Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 931 - 960 of 15658

Full-Text Articles in Engineering

Towards Robust Consensus For Intelligent Decision-Making In Iot Blockchain Networks, Charles Rawlins, S. (Sarangapani) Jagannathan Jan 2023

Towards Robust Consensus For Intelligent Decision-Making In Iot Blockchain Networks, Charles Rawlins, S. (Sarangapani) Jagannathan

Electrical and Computer Engineering Faculty Research & Creative Works

Distributed consensus is the core aspect of blockchain protocol security design. Recent protocols like IOTA have improved concurrency and scalability over Proof-of-work (PoW) with Bitcoin but have core design decisions that are inefficient for limited devices and do not take advantage of previous network experience to reduce calculations. This work proposes the first blockchain consensus protocol based on active machine-learning decisions, called Proof-of-history (PoH). PoH is setup as a distributed reinforcement-learning task for monitoring classification and training of blockchain transactions with an inner deep classifier. Early theoretical analysis and simulations show that PoH is robust to uncoordinated byzantine attacks through …


Improved Intelligent Ledger Construction For Realistic Iot Blockchain Networks, Charles Rawlins, S. (Sarangapani) Jagannathan Jan 2023

Improved Intelligent Ledger Construction For Realistic Iot Blockchain Networks, Charles Rawlins, S. (Sarangapani) Jagannathan

Electrical and Computer Engineering Faculty Research & Creative Works

Scalability is essential for next generation blockchain technology to integrate with large mobile networks like Internet of Things (IoT). The IOTA distributed ledger protocol has combined transaction generation and verification to address this, but at the expense of increased reliance on connectivity to resolve conflicts with a novel ledger data structure. Intelligent Ledger Construction (ILC) was proposed as an auditable lightweight reinforcement-learning scheme to address this constraint with proposal of local conflict resolution with machine-learning classification. This effort presents an improved reliability reward model to enhance training for ILC and further reduce adversarial gaming and resource usage. Testing this revision …


Blockchain And Puf-Based Secure Key Establishment Protocol For Cross-Domain Digital Twins In Industrial Internet Of Things Architecture, Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem, Rupak Kharel, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues Jan 2023

Blockchain And Puf-Based Secure Key Establishment Protocol For Cross-Domain Digital Twins In Industrial Internet Of Things Architecture, Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem, Rupak Kharel, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues

VMASC Publications

Introduction:: The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical and digital domains is crucial for unlocking the full potential of the IIoT, and digital twins can facilitate this integration by providing a virtual representation of real-world entities.

Objectives:: By combining digital twins with the IIoT, industries can simulate, predict, and control physical behaviors, enabling them to achieve broader value and support industry 4.0 and 5.0. Constituents of cooperative IIoT domains tend to interact and collaborate during their complicated …


A Deep Bilstm Machine Learning Method For Flight Delay Prediction Classification, Desmond B. Bisandu Phd, Irene Moulitsas Phd Jan 2023

A Deep Bilstm Machine Learning Method For Flight Delay Prediction Classification, Desmond B. Bisandu Phd, Irene Moulitsas Phd

Journal of Aviation/Aerospace Education & Research

This paper proposes a classification approach for flight delays using Bidirectional Long Short-Term Memory (BiLSTM) and Long Short-Term Memory (LSTM) models. Flight delays are a major issue in the airline industry, causing inconvenience to passengers and financial losses to airlines. The BiLSTM and LSTM models, powerful deep learning techniques, have shown promising results in a classification task. In this study, we collected a dataset from the United States (US) Bureau of Transportation Statistics (BTS) of flight on-time performance information and used it to train and test the BiLSTM and LSTM models. We set three criteria for selecting highly important features …


Material Extrusion-Based Additive Manufacturing: G-Code And Firmware Attacks And Defense Frameworks, Haris Rais Jan 2023

Material Extrusion-Based Additive Manufacturing: G-Code And Firmware Attacks And Defense Frameworks, Haris Rais

Theses and Dissertations

Additive Manufacturing (AM) refers to a group of manufacturing processes that create physical objects by sequentially depositing thin layers. AM enables highly customized production with minimal material wastage, rapid and inexpensive prototyping, and the production of complex assemblies as single parts in smaller production facilities. These features make AM an essential component of Industry 4.0 or Smart Manufacturing. It is now used to print functional components for aircraft, rocket engines, automobiles, medical implants, and more. However, the increased popularity of AM also raises concerns about cybersecurity. Researchers have demonstrated strength degradation attacks on printed objects by injecting cavities in the …


The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii Jan 2023

The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii

Browse all Theses and Dissertations

The widespread expansion of Electric Vehicles (EV) throughout the world creates a requirement for charging stations. While Cybersecurity research is rapidly expanding in the field of Electric Vehicle Infrastructure, efforts are impacted by the availability of testing platforms. This paper presents a solution called the “Open Charge Point Protocol (OCPP) Cyber Range.” Its purpose is to conduct Cybersecurity research against vulnerabilities in the OCPP v1.6 protocol. The OCPP Cyber Range can be used to enable current or future research and to train operators and system managers of Electric Charge Vehicle Supply Equipment (EVSE). This paper demonstrates this solution using three …


Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan Jan 2023

Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan

Browse all Theses and Dissertations

Deploying Mandatory Access Controls (MAC) is a popular way to provide host protection against malware. Unfortunately, current implementations lack the flexibility to adapt to emergent malware threats and are known for being difficult to configure. A core tenet of MAC security systems is that the policies they are deployed with are immutable from the host while they are active. This work looks at deploying a MAC system that leverages using encrypted security tokens to allow for redeploying policy configurations in real-time without the need to stop a running process. This is instrumental in developing an adaptive framework for security systems …


Energy-Efficient Multi-Rate Opportunistic Routing In Wireless Mesh Networks, Mohammad Ali Mansouri Khah, Neda Moghim, Nasrin Gholami, Sachin Shetty Jan 2023

Energy-Efficient Multi-Rate Opportunistic Routing In Wireless Mesh Networks, Mohammad Ali Mansouri Khah, Neda Moghim, Nasrin Gholami, Sachin Shetty

VMASC Publications

Opportunistic or anypath routing protocols are focused on improving the performance of traditional routing in wireless mesh networks. They do so by leveraging the broadcast nature of the wireless medium and the spatial diversity of the network. Using a set of neighboring nodes, instead of a single specific node, as the next hop forwarder is a crucial aspect of opportunistic routing protocols, and the selection of the forwarder set plays a vital role in their performance. However, most opportunistic routing protocols consider a single transmission rate and power for the nodes, which limits their potential. To address this limitation, this …


A Structured Narrative Prompt For Prompting Narratives From Large Language Models: Sentiment Assessment Of Chatgpt-Generated Narratives And Real Tweets, Christopher J. Lynch, Erik J. Jensen, Virginia Zamponi, Kevin O'Brien, Erika Frydenlund, Ross Gore Jan 2023

A Structured Narrative Prompt For Prompting Narratives From Large Language Models: Sentiment Assessment Of Chatgpt-Generated Narratives And Real Tweets, Christopher J. Lynch, Erik J. Jensen, Virginia Zamponi, Kevin O'Brien, Erika Frydenlund, Ross Gore

VMASC Publications

Large language models (LLMs) excel in providing natural language responses that sound authoritative, reflect knowledge of the context area, and can present from a range of varied perspectives. Agent-based models and simulations consist of simulated agents that interact within a simulated environment to explore societal, social, and ethical, among other, problems. Simulated agents generate large volumes of data and discerning useful and relevant content is an onerous task. LLMs can help in communicating agents' perspectives on key life events by providing natural language narratives. However, these narratives should be factual, transparent, and reproducible. Therefore, we present a structured narrative prompt …


Efficient Maritime Object Detection And Validation For Enhancing Safety Of Uncrewed Marine Systems, Ahmed Saglam, Yiannis Papelis Jan 2023

Efficient Maritime Object Detection And Validation For Enhancing Safety Of Uncrewed Marine Systems, Ahmed Saglam, Yiannis Papelis

VMASC Publications

Safe operation of uncrewed maritime systems is a major concern in the presence of other vehicles or obstacles. Typically, perception algorithms utilize sensor data to identify obstacles that must be avoided, and AI algorithms are used to interpret raw sensor data for use in navigation and object avoidance algorithms. However, perception algorithms are typically computationally expensive. In this paper, we present an efficient method for detecting obstacles using raw lidar data in the form of range or Point Cloud, employing computationally efficient techniques that do not depend on trained models or AI matching. The approach
converts the sensor readings into …


A Survey And Evaluation Of Android-Based Malware Evasion Techniques And Detection Frameworks, Parvez Faruki, Rhati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun, Rajendra Pamula Jan 2023

A Survey And Evaluation Of Android-Based Malware Evasion Techniques And Detection Frameworks, Parvez Faruki, Rhati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun, Rajendra Pamula

School of Computer Science & Engineering Faculty Publications

Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing innovative techniques to avoid or prolong malware detection effectively. Past studies have shown that malware detection systems are susceptible to evasion attacks where adversaries can successfully bypass the existing security defenses and deliver the malware to the target system without being detected. The evolution of escape-resistant systems is an open research problem. This paper presents a detailed taxonomy and evaluation of Android-based malware evasion …


On The Pursuit Of Developer Happiness: Webcam-Based Eye Tracking And Affect Recognition In The Ide, Tamsin Rogers Jan 2023

On The Pursuit Of Developer Happiness: Webcam-Based Eye Tracking And Affect Recognition In The Ide, Tamsin Rogers

Honors Theses

Recent research highlights the viability of webcam-based eye tracking as a low-cost alternative to dedicated remote eye trackers. Simultaneously, research shows the importance of understanding emotions of software developers, where it was found that emotions have significant effects on productivity, code quality, and team dynamics. In this paper, we present our work towards an integrated eye-tracking and affect recognition tool for use during software development. This combined approach could enhance our understanding of software development by combining information about the code developers are looking at, along with the emotions they experience. The presented tool utilizes an unmodified webcam to capture …


Exploration Of Robotics Need In The Medical Field And Robotic Arm Operation Via Glove Control, Aditi Vijayvergia Jan 2023

Exploration Of Robotics Need In The Medical Field And Robotic Arm Operation Via Glove Control, Aditi Vijayvergia

Master’s Theses

This thesis project is an exercise in getting hands-on experience in redesigning and modifying a robotic system. It also involves understanding the current need for robotic applications in hospital settings. To achieve the above, a thorough literature review of the current state of robotics in a hospital setting was conducted. Moreover, a number of interviews with medical care professionals were completed. Three main themes were obtained from the literature review and five main themes were obtained from the interviews which will be presented in this thesis report. The next phase of the project involved redesigning a system that is composed …


Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun Jan 2023

Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun

Electronic Theses and Dissertations

Data science plays a crucial role in enabling organizations to optimize data-driven opportunities within financial risk management. It involves identifying, assessing, and mitigating risks, ultimately safeguarding investments, reducing uncertainty, ensuring regulatory compliance, enhancing decision-making, and fostering long-term sustainability. This thesis explores three facets of Data Science projects: enhancing customer understanding, fraud prevention, and predictive analysis, with the goal of improving existing tools and enabling more informed decision-making. The first project examined leveraged big data technologies, such as Hadoop and Spark, to enhance financial risk management by accurately predicting loan defaulters and their repayment likelihood. In the second project, we investigated …


Peer-To-Peer Energy Trading In Smart Residential Environment With User Behavioral Modeling, Ashutosh Timilsina Jan 2023

Peer-To-Peer Energy Trading In Smart Residential Environment With User Behavioral Modeling, Ashutosh Timilsina

Theses and Dissertations--Computer Science

Electric power systems are transforming from a centralized unidirectional market to a decentralized open market. With this shift, the end-users have the possibility to actively participate in local energy exchanges, with or without the involvement of the main grid. Rapidly reducing prices for Renewable Energy Technologies (RETs), supported by their ease of installation and operation, with the facilitation of Electric Vehicles (EV) and Smart Grid (SG) technologies to make bidirectional flow of energy possible, has contributed to this changing landscape in the distribution side of the traditional power grid.

Trading energy among users in a decentralized fashion has been referred …


Depression Classification On Privacy Protected Facial Features Data, Yanisa Mahayossanunt Jan 2023

Depression Classification On Privacy Protected Facial Features Data, Yanisa Mahayossanunt

Chulalongkorn University Theses and Dissertations (Chula ETD)

This thesis presents depression classification on privacy protected facial features data. Fast depression classification to help patients receive proper treatment is a method that can prevent the damage of depression. However, fast and effective depression classification is difficult because medical personnel are adequate and the time to analyze depression is long per patient. Applied artificial intelligence in the medical field can help reduce the workload of medical personnel. It is also difficult because of privacy protection. Therefore, we utilize extracted facial features from facial expressions in clinical interview videos to develop a machine learning model. The model utilizes LSTM, attention …


เครื่องสร้างปริภูมิสถานะสำหรับโมเดลเช็กกิงแบบแอลทีแอลโดยใช้แอลเอสทีเอ็มที่มีการจำแนกแบบหลายป้าย, ชลิกา ศักดิ์สุภาวัฒนกุล Jan 2023

เครื่องสร้างปริภูมิสถานะสำหรับโมเดลเช็กกิงแบบแอลทีแอลโดยใช้แอลเอสทีเอ็มที่มีการจำแนกแบบหลายป้าย, ชลิกา ศักดิ์สุภาวัฒนกุล

Chulalongkorn University Theses and Dissertations (Chula ETD)

กระบวนการทวนสอบเชิงรูปนัยเป็นสิ่งที่สำคัญในการตรวจสอบความปลอดภัย ความดำเนินชีวิตและความสัมพันธ์ของระบบซอฟต์แวร์ตั้งแต่เริ่มต้นออกแบบซอฟต์แวร์ ซึ่งสามารถช่วยให้ลดความพยายามในการพัฒนาอย่างเห็นได้ชัด โมเดลเช็กกิงเป็นวิธีการเชิงรูปนัยอย่างหนึ่งที่สามารถทวนสอบระบบซอฟต์แวร์ตามคุณสมบัติเชิงพฤติกรรมที่เขียนเป็นสูตรตรรกศาสตร์เชิงเวลาแบบลำดับหรือเรียกว่าสูตรแอลทีแอล โดยใช้วิธีการสำรวจเส้นทางดำเนินงานที่เป็นไปได้ทั้งหมดอย่างละเอียดถี่ถ้วนในปริภูมิสถานะของระบบซอฟต์แวร์และกำหนดว่าเส้นทางดำเนินงานทั้งหมดของระบบเป็นไปตามคุณสมบัติที่เขียนโดยใช้สูตรแอลทีแอลหรือไม่ อย่างไรก็ตาม ระบบที่มีขนาดใหญ่และมีความซับซ้อนอาจทำให้เกิดการระเบิดของปริภูมิสถานะในการทำโมเดลเช็กกิงได้ ซึ่งมีการเสนอวิธีการลดพื้นที่ของปริภูมิสถานะหลายวิธีและแม้แต่วิธีการของแมชชีนเลิร์นนิงก็ถูกนำมาใช้เพื่อทำนายผลลัพธ์ความพึงพอใจของคุณสมบัติแอลทีแอลของระบบซอฟต์แวร์ เมื่อพิจารณาถึงความสำเร็จในการฝึกอบรมโครงข่ายความจำระยะสั้นแบบยาวหรือแอลเอสทีเอ็มสำหรับการทำนายลำดับข้อมูลอนุกรมเวลาแบบยาว ในวิทยานิพนธ์นี้ ได้เสนอแนวคิดแอลเอสทีเอ็มที่ขยายการจำแนกแบบหลายป้ายและกลยุทธ์การหาขีดแบ่งเพื่อบรรเทาปัญหาการระเบิดของปริภูมิสถานะและสร้างเป็นเครื่องสร้างปริภูมิสถานะสำหรับสร้างเส้นทางดำเนินงานของระบบซอฟต์แวร์ได้ตามที่ต้องการ โดย ได้สร้างเครื่องมือในการทวนสอบคุณสมบัติพื้นฐานของระบบซอฟต์แวร์ ได้แก่ คุณสมบัติด้านความปลอดภัย ด้านความดำเนินชีวิตและด้านความสัมพันธ์ ด้วยเทคนิคออน-เดอะ-ฟลาย


การแปลงไทมด์ออโตมาตาความน่าจะเป็นไปเป็นรหัสปริซึม, ถิรวัตร สุตาลังกา Jan 2023

การแปลงไทมด์ออโตมาตาความน่าจะเป็นไปเป็นรหัสปริซึม, ถิรวัตร สุตาลังกา

Chulalongkorn University Theses and Dissertations (Chula ETD)

วิทยานิพนธ์ฉบับนี้มุ่งศึกษากระบวนการแปลงไทมด์ออโตมาตาความน่าจะเป็นเป็นรหัสปริซึม ซึ่งมีความสำคัญในการวิเคราะห์ระบบเวลาจริงและระบบที่มีความซับซ้อนด้วยความน่าจะเป็น การวิจัยนี้เสนอกฎการแปลงสำหรับแปลงไทมด์ออโตมาตาจากเอกซ์เอ็มแอลเป็นรหัสปริซึม,ช่วยในการวิเคราะห์และตรวจสอบคุณลักษณะที่ซับซ้อนของระบบ นอกจากนี้ วิทยานิพนธ์ยังได้พัฒนากระบวนการแปลงที่มีความสอดคล้องทางความหมาย ช่วยให้สามารถแปลงแบบจำลองที่ออกแบบด้วย UPPAAL ในรูปแบบเอกซ์เอ็มแอลไปยังรหัสปริซึมได้อย่างเหมาะสม ผลลัพธ์จากการศึกษานี้มีความสำคัญในการประยุกต์ใช้ทฤษฎีในแบบจำลองจริงและนำไปสู่การประยุกต์ใช้งานที่มีประสิทธิผลมากขึ้นในหลากหลายด้าน วิทยานิพนธ์ยังนำเสนอการพัฒนาเครื่องมือสำหรับการแปลงรหัสที่มีประสิทธิภาพ ซึ่งใช้ภาษาจาวาและมีความยืดหยุ่นในการปรับใช้กับระบบต่างๆ การทดสอบเครื่องมือนี้พบว่าสามารถแปลงแบบจำลองได้อย่างถูกต้องและครบถ้วน รวมถึงการจัดการกับข้อผิดพลาดที่อาจเกิดขึ้น การทดสอบครอบคลุมแสดงให้เห็นถึงความสามารถของเครื่องมือในการวิเคราะห์และทดสอบแบบจำลองที่มีความซับซ้อน ลดเวลาและความพยายามในการวิเคราะห์แบบจำลองด้วยตนเอง และทำให้มั่นใจได้ว่าผลลัพธ์ที่ได้มีความถูกต้องและเชื่อถือได้ เครื่องมือนี้มีศักยภาพในการเป็นเครื่องมือมาตรฐานสำหรับการวิเคราะห์แบบจำลองไทมด์ออโตมาตาความน่าจะเป็นในอนาคต ช่วยจัดการกับความต้องการที่ซับซ้อนของระบบในโลกจริง


Breast Density Classification Using Deep Learning, Conrad Thomas Testagrose Jan 2023

Breast Density Classification Using Deep Learning, Conrad Thomas Testagrose

UNF Graduate Theses and Dissertations

Breast density screenings are an accepted means to determine a patient's predisposed risk of breast cancer development. Although the direct correlation is not fully understood, breast cancer risk increases with higher levels of mammographic breast density. Radiologists visually assess a patient's breast density using mammogram images and assign a density score based on four breast density categories outlined by the Breast Imaging and Reporting Data Systems (BI-RADS). There have been efforts to develop automated tools that assist radiologists with increasing workloads and to help reduce the intra- and inter-rater variability between radiologists. In this thesis, I explored two deep-learning-based approaches …


Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes Jan 2023

Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes

UNF Graduate Theses and Dissertations

Research on Flying Ad-Hoc Networks (FANETs) has increased due to the availability of Unmanned Aerial Vehicles (UAVs) and the electronic components that control and connect them. Many applications, such as 3D mapping, construction inspection, or emergency response operations could benefit from an application and adaptation of swarm intelligence-based deployments of multiple UAVs. Such groups of cooperating UAVs, through the use of local rules, could be seen as network nodes establishing an ad-hoc network for communication purposes.

One FANET application is to provide communication coverage over an area where communication infrastructure is unavailable. A crucial part of a FANET implementation is …


Extracting Road Surface Marking Features From Aerial Images Using Deep Learning, Michael Kimollo Jan 2023

Extracting Road Surface Marking Features From Aerial Images Using Deep Learning, Michael Kimollo

UNF Graduate Theses and Dissertations

The traffic and roadway safety agencies spend significant efforts each year collecting roadway data, including lane configurations and other road surface marking data, such as areas with school zone markings, sidewalks, left turns, right turns, bicycle lanes, etc., for safety analysis and planning purposes. The current manual data collection methods pose significant operational and quality control challenges as they are costly and prone to errors. In addition to that the manual data collection is labor intensive and takes too much time involving high equipment costs, questionable data accuracy guarantees, and concerns about the safety of the crew.

This study aims …


Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte Jan 2023

Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte

Browse all Theses and Dissertations

Modern web development has grown increasingly reliant on scripting languages such as PHP. The complexities of an interpreted language means it is very difficult to account for every use case as unusual interactions can cause unintended side effects. Automatically generating test input to detect bugs or fuzzing, has proven to be an effective technique for JavaScript engines. By extending this concept to PHP, existing vulnerabilities that have since gone undetected can be brought to light. While PHP fuzzers exist, they are limited to testing a small quantity of test seeds per second. In this thesis, we propose a solution for …


Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula Jan 2023

Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula

Browse all Theses and Dissertations

Malware detection is a critical task in ensuring the security of computer systems. Due to a surge in malware and the malware program sophistication, machine learning methods have been developed to perform such a task with great success. To further learn structural semantics, Graph Neural Networks abbreviated as GNNs have emerged as a recent practice for malware detection by modeling the relationships between various components of a program as a graph, which deliver promising detection performance improvement. However, this line of research attends to individual programs while overlooking program interactions; also, these GNNs tend to perform feature aggregation from neighbors …


Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams Jan 2023

Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams

Browse all Theses and Dissertations

Most of today’s time series data contain anomalies and multiple seasonalities, and accurate anomaly detection in these data is critical to almost any type of business. However, most mainstream forecasting models used for anomaly detection can only incorporate one or no seasonal component into their forecasts and cannot capture every known seasonal pattern in time series data. In this thesis, we propose a new multi-seasonal forecasting model for anomaly detection in time series data that extends the popular Seasonal Autoregressive Integrated Moving Average (SARIMA) model. Our model, named multi-SARIMA, utilizes a time series dataset’s multiple pre-determined seasonal trends to increase …


Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula Jan 2023

Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula

Browse all Theses and Dissertations

Machine learning techniques utilize training data samples to help understand, predict, classify, and make valuable decisions for different applications such as medicine, email filtering, speech recognition, agriculture, and computer vision, where it is challenging or unfeasible to produce traditional algorithms to accomplish the needed tasks. Unsupervised ML-based approaches have emerged for building groups of data samples known as data clusters for driving necessary decisions about these data samples and helping solve challenges in critical applications. Data clustering is used in multiple fields, including health, finance, social networks, education, and science. Sequential processing of clustering algorithms, like the K-Means, Minibatch K-Means, …


Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal Jan 2023

Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal

Browse all Theses and Dissertations

Heart failure is a syndrome which effects a patient’s quality of life adversely. It can be caused by different underlying conditions or abnormalities and involves both cardiovascular and non-cardiovascular comorbidities. Heart failure cannot be cured but a patient’s quality of life can be improved by effective treatment through medicines and surgery, and lifestyle management. As effective treatment of heart failure incurs cost for the patients and resource allocation for the hospitals, predicting length of stay of these patients during each hospitalization becomes important. Heart failure can be classified into two types: left sided heart failure and right sided heart failure. …


Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha Jan 2023

Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha

Browse all Theses and Dissertations

Smart cities have emerged to tackle many critical problems that can thwart the overwhelming urbanization process, such as traffic jams, environmental pollution, expensive health care, and increasing energy demand. This Master thesis proposes efficient and high-quality cloud-based machine-learning solutions for efficient and sustainable smart cities environment. Different supervised machine-learning models for air quality predication (AQP) in efficient and sustainable smart cities environment is developed. For that, ML-based techniques are implemented using cloud-based solutions. For example, regression and classification methods are implemented using distributed cloud computing to forecast air execution time and accuracy of the implemented ML solution. These models are …


Contributors To Pathologic Depolarization In Myotonia Congenita, Jessica Hope Myers Jan 2023

Contributors To Pathologic Depolarization In Myotonia Congenita, Jessica Hope Myers

Browse all Theses and Dissertations

Myotonia congenita is an inherited skeletal muscle disorder caused by loss-of-function mutation in the CLCN1 gene. This gene encodes the ClC-1 chloride channel, which is almost exclusively expressed in skeletal muscle where it acts to stabilize the resting membrane potential. Loss of this chloride channel leads to skeletal muscle hyperexcitability, resulting in involuntary muscle action potentials (myotonic discharges) seen clinically as muscle stiffness (myotonia). Stiffness affects the limb and facial muscles, though specific muscle involvement can vary between patients. Interestingly, respiratory distress is not part of this disease despite muscles of respiration such as the diaphragm muscle also carrying this …


Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman Jan 2023

Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman

Browse all Theses and Dissertations

Insider threats to information security have become a burden for organizations. Understanding insider activities leads to an effective improvement in identifying insider attacks and limits their threats. This dissertation presents three systems to detect insider threats effectively. The aim is to reduce the false negative rate (FNR), provide better dataset use, and reduce dimensionality and zero padding effects. The systems developed utilize deep learning techniques and are evaluated using the CERT 4.2 dataset. The dataset is analyzed and reformed so that each row represents a variable length sample of user activities. Two data representations are implemented to model extracted features …


A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham Jan 2023

A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham

Browse all Theses and Dissertations

The Industrial Internet of Things (IIoT) refers to a set of smart devices, i.e., actuators, detectors, smart sensors, and autonomous systems connected throughout the Internet to help achieve the purpose of various industrial applications. Unfortunately, IIoT applications are increasingly integrated into insecure physical environments leading to greater exposure to new cyber and physical system attacks. In the current IIoT security realm, effective anomaly detection is crucial for ensuring the integrity and reliability of critical infrastructure. Traditional security solutions may not apply to IIoT due to new dimensions, including extreme energy constraints in IIoT devices. Deep learning (DL) techniques like Convolutional …