Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Engineering

On Path Consistency For Binary Constraint Satisfaction Problems, Christopher G. Reeson Dec 2016

On Path Consistency For Binary Constraint Satisfaction Problems, Christopher G. Reeson

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Constraint satisfaction problems (CSPs) provide a flexible and powerful framework for modeling and solving many decision problems of practical importance. Consistency properties and the algorithms for enforcing them on a problem instance are at the heart of Constraint Processing and best distinguish this area from other areas concerned with the same combinatorial problems. In this thesis, we study path consistency (PC) and investigate several algorithms for enforcing it on binary finite CSPs. We also study algorithms for enforcing consistency properties that are related to PC but are stronger or weaker than PC.

We identify and correct errors in the literature …


Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu Dec 2016

Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Software repackaging is a common approach for creating malware. In this approach, malware authors inject malicious payloads into legitimate applications; then, to ren- der security analysis more difficult, they obfuscate most or all of the code. This forces analysts to spend a large amount of effort filtering out benign obfuscated methods in order to locate potentially malicious methods for further analysis. If an effective mechanism for filtering out benign obfuscated methods were available, the number of methods that must be analyzed could be reduced, allowing analysts to be more productive. In this thesis, we introduce SEMEO, a highly effective and …


Towards Building A Review Recommendation System That Trains Novices By Leveraging The Actions Of Experts, Shilpa Khanal Dec 2016

Towards Building A Review Recommendation System That Trains Novices By Leveraging The Actions Of Experts, Shilpa Khanal

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Online reviews increase consumer visits, increase the time spent on the website, and create a sense of community among the frequent shoppers. Because of the importance of online reviews, online retailers such as Amazon.com and eOpinions provide detailed guidelines for writing reviews. However, though these guidelines provide instructions on how to write reviews, reviewers are not provided instructions for writing product-specific reviews. As a result, poorly-written reviews are abound and a customer may need to scroll through a large number of reviews, which could be up to 6000 pixels down from the top of the page, in order to find …


Recognizing And Combating Cybercrime, Marcia L. Dority Baker Oct 2016

Recognizing And Combating Cybercrime, Marcia L. Dority Baker

Information Technology Services: Publications

Can You Spot the Scam?

Scams make great stories. Tales of Internet crime or other fraud make up some of Hollywood's most exciting thrillers. While cybercrime blockbusters are fun to watch on the big screen, cybercrime is a serious problem on campuses globally.

How many people do you know who are the victim of a scam (Internet or phone)? According to the FBI, cybercrime is a growing threat that affects individuals and businesses around the world. A recent Washington Post article reported that cybercrime cost the global economy $445 billion in 2014.


Improving The Efficiency Of Ci With Uber-Commits, Matias Waterloo Aug 2016

Improving The Efficiency Of Ci With Uber-Commits, Matias Waterloo

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Continuous Integration (CI) is a software engineering practice where developers break their coding tasks into small changes that can be integrated with the shared code repository on a frequent basis. The primary objectives of CI are to avoid integration problems caused by large change sets and to provide prompt developer feedback so that if a problem is detected, it can be easily and quickly resolved. In this thesis, we argue that while keeping changes small and integrating often is a wise approach for developers, the CI server may be more efficient operating on a different scale. In our approach, the …


Use Of Clustering Techniques For Protein Domain Analysis, Eric Rodene Jul 2016

Use Of Clustering Techniques For Protein Domain Analysis, Eric Rodene

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Next-generation sequencing has allowed many new protein sequences to be identified. However, this expansion of sequence data limits the ability to determine the structure and function of most of these newly-identified proteins. Inferring the function and relationships between proteins is possible with traditional alignment-based phylogeny. However, this requires at least one shared subsequence. Without such a subsequence, no meaningful alignments between the protein sequences are possible. The entire protein set (or proteome) of an organism contains many unrelated proteins. At this level, the necessary similarity does not occur. Therefore, an alternative method of understanding relationships within diverse sets of proteins …


Examining Bridges Between Informal And Formal Learning Environments: A Sequential Mixed Method Design, Dagen L. Valentine Jul 2016

Examining Bridges Between Informal And Formal Learning Environments: A Sequential Mixed Method Design, Dagen L. Valentine

Department of Agricultural Leadership, Education and Communication: Dissertations, Theses, and Student Scholarship

The purpose of this sequential mixed method study was to identify schools implementing a technology-based engineering design intervention in a way that connects or bridges formal learning environments of the school-day to informal learning environments such as afterschool programs. Further, this study investigated educators’ decisions that enabled or facilitated bridging between formal and informal learning environments. This cooperation and/or linking between informal and formal learning time is bridging. Participants included public schools (n=16) in Eastern Nebraska that incorporated the Nebraska Wearables Technology (WearTec) program at their school, club or Out-of-School-Time program during the 2015-2016 school year. Three of the schools …


Significant Permission Identification For Android Malware Detection, Lichao Sun Jul 2016

Significant Permission Identification For Android Malware Detection, Lichao Sun

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

A recent report indicates that a newly developed malicious app for Android is introduced every 11 seconds. To combat this alarming rate of malware creation, we need a scalable malware detection approach that is effective and efficient. In this thesis, we introduce SigPID, a malware detection system based on permission analysis to cope with the rapid increase in the number of Android malware. Instead of analyzing all 135 Android permissions, our approach applies 3-level pruning by mining the permission data to identify only significant permissions that can be effective in distinguishing benign and malicious apps. Based on the identified significant …


A Roadmap To Safe And Reliable Engineered Biological Nano-Communication Networks, Justin W. Firestone Apr 2016

A Roadmap To Safe And Reliable Engineered Biological Nano-Communication Networks, Justin W. Firestone

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Synthetic biology has the potential to benefit society with novel applications that can improve soil quality, produce biofuels, grow customized biological tissue, and perform intelligent drug delivery, among many other possibilities. Engineers are creating techniques to program living cells, inserting new logic, and leveraging cell-to-cell communication, which result in changes to a cell's core functionality. Using these techniques, we can now create synthetic biological organisms (SBOs) with entirely new (potentially unseen) behaviors, which, similar to silicon devices, can sense, actuate, perform computation, and interconnect with other networks at the nanoscale level. SBOs are programmable evolving entities, and can be likened …


Flying By Fire: Making Controlled Burns Safer For Humans And Uavs, Rebecca Horzewski, Carrick Detweiler Apr 2016

Flying By Fire: Making Controlled Burns Safer For Humans And Uavs, Rebecca Horzewski, Carrick Detweiler

UCARE Research Products

A temperature sensing circuit board was developed that will allow Nimbus Lab's controlled burn starting UAV to react to the temperatures around it.


Table Headers: An Entrance To The Data Mine, George Nagy, Sharad C. Seth Jan 2016

Table Headers: An Entrance To The Data Mine, George Nagy, Sharad C. Seth

CSE Conference and Workshop Papers

Algorithmic methods are demonstrated for information extraction from table header elements, including data categories and data hierarchies. The table headers are found with the Minimum Index Point Search algorithm. The header-path alignment and header completion algorithms yield database-ready table content and configuration statistics on a random sample of 400 diverse tables with ground truth and 1120 tables without ground truth from international statistical data sites.


Impacts Of Soil Type And Moisture On The Capacity Of Multi-Carrier Modulation In Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran Jan 2016

Impacts Of Soil Type And Moisture On The Capacity Of Multi-Carrier Modulation In Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran

CSE Conference and Workshop Papers

Unique interactions between soil and communication components in wireless underground communications necessitate revisiting fundamental communication concepts from a different perspective. In this paper, capacity profile of wireless underground (UG) channel for multi-carrier transmission techniques is analyzed based on empirical antenna return loss and channel frequency response models in different soil types and moisture values. It is shown that data rates in excess of 124 Mbps are possible for distances up to 12 m. For shorter distances and lower soil moisture conditions, data rates of 362 Mbps can be achieved. It is also shown that due to soil moisture variations, UG …


Learning Hierarchically Decomposable Concepts With Active Over-Labeling, Yuji Mo, Stephen Scott, Doug Downey Jan 2016

Learning Hierarchically Decomposable Concepts With Active Over-Labeling, Yuji Mo, Stephen Scott, Doug Downey

CSE Conference and Workshop Papers

Many classification tasks target high-level concepts that can be decomposed into a hierarchy of finer-grained subconcepts. For example, some string entities that are Locations are also Attractions, some Attractions are Museums, etc. Such hierarchies are common in named entity recognition (NER), document classification, and biological sequence analysis. We present a new approach for learning hierarchically decomposable concepts. The approach learns a high-level classifier (e.g., location vs. non-location) by seperately learning multiple finer-grained classifiers (e.g., museum vs. non-museum), and then combining the results. Soliciting labels at a finer level of granularity than that of the target concept is a new approach …


Csce 411h: Data Modeling For Systems Development—A Peer Review Of Teaching Project Inquiry Portfolio, Hongfeng Yu Jan 2016

Csce 411h: Data Modeling For Systems Development—A Peer Review Of Teaching Project Inquiry Portfolio, Hongfeng Yu

UNL Faculty Course Portfolios

A new course CSCE411H has been developed in 2015-2016. The course tackles the learning of traditional and emerging data modeling techniques in big data related areas from the system and application perspectives. The students have mixed background in Business, Engineering, and Art and Science with different levels. These have introduced a unique set of challenges in the development of this new course. In this inquiry portfolio, I investigated if the adjustment of assignments can benefit the team work of the students with a variety of background. Through the data collection and analysis, the investigation showed that the new assignment design …