Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (329)
- Physical Sciences and Mathematics (322)
- Computer Sciences (303)
- Electrical and Computer Engineering (28)
- Life Sciences (27)
-
- Education (26)
- Other Computer Engineering (20)
- Higher Education (19)
- Biomedical Engineering and Bioengineering (16)
- Artificial Intelligence and Robotics (10)
- Computational Engineering (10)
- Social and Behavioral Sciences (9)
- Computer and Systems Architecture (8)
- Operations Research, Systems Engineering and Industrial Engineering (8)
- Engineering Education (7)
- Materials Science and Engineering (7)
- Mechanical Engineering (7)
- Software Engineering (7)
- Databases and Information Systems (6)
- Digital Communications and Networking (6)
- Robotics (6)
- Arts and Humanities (5)
- Business (5)
- Civil and Environmental Engineering (5)
- Graphics and Human Computer Interfaces (5)
- Information Security (5)
- Operational Research (5)
- Power and Energy (5)
- Architecture (4)
- Institution
-
- Wright State University (279)
- Boise State University (21)
- Southern Methodist University (20)
- Southwestern Oklahoma State University (20)
- University of Denver (17)
-
- California Polytechnic State University, San Luis Obispo (8)
- Cleveland State University (6)
- Technological University Dublin (6)
- University of Nebraska - Lincoln (6)
- Utah State University (5)
- Georgia Southern University (2)
- Illinois Math and Science Academy (2)
- The College of Wooster (2)
- University of Arkansas, Fayetteville (2)
- University of Central Florida (2)
- University of Texas at El Paso (2)
- Western Kentucky University (2)
- Bowdoin College (1)
- Chapman University (1)
- East Tennessee State University (1)
- Faculty of Engineering, Mansoura University (1)
- Florida International University (1)
- Grand Valley State University (1)
- Harrisburg University of Science and Technology (1)
- La Salle University (1)
- Liberty University (1)
- Missouri University of Science and Technology (1)
- Nova Southeastern University (1)
- Old Dominion University (1)
- Purdue University (1)
- Publication Year
- Publication
-
- BITs and PCs Newsletter (157)
- Browse all Theses and Dissertations (122)
- Electronic Theses and Dissertations (20)
- Oklahoma Research Day Abstracts (18)
- Computer Science and Engineering Theses and Dissertations (11)
-
- Electrical and Computer Engineering Faculty Publications and Presentations (8)
- Materials Science and Engineering Faculty Publications and Presentations (7)
- ETD Archive (6)
- Mechanical and Biomedical Engineering Faculty Publications and Presentations (5)
- Computer Science and Software Engineering (4)
- Electrical Engineering Theses and Dissertations (4)
- Honors Theses (4)
- Practice Papers (3)
- Civil and Environmental Engineering Theses and Dissertations (2)
- College of Engineering News (2)
- Honors Projects (2)
- Mahurin Honors College Capstone Experience/Thesis Projects (2)
- Master's Theses (2)
- Open Access Theses & Dissertations (2)
- School of Computing: Faculty Publications (2)
- Senior Independent Study Theses (2)
- Student Research (2)
- The International Student Science Fair 2018 (2)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (1)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
- Allen E. Paulson College of Engineering & Computing News (2012-2023) (1)
- Allen E. Paulson College of Engineering & Computing Progress (1)
- Articles (1)
- Biomedical Engineering Undergraduate Honors Theses (1)
- Chancellor’s Honors Program Projects (1)
- Publication Type
Articles 1 - 30 of 428
Full-Text Articles in Engineering
Beyond The Horizon: Exploring Anomaly Detection Potentials With Federated Learning And Hybrid Transformers In Spacecraft Telemetry, Juan Rodriguez
Beyond The Horizon: Exploring Anomaly Detection Potentials With Federated Learning And Hybrid Transformers In Spacecraft Telemetry, Juan Rodriguez
Computer Science and Engineering Theses and Dissertations
Telemetry sensors play a crucial role in spacecraft operations, providing essential data on efficiency, sustainability, and safety. However, identifying irregularities in telemetry data can be a time-consuming process that risks the success of missions. With the rise of CubeSats and smallsats, telemetry data has become more abundant, but concerns about privacy and scalability have resulted in untapped data potential. To address these issues, we propose a new approach to anomaly detection that utilizes machine learning models at data sources. These models solely transmit weights to a centralized server for aggregation, resulting in improved dataset performance with a single global model. …
Leveraging Agile Software Methodologies Within Software Development To Introduce A Novel Educational Software Methodology, Montserrat Guadalupe Molina
Leveraging Agile Software Methodologies Within Software Development To Introduce A Novel Educational Software Methodology, Montserrat Guadalupe Molina
Open Access Theses & Dissertations
Agile Software Development has been growing increasingly popular in the software engineering industry as a way to produce working software in a quick and people-centered manner. Agile methodologies require practitioners to have strong technical and non-technical skills, such as teamwork, project management, and communication skills. Students graduating from the software engineering discipline have been found to be lacking in these areas, leading to many difficulties faced by recent graduates as they begin their professional careers. Given that Agile Software Development is the most popular software development lifecycle currently used by practitioners in industry, it is important to expose students to …
Cybersecurity In Critical Infrastructure Systems: Emulated Protection Relay, Mitchell Bylak
Cybersecurity In Critical Infrastructure Systems: Emulated Protection Relay, Mitchell Bylak
Computer Science and Computer Engineering Undergraduate Honors Theses
Cyber-attacks on Critical Systems Infrastructure have been steadily increasing across the world as the capabilities of and reliance on technology have grown throughout the 21st century, and despite the influx of new cybersecurity practices and technologies, the industry faces challenges in its cooperation between the government that regulates law practices and the private sector that owns and operates critical infrastructure and security, which has directly led to an absence of eas- ily accessible information and learning resources on cybersecurity for use in public environments and educational settings. This honors research thesis addresses these challenges by submitting the development of an …
Generation Of Dna Oligomers With Similar Chemical Kinetics Via In-Silico Optimization, Michael Tobiason, Bernard Yurke, William L. Hughes
Generation Of Dna Oligomers With Similar Chemical Kinetics Via In-Silico Optimization, Michael Tobiason, Bernard Yurke, William L. Hughes
Electrical and Computer Engineering Faculty Publications and Presentations
Networks of interacting DNA oligomers are useful for applications such as biomarker detection, targeted drug delivery, information storage, and photonic information processing. However, differences in the chemical kinetics of hybridization reactions, referred to as kinetic dispersion, can be problematic for some applications. Here, it is found that limiting unnecessary stretches of Watson-Crick base pairing, referred to as unnecessary duplexes, can yield exceptionally low kinetic dispersions. Hybridization kinetics can be affected by unnecessary intra-oligomer duplexes containing only 2 base-pairs, and such duplexes explain up to 94% of previously reported kinetic dispersion. As a general design rule, it is recommended that unnecessary …
Machine Learning-Enabled Regional Multi-Hazards Risk Assessment Considering Social Vulnerability, Tianjie Zhang, Donglei Wang, Yang Lu
Machine Learning-Enabled Regional Multi-Hazards Risk Assessment Considering Social Vulnerability, Tianjie Zhang, Donglei Wang, Yang Lu
Civil Engineering Faculty Publications and Presentations
The regional multi-hazards risk assessment poses difficulties due to data access challenges, and the potential interactions between multi-hazards and social vulnerability. For better natural hazards risk perception and preparedness, it is important to study the nature-hazards risk distribution in different areas, specifically a major priority in the areas of high hazards level and social vulnerability. We propose a multi-hazards risk assessment method which considers social vulnerability into the analyzing and utilize machine learning-enabled models to solve this issue. The proposed methodology integrates three aspects as follows: (1) characterization and mapping of multi-hazards (Flooding, Wildfires, and Seismic) using five machine learning …
The First Annual Teaching And Research Showcase Poster Tu Dublin – The Proof Is In The Pudding – Using Perceived Stress To Measure Short-Term Impact In Initiatives To Enhance Gender Balance In Computing Education, Alina Berry, Sarah Jane Delany
The First Annual Teaching And Research Showcase Poster Tu Dublin – The Proof Is In The Pudding – Using Perceived Stress To Measure Short-Term Impact In Initiatives To Enhance Gender Balance In Computing Education, Alina Berry, Sarah Jane Delany
Other resources
The problem of gender imbalance in computing higher education has forced academics and professionals to implement a wide range of initiatives. Many initiatives use recruitment or retention numbers as their most obvious evidence of impact. This type of evidence of impact is, however, more resource heavy to obtain, as well as often requires a longitudinal approach. There are many shorter term initiatives that use other ways to measure their success.
First, this poster presents with a review of existing evaluation measures in interventions to recruit and retain women in computing education across the board. Three main groups of evaluation come …
Modern Practices For Responsive Web Design And Web Accessibility, Keyaun Washington
Modern Practices For Responsive Web Design And Web Accessibility, Keyaun Washington
Honors Theses
Responsive web design and web accessibility play crucial roles in ensuring an optimal user experience on the web. By designing websites with responsiveness and accessibility in mind, more opportunities are opened up for a wider audience to access and interact with our content. Through modern practices, responsive web design allows websites to reach several different devices ranging from compact smartwatches to expansive television screens. Designing for accessibility provides accommodations for individuals with impairments while also providing benefits for individuals without impairments. However, designing for responsiveness and accessibility can present challenges; a poor attempt at providing accessibility features can worsen a …
Grammatical Triples Extraction For The Distant Reading Of Textual Corpora, Stephanie Buongiorno, Stephanie Buongiorno
Grammatical Triples Extraction For The Distant Reading Of Textual Corpora, Stephanie Buongiorno, Stephanie Buongiorno
Multidisciplinary Studies Theses and Dissertations
Grammatical triples extraction has become increasingly important for the analysis of large, textual corpora. By providing insight into the sentence-level linguistic features of a corpus, extracted triples have supported interpretations of some of the most relevant problems of our time. The growing importance of triples extraction for analyzing large corpora has put the quality of extracted triples under new scrutiny, however. Triples outputs are known to have large amounts of erroneous triples. The extraction of erroneous triples poses a risk for understanding a textual corpus because erroneous triples can be nonfactual and even analogous to misinformation. Disciplines such as the …
Design, Determination, And Evaluation Of Gender-Based Bias Mitigation Techniques For Music Recommender Systems, Sunny Shrestha
Design, Determination, And Evaluation Of Gender-Based Bias Mitigation Techniques For Music Recommender Systems, Sunny Shrestha
Electronic Theses and Dissertations
The majority of smartphone users engage with a recommender system on a daily basis. Many rely on these recommendations to make their next purchase, download the next game, listen to the new music or find the next healthcare provider. Although there are plenty of evidence backed research that demonstrates presence of gender bias in Machine Learning (ML) models like recommender systems, the issue is viewed as a frivolous cause that doesn’t merit much action. However, gender bias poses to effect more than half of the population as by default ML systems are designed to cater to a cisgender man. This …
Completeness Of Nominal Props, Samuel Balco, Alexander Kurz
Completeness Of Nominal Props, Samuel Balco, Alexander Kurz
Engineering Faculty Articles and Research
We introduce nominal string diagrams as string diagrams internal in the category of nominal sets. This leads us to define nominal PROPs and nominal monoidal theories. We show that the categories of ordinary PROPs and nominal PROPs are equivalent. This equivalence is then extended to symmetric monoidal theories and nominal monoidal theories, which allows us to transfer completeness results between ordinary and nominal calculi for string diagrams.
On A Computer Science Master Program For Sustainable Development, Daniel Einarson
On A Computer Science Master Program For Sustainable Development, Daniel Einarson
Practice Papers
Sustainable development and the UN’s Sustainable Development Goals have been pointed out as crucial for our common future, addressing several aspects of a world to be considered as sustainable. From a university perspective it is certainly interesting, and important, to see how research and education contribute to that context, which may be seen from both disciplinary, and multi-disciplinary perspectives.
A one-year Master Program in Computer Science for Sustainable Development, at Kristianstad University (HKR), Sweden, has a background in the UN’s Agenda 2030, and in statements, claiming that ‘at the edge’-techniques, from areas such as Artificial Intelligence, and Datamining are crucial …
Engaging Students Through Innovation In Computer Science Education, Kamilla Klonowska, Marijana Teljega, Fredrik Frisk
Engaging Students Through Innovation In Computer Science Education, Kamilla Klonowska, Marijana Teljega, Fredrik Frisk
Practice Papers
This contribution addresses how the innovation activities have been implemented in two bachelor programmes in computer science at Kristianstad University in Sweden. The goal of the innovation activities is to equip students with essential skills and abilities like developing technical and analytical skills, communication, collaboration, problem-solving, critical thinking, and creativity to prepare them in their professional role, to actively contribute to their workplace and work to identify and find innovative solutions to societal challenges. To achieve this goal, the programmes provide project-based learning to enhance the learning experience for students and, additionally, include the events like Imagine or Hackathon, where …
A Three-Year Academic Track Towards Literacy In Sustainable Development - A Computer Science Study Program Case, Kamilla Klonowska, Marijana Teljega, Daniel Einarson
A Three-Year Academic Track Towards Literacy In Sustainable Development - A Computer Science Study Program Case, Kamilla Klonowska, Marijana Teljega, Daniel Einarson
Practice Papers
The 3-year Bachelor Programme in Software Development study program at Kristianstad University, Sweden, aims to integrate not only academic competencies and skills in subject courses but also critical thinking skills on how Computer Science can contribute to achieving the sustainable development goals.
Starting from an understanding of the sustainable development goals, students begin a process of designing and implementing applications for some specific goals. Through participation in various activities, students exchange the ideas and perspectives, and are challenged to consider multiple solutions to complex problems. The students' critical thinking, communicative abilities, and the ability to solve problems both individually as …
Video Anomaly Detection Using Residual Autoencoder: A Lightweight Framework, Mohamed H. Habeb, May A. Salama, Lamiaa A. Elrefaei
Video Anomaly Detection Using Residual Autoencoder: A Lightweight Framework, Mohamed H. Habeb, May A. Salama, Lamiaa A. Elrefaei
Mansoura Engineering Journal
This paper proposes an efficient lightweight deep spatial residual autoencoder (SRAE) model to detect anomalous events in video surveillance systems. A lightweight network is essential in real-time situations where time is critical. Moreover, it could be deployed on low-resource devices like embedded systems or mobile devices. This makes it a very useful option for real-world situations where there may be a shortage of resources. The proposed network is composed of a 3-layer residual encoder-decoder architecture that is adopted to acquire the salient spatial characteristics representative of normal events in videos. Then, the reconstruction loss is used to find abnormalities, where …
Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte
Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte
Browse all Theses and Dissertations
Modern web development has grown increasingly reliant on scripting languages such as PHP. The complexities of an interpreted language means it is very difficult to account for every use case as unusual interactions can cause unintended side effects. Automatically generating test input to detect bugs or fuzzing, has proven to be an effective technique for JavaScript engines. By extending this concept to PHP, existing vulnerabilities that have since gone undetected can be brought to light. While PHP fuzzers exist, they are limited to testing a small quantity of test seeds per second. In this thesis, we propose a solution for …
Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula
Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula
Browse all Theses and Dissertations
Malware detection is a critical task in ensuring the security of computer systems. Due to a surge in malware and the malware program sophistication, machine learning methods have been developed to perform such a task with great success. To further learn structural semantics, Graph Neural Networks abbreviated as GNNs have emerged as a recent practice for malware detection by modeling the relationships between various components of a program as a graph, which deliver promising detection performance improvement. However, this line of research attends to individual programs while overlooking program interactions; also, these GNNs tend to perform feature aggregation from neighbors …
Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams
Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams
Browse all Theses and Dissertations
Most of today’s time series data contain anomalies and multiple seasonalities, and accurate anomaly detection in these data is critical to almost any type of business. However, most mainstream forecasting models used for anomaly detection can only incorporate one or no seasonal component into their forecasts and cannot capture every known seasonal pattern in time series data. In this thesis, we propose a new multi-seasonal forecasting model for anomaly detection in time series data that extends the popular Seasonal Autoregressive Integrated Moving Average (SARIMA) model. Our model, named multi-SARIMA, utilizes a time series dataset’s multiple pre-determined seasonal trends to increase …
Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula
Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula
Browse all Theses and Dissertations
Machine learning techniques utilize training data samples to help understand, predict, classify, and make valuable decisions for different applications such as medicine, email filtering, speech recognition, agriculture, and computer vision, where it is challenging or unfeasible to produce traditional algorithms to accomplish the needed tasks. Unsupervised ML-based approaches have emerged for building groups of data samples known as data clusters for driving necessary decisions about these data samples and helping solve challenges in critical applications. Data clustering is used in multiple fields, including health, finance, social networks, education, and science. Sequential processing of clustering algorithms, like the K-Means, Minibatch K-Means, …
Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal
Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal
Browse all Theses and Dissertations
Heart failure is a syndrome which effects a patient’s quality of life adversely. It can be caused by different underlying conditions or abnormalities and involves both cardiovascular and non-cardiovascular comorbidities. Heart failure cannot be cured but a patient’s quality of life can be improved by effective treatment through medicines and surgery, and lifestyle management. As effective treatment of heart failure incurs cost for the patients and resource allocation for the hospitals, predicting length of stay of these patients during each hospitalization becomes important. Heart failure can be classified into two types: left sided heart failure and right sided heart failure. …
Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani
Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani
Browse all Theses and Dissertations
Identifying the version of the Solidity compiler used to create an Ethereum contract is a challenging task, especially when the contract bytecode is obfuscated and lacks explicit metadata. Ethereum bytecode is highly complex, as it is generated by the Solidity compiler, which translates high-level programming constructs into low-level, stack-based code. Additionally, the Solidity compiler undergoes frequent updates and modifications, resulting in continuous evolution of bytecode patterns. To address this challenge, we propose using deep learning models to analyze Ethereum bytecodes and infer the compiler version that produced them. A large number of Ethereum contracts and the corresponding compiler versions is …
Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha
Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha
Browse all Theses and Dissertations
Smart cities have emerged to tackle many critical problems that can thwart the overwhelming urbanization process, such as traffic jams, environmental pollution, expensive health care, and increasing energy demand. This Master thesis proposes efficient and high-quality cloud-based machine-learning solutions for efficient and sustainable smart cities environment. Different supervised machine-learning models for air quality predication (AQP) in efficient and sustainable smart cities environment is developed. For that, ML-based techniques are implemented using cloud-based solutions. For example, regression and classification methods are implemented using distributed cloud computing to forecast air execution time and accuracy of the implemented ML solution. These models are …
Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan
Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan
Browse all Theses and Dissertations
Deploying Mandatory Access Controls (MAC) is a popular way to provide host protection against malware. Unfortunately, current implementations lack the flexibility to adapt to emergent malware threats and are known for being difficult to configure. A core tenet of MAC security systems is that the policies they are deployed with are immutable from the host while they are active. This work looks at deploying a MAC system that leverages using encrypted security tokens to allow for redeploying policy configurations in real-time without the need to stop a running process. This is instrumental in developing an adaptive framework for security systems …
The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii
The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii
Browse all Theses and Dissertations
The widespread expansion of Electric Vehicles (EV) throughout the world creates a requirement for charging stations. While Cybersecurity research is rapidly expanding in the field of Electric Vehicle Infrastructure, efforts are impacted by the availability of testing platforms. This paper presents a solution called the “Open Charge Point Protocol (OCPP) Cyber Range.” Its purpose is to conduct Cybersecurity research against vulnerabilities in the OCPP v1.6 protocol. The OCPP Cyber Range can be used to enable current or future research and to train operators and system managers of Electric Charge Vehicle Supply Equipment (EVSE). This paper demonstrates this solution using three …
Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee
Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee
Browse all Theses and Dissertations
This research explores data-driven AI techniques to extract insights from relevant medical data for pain management in patients with Sickle Cell Disease (SCD). SCD is an inherited red blood cell disorder that can cause a multitude of complications throughout an individual’s life. Most patients with SCD experience repeated, unpredictable episodes of severe pain. Arguably, the most challenging aspect of treating pain episodes in SCD is assessing and interpreting the patient’s pain intensity level due to the subjective nature of pain. In this study, we leverage multiple data-driven AI techniques to improve pain management in patients with SCD. The proposed approaches …
Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh
Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh
Browse all Theses and Dissertations
The Internet of Things (IoT) is used in many fields that generate sensitive data, such as healthcare and surveillance. Increased reliance on IoT raised serious information security concerns. This dissertation presents three systems for analyzing and classifying IoT traffic using Deep Learning (DL) models, and a large dataset is built for systems training and evaluation. The first system studies the effect of combining raw data and engineered features to optimize the classification of encrypted and compressed IoT traffic using Engineered Features Classification (EFC), Raw Data Classification (RDC), and combined Raw Data and Engineered Features Classification (RDEFC) approaches. Our results demonstrate …
Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman
Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman
Browse all Theses and Dissertations
Insider threats to information security have become a burden for organizations. Understanding insider activities leads to an effective improvement in identifying insider attacks and limits their threats. This dissertation presents three systems to detect insider threats effectively. The aim is to reduce the false negative rate (FNR), provide better dataset use, and reduce dimensionality and zero padding effects. The systems developed utilize deep learning techniques and are evaluated using the CERT 4.2 dataset. The dataset is analyzed and reformed so that each row represents a variable length sample of user activities. Two data representations are implemented to model extracted features …
A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham
A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham
Browse all Theses and Dissertations
The Industrial Internet of Things (IIoT) refers to a set of smart devices, i.e., actuators, detectors, smart sensors, and autonomous systems connected throughout the Internet to help achieve the purpose of various industrial applications. Unfortunately, IIoT applications are increasingly integrated into insecure physical environments leading to greater exposure to new cyber and physical system attacks. In the current IIoT security realm, effective anomaly detection is crucial for ensuring the integrity and reliability of critical infrastructure. Traditional security solutions may not apply to IIoT due to new dimensions, including extreme energy constraints in IIoT devices. Deep learning (DL) techniques like Convolutional …
Accelerating Precision Station Keeping For Automated Aircraft, James D. Anderson
Accelerating Precision Station Keeping For Automated Aircraft, James D. Anderson
Browse all Theses and Dissertations
Automated vehicles pose challenges in various research domains, including robotics, machine learning, computer vision, public safety, system certification, and beyond. These vehicles autonomously handle navigation and locomotion, often requiring minimal user interaction, and can operate on land, in water, or in the air. In the context of aircraft, one specific application is Automated Aerial Refueling (AAR). Traditional aerial refueling involves a "tanker" aircraft using a mechanism, such as a rigid boom arm or a flexible hose, to transfer fuel to another aircraft designated as the "receiver". For AAR, the boom arm may be maneuvered automatically, or in certain instances the …
Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams
Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams
Browse all Theses and Dissertations
Obtaining accurate inferences from deep neural networks is difficult when models are trained on instances with conflicting labels. Algorithmic recognition of online hate speech illustrates this. No human annotator is perfectly reliable, so multiple annotators evaluate and label online posts in a corpus. Labeling scheme limitations, differences in annotators' beliefs, and limits to annotators' honesty and carefulness cause some labels to disagree. Consequently, decisive and accurate inferences become less likely. Some practical applications such as social research can tolerate some indecisiveness. However, an online platform using an indecisive classifier for automated content moderation could create more problems than it solves. …
Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn
Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn
Culminating Experience Projects
This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …