Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Web archiving (3)
- Cybersecurity (2)
- Deep learning (2)
- Machine learning (2)
- Memento (2)
-
- 2FA (1)
- AFLR (1)
- Account recovery (1)
- Acoustic liners (1)
- Advancing front (1)
- Aeroacoustics (1)
- Archived web pages (1)
- Archives (1)
- Artificial intelligence (1)
- Artificial neural networks (1)
- Attack (1)
- Backdoor (1)
- Brand familiarity (1)
- Cellular neural networks (1)
- Cloud computing (1)
- Commodity modeling (1)
- Curvilinear (1)
- Cyber risk (1)
- Data breach (1)
- Deep recurrent learning (1)
- Digital signal processing (1)
- Economics of cybersecurity (1)
- Edge Computing (1)
- Eigenvalue (1)
- Electroencephalography (1)
Articles 1 - 16 of 16
Full-Text Articles in Physical Sciences and Mathematics
Enhanced Traffic Incident Analysis With Advanced Machine Learning Algorithms, Zhenyu Wang
Enhanced Traffic Incident Analysis With Advanced Machine Learning Algorithms, Zhenyu Wang
Computational Modeling & Simulation Engineering Theses & Dissertations
Traffic incident analysis is a crucial task in traffic management centers (TMCs) that typically manage many highways with limited staff and resources. An effective automatic incident analysis approach that can report abnormal events timely and accurately will benefit TMCs in optimizing the use of limited incident response and management resources. During the past decades, significant efforts have been made by researchers towards the development of data-driven approaches for incident analysis. Nevertheless, many developed approaches have shown limited success in the field. This is largely attributed to the long detection time (i.e., waiting for overwhelmed upstream detection stations; meanwhile, downstream stations …
The Effects Of Security Framing, Time Pressure, And Brand Familiarity On Risky Mobile Application Downloads, Cody Parker
The Effects Of Security Framing, Time Pressure, And Brand Familiarity On Risky Mobile Application Downloads, Cody Parker
Psychology Theses & Dissertations
The current study examined the effects of security system framing, time pressure, and brand familiarity on mobile application download behaviors, with an emphasis on risk taking. According to the Prospect Theory, people tend to engage in irrational decision making, and make qualitatively different decisions when information is framed in terms of gains and losses (i.e., the framing effect). Past research has used this framing effect to guide the design of a risk display for mobile applications (apps), with the purpose of communicating the potential risks and minimizing insecure app selections. Time pressure has been shown to influence the framing effect …
Parallelization Of The Advancing Front Local Reconnection Mesh Generation Software Using A Pseudo-Constrained Parallel Data Refinement Method, Kevin Mark Garner Jr.
Parallelization Of The Advancing Front Local Reconnection Mesh Generation Software Using A Pseudo-Constrained Parallel Data Refinement Method, Kevin Mark Garner Jr.
Computer Science Theses & Dissertations
Preliminary results of a long-term project entailing the parallelization of an industrial strength sequential mesh generator, called Advancing Front Local Reconnection (AFLR), are presented. AFLR has been under development for the last 25 years at the NSF/ERC center at Mississippi State University. The parallel procedure that is presented is called Pseudo-constrained (PsC) Parallel Data Refinement (PDR) and consists of the following steps: (i) use an octree data-decomposition scheme to divide the original geometry into subdomains (octree leaves), (ii) refine each subdomain with the proper adjustments of its neighbors using the given refinement code, and (iii) combine all subdomain data into …
Mementomap: A Web Archive Profiling Framework For Efficient Memento Routing, Sawood Alam
Mementomap: A Web Archive Profiling Framework For Efficient Memento Routing, Sawood Alam
Computer Science Theses & Dissertations
With the proliferation of public web archives, it is becoming more important to better profile their contents, both to understand their immense holdings as well as to support routing of requests in Memento aggregators. A memento is a past version of a web page and a Memento aggregator is a tool or service that aggregates mementos from many different web archives. To save resources, the Memento aggregator should only poll the archives that are likely to have a copy of the requested Uniform Resource Identifier (URI). Using the Crawler Index (CDX), we generate profiles of the archives that summarize their …
Cyber-Assets At Risk (Car): Monetary Impact Of Personally Identifiable Information Data Breaches On Companies, Omer Ilker Poyraz
Cyber-Assets At Risk (Car): Monetary Impact Of Personally Identifiable Information Data Breaches On Companies, Omer Ilker Poyraz
Engineering Management & Systems Engineering Theses & Dissertations
Cyber-systems provide convenience, ubiquity, economic advantage, and higher efficiency to both individuals and organizations. However, vulnerabilities of the cyber domain also offer malicious actors with the opportunities to compromise the most sensitive information. Recent cybersecurity incidents show that a group of hackers can cause a massive data breach, resulting in companies losing competitive advantage, reputation, and money. Governments have since taken some actions in protecting individuals and companies from such crime by authorizing federal agencies and developing regulations. To protect the public from losing their most sensitive records, governments have also been compelling companies to follow cybersecurity regulations. If companies …
Bootstrapping Web Archive Collections From Micro-Collections In Social Media, Alexander C. Nwala
Bootstrapping Web Archive Collections From Micro-Collections In Social Media, Alexander C. Nwala
Computer Science Theses & Dissertations
In a Web plagued by disappearing resources, Web archive collections provide a valuable means of preserving Web resources important to the study of past events. These archived collections start with seed URIs (Uniform Resource Identifiers) hand-selected by curators. Curators produce high quality seeds by removing non-relevant URIs and adding URIs from credible and authoritative sources, but this ability comes at a cost: it is time consuming to collect these seeds. The result of this is a shortage of curators, a lack of Web archive collections for various important news events, and a need for an automatic system for generating seeds. …
Deep Learning For Remote Sensing Image Processing, Yan Lu
Deep Learning For Remote Sensing Image Processing, Yan Lu
Computational Modeling & Simulation Engineering Theses & Dissertations
Remote sensing images have many applications such as ground object detection, environmental change monitoring, urban growth monitoring and natural disaster damage assessment. As of 2019, there were roughly 700 satellites listing “earth observation” as their primary application. Both spatial and temporal resolutions of satellite images have improved consistently in recent years and provided opportunities in resolving fine details on the Earth's surface. In the past decade, deep learning techniques have revolutionized many applications in the field of computer vision but have not fully been explored in remote sensing image processing. In this dissertation, several state-of-the-art deep learning models have been …
Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning
Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning
Electrical & Computer Engineering Theses & Dissertations
Mobile devices are becoming smarter to satisfy modern user's increasing needs better, which is achieved by equipping divers of sensors and integrating the most cutting-edge Deep Learning (DL) techniques. As a sophisticated system, it is often vulnerable to multiple attacks (side-channel attacks, neural backdoor, etc.). This dissertation proposes solutions to maintain the cyber-hygiene of the DL-Based smartphone system by exploring possible vulnerabilities and developing countermeasures.
First, I actively explore possible vulnerabilities on the DL-Based smartphone system to develop proactive defense mechanisms. I discover a new side-channel attack on smartphones using the unrestricted magnetic sensor data. I demonstrate that attackers can …
A Framework For Verifying The Fixity Of Archived Web Resources, Mohamed Aturban
A Framework For Verifying The Fixity Of Archived Web Resources, Mohamed Aturban
Computer Science Theses & Dissertations
The number of public and private web archives has increased, and we implicitly trust content delivered by these archives. Fixity is checked to ensure that an archived resource has remained unaltered (i.e., fixed) since the time it was captured. Currently, end users do not have the ability to easily verify the fixity of content preserved in web archives. For instance, if a web page is archived in 1999 and replayed in 2019, how do we know that it has not been tampered with during those 20 years? In order for the users of web archives to verify that archived web …
Automatic Linear And Curvilinear Mesh Generation Driven By Validity Fidelity And Topological Guarantees, Jing Xu
Computer Science Theses & Dissertations
Image-based geometric modeling and mesh generation play a critical role in computational biology and medicine. In this dissertation, a comprehensive computational framework for both guaranteed quality linear and high-order automatic mesh generation is presented. Starting from segmented images, a quality 2D/3D linear mesh is constructed. The boundary of the constructed mesh is proved to be homeomorphic to the object surface. In addition, a guaranteed dihedral angle bound of up to 19:47o for the output tetrahedra is provided. Moreover, user-specified guaranteed bounds on the distance between the boundaries of the mesh and the boundaries of the materials are allowed. The …
Towards Dynamic Vehicular Clouds, Aida Ghazizadeh
Towards Dynamic Vehicular Clouds, Aida Ghazizadeh
Computer Science Theses & Dissertations
Motivated by the success of the conventional cloud computing, Vehicular Clouds were introduced as a group of vehicles whose corporate computing, sensing, communication, and physical resources can be coordinated and dynamically allocated to authorized users. One of the attributes that set Vehicular Clouds apart from conventional clouds is resource volatility. As vehicles enter and leave the cloud, new computing resources become available while others depart, creating a volatile environment where the task of reasoning about fundamental performance metrics becomes very challenging. The goal of this thesis is to design an architecture and model for a dynamic Vehicular Cloud built on …
The Accumulation Of It Capability And Its Long-Term Effect On Financial Performance, Jin Ho Kim
The Accumulation Of It Capability And Its Long-Term Effect On Financial Performance, Jin Ho Kim
Theses and Dissertations in Business Administration
Many scholars have been studying information technology (IT) capability and its impact on business performance. However, it has been debated whether the IT capability influences firm performance because prior literature shows mixed results. To understand this phenomenon, I performed two studies in this research, placed in two parts. First, by deploying the new concept of accumulation of IT capability, I attempted to reinvestigate the relationship between IT capability and business performance. Next, I examined what factors influence the accumulation of IT capability. In the first part, I suggested two novel constructs that measure the extent of the accumulation of IT …
Truck Trailer Classification Using Side-Fire Light Detection And Ranging (Lidar) Data, Olcay Sahin
Truck Trailer Classification Using Side-Fire Light Detection And Ranging (Lidar) Data, Olcay Sahin
Civil & Environmental Engineering Theses & Dissertations
Classification of vehicles into distinct groups is critical for many applications, including freight and commodity flow modeling, pavement management and design, tolling, air quality monitoring, and intelligent transportation systems. The Federal Highway Administration (FHWA) developed a standardized 13-category vehicle classification ruleset, which meets the needs of many traffic data user applications. However, some applications need high-resolution data for modeling and analysis. For example, the type of commodity being carried must be known in the freight modeling framework. Unfortunately, this information is not available at the state or metropolitan level, or it is expensive to obtain from current resources.
Nevertheless, using …
Deep Cellular Recurrent Neural Architecture For Efficient Multidimensional Time-Series Data Processing, Lasitha S. Vidyaratne
Deep Cellular Recurrent Neural Architecture For Efficient Multidimensional Time-Series Data Processing, Lasitha S. Vidyaratne
Electrical & Computer Engineering Theses & Dissertations
Efficient processing of time series data is a fundamental yet challenging problem in pattern recognition. Though recent developments in machine learning and deep learning have enabled remarkable improvements in processing large scale datasets in many application domains, most are designed and regulated to handle inputs that are static in time. Many real-world data, such as in biomedical, surveillance and security, financial, manufacturing and engineering applications, are rarely static in time, and demand models able to recognize patterns in both space and time. Current machine learning (ML) and deep learning (DL) models adapted for time series processing tend to grow in …
Account Recovery Methods For Two-Factor Authentication (2fa): An Exploratory Study, Lauren Nicole Tiller
Account Recovery Methods For Two-Factor Authentication (2fa): An Exploratory Study, Lauren Nicole Tiller
Psychology Theses & Dissertations
System administrators have started to adopt two-factor authentication (2FA) to increase user account resistance to cyber-attacks. Systems with 2FA require users to verify their identity using a password and a second-factor authentication device to gain account access. This research found that 60% of users only enroll one second-factor device to their account. If a user’s second factor becomes unavailable, systems are using different procedures to ensure its authorized owner recovers the account. Account recovery is essentially a bypass of the system’s main security protocols and needs to be handled as an alternative authentication process (Loveless, 2018). The current research aimed …
Investigating The Feasibility And Stability For Modeling Acoustic Wave Scattering Using A Time-Domain Boundary Integral Equation With Impedance Boundary Condition, Michelle E. Rodio
Investigating The Feasibility And Stability For Modeling Acoustic Wave Scattering Using A Time-Domain Boundary Integral Equation With Impedance Boundary Condition, Michelle E. Rodio
Mathematics & Statistics Theses & Dissertations
Reducing aircraft noise is a major objective in the field of computational aeroacoustics. When designing next generation quiet and environmentally friendly aircraft, it is important to be able to accurately and efficiently predict the acoustic scattering by an aircraft body from a given noise source. Acoustic liners are an effective tool for aircraft noise reduction and are characterized by a frequency-dependent impedance. Converted into the time-domain using Fourier transforms, an impedance boundary condition can be used to simulate the acoustic wave scattering by geometric bodies treated with acoustic liners
This work considers using either an impedance or an admittance (inverse …