Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Science

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 428

Full-Text Articles in Engineering

Beyond The Horizon: Exploring Anomaly Detection Potentials With Federated Learning And Hybrid Transformers In Spacecraft Telemetry, Juan Rodriguez May 2024

Beyond The Horizon: Exploring Anomaly Detection Potentials With Federated Learning And Hybrid Transformers In Spacecraft Telemetry, Juan Rodriguez

Computer Science and Engineering Theses and Dissertations

Telemetry sensors play a crucial role in spacecraft operations, providing essential data on efficiency, sustainability, and safety. However, identifying irregularities in telemetry data can be a time-consuming process that risks the success of missions. With the rise of CubeSats and smallsats, telemetry data has become more abundant, but concerns about privacy and scalability have resulted in untapped data potential. To address these issues, we propose a new approach to anomaly detection that utilizes machine learning models at data sources. These models solely transmit weights to a centralized server for aggregation, resulting in improved dataset performance with a single global model. …


Leveraging Agile Software Methodologies Within Software Development To Introduce A Novel Educational Software Methodology, Montserrat Guadalupe Molina Dec 2023

Leveraging Agile Software Methodologies Within Software Development To Introduce A Novel Educational Software Methodology, Montserrat Guadalupe Molina

Open Access Theses & Dissertations

Agile Software Development has been growing increasingly popular in the software engineering industry as a way to produce working software in a quick and people-centered manner. Agile methodologies require practitioners to have strong technical and non-technical skills, such as teamwork, project management, and communication skills. Students graduating from the software engineering discipline have been found to be lacking in these areas, leading to many difficulties faced by recent graduates as they begin their professional careers. Given that Agile Software Development is the most popular software development lifecycle currently used by practitioners in industry, it is important to expose students to …


Cybersecurity In Critical Infrastructure Systems: Emulated Protection Relay, Mitchell Bylak Dec 2023

Cybersecurity In Critical Infrastructure Systems: Emulated Protection Relay, Mitchell Bylak

Computer Science and Computer Engineering Undergraduate Honors Theses

Cyber-attacks on Critical Systems Infrastructure have been steadily increasing across the world as the capabilities of and reliance on technology have grown throughout the 21st century, and despite the influx of new cybersecurity practices and technologies, the industry faces challenges in its cooperation between the government that regulates law practices and the private sector that owns and operates critical infrastructure and security, which has directly led to an absence of eas- ily accessible information and learning resources on cybersecurity for use in public environments and educational settings. This honors research thesis addresses these challenges by submitting the development of an …


Generation Of Dna Oligomers With Similar Chemical Kinetics Via In-Silico Optimization, Michael Tobiason, Bernard Yurke, William L. Hughes Oct 2023

Generation Of Dna Oligomers With Similar Chemical Kinetics Via In-Silico Optimization, Michael Tobiason, Bernard Yurke, William L. Hughes

Electrical and Computer Engineering Faculty Publications and Presentations

Networks of interacting DNA oligomers are useful for applications such as biomarker detection, targeted drug delivery, information storage, and photonic information processing. However, differences in the chemical kinetics of hybridization reactions, referred to as kinetic dispersion, can be problematic for some applications. Here, it is found that limiting unnecessary stretches of Watson-Crick base pairing, referred to as unnecessary duplexes, can yield exceptionally low kinetic dispersions. Hybridization kinetics can be affected by unnecessary intra-oligomer duplexes containing only 2 base-pairs, and such duplexes explain up to 94% of previously reported kinetic dispersion. As a general design rule, it is recommended that unnecessary …


Machine Learning-Enabled Regional Multi-Hazards Risk Assessment Considering Social Vulnerability, Tianjie Zhang, Donglei Wang, Yang Lu Aug 2023

Machine Learning-Enabled Regional Multi-Hazards Risk Assessment Considering Social Vulnerability, Tianjie Zhang, Donglei Wang, Yang Lu

Civil Engineering Faculty Publications and Presentations

The regional multi-hazards risk assessment poses difficulties due to data access challenges, and the potential interactions between multi-hazards and social vulnerability. For better natural hazards risk perception and preparedness, it is important to study the nature-hazards risk distribution in different areas, specifically a major priority in the areas of high hazards level and social vulnerability. We propose a multi-hazards risk assessment method which considers social vulnerability into the analyzing and utilize machine learning-enabled models to solve this issue. The proposed methodology integrates three aspects as follows: (1) characterization and mapping of multi-hazards (Flooding, Wildfires, and Seismic) using five machine learning …


The First Annual Teaching And Research Showcase Poster Tu Dublin – The Proof Is In The Pudding – Using Perceived Stress To Measure Short-Term Impact In Initiatives To Enhance Gender Balance In Computing Education, Alina Berry, Sarah Jane Delany Jun 2023

The First Annual Teaching And Research Showcase Poster Tu Dublin – The Proof Is In The Pudding – Using Perceived Stress To Measure Short-Term Impact In Initiatives To Enhance Gender Balance In Computing Education, Alina Berry, Sarah Jane Delany

Other resources

The problem of gender imbalance in computing higher education has forced academics and professionals to implement a wide range of initiatives. Many initiatives use recruitment or retention numbers as their most obvious evidence of impact. This type of evidence of impact is, however, more resource heavy to obtain, as well as often requires a longitudinal approach. There are many shorter term initiatives that use other ways to measure their success.

First, this poster presents with a review of existing evaluation measures in interventions to recruit and retain women in computing education across the board. Three main groups of evaluation come …


Modern Practices For Responsive Web Design And Web Accessibility, Keyaun Washington May 2023

Modern Practices For Responsive Web Design And Web Accessibility, Keyaun Washington

Honors Theses

Responsive web design and web accessibility play crucial roles in ensuring an optimal user experience on the web. By designing websites with responsiveness and accessibility in mind, more opportunities are opened up for a wider audience to access and interact with our content. Through modern practices, responsive web design allows websites to reach several different devices ranging from compact smartwatches to expansive television screens. Designing for accessibility provides accommodations for individuals with impairments while also providing benefits for individuals without impairments. However, designing for responsiveness and accessibility can present challenges; a poor attempt at providing accessibility features can worsen a …


Grammatical Triples Extraction For The Distant Reading Of Textual Corpora, Stephanie Buongiorno, Stephanie Buongiorno May 2023

Grammatical Triples Extraction For The Distant Reading Of Textual Corpora, Stephanie Buongiorno, Stephanie Buongiorno

Multidisciplinary Studies Theses and Dissertations

Grammatical triples extraction has become increasingly important for the analysis of large, textual corpora. By providing insight into the sentence-level linguistic features of a corpus, extracted triples have supported interpretations of some of the most relevant problems of our time. The growing importance of triples extraction for analyzing large corpora has put the quality of extracted triples under new scrutiny, however. Triples outputs are known to have large amounts of erroneous triples. The extraction of erroneous triples poses a risk for understanding a textual corpus because erroneous triples can be nonfactual and even analogous to misinformation. Disciplines such as the …


Design, Determination, And Evaluation Of Gender-Based Bias Mitigation Techniques For Music Recommender Systems, Sunny Shrestha Mar 2023

Design, Determination, And Evaluation Of Gender-Based Bias Mitigation Techniques For Music Recommender Systems, Sunny Shrestha

Electronic Theses and Dissertations

The majority of smartphone users engage with a recommender system on a daily basis. Many rely on these recommendations to make their next purchase, download the next game, listen to the new music or find the next healthcare provider. Although there are plenty of evidence backed research that demonstrates presence of gender bias in Machine Learning (ML) models like recommender systems, the issue is viewed as a frivolous cause that doesn’t merit much action. However, gender bias poses to effect more than half of the population as by default ML systems are designed to cater to a cisgender man. This …


Completeness Of Nominal Props, Samuel Balco, Alexander Kurz Jan 2023

Completeness Of Nominal Props, Samuel Balco, Alexander Kurz

Engineering Faculty Articles and Research

We introduce nominal string diagrams as string diagrams internal in the category of nominal sets. This leads us to define nominal PROPs and nominal monoidal theories. We show that the categories of ordinary PROPs and nominal PROPs are equivalent. This equivalence is then extended to symmetric monoidal theories and nominal monoidal theories, which allows us to transfer completeness results between ordinary and nominal calculi for string diagrams.


On A Computer Science Master Program For Sustainable Development, Daniel Einarson Jan 2023

On A Computer Science Master Program For Sustainable Development, Daniel Einarson

Practice Papers

Sustainable development and the UN’s Sustainable Development Goals have been pointed out as crucial for our common future, addressing several aspects of a world to be considered as sustainable. From a university perspective it is certainly interesting, and important, to see how research and education contribute to that context, which may be seen from both disciplinary, and multi-disciplinary perspectives.

A one-year Master Program in Computer Science for Sustainable Development, at Kristianstad University (HKR), Sweden, has a background in the UN’s Agenda 2030, and in statements, claiming that ‘at the edge’-techniques, from areas such as Artificial Intelligence, and Datamining are crucial …


Engaging Students Through Innovation In Computer Science Education, Kamilla Klonowska, Marijana Teljega, Fredrik Frisk Jan 2023

Engaging Students Through Innovation In Computer Science Education, Kamilla Klonowska, Marijana Teljega, Fredrik Frisk

Practice Papers

This contribution addresses how the innovation activities have been implemented in two bachelor programmes in computer science at Kristianstad University in Sweden. The goal of the innovation activities is to equip students with essential skills and abilities like developing technical and analytical skills, communication, collaboration, problem-solving, critical thinking, and creativity to prepare them in their professional role, to actively contribute to their workplace and work to identify and find innovative solutions to societal challenges. To achieve this goal, the programmes provide project-based learning to enhance the learning experience for students and, additionally, include the events like Imagine or Hackathon, where …


A Three-Year Academic Track Towards Literacy In Sustainable Development - A Computer Science Study Program Case, Kamilla Klonowska, Marijana Teljega, Daniel Einarson Jan 2023

A Three-Year Academic Track Towards Literacy In Sustainable Development - A Computer Science Study Program Case, Kamilla Klonowska, Marijana Teljega, Daniel Einarson

Practice Papers

The 3-year Bachelor Programme in Software Development study program at Kristianstad University, Sweden, aims to integrate not only academic competencies and skills in subject courses but also critical thinking skills on how Computer Science can contribute to achieving the sustainable development goals.

Starting from an understanding of the sustainable development goals, students begin a process of designing and implementing applications for some specific goals. Through participation in various activities, students exchange the ideas and perspectives, and are challenged to consider multiple solutions to complex problems. The students' critical thinking, communicative abilities, and the ability to solve problems both individually as …


Video Anomaly Detection Using Residual Autoencoder: A Lightweight Framework, Mohamed H. Habeb, May A. Salama, Lamiaa A. Elrefaei Jan 2023

Video Anomaly Detection Using Residual Autoencoder: A Lightweight Framework, Mohamed H. Habeb, May A. Salama, Lamiaa A. Elrefaei

Mansoura Engineering Journal

This paper proposes an efficient lightweight deep spatial residual autoencoder (SRAE) model to detect anomalous events in video surveillance systems. A lightweight network is essential in real-time situations where time is critical. Moreover, it could be deployed on low-resource devices like embedded systems or mobile devices. This makes it a very useful option for real-world situations where there may be a shortage of resources. The proposed network is composed of a 3-layer residual encoder-decoder architecture that is adopted to acquire the salient spatial characteristics representative of normal events in videos. Then, the reconstruction loss is used to find abnormalities, where …


Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte Jan 2023

Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte

Browse all Theses and Dissertations

Modern web development has grown increasingly reliant on scripting languages such as PHP. The complexities of an interpreted language means it is very difficult to account for every use case as unusual interactions can cause unintended side effects. Automatically generating test input to detect bugs or fuzzing, has proven to be an effective technique for JavaScript engines. By extending this concept to PHP, existing vulnerabilities that have since gone undetected can be brought to light. While PHP fuzzers exist, they are limited to testing a small quantity of test seeds per second. In this thesis, we propose a solution for …


Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula Jan 2023

Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula

Browse all Theses and Dissertations

Malware detection is a critical task in ensuring the security of computer systems. Due to a surge in malware and the malware program sophistication, machine learning methods have been developed to perform such a task with great success. To further learn structural semantics, Graph Neural Networks abbreviated as GNNs have emerged as a recent practice for malware detection by modeling the relationships between various components of a program as a graph, which deliver promising detection performance improvement. However, this line of research attends to individual programs while overlooking program interactions; also, these GNNs tend to perform feature aggregation from neighbors …


Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams Jan 2023

Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams

Browse all Theses and Dissertations

Most of today’s time series data contain anomalies and multiple seasonalities, and accurate anomaly detection in these data is critical to almost any type of business. However, most mainstream forecasting models used for anomaly detection can only incorporate one or no seasonal component into their forecasts and cannot capture every known seasonal pattern in time series data. In this thesis, we propose a new multi-seasonal forecasting model for anomaly detection in time series data that extends the popular Seasonal Autoregressive Integrated Moving Average (SARIMA) model. Our model, named multi-SARIMA, utilizes a time series dataset’s multiple pre-determined seasonal trends to increase …


Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula Jan 2023

Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula

Browse all Theses and Dissertations

Machine learning techniques utilize training data samples to help understand, predict, classify, and make valuable decisions for different applications such as medicine, email filtering, speech recognition, agriculture, and computer vision, where it is challenging or unfeasible to produce traditional algorithms to accomplish the needed tasks. Unsupervised ML-based approaches have emerged for building groups of data samples known as data clusters for driving necessary decisions about these data samples and helping solve challenges in critical applications. Data clustering is used in multiple fields, including health, finance, social networks, education, and science. Sequential processing of clustering algorithms, like the K-Means, Minibatch K-Means, …


Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal Jan 2023

Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal

Browse all Theses and Dissertations

Heart failure is a syndrome which effects a patient’s quality of life adversely. It can be caused by different underlying conditions or abnormalities and involves both cardiovascular and non-cardiovascular comorbidities. Heart failure cannot be cured but a patient’s quality of life can be improved by effective treatment through medicines and surgery, and lifestyle management. As effective treatment of heart failure incurs cost for the patients and resource allocation for the hospitals, predicting length of stay of these patients during each hospitalization becomes important. Heart failure can be classified into two types: left sided heart failure and right sided heart failure. …


Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani Jan 2023

Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani

Browse all Theses and Dissertations

Identifying the version of the Solidity compiler used to create an Ethereum contract is a challenging task, especially when the contract bytecode is obfuscated and lacks explicit metadata. Ethereum bytecode is highly complex, as it is generated by the Solidity compiler, which translates high-level programming constructs into low-level, stack-based code. Additionally, the Solidity compiler undergoes frequent updates and modifications, resulting in continuous evolution of bytecode patterns. To address this challenge, we propose using deep learning models to analyze Ethereum bytecodes and infer the compiler version that produced them. A large number of Ethereum contracts and the corresponding compiler versions is …


Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha Jan 2023

Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha

Browse all Theses and Dissertations

Smart cities have emerged to tackle many critical problems that can thwart the overwhelming urbanization process, such as traffic jams, environmental pollution, expensive health care, and increasing energy demand. This Master thesis proposes efficient and high-quality cloud-based machine-learning solutions for efficient and sustainable smart cities environment. Different supervised machine-learning models for air quality predication (AQP) in efficient and sustainable smart cities environment is developed. For that, ML-based techniques are implemented using cloud-based solutions. For example, regression and classification methods are implemented using distributed cloud computing to forecast air execution time and accuracy of the implemented ML solution. These models are …


Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan Jan 2023

Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan

Browse all Theses and Dissertations

Deploying Mandatory Access Controls (MAC) is a popular way to provide host protection against malware. Unfortunately, current implementations lack the flexibility to adapt to emergent malware threats and are known for being difficult to configure. A core tenet of MAC security systems is that the policies they are deployed with are immutable from the host while they are active. This work looks at deploying a MAC system that leverages using encrypted security tokens to allow for redeploying policy configurations in real-time without the need to stop a running process. This is instrumental in developing an adaptive framework for security systems …


The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii Jan 2023

The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii

Browse all Theses and Dissertations

The widespread expansion of Electric Vehicles (EV) throughout the world creates a requirement for charging stations. While Cybersecurity research is rapidly expanding in the field of Electric Vehicle Infrastructure, efforts are impacted by the availability of testing platforms. This paper presents a solution called the “Open Charge Point Protocol (OCPP) Cyber Range.” Its purpose is to conduct Cybersecurity research against vulnerabilities in the OCPP v1.6 protocol. The OCPP Cyber Range can be used to enable current or future research and to train operators and system managers of Electric Charge Vehicle Supply Equipment (EVSE). This paper demonstrates this solution using three …


Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee Jan 2023

Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee

Browse all Theses and Dissertations

This research explores data-driven AI techniques to extract insights from relevant medical data for pain management in patients with Sickle Cell Disease (SCD). SCD is an inherited red blood cell disorder that can cause a multitude of complications throughout an individual’s life. Most patients with SCD experience repeated, unpredictable episodes of severe pain. Arguably, the most challenging aspect of treating pain episodes in SCD is assessing and interpreting the patient’s pain intensity level due to the subjective nature of pain. In this study, we leverage multiple data-driven AI techniques to improve pain management in patients with SCD. The proposed approaches …


Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh Jan 2023

Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh

Browse all Theses and Dissertations

The Internet of Things (IoT) is used in many fields that generate sensitive data, such as healthcare and surveillance. Increased reliance on IoT raised serious information security concerns. This dissertation presents three systems for analyzing and classifying IoT traffic using Deep Learning (DL) models, and a large dataset is built for systems training and evaluation. The first system studies the effect of combining raw data and engineered features to optimize the classification of encrypted and compressed IoT traffic using Engineered Features Classification (EFC), Raw Data Classification (RDC), and combined Raw Data and Engineered Features Classification (RDEFC) approaches. Our results demonstrate …


Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman Jan 2023

Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman

Browse all Theses and Dissertations

Insider threats to information security have become a burden for organizations. Understanding insider activities leads to an effective improvement in identifying insider attacks and limits their threats. This dissertation presents three systems to detect insider threats effectively. The aim is to reduce the false negative rate (FNR), provide better dataset use, and reduce dimensionality and zero padding effects. The systems developed utilize deep learning techniques and are evaluated using the CERT 4.2 dataset. The dataset is analyzed and reformed so that each row represents a variable length sample of user activities. Two data representations are implemented to model extracted features …


A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham Jan 2023

A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham

Browse all Theses and Dissertations

The Industrial Internet of Things (IIoT) refers to a set of smart devices, i.e., actuators, detectors, smart sensors, and autonomous systems connected throughout the Internet to help achieve the purpose of various industrial applications. Unfortunately, IIoT applications are increasingly integrated into insecure physical environments leading to greater exposure to new cyber and physical system attacks. In the current IIoT security realm, effective anomaly detection is crucial for ensuring the integrity and reliability of critical infrastructure. Traditional security solutions may not apply to IIoT due to new dimensions, including extreme energy constraints in IIoT devices. Deep learning (DL) techniques like Convolutional …


Accelerating Precision Station Keeping For Automated Aircraft, James D. Anderson Jan 2023

Accelerating Precision Station Keeping For Automated Aircraft, James D. Anderson

Browse all Theses and Dissertations

Automated vehicles pose challenges in various research domains, including robotics, machine learning, computer vision, public safety, system certification, and beyond. These vehicles autonomously handle navigation and locomotion, often requiring minimal user interaction, and can operate on land, in water, or in the air. In the context of aircraft, one specific application is Automated Aerial Refueling (AAR). Traditional aerial refueling involves a "tanker" aircraft using a mechanism, such as a rigid boom arm or a flexible hose, to transfer fuel to another aircraft designated as the "receiver". For AAR, the boom arm may be maneuvered automatically, or in certain instances the …


Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams Jan 2023

Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams

Browse all Theses and Dissertations

Obtaining accurate inferences from deep neural networks is difficult when models are trained on instances with conflicting labels. Algorithmic recognition of online hate speech illustrates this. No human annotator is perfectly reliable, so multiple annotators evaluate and label online posts in a corpus. Labeling scheme limitations, differences in annotators' beliefs, and limits to annotators' honesty and carefulness cause some labels to disagree. Consequently, decisive and accurate inferences become less likely. Some practical applications such as social research can tolerate some indecisiveness. However, an online platform using an indecisive classifier for automated content moderation could create more problems than it solves. …


Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn Dec 2022

Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn

Culminating Experience Projects

This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …