Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Browse all Theses and Dissertations

Information Technology

Publication Year

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Realistic Virtual Human Character Design Strategy And Experience For Supporting Serious Role-Playing Simulations On Mobile Devices, Sindhu Kumari Jan 2022

Realistic Virtual Human Character Design Strategy And Experience For Supporting Serious Role-Playing Simulations On Mobile Devices, Sindhu Kumari

Browse all Theses and Dissertations

Promoting awareness of social determinants of health (SDoH) among healthcare providers is important to improve the patient care experience and outcome as it helps providers understand their patients in a better way which can facilitate more efficient and effective communication about health conditions. Healthcare professionals are typically educated about SDoH through lectures, questionaries, or role-play-based approaches; but in today’s world, it is becoming increasingly possible to leverage modern technology to create more impactful and accessible tools for SDoH education. Wright LIFE (Lifelike Immersion for Equity) is a simulation-based training tool especially created for this purpose. It is a mobile app …


Few-Shot Malware Detection Using A Novel Adversarial Reprogramming Model, Ekula Praveen Kumar Jan 2022

Few-Shot Malware Detection Using A Novel Adversarial Reprogramming Model, Ekula Praveen Kumar

Browse all Theses and Dissertations

The increasing sophistication of malware has made detecting and defending against new strains a major challenge for cybersecurity. One promising approach to this problem is using machine learning techniques that extract representative features and train classification models to detect malware in an early stage. However, training such machine learning-based malware detection models represents a significant challenge that requires a large number of high-quality labeled data samples while it is very costly to obtain them in real-world scenarios. In other words, training machine learning models for malware detection requires the capability to learn from only a few labeled examples. To address …


Kbot: Knowledge-Enabled Personalized Chatbot For Self-Management Of Asthma In Pediatric Population, Dipesh Kadariya Jan 2019

Kbot: Knowledge-Enabled Personalized Chatbot For Self-Management Of Asthma In Pediatric Population, Dipesh Kadariya

Browse all Theses and Dissertations

Asthma, chronic pulmonary disease, is one of the major health issues in the United States. Given its chronic nature, the demand for continuous monitoring of patient’s adherence to the medication care plan, assessment of their environment triggers, and management of asthma control level can be challenging in traditional clinical settings and taxing on clinical professionals. A shift from a reactive to a proactive asthma care can improve health outcomes and reduce expenses. On the technology spectrum, smart conversational systems and Internet-of-Things (IoTs) are rapidly gaining popularity in the healthcare industry. By leveraging such technological prevalence, it is feasible to design …


Software Implementations And Applications Of Elliptic Curve Cryptography, Kirill Kultinov Jan 2019

Software Implementations And Applications Of Elliptic Curve Cryptography, Kirill Kultinov

Browse all Theses and Dissertations

Elliptic Curve Cryptography (ECC) is a public-key cryptography system. Elliptic Curve Cryptography (ECC) can achieve the same level of security as the public-key cryptography system, RSA, with a much smaller key size. It is a promising public key cryptography system with regard to time efficiency and resource utilization. This thesis focuses on the software implementations of ECC over finite field GF(p) with two distinct implementations of the Big Integer classes using character arrays, and bit sets in C++ programming language. Our implementation works on the ECC curves of the form y^2 = x^3 + ax + b (mod p). The …


A Stochastic Petri Net Based Nlu Scheme For Technical Documents Understanding, Adamantia Psarologou Jan 2016

A Stochastic Petri Net Based Nlu Scheme For Technical Documents Understanding, Adamantia Psarologou

Browse all Theses and Dissertations

Natural Language Understanding (NLU) is a very old research field, which deals with machine reading comprehension. Despite the many years of work and the numerous accomplishments by several researchers in the field, there is still place for significant improvements. Here, our goal is to develop a novel NLU methodology for detecting and extracting event/action associations in technical documents. In order to achieve this goal we present a synergy of methods (Kernel extraction, Formal Language Modeling, Stochastic Petri-nets (SPN) mapping and Event Representation via SPN graph synthesis). In particular, the basic meaning of a natural language sentence is given by its …