Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 26 of 26

Full-Text Articles in Physical Sciences and Mathematics

Using Materialized Views For Answering Graph Pattern Queries, Michael Lan Dec 2022

Using Materialized Views For Answering Graph Pattern Queries, Michael Lan

Dissertations

Discovering patterns in graphs by evaluating graph pattern queries involving direct (edge-to-edge mapping) and reachability (edge-to-path mapping) relationships under homomorphisms on data graphs has been extensively studied. Previous studies have aimed to reduce the evaluation time of graph pattern queries due to the potentially numerous matches on large data graphs.

In this work, the concept of the summary graph is developed to improve the evaluation of tree pattern queries and graph pattern queries. The summary graph first filters out candidate matches which violate certain reachability constraints, and then finds local matches of query edges. This reduces redundancy in the representation …


Android Security: Analysis And Applications, Raina Samuel Dec 2022

Android Security: Analysis And Applications, Raina Samuel

Dissertations

The Android mobile system is home to millions of apps that offer a wide range of functionalities. Users rely on Android apps in various facets of daily life, including critical, e.g., medical, settings. Generally, users trust that apps perform their stated purpose safely and accurately. However, despite the platform’s efforts to maintain a safe environment, apps routinely manage to evade scrutiny. This dissertation analyzes Android app behavior and has revealed several weakness: lapses in device authentication schemes, deceptive practices such as apps covering their traces, as well as behavioral and descriptive inaccuracies in medical apps. Examining a large corpus of …


Machine Learning-Based Data Analytics For Understanding Space Weather And Climate, Yasser Abduallah Dec 2022

Machine Learning-Based Data Analytics For Understanding Space Weather And Climate, Yasser Abduallah

Dissertations

This dissertation addresses multiple crucial problems in space weather and climate, presenting new machine learning-based data analytics algorithms and models for tackling the problems.

First, the dissertation presents two new approaches to predicting solar flares. One approach, called DeepSun, predicts solar flares by utilizing a machine-learning-as-a-service (MLaaS) platform. The DeepSun system provides a friendly interface for Web users and an application programming interface (API) for remote programming users. It adopts an ensemble learning method that employs several machine learning algorithms to perform multiclass flare prediction. The other approach, named SolarFlareNet, forecasts the occurrence of solar flares within the next 24 …


Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba Oct 2022

Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba

Dissertations

Artificial Intelligence (AI) is changing every technology we deal with. Autonomy has been a sought-after goal in vehicles, and now more than ever we are very close to that goal. Vehicles before were dumb mechanical devices, now they are becoming smart, computerized, and connected coined as Autonomous Vehicles (AVs). Moreover, researchers found a way to make more use of these enormous capabilities and introduced Autonomous Vehicles Cloud Computing (AVCC). In these platforms, vehicles can lend their unused resources and sensory data to join AVCC.

In this dissertation, we investigate security and privacy issues in AVCC. As background, we built our …


Computation Of Risk Measures In Finance And Parallel Real-Time Scheduling, Yajuan Li Aug 2022

Computation Of Risk Measures In Finance And Parallel Real-Time Scheduling, Yajuan Li

Dissertations

Many application areas employ various risk measures, such as a quantile, to assess risks. For example, in finance, risk managers employ a quantile to help determine appropriate levels of capital needed to be able to absorb (with high probability) large unexpected losses in credit portfolios comprising loans, bonds, and other financial instruments subject to default. This dissertation discusses the computation of risk measures in finance and parallel real-time scheduling.

Firstly, two estimation approaches are compared for one risk measure, a quantile, via randomized quasi-Monte Carlo (RQMC) in an asymptotic setting where the number of randomizations for RQMC grows large, but …


Low-Reynolds-Number Locomotion Via Reinforcement Learning, Yuexin Liu Aug 2022

Low-Reynolds-Number Locomotion Via Reinforcement Learning, Yuexin Liu

Dissertations

This dissertation summarizes computational results from applying reinforcement learning and deep neural network to the designs of artificial microswimmers in the inertialess regime, where the viscous dissipation in the surrounding fluid environment dominates and the swimmer’s inertia is completely negligible. In particular, works in this dissertation consist of four interrelated studies of the design of microswimmers for different tasks: (1) a one-dimensional microswimmer in free-space that moves towards the target via translation, (2) a one-dimensional microswimmer in a periodic domain that rotates to reach the target, (3) a two-dimensional microswimmer that switches gaits to navigate to the designated targets in …


Towards Ensuring Integrity And Authenticity Of Software Repositories, Sangat Vaidya Aug 2022

Towards Ensuring Integrity And Authenticity Of Software Repositories, Sangat Vaidya

Dissertations

The software development process comprises a series of steps known as a software supply chain. These steps include managing the source code, testing, building and packaging it into a final product, and distributing the product to end users. Along this chain, software repositories are used for different purposes such as source code management (Git, SVN, mercurial), software distribution (PyPI, RubyGems, NPM) or for deploying software based on container images (Harbor, DockerHub, Artifact Hub). In the recent past, different types of repositories have increasingly been the target of attacks. As such, there is a need for mechanisms to ensure integrity and …


Data Collection And Machine Learning Methods For Automated Pedestrian Facility Detection And Mensuration, Joseph Bailey Luttrell Iv Aug 2022

Data Collection And Machine Learning Methods For Automated Pedestrian Facility Detection And Mensuration, Joseph Bailey Luttrell Iv

Dissertations

Large-scale collection of pedestrian facility (crosswalks, sidewalks, etc.) presence data is vital to the success of efforts to improve pedestrian facility management, safety analysis, and road network planning. However, this kind of data is typically not available on a large scale due to the high labor and time costs that are the result of relying on manual data collection methods. Therefore, methods for automating this process using techniques such as machine learning are currently being explored by researchers. In our work, we mainly focus on machine learning methods for the detection of crosswalks and sidewalks from both aerial and street-view …


Diagnostics Of Dementia From Structural And Functional Markers Of Brain Atrophy With Machine Learning, Tetiana Habuza Jun 2022

Diagnostics Of Dementia From Structural And Functional Markers Of Brain Atrophy With Machine Learning, Tetiana Habuza

Dissertations

Dementia is a condition in which higher mental functions are disrupted. It currently affects an estimated 57 million people throughout the world. A dementia diagnosis is difficult since neither anatomical indicators nor functional testing is currently sufficiently sensitive or specific. There remains a long list of outstanding issues that must be addressed. First, multimodal diagnosis has yet to be introduced into the early stages of dementia screening. Second, there is no accurate instrument for predicting the progression of pre-dementia. Third, non-invasive testing cannot be used to provide differential diagnoses. By creating ML models of normal and accelerated brain aging, we …


One-Stage Blind Source Separation Via A Sparse Autoencoder Framework, Jason Anthony Dabin May 2022

One-Stage Blind Source Separation Via A Sparse Autoencoder Framework, Jason Anthony Dabin

Dissertations

Blind source separation (BSS) is the process of recovering individual source transmissions from a received mixture of co-channel signals without a priori knowledge of the channel mixing matrix or transmitted source signals. The received co-channel composite signal is considered to be captured across an antenna array or sensor network and is assumed to contain sparse transmissions, as users are active and inactive aperiodically over time. An unsupervised machine learning approach using an artificial feedforward neural network sparse autoencoder with one hidden layer is formulated for blindly recovering the channel matrix and source activity of co-channel transmissions. The BSS sparse autoencoder …


Understanding The Voluntary Moderation Practices In Live Streaming Communities, Jie Cai May 2022

Understanding The Voluntary Moderation Practices In Live Streaming Communities, Jie Cai

Dissertations

Harmful content, such as hate speech, online abuses, harassment, and cyberbullying, proliferates across various online communities. Live streaming as a novel online community provides ways for thousands of users (viewers) to entertain and engage with a broadcaster (streamer) in real-time in the chatroom. While the streamer has the camera on and the screen shared, tens of thousands of viewers are watching and messaging in real-time, resulting in concerns about harassment and cyberbullying. To regulate harmful content—toxic messages in the chatroom, streamers rely on a combination of automated tools and volunteer human moderators (mods) to block users or remove content, which …


A Self-Learning Intersection Control System For Connected And Automated Vehicles, Ardeshir Mirbakhsh May 2022

A Self-Learning Intersection Control System For Connected And Automated Vehicles, Ardeshir Mirbakhsh

Dissertations

This study proposes a Decentralized Sparse Coordination Learning System (DSCLS) based on Deep Reinforcement Learning (DRL) to control intersections under the Connected and Automated Vehicles (CAVs) environment. In this approach, roadway sections are divided into small areas; vehicles try to reserve their desired area ahead of time, based on having a common desired area with other CAVs; the vehicles would be in an independent or coordinated state. Individual CAVs are set accountable for decision-making at each step in both coordinated and independent states. In the training process, CAVs learn to minimize the overall delay at the intersection. Due to the …


Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld May 2022

Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld

Dissertations

This dissertation focuses on the development of machine learning algorithms for spiking neural networks, with an emphasis on local three-factor learning rules that are in keeping with the constraints imposed by current neuromorphic hardware. Spiking neural networks (SNNs) are an alternative to artificial neural networks (ANNs) that follow a similar graphical structure but use a processing paradigm more closely modeled after the biological brain in an effort to harness its low power processing capability. SNNs use an event based processing scheme which leads to significant power savings when implemented in dedicated neuromorphic hardware such as Intel’s Loihi chip.

This work …


Optimization Opportunities In Human In The Loop Computational Paradigm, Dong Wei May 2022

Optimization Opportunities In Human In The Loop Computational Paradigm, Dong Wei

Dissertations

An emerging trend is to leverage human capabilities in the computational loop at different capacities, ranging from tapping knowledge from a richly heterogeneous pool of knowledge resident in the general population to soliciting expert opinions. These practices are, in general, termed human-in-the-loop (HITL) computations.

A HITL process requires holistic treatment and optimization from multiple standpoints considering all stakeholders: a. applications, b. platforms, c. humans. In application-centric optimization, the factors of interest usually are latency (how long it takes for a set of tasks to finish), cost (the monetary or computational expenses incurred in the process), and quality of the completed …


Towards Practicalization Of Blockchain-Based Decentralized Applications, Songlin He May 2022

Towards Practicalization Of Blockchain-Based Decentralized Applications, Songlin He

Dissertations

Blockchain can be defined as an immutable ledger for recording transactions, maintained in a distributed network of mutually untrusting peers. Blockchain technology has been widely applied to various fields beyond its initial usage of cryptocurrency. However, blockchain itself is insufficient to meet all the desired security or efficiency requirements for diversified application scenarios. This dissertation focuses on two core functionalities that blockchain provides, i.e., robust storage and reliable computation. Three concrete application scenarios including Internet of Things (IoT), cybersecurity management (CSM), and peer-to-peer (P2P) content delivery network (CDN) are utilized to elaborate the general design principles for these two main …


Representation Learning In Finance, Ajim Uddin May 2022

Representation Learning In Finance, Ajim Uddin

Dissertations

Finance studies often employ heterogeneous datasets from different sources with different structures and frequencies. Some data are noisy, sparse, and unbalanced with missing values; some are unstructured, containing text or networks. Traditional techniques often struggle to combine and effectively extract information from these datasets. This work explores representation learning as a proven machine learning technique in learning informative embedding from complex, noisy, and dynamic financial data. This dissertation proposes novel factorization algorithms and network modeling techniques to learn the local and global representation of data in two specific financial applications: analysts’ earnings forecasts and asset pricing.

Financial analysts’ earnings forecast …


Private Information Retrieval And Function Computation For Noncolluding Coded Databases, Sarah A. Obead May 2022

Private Information Retrieval And Function Computation For Noncolluding Coded Databases, Sarah A. Obead

Dissertations

The rapid development of information and communication technologies has motivated many data-centric paradigms such as big data and cloud computing. The resulting paradigmatic shift to cloud/network-centric applications and the accessibility of information over public networking platforms has brought information privacy to the focal point of current research challenges. Motivated by the emerging privacy concerns, the problem of private information retrieval (PIR), a standard problem of information privacy that originated in theoretical computer science, has recently attracted much attention in the information theory and coding communities. The goal of PIR is to allow a user to download a message from a …


Graph Enabled Cross-Domain Knowledge Transfer, Shibo Yao May 2022

Graph Enabled Cross-Domain Knowledge Transfer, Shibo Yao

Dissertations

The world has never been more connected, led by the information technology revolution in the past decades that has fundamentally changed the way people interact with each other using social networks. Consequently, enormous human activity data are collected from the business world and machine learning techniques are widely adopted to aid our decision processes. Despite of the success of machine learning in various application scenarios, there are still many questions that need to be well answered, such as optimizing machine learning outcomes when desired knowledge cannot be extracted from the available data. This naturally drives us to ponder if one …


Adversarially Robust And Accurate Machine Learning For Image Classification, Yanan Yang May 2022

Adversarially Robust And Accurate Machine Learning For Image Classification, Yanan Yang

Dissertations

Machine learning techniques in medical imaging systems are accurate, but minor perturbations in the data known as adversarial attacks can fool them. These attacks make the systems vulnerable to fraud and deception, and thus a significant challenge has been posed in practice. This dissertation presents the gradient-free trained sign activation networks to detect and deter adversarial attacks on medical imaging AI (Artificial Intelligence) systems. Experimental results show a higher distortion value is required to attack the proposed model than other state-of-the-art models on brain MRI (Magnetic resonance imaging), Chest X-ray, and histopathology image datasets. Moreover, the proposed models outperform the …


Management Of Data Brokers In Support Of Smart Community Applications, Shadha Tabatabai Apr 2022

Management Of Data Brokers In Support Of Smart Community Applications, Shadha Tabatabai

Dissertations

The widespread use of smart devices has led to the Internet of Things (IoT) revolution. Big data generated by billions of devices must be analyzed to make better decisions. However, this introduces security, communication, and processing problems. To solve these problems, we develop algorithms to enhance the work of brokers. We focus our efforts on three problems.

In the first problem, brokers are used in the cloud along with Software Defined Network (SDN) switches. We formulate minimizing brokers’ load difference within a reconfiguration budget with the constraint of indivisible topics as an Integer Linear Programming (ILP) problem. We show that …


Unsupervised Learning With Word Embeddings Captures Quiescent Knowledge From Covid-19 And Materials Science Literature, Tasnim H. Gharaibeh Apr 2022

Unsupervised Learning With Word Embeddings Captures Quiescent Knowledge From Covid-19 And Materials Science Literature, Tasnim H. Gharaibeh

Dissertations

Millions of scientific papers are produced each year and the scientific literature is continuing to grow at a head-spinning speed. Thus, massive scientific knowledge exists in solid text, but all these publications make it difficult, if not impossible, for researchers to keep in up to date with discoveries, even within a narrow scientific area. This massive amount of information also makes it difficult to find implicit and hidden connections, relationships, and dependencies within the information that may guide the direction of future research or lead to valuable new insights. So, there is a need for algorithms or models that can …


The Global Rise Of Online Devices, Cyber Crime And Cyber Defense: Enhancing Ethical Actions, Counter Measures, Cyber Strategy, And Approaches, Naresh Kshetri Mar 2022

The Global Rise Of Online Devices, Cyber Crime And Cyber Defense: Enhancing Ethical Actions, Counter Measures, Cyber Strategy, And Approaches, Naresh Kshetri

Dissertations

The rise of online devices, online users, online shopping, online gaming, and online teaching has ultimately given rise to online attacks and online crimes. As cases of COVID-19 seem to increase day by day, so do online crimes and attacks (as many sectors and organizations went 100% online). Technological advancements and cyber warfare already generated many ethical issues, as internet users increasingly need ethical cyber defense strategies.

Individual internet users have challenges on their end; and on the other end, nation states (some secretly, some openly), are investing in robot weapons and autonomous weapons systems (AWS). New technologies have combined …


Dark Patterns: Effect On Overall User Experience And Site Revisitation, Deon Soul Calawen Jan 2022

Dark Patterns: Effect On Overall User Experience And Site Revisitation, Deon Soul Calawen

Dissertations

Dark patterns are user interfaces purposefully designed to manipulate users into doing something they might not otherwise do for the benefit of an online service. This study investigates the impact of dark patterns on overall user experience and site revisitation in the context of airline websites. In order to assess potential dark pattern effects, two versions of the same airline website were compared: a dark version containing dark pattern elements and a bright version free of manipulative interfaces. User experience for both websites were assessed quantitatively through a survey containing a User Experience Questionnaire (UEQ) and a System Usability Scale …


Evaluating The Performance Of Vision Transformer Architecture For Deepfake Image Classification, Devesan Govindasamy Jan 2022

Evaluating The Performance Of Vision Transformer Architecture For Deepfake Image Classification, Devesan Govindasamy

Dissertations

Deepfake classification has seen some impressive results lately, with the experimentation of various deep learning methodologies, researchers were able to design some state-of-the art techniques. This study attempts to use an existing technology “Transformers” in the field of Natural Language Processing (NLP) which has been a de-facto standard in text processing for the purposes of Computer Vision. Transformers use a mechanism called “self-attention”, which is different from CNN and LSTM. This study uses a novel technique that considers images as 16x16 words (Dosovitskiy et al., 2021) to train a deep neural network with “self-attention” blocks to detect deepfakes. It creates …


An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous Jan 2022

An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous

Dissertations

Botnets pose a significant and growing risk to modern networks. Detection of botnets remains an important area of open research in order to prevent the proliferation of botnets and to mitigate the damage that can be caused by botnets that have already been established. Botnet detection can be broadly categorised into two main categories: signature-based detection and anomaly-based detection. This paper sets out to measure the accuracy, false-positive rate, and false-negative rate of four algorithms that are available in Weka for anomaly-based detection of a dataset of HTTP and IRC botnet data. The algorithms that were selected to detect botnets …


Measuring And Comparing Social Bias In Static And Contextual Word Embeddings, Alan Cueva Mora Jan 2022

Measuring And Comparing Social Bias In Static And Contextual Word Embeddings, Alan Cueva Mora

Dissertations

Word embeddings have been considered one of the biggest breakthroughs of deep learning for natural language processing. They are learned numerical vector representations of words where similar words have similar representations. Contextual word embeddings are the promising second-generation of word embeddings assigning a representation to a word based on its context. This can result in different representations for the same word depending on the context (e.g. river bank and commercial bank). There is evidence of social bias (human-like implicit biases based on gender, race, and other social constructs) in word embeddings. While detecting bias in static (classical or non-contextual) word …