Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Florida Institute of Technology

Theses/Dissertations

2020

Articles 1 - 18 of 18

Full-Text Articles in Physical Sciences and Mathematics

A Fast And Exact Motif Enumeration Algorithm For Dynamic Networks, Abbas Al-Thaedan Dec 2020

A Fast And Exact Motif Enumeration Algorithm For Dynamic Networks, Abbas Al-Thaedan

Theses and Dissertations

From social to biological networks, prior research in complex networks have demonstrated the importance of the frequency and distribution of different types of motifs to important network functions and properties. A network motif (or graphlet) is defined as a small connected sub-pattern which is over-represented in a network. Network motifs have been widely applied in a wide range of applications, namely biological, social, and technical networks. The counting of the network motif involves expensive enumeration of graph sub-patterns along with the detection of graph isomorphism. In general, network motif detection algorithms are computationally expensive and often designed to operate over …


A Machine Learning Approach To Forecasting Sep Events With Solar Activities, Jesse Scott Torres Dec 2020

A Machine Learning Approach To Forecasting Sep Events With Solar Activities, Jesse Scott Torres

Theses and Dissertations

Solar energetic particles (SEPs) are fast-moving events which can cause severe damage to astronauts and their equipment, and can disrupt communications on Earth. There are no clear patterns in solar activities which indicate whether an SEP is about to occur, making physics-based methods inaccurate for SEP forecasting. Therefore, in order to provide an advance warning so that astronauts are able to get to safety, we apply neural networks to the problems of forecasting SEP occurrence and intensity. Our algorithm for predicting SEP occurrence uses a combination of observed CME properties and derived features and achieves a TSS of 0.846 and …


Real-Time Action Classification Using Intermediate Skeletal Pose Estimation, Kleanthis Zisis Tegos Dec 2020

Real-Time Action Classification Using Intermediate Skeletal Pose Estimation, Kleanthis Zisis Tegos

Theses and Dissertations

The topic of Human Action Classification has attracted significant interest these past years, which can be attributed to the advancements in deep learning methodologies. Its applications range from robotics to surveillance and automated video categorization, as well as in the healthcare industry. The literature, however, has primarily focused on offline action classification, without significant attention being given to the constraints of an online real-time classifier. Using an intermediate skeletal representation of humans, while convoluted, provides a scalable means of tackling the action classification problem. This project discusses the existing literature, and adapts two of the state-of-the-art approaches for real-time analysis. …


Real-Time Full Face Closed Eyes Detection, Lucas De Morais Tramasso Dec 2020

Real-Time Full Face Closed Eyes Detection, Lucas De Morais Tramasso

Theses and Dissertations

Intelligent systems based on machine-learning techniques are becoming a common way of solving problems in many different areas. In this thesis, our goal is to apply machine learning to a computer vision problem. We propose a new solution to detect closed eyes in full-face images. Accurate detection of closed eyes can be used in many problems such as driver drowsiness detection, human-computer interaction, and computer user monitoring. Most algorithms used to detect blinks or closed eyes follow a similar workflow. They require detection of a region of interest that is then used with different algorithms and techniques to determine if …


Refinements Of The Concept Of Privacy In Distributed Computing, Entisar Seedi Alshammry Dec 2020

Refinements Of The Concept Of Privacy In Distributed Computing, Entisar Seedi Alshammry

Theses and Dissertations

In light of the tremendous development of technology in the modern world in which we live, privacy concerns are increasing, especially after the massive spread of distributed computing systems and the technologies that depend on it, whether in personal devices or public services. Hence, this research proposes refinements on the concept of privacy for enhancing the development of privacy-related strategies in distributed computing systems to address the elements of privacy. In particular, the study introduces the new concept of Privacy Appetite to describe and model the nature of the relationship between the intended disclosure of private information and gained value …


Biometric Face Skintone Data Augmentation Using A Generative Adversarial Network, Rosalin Dash Dec 2020

Biometric Face Skintone Data Augmentation Using A Generative Adversarial Network, Rosalin Dash

Theses and Dissertations

Researchers seek methods to increase the accuracy and efficiency in identifying an individual using facial biometric systems. Factors like skin color, which may affect the accuracy of facial recognition, need to be investigated further. To analyze the impact of race with respect to skin color of face on biometric systems, we focused on generating a dataset with uniformly distributed images of different skin tones while preserving identities. Deep learning neural network architectures like the generative adversarial network (GAN) focus on modifying only certain features of the face like the color of the skin. In our experimental approach, we implemented a …


Controlling Framing Effects For Web-Based Group Decision Support Systems, Badria Sulaiman Alfurhood Aug 2020

Controlling Framing Effects For Web-Based Group Decision Support Systems, Badria Sulaiman Alfurhood

Theses and Dissertations

The way the proposal and the available alternatives are presented or framed for a group decision may alter the ultimate group decision. Strategic framing is an attack method used to manipulate people into irrationally preferring a particular alternative. The adverse effects of framing threaten the trustworthiness and results of the group decision support systems (GDSSs). Nonetheless, the avoidance or reduction of framing effects is possible. Negative framing effects arise when users are not consistent with their choices if framing is applied for a collaborative decision using GDSSs. In this interdisciplinary research, human-computer interaction (HCI) informed methods, cognitive science, and political …


A Web-Based User-Interface For Internet Of Things Device Management, Leena Mansour Alghamdi Jul 2020

A Web-Based User-Interface For Internet Of Things Device Management, Leena Mansour Alghamdi

Theses and Dissertations

With the growing advances in the Internet of Things (IoT) technology, which combines various devices with distinct functions, capabilities, and communication protocols, it is essential to provide a platform that enables IoT users to interact with their IoT devices directly and be able to manage them effortlessly via that platform from various locations at any time in order to protect their privacy when using IoT devices. In this study, we are aiming to provide a web-based user interface that can address that challenges and provide real-time data control; hence, we have created a user interface prototype, which can demonstrate the …


Blockchain Interoperability With Cross-Chain Stablecoin Payments, Ravi Balvantrai Pandhi May 2020

Blockchain Interoperability With Cross-Chain Stablecoin Payments, Ravi Balvantrai Pandhi

Theses and Dissertations

A Peer-to-peer payment system was one of the first proposed applications of blockchain technology. Cryptocurrencies have instead been used as a speculative investment. Stablecoins worth approximately 7 billion USD circulate the cryptocurrency market today, presenting a good case for their use in cryptocurrency payments [2]. Stablecoins have also been issued on a variety of blockchains that operate balkanized from each other. Cross-chain transfer between stablecoins is currently enabled by centralized middlemen. The actions of putting stablecoin transfer in the hands of intermediaries is a path towards centralization of control opposite to the decentralization ideology of blockchains. The inter blockchain transfer …


Blockchain For Educational Certificate Distribution, Layla Asiri May 2020

Blockchain For Educational Certificate Distribution, Layla Asiri

Theses and Dissertations

There are many authenticity problems associated with paper certificates and diplomas. Besides the increase in the forgery of paper certificates and diplomas, other quality problems regarding paper certificates and diplomas deserve attention too. This study seeks to evaluate how alternative technologies may mitigate concerns for Florida Institute of Technology students and faculty and determine whether they support the adoption of Blockchain technology. In particular, this research aims to investigate the challenges of using Blockchain technology for issuing and verifying academic records, certificates, and diplomas for Florida Institute of Technology students and faculty. Blockchain technology can be difficult for institutions to …


Practical Adversarial Attacks Against Black Box Speech Recognition Systems And Devices, Yuxuan Chen May 2020

Practical Adversarial Attacks Against Black Box Speech Recognition Systems And Devices, Yuxuan Chen

Theses and Dissertations

With the advance of speech recognition technologies, intelligent voice control devices such as Amazon Echo have became increasingly popular in our daily life. Currently, most state-of-the-art speech recognition systems are using neural networks to further improve the accuracy and efficacy of the system. Unfortunately, neural networks are vulnerable to adversarial examples: inputs specifically designed by an adversary to cause a neural network to misclassify them. Hence, it becomes imperative to understand the security implications of the speech recognition systems in the presence of such attacks. In this dissertation, we first introduce an effective audio adversarial attack towards one white box …


Iot Tracking System Effectiveness In Enhancing Library Services, Khulud Alawaji May 2020

Iot Tracking System Effectiveness In Enhancing Library Services, Khulud Alawaji

Theses and Dissertations

The advantages that the Internet of Things (IoT) provides lead to an increase in the number of IoT solutions that integrate different fields. One of the important IoT contributions is in location-based IoT applications, which leverage the Indoor Positioning System (IPS) technology. IPS uses numerous technologies; one is the Beacon technology, which is based on a small wireless sensor device used to send signals. IPS based Beacon technology used in college libraries to increase the productivity, accuracy, safety, and efficiency of daily processes. This research proposed an IoT Beacon-based tracking system concept to be applied at Evans Library at Florida …


A Blockchain Approach For Negotiating Trust In Iot, Skailer Knezevic May 2020

A Blockchain Approach For Negotiating Trust In Iot, Skailer Knezevic

Theses and Dissertations

“The internet is no longer a web that we connect to. Instead, its a computerized, networked, and interconnected world that we live in. This is the future, and what were calling the Internet of Things.”- Bruce Schneier, 2019 The Internet of Things is becoming a big part of our lives. Every year there are more devices with the capability to connect on the internet and communicate with each other. Today there are over 400 million IoT devices in the world, and this number is predicted to grow to 1.5 billion devices by 2022 [14]. It is becoming more difficult to …


Dynamics In Recommendations Of Updates For Free Open-Source Software, Shakre Elmane May 2020

Dynamics In Recommendations Of Updates For Free Open-Source Software, Shakre Elmane

Theses and Dissertations

In Free and Open-Source Software (FOSS) world, newer is not always better. Automatically updating to the latest version of FOSS applications involves real risks. The newer version could be missing features that are essential to some users, but are dropped by the developers. Another possible scenario, with even more serious consequences, is a project taken over by malicious developers who target users’ sensitive data, or try to control their systems. In this work we identify a set of security risks associated with changes of reviewers in automatic Free and Open-Source software (FOSS) updates. Automatic updates can be a prime target …


Iot-Based Solutions For Privacy-Preservation During Interaction With Assistive Robotics, Tahani Ali Albuluwi May 2020

Iot-Based Solutions For Privacy-Preservation During Interaction With Assistive Robotics, Tahani Ali Albuluwi

Theses and Dissertations

As mobile robot technologies become pervasive in daily life settings and share physical space with regular people, privacy concerns and complications arise. In particular, the independent and enhanced mobility features of mobile robots raise the potential of privacy violations through continuous surveillance, access to privacy-sensitive locations, or opportunities for witnessing embarrassing situations. In this paper, an IoT-based solution concept called PrivateLoc is proposed to empower end-users with the ability to use smartwatches to restrict robot perception and movement at home dynamically according to end-users’ privacy preferences, conditions, or locations. Thus, descriptive research was conducted using structured surveys with 104 participants, …


Characterization Of Written Text Using Data And Network Science, Harith A. Hamdon Hamoodat May 2020

Characterization Of Written Text Using Data And Network Science, Harith A. Hamdon Hamoodat

Theses and Dissertations

The success of humans cannot be attributed to language, but it is certainly true that language and humans are inseparable. Since the first language appeared, we have seen that language continually evolving over space and social gatherings to formed around 7,000 languages today. The origin and evolution of languages still vague, and state-of-the-art in languages evolution still lack a comprehensive characterization. In general, this problem is mainly tackled by statistical measuring the changes on the part of the language ( e.g., words and sounds). Given the current availability of data and computational power, this dissertation proposes a comprehensive data-driven characterization …


A Bio-Inspired Classification System For Cyber-Physical-Human Identity Resolution, Mary Catherine (Kay) Michel May 2020

A Bio-Inspired Classification System For Cyber-Physical-Human Identity Resolution, Mary Catherine (Kay) Michel

Theses and Dissertations

The Internet has created a need for understanding complex technology and identities today. Cybercrime can take years to solve, and a systematic design may aid in more rapid resolution. Classification of identities involves the arrangement of shared qualities or characteristics known as features set expression, useful for identifying specific types of cybercriminals based on empirical evidence and logic. In order for classification of a cyber identity to be explainable and acceptable to researchers, a holistic systematic approach is beneficial to organize natural and synthetic features of living and non-living organisms into a standardized model. Proven scientific methods in the biology …


Enhancing Cybersecurity By Generating User-Specific Security Policy Through The Formal Modeling Of User Behavior, Arwa Alqadheeb Jan 2020

Enhancing Cybersecurity By Generating User-Specific Security Policy Through The Formal Modeling Of User Behavior, Arwa Alqadheeb

Theses and Dissertations

Despite the ongoing efforts to develop cutting-edge security solutions, the question always remains whether these technologies can overcome system vulnerabilities that often result from poor security practices made by end-users. Recently, some research devoted to study the human role in cybersecurity, especially the psychological aspect. Researchers found that the users’ responses to security-related situations correlate with various elusive factors such as demographics, personality traits, decision-making styles, and risk-taking preferences. That explains why some users neglect to act according to common security tips and advice. The goal of this research is to make cybersecurity maintain a high-level of quality and reliability; …