intelligence. This paper also discusses the motivation, design, and creation of Wordmuse.


Predicting Startup Success Using Publicly Available Data, Emily Gavrilenko Dec 2022

Predicting Startup Success Using Publicly Available Data, Emily Gavrilenko

Master's Theses

Predicting the success of an early-stage startup has always been a major effort for investors and venture funds. Statistically, there are about 305 million total startups created in a year, but less than 10% of them succeed to become profitable businesses. Accurately identifying the signs of startup growth is the work of countless investors, and in recent years, research has turned to machine learning in hopes of improving the accuracy and speed of startup success prediction.

To learn about a startup, investors have to navigate many different internet sources and often rely on personal intuition to determine the startup’s potential …


Applying Expansive Framing To An Integrated Mathematics-Computer Science Unit, Kimberly Evagelatos Beck, Jessica F. Shumway Sep 2022

Applying Expansive Framing To An Integrated Mathematics-Computer Science Unit, Kimberly Evagelatos Beck, Jessica F. Shumway

Publications

In this research report for the National Council of Teachers of Mathematics 2022 Research Conference, we discuss the theory of Expansive Framing and its application to an interdisciplinary mathematics-computer science curricular unit.


Protection Against Contagion In Complex Networks, Pegah Hozhabrierdi Aug 2022

Protection Against Contagion In Complex Networks, Pegah Hozhabrierdi

Dissertations - ALL

In real-world complex networks, harmful spreads, commonly known as contagions, are common and can potentially lead to catastrophic events if uncontrolled. Some examples include pandemics, network attacks on crucial infrastructure systems, and the propagation of misinformation or radical ideas. Thus, it is critical to study the protective measures that inhibit or eliminate contagion in these networks. This is known as the network protection problem.

The network protection problem investigates the most efficient graph manipulations (e.g., node and/or edge removal or addition) to protect a certain set of nodes known as critical nodes. There are two types of critical nodes: (1) …


Cyberbullying Detection Using Weakly Supervised And Fully Supervised Learning, Abhinav Abhishek Aug 2022

Cyberbullying Detection Using Weakly Supervised And Fully Supervised Learning, Abhinav Abhishek

ETD Archive

Machine learning is a very useful tool to solve issues in multiple domains such as sentiment analysis, fake news detection, facial recognition, and cyberbullying. In this work, we have leveraged its ability to understand the nuances of natural language to detect cyberbullying. We have further utilized it to detect the subject of cyberbullying such as age, gender, ethnicity, and religion. Further, we have built another layer to detect the cases of misogyny in cyberbullying. In one of our experiments, we created a three-layered architecture to detect cyberbullying , then to detect if it is gender based and finally if it …


The Ukicer 2022 Conference Poster: Techmate: A Best Practice Toolkit For Driving Sustainable Acceleration Towards Gender Equality In Technology Disciplines In Heis., Alina Berry Aug 2022

The Ukicer 2022 Conference Poster: Techmate: A Best Practice Toolkit For Driving Sustainable Acceleration Towards Gender Equality In Technology Disciplines In Heis., Alina Berry

Conference papers

TechMate is a research project that is being developed to enhance gender balance in technology disciplines, in particular computing higher education in Ireland and beyond. Gender imbalance in computing education is a well-known issue: in Ireland, less than 15% of the student population in computer science, ICT and related disciplines are women. Despite a significant amount of research and practical work conducted in the recent decades, the problem still persists and this research initiative aims to improve the situation.

Among the main aims of this project, there is a development of a toolkit to drive sustainable acceleration towards gender equality …


Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones May 2022

Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones

Other Student Works

This project will analyze the results of trials implementing various storage methods on Geth nodes to synchronize and maintain a full-archive state of the Ethereum blockchain. The purpose of these trials is to gain deeper insight to the process of lowering cost and increasing efficiency of blockchain storage using available technologies, analyzing results of various storage drives under similar conditions. It provides performance analysis and describes performance of each trial in relation to the others.


Human Trafficking And Machine Learning: A Data Pipeline From Law Agencies To Research Groups, Nathaniel Hites May 2022

Human Trafficking And Machine Learning: A Data Pipeline From Law Agencies To Research Groups, Nathaniel Hites

Computer Science and Engineering Theses and Dissertations

Human trafficking is a form of modern-day slavery that, while highly illegal, is more dangerous with the advancements of modern technology (such as the Internet), which allows such a practice to spread more easily and quickly all over the world. While the number of victims of human trafficking is large (according to non-profit organization Safe House, there are estimated to be about 20.5 million human trafficking victims, worldwide (“Human Trafficking Statistics & Facts.” Safe Horizon)- co-erced or manipulated by traffickers into either forced labor, or sexual exploitation and encounters), the number of heard cases is proportionally low- several thousand successful …


Increasing Perceived Realism Of Objects In A Mixed Reality Environment Using 'Diminished Virtual Reality', Logan Scott Parker May 2022

Increasing Perceived Realism Of Objects In A Mixed Reality Environment Using 'Diminished Virtual Reality', Logan Scott Parker

Honors Theses

With the recent explosion of popularity of virtual and mixed reality, an important question has arisen: “Is there a way to create a better blend of real and virtual worlds in a mixed reality experience?” This research attempts to determine whether a visual filter can be created and applied to virtual objects to better convince the brain into interpreting a composite of virtual and real views as one seamless view. The method devised in this thesis is being called 'Diminished Virtual Reality'. The results found in this study show that when presented with a scene composed of a combination of …


Improved Sensor-Based Human Activity Recognition Via Hybrid Convolutional And Recurrent Neural Networks, Sonia Perez-Gamboa May 2022

Improved Sensor-Based Human Activity Recognition Via Hybrid Convolutional And Recurrent Neural Networks, Sonia Perez-Gamboa

Electronic Theses, Projects, and Dissertations

Non-intrusive sensor-based human activity recognition is utilized in a spectrum of applications including fitness tracking devices, gaming, health care monitoring, and smartphone applications. Deep learning models such as convolutional neural networks (CNNs) and long short-term memory (LSTMs) recurrent neural networks provide a way to achieve human activity recognition accurately and effectively. This project designed and explored a variety of multi-layer hybrid deep learning architectures which aimed to improve human activity recognition performance by integrating local features and was scale invariant with dependencies of activities. We achieved a 94.7% activity recognition rate on the University of California, Irvine public domain dataset …


Semantics-Driven Abstractive Document Summarization, Amanuel Alambo Jan 2022

Semantics-Driven Abstractive Document Summarization, Amanuel Alambo

Browse all Theses and Dissertations

The evolution of the Web over the last three decades has led to a deluge of scientific and news articles on the Internet. Harnessing these publications in different fields of study is critical to effective end user information consumption. Similarly, in the domain of healthcare, one of the key challenges with the adoption of Electronic Health Records (EHRs) for clinical practice has been the tremendous amount of clinical notes generated that can be summarized without which clinical decision making and communication will be inefficient and costly. In spite of the rapid advances in information retrieval and deep learning techniques towards …


Building An Understanding Of Human Activities In First Person Video Using Fuzzy Inference, Bradley A. Schneider Jan 2022

Building An Understanding Of Human Activities In First Person Video Using Fuzzy Inference, Bradley A. Schneider

Browse all Theses and Dissertations

Activities of Daily Living (ADL’s) are the activities that people perform every day in their home as part of their typical routine. The in-home, automated monitoring of ADL’s has broad utility for intelligent systems that enable independent living for the elderly and mentally or physically disabled individuals. With rising interest in electronic health (e-Health) and mobile health (m-Health) technology, opportunities abound for the integration of activity monitoring systems into these newer forms of healthcare. In this dissertation we propose a novel system for describing ’s based on video collected from a wearable camera. Most in-home activities are naturally defined by …


Developing A Virtual Modular Synthesizer For Sound Waves And Midi, Margaret Jagger Jan 2022

Developing A Virtual Modular Synthesizer For Sound Waves And Midi, Margaret Jagger

Senior Independent Study Theses

Modular synthesis involves the alteration and modification of digital sound signals. Thus, this modular synthesizer allows a user the option of supplying their own MIDI-compatible controller to serve as an input source, or to use the built-in pure sound waves instead. Either input will be fed into the domain-specific language SuperCollider and altered, with specific sound modifications dependent on the input source used. Using theoretical knowledge of the physics behind the motion of sound waves, various modules and functionalities are created. Then, with SuperCollider, these modules are implemented into a synthesizer which accepts either pure sound waves or MIDI as …


Covidalert - A Wristwatch-Based System To Alert Users From Face Touching, Mrinmoy Roy Jan 2022

Covidalert - A Wristwatch-Based System To Alert Users From Face Touching, Mrinmoy Roy

Graduate Research Theses & Dissertations

Worldwide 219 million people have been infected and 4.5 million have lost their lives in ongoing Covid-19 pandemic. Until vaccines became widely available, precautions and safety measures like wearing masks, physical distancing, avoiding face touching were some of the primary means to curb the spread of virus. Face touching is a compulsive human behavior that can not be prevented without constantly making a conscious effort, even then it is inevitable. To address this problem, we have designed a smartwatch-based solution, CovidAlert, that leverages Random Forest algorithm trained on accelerometer and gyroscope data from the smartwatch to detect hand transition to …


Frequency Analysis Of Trabecular Bone Structure, Daniel Parada San Martin Jan 2022

Frequency Analysis Of Trabecular Bone Structure, Daniel Parada San Martin

Electronic Theses and Dissertations

Medical data is hard to obtain due to privacy laws making research difficult. Many databases of medical data have been compiled over the years and are available to the scientific community. These databases are not comprehensive and lack many clinical conditions. Certain type of medical conditions are rare, making them harder to obtain, or are not present at all in the aforementioned databases. Due to the sparsity or complete lack of data regarding certain conditions, research has stifled. Recent developments in machine learning and generative neural networks have made it possible to generate realistic data that can overcome the lack …


Model-Based Testing Of Smart Home Systems Using Efsm, Cefsm, And Fsmapp, Afnan Mohammed Albahli Jan 2022

Model-Based Testing Of Smart Home Systems Using Efsm, Cefsm, And Fsmapp, Afnan Mohammed Albahli

Electronic Theses and Dissertations

Smart Home Systems (SHS) are some of the most popular Internet of Things (IoT) applications. In 2021, there were 52.22 million smart homes in the United States and they are expected to grow to 77.1 million in 2025 [71]. According to MediaPost [74], 69 percent of American households have at least one smart home device. The number of smart home systems poses a challenge for software testers to find the right approach to test these systems. This dissertation employs Extended Finite State Machines (EFSMs) [6, 24, 105], Communicating Extended Finite State Machines (EFSMs) [68] and FSMApp [10] to generate reusable …


Humanizing Computational Literature Analysis Through Art-Based Visualizations, Alexandria Leto Jan 2022

Humanizing Computational Literature Analysis Through Art-Based Visualizations, Alexandria Leto

Electronic Theses and Dissertations

Inequalities in gender representation and characterization in fictional works are issues that have long been discussed by social scientists. This work addresses these inequalities with two interrelated components. First, it contributes a sentiment and word frequency analysis task focused on gender-specific nouns and pronouns in 15,000 fictional works taken from the online library, Project Gutenberg. This analysis allows for both quantifying and offering further insight on the nature of this disparity in gender representation. Then, the outcomes of the analysis are harnessed to explore novel data visualization formats using computational and studio art techniques. Our results call attention to the …


Multi-Agent Pathfinding In Mixed Discrete-Continuous Time And Space, Thayne T. Walker Jan 2022

Multi-Agent Pathfinding In Mixed Discrete-Continuous Time And Space, Thayne T. Walker

Electronic Theses and Dissertations

In the multi-agent pathfinding (MAPF) problem, agents must move from their current locations to their individual destinations while avoiding collisions. Ideally, agents move to their destinations as quickly and efficiently as possible. MAPF has many real-world applications such as navigation, warehouse automation, package delivery and games. Coordination of agents is necessary in order to avoid conflicts, however, it can be very computationally expensive to find mutually conflict-free paths for multiple agents – especially as the number of agents is increased. Existing state-ofthe- art algorithms have been focused on simplified problems on grids where agents have no shape or volume, and …