Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Florida Institute of Technology

Theses and Dissertations

2015

Articles 1 - 10 of 10

Full-Text Articles in Physical Sciences and Mathematics

Detecting Harmful Hand Behavior With Machine Learning From Wearable Motion Sensor Data, Lingfeng Zhang Dec 2015

Detecting Harmful Hand Behavior With Machine Learning From Wearable Motion Sensor Data, Lingfeng Zhang

Theses and Dissertations

In medical care and special needs areas, human activity recognition helps doctors track the patients while they are unsupervised. In this paper, we will present our classifier system for detecting harmful hand behavior. The data comes from a wearable sensor on the user’s wrist. It collects signals in the three axes x, y and z. For each axis, it contains multiple attributes. Because reducing irrelevant attributes can decrease the time complexity and increase the accuracy, we started processing the raw data by ignoring some attributes from the whole attributes set. Our design approach is to apply a classification algorithm which …


A Methodology For Evaluating The Strength Of Cued-Recall Graphical Passwords, Mohammad N. Alshehri Dec 2015

A Methodology For Evaluating The Strength Of Cued-Recall Graphical Passwords, Mohammad N. Alshehri

Theses and Dissertations

With the revolution of computers, in particular smartphones, people use them to deal with sensitive information such as making online payments, online banking, managing medical records, and communicating with others via messages, emails, and social media. Consequently, computers and smartphones have become a storehouse of private information that must be protected from getting in the hands of unauthorized people. Verifying the identity of a computer’s users before granting access to them is one option of protection. Textual passwords and PINs are commonly used for authentication on standalone PCs, and smartphones. Users create problems, such as using easy to guess passwords …


Identifying Student Behavior For Improving Online Course Performance With Machine Learning, Makoto Mori Dec 2015

Identifying Student Behavior For Improving Online Course Performance With Machine Learning, Makoto Mori

Theses and Dissertations

In this study we investigate the correlation between student behavior and performance in online courses. Based on the web logs and syllabus of a course, we extract features that characterize student behavior. Using machine learning algorithms, we build models to predict performance at end of the period. Furthermore, we identify important behavior and behavior combinations in the models. The result of prediction in three tasks reach 87% accurate on average without using any score related features in the first half of the semester.


Using A Personalized Machine Learning Approach To Detect Stolen Phones, Huizhong Hu Dec 2015

Using A Personalized Machine Learning Approach To Detect Stolen Phones, Huizhong Hu

Theses and Dissertations

With the increasing number of smartphone penetration, mining smartphone data that make smartphone smarter became a top research area, there are a lot of event data which we can use to predict behavior or detect anomalies. The privacy disclosure caused by stolen or lost phones becomes an increasingly difficult problem that cannot be ignored. So we design an anomaly detection system by mining patterns to detect stolen phones. We use a pattern mining algorithm to abstract patterns from user past behavior, then construct a personalized model and use a scoring function and threshold setting strategy to detect stolen events. Moreover, …


Estimating Effectiveness Of Twitter Messages With A Personalized Machine Learning Approach, Xunhu Sun Jul 2015

Estimating Effectiveness Of Twitter Messages With A Personalized Machine Learning Approach, Xunhu Sun

Theses and Dissertations

In Twitter, many aspects of retweeting behavior, which is the most effective indicator of spreading effectiveness of the tweet, have been researched, such as whether a reader will retweet a certain tweet or not. However, the total number of retweets of the tweet, which is the quantitative measure of quality, has not been well addressed by existing work. To estimate the number of retweets and associated factors, this paper proposes a procedure to develop a personalized model for one author. The training data comes from the author’s past tweets. We propose 3 types of new features based on the contents …


Nat Traversal Techniques And Udp Keep-Alive Interval Optimization, Christopher Daniel Widmer Jul 2015

Nat Traversal Techniques And Udp Keep-Alive Interval Optimization, Christopher Daniel Widmer

Theses and Dissertations

NAT traversal presents a challenge to Peer to Peer (P2P) applications, as in many instances a third party is needed to help initiate communication between two hosts when one is behind one or more NAT devices. Much work has gone into facilitating communication across NATs using various protocols, and several standards have been developed to this end. This thesis explores the advantages and disadvantages of several of these standards, including protocols for interacting with the NAT device itself (NAT Port Mapping Protocol (NATPMP), Port Control Protocol (PCP), and Universal Plug and Play (UPnP)), and those using an external server to …


A Foundation For Cyber Experimentation, Evan Lawrence Stoner May 2015

A Foundation For Cyber Experimentation, Evan Lawrence Stoner

Theses and Dissertations

Despite the variety of environments and tools available to computer scientists performing cyber experimentation, the community lacks a single cohesive platform that is capable of unifying these tools across environments and research domains. In pursuit of this unifying platform, we introduce a new framework that is agnostic to the underlying environment, tools, and domain. We show the effectiveness of this framework by (1) demonstrating how an example experiment can be described within the framework and what benefits this offers, (2) presenting a prototype implementation of the framework, and (3) offering a collection of approaches to automated experimentation that the framework …


A Multi-Level Analysis Of Collaborations In Computer Science, Pramod Divakarmurthy May 2015

A Multi-Level Analysis Of Collaborations In Computer Science, Pramod Divakarmurthy

Theses and Dissertations

Working in collaboration is common in today’s highly connected scientific community. By collaborating, researchers can solve challenging multi-disciplinary problems, increase knowledge dissemination as well as productivity. These and other advantages motivate the study of the collaboration patterns of researchers. Such patterns can be observed directly in networks of manuscript co-authorship. In such a network, nodes represent authors and the links between them indicate that they have co-authored a paper. Several researchers constructed and studied large-scale networks representing collaborations in Mathematics, Biology, Physics, and Neuroscience. Most studies have performed bibliometric analysis of scientific publications, evaluated and ranked scholars on their research …


Framework For Open-Source Software Update Mechanism: Resistance To Stacking The Deck Attack, Khalid Alhamed May 2015

Framework For Open-Source Software Update Mechanism: Resistance To Stacking The Deck Attack, Khalid Alhamed

Theses and Dissertations

Currently many users trust open-source binaries downloaded from repositories such as sourceforge.net,github.com, and gitorious.org. As with any system connected to the Internet, such repositories can be subject to attacks tampering with the distributed binaries (inserting malicious code, changing behavior). Developers can change their vision and abandon features that are essential for certain users. Moreover, well-funded attackers can effectively take control of a project by orchestrating the transfer of the leadership of the developers to people whom they control. We propose a framework to reduce the level of trust that users are required to have into updates for open-source software that …


Towards A Usable-Security Engineering Framework For Enhancing Software Development, Yasser M. Hausawi May 2015

Towards A Usable-Security Engineering Framework For Enhancing Software Development, Yasser M. Hausawi

Theses and Dissertations

Computer systems are fundamental tools for almost every single process in life. People from all over the globe use computer systems for an unlimited number of purposes. Consequently, a close relationship between people and computer systems exists. Current research investigates how people and such systems to interact with each other in a proper manner. The research work on this matter is being conducted in different directions; one direction is investigating people’s behaviors toward computer systems, such as the cognitive and mental state of humans when interacting with computer systems; another direction studies the computer system’s behaviors toward people, such as …