Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Fifth Aeon – A.I Competition And Balancer, William M. Ritson Jun 2019

Fifth Aeon – A.I Competition And Balancer, William M. Ritson

Master's Theses

Collectible Card Games (CCG) are one of the most popular types of games in both digital and physical space. Despite their popularity, there is a great deal of room for exploration into the application of artificial intelligence in order to enhance CCG gameplay and development. This paper presents Fifth Aeon a novel and open source CCG built to run in browsers and two A.I applications built upon Fifth Aeon. The first application is an artificial intelligence competition run on the Fifth Aeon game. The second is an automatic balancing system capable of helping a designer create new cards that do …


Cloneless: Code Clone Detection Via Program Dependence Graphs With Relaxed Constraints, Thomas J. Simko Jun 2019

Cloneless: Code Clone Detection Via Program Dependence Graphs With Relaxed Constraints, Thomas J. Simko

Master's Theses

Code clones are pieces of code that have the same functionality. While some clones may structurally match one another, others may look drastically different. The inclusion of code clones clutters a code base, leading to increased costs through maintenance. Duplicate code is introduced through a variety of means, such as copy-pasting, code generated by tools, or developers unintentionally writing similar pieces of code. While manual clone identification may be more accurate than automated detection, it is infeasible due to the extensive size of many code bases. Software code clone detection methods have differing degree of success based on the analysis …


A Machine Learning Approach To Network Intrusion Detection System Using K Nearest Neighbor And Random Forest, Ilemona S. Atawodi May 2019

A Machine Learning Approach To Network Intrusion Detection System Using K Nearest Neighbor And Random Forest, Ilemona S. Atawodi

Master's Theses

The evolving area of cybersecurity presents a dynamic battlefield for cyber criminals and security experts. Intrusions have now become a major concern in the cyberspace. Different methods are employed in tackling these threats, but there has been a need now more than ever to updating the traditional methods from rudimentary approaches such as manually updated blacklists and whitelists. Another method involves manually creating rules, this is usually one of the most common methods to date.

A lot of similar research that involves incorporating machine learning and artificial intelligence into both host and network-based intrusion systems recently. Doing this originally presented …