Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Department of Computer Science and Engineering (35)
- Department of Mechanical and Materials Engineering (6)
- Computer science (3)
- Computer engineering (2)
- ITS (2)
-
- Intrusion Detection (2)
- Linked Data (2)
- Machine Learning (2)
- Mechanical engineering (2)
- Natural Language Processing (2)
- Photovoltaic (2)
- RDF (2)
- RDFS (2)
- Accelerometer (1)
- Add-on (1)
- Address Transformation (1)
- Aided target recognition (1)
- Airfoil S818 (1)
- Analytical Equations (1)
- Android (1)
- Android malware (1)
- Android malware information leakage (1)
- Android static code analysis (1)
- Android taint analysis (1)
- Artificial Intelligence (1)
- Artificial intelligence (1)
- Assembly instructions (1)
- Assembly language (1)
- Augmented Reality (1)
- Automatic Text Categorization (1)
Articles 1 - 30 of 41
Full-Text Articles in Physical Sciences and Mathematics
Data-Driven Network-Centric Threat Assessment, Dae Wook Kim
Data-Driven Network-Centric Threat Assessment, Dae Wook Kim
Browse all Theses and Dissertations
As the Internet has grown increasingly popular as a communication and information sharing platform, it has given rise to two major types of Internet security threats related to two primary entities: end-users and network services. First, information leakages from networks can reveal sensitive information about end-users. Second, end-users systems can be compromised through attacks on network services, such as scanning-and-exploit attacks, spamming, drive-by downloads, and fake anti-virus software. Designing threat assessments to detect these threats is, therefore, of great importance, and a number of the detection systems have been proposed. However, these existing threat assessment systems face significant challenges in …
Deep Learning Approach For Intrusion Detection System (Ids) In The Internet Of Things (Iot) Network Using Gated Recurrent Neural Networks (Gru), Manoj Kumar Putchala
Deep Learning Approach For Intrusion Detection System (Ids) In The Internet Of Things (Iot) Network Using Gated Recurrent Neural Networks (Gru), Manoj Kumar Putchala
Browse all Theses and Dissertations
The Internet of Things (IoT) is a complex paradigm where billions of devices are connected to a network. These connected devices form an intelligent system of systems that share the data without human-to-computer or human-to-human interaction. These systems extract meaningful data that can transform human lives, businesses, and the world in significant ways. However, the reality of IoT is prone to countless cyber-attacks in the extremely hostile environment like the internet. The recent hack of 2014 Jeep Cherokee, iStan pacemaker, and a German steel plant are a few notable security breaches. To secure an IoT system, the traditional high-end security …
Virtuo-Its: An Interactive Tutoring System To Teach Virtual Memory Concepts Of An Operating System, Venkata Krishna Kanth Musunuru
Virtuo-Its: An Interactive Tutoring System To Teach Virtual Memory Concepts Of An Operating System, Venkata Krishna Kanth Musunuru
Browse all Theses and Dissertations
Interactive tutoring systems are software applications that help individuals to learn difficult concepts. They can allow students to interact with ideas from essential mathematics to more complicated subjects like software engineering. This thesis concentrates on one such interactive tutoring system (ITS) designed for teaching concepts related to operating system virtual memory. Operating system concepts can be troublesome to learn without having someone or something to explain them. Even when an instructor is able to provide detailed explanations, it is still exceptionally difficult for students without a computer science foundation to comprehend these concepts. Students require a sophisticated set of mental …
Gait Analysis From Wearable Devices Using Image And Signal Processing, Bradley A. Schneider
Gait Analysis From Wearable Devices Using Image And Signal Processing, Bradley A. Schneider
Browse all Theses and Dissertations
We present the results of analyzing gait motion in-person video taken from a commercially available wearable camera embedded in a pair of glasses. The video is analyzed with three different computer vision methods to extract motion vectors from different gait sequences from four individuals for comparison against a manually annotated ground truth dataset. Using a combination of signal processing and computer vision techniques, gait features are extracted to identify the walking pace of the individual wearing the camera and are validated using the ground truth dataset. We perform an additional data collection with both the camera and a body-worn accelerometer …
Characterizing Concepts In Taxonomy For Entity Recommendations, Siva Kumar Cheekula
Characterizing Concepts In Taxonomy For Entity Recommendations, Siva Kumar Cheekula
Browse all Theses and Dissertations
Entity recommendation systems are enormously popular on the Web. These systems harness manually crafted taxonomies for improving recommendations. For example, Yahoo created the Open Directory Project for search and recommendation, and Amazon utilizes its own product taxonomy. While these taxonomies are of high quality, it is a labor and time-intensive process to manually create and keep them up to date. Instead, in this era ofWeb 2.0 where users collaboratively create large amounts of information on the Web, it is possible to utilize user-generated content to automatically generate good quality taxonomies. However, harnessing such taxonomies for entity recommendations has not been …
Multi-Class Classification Of Textual Data: Detection And Mitigation Of Cheating In Massively Multiplayer Online Role Playing Games, Naga Sai Nikhil Maguluri
Multi-Class Classification Of Textual Data: Detection And Mitigation Of Cheating In Massively Multiplayer Online Role Playing Games, Naga Sai Nikhil Maguluri
Browse all Theses and Dissertations
The success of any multiplayer game depends on the player’s experience. Cheating/Hacking undermines the player’s experience and thus the success of that game. Cheaters, who use hacks, bots or trainers are ruining the gaming experience of a player and are making him leave the game. As the video game industry is a constantly increasing multibillion dollar economy, it is crucial to assure and maintain a state of security. Players reflect their gaming experience in one of the following places: multiplayer chat, game reviews, and social media. This thesis is an exploratory study where our goal is to experiment and propose …
Sched-Its: An Interactive Tutoring System To Teach Cpu Scheduling Concepts In An Operating Systems Course, Bharath Kumar Koya
Sched-Its: An Interactive Tutoring System To Teach Cpu Scheduling Concepts In An Operating Systems Course, Bharath Kumar Koya
Browse all Theses and Dissertations
Operating systems is an essential course in computer science curriculum, which helps students to develop a mental model of how computer operating systems work. The internal mechanisms and processes of an operating system (OS) are often complex, non-deterministic and intangible which makes them difficult for students to understand. One such concept is central processing unit (CPU) scheduling. CPU scheduling forms the basis of the multiprogramming in an OS. In practice, OS courses involve classroom lectures describing high-level abstractions of the concepts, and students complete programming assignments to apply the material in a more concrete way. Depending on the programming assignments, …
Detection Of Ddos Attacks Against The Sdn Controller Using Statistical Approaches, Basheer Husham Ali Al-Mafrachi
Detection Of Ddos Attacks Against The Sdn Controller Using Statistical Approaches, Basheer Husham Ali Al-Mafrachi
Browse all Theses and Dissertations
In traditional networks, switches and routers are very expensive, complex, and inflexible because forwarding and handling of packets are in the same device. However, Software Defined Networking (SDN) makes networks design more flexible, cheaper, and programmable because it separates the control plane from the data plane. SDN gives administrators of networks more flexibility to handle the whole network by using one device which is the controller. Unfortunately, SDN faces a lot of security problems that may severely affect the network operations if not properly addressed. Threat vectors may target main components of SDN such as the control plane, the data …
Detecting Information Leakage In Android Malware Using Static Taint Analysis, Soham P. Kelkar
Detecting Information Leakage In Android Malware Using Static Taint Analysis, Soham P. Kelkar
Browse all Theses and Dissertations
According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted attackers to use Android as a platform to conduct malicious activities. To achieve these malicious activities some attacker choose to develop malicious Apps to steal information from the Android users. As the modern day smartphones process, a lot of sensitive information, information security, and privacy becoming a potential target for the attacker. The malicious Apps steal information from the infected phone and send this information to the attacker-controlled URLs using various Android sink functions. Therefore, it necessary to protect data as it can prove detrimental …
Ab Initio Study Of The Effects Of Humidity On Perovskite Based Hybrid Solar Cell Interfaces, Shantanu Rajendra Rachalwar
Ab Initio Study Of The Effects Of Humidity On Perovskite Based Hybrid Solar Cell Interfaces, Shantanu Rajendra Rachalwar
Browse all Theses and Dissertations
Despite the impressive success of perovskite-based hybrid solar cells, their widespread usage has been limited partially owing to stability issues under working environmental conditions. Among these, the effects of humidity are some of the most significant. Water intercalation generally degrades the material, shortens its useful life, and reduces the efficiency of photovoltaic energy conversion. Understanding the reasons for these effects can be achieved through detailed and accurate atomic-scale analysis. Here, we study water intercalation at the interfaces of perovskite-based hybrid solar cell material and TiO2 electrode. Accurate ab initio computer simulations are used to obtain structural and electronic properties. We …
Development Of Computer Program For Wind Resource Assessment, Rotor Design And Rotor Performance, Valentina Jami
Development Of Computer Program For Wind Resource Assessment, Rotor Design And Rotor Performance, Valentina Jami
Browse all Theses and Dissertations
People understand and have seen that renewable energy has many advantages over conventional energy sources. Because of these advantages, more and more emphasis has been given to generating electrical energy with renewable sources. Among the many renewable and conventional ways currently available for a society to generate electrical power, wind turbines are one of the cheapest ways of doing this. The main objective of this thesis work is to develop a computer program that assesses the wind resource at a given location, designs a wind turbine rotor for optimum power capture for one wind speed, and analyzes the performance of …
Automated Rendering Of Schema Diagram For Ontologies, Nazifa Karima
Automated Rendering Of Schema Diagram For Ontologies, Nazifa Karima
Browse all Theses and Dissertations
Semantic Web extends the current web, using ontologies, metadata and other technologies to establish links between terms and concepts. This enables machines to automatically integrate information across different platforms utilizing the standard definitions. Furthermore, reasoning agents can infer new knowledge by gathering existing information and these additional connections between them. As a result of being designed and maintained independently, data sources exhibit highly heterogeneous nature. This increases the complexity of data integration and hinders interoperability. However, if we can align the overlapping concepts among different domains of knowledge, the prospect of achieving interoperability and integration without having any intermediate reasoning …
Harassment Detection On Twitter Using Conversations, Venkatesh Edupuganti
Harassment Detection On Twitter Using Conversations, Venkatesh Edupuganti
Browse all Theses and Dissertations
Social media has brought people closer than ever before, but the use of social media has also brought with it a risk of online harassment. Such harassment can have a serious impact on a person such as causing low self-esteem and depression. The past research on detecting harassment on social media is primarily based on the content of messages exchanged on social media. The lack of context when relying on a single social media post can result in a high degree of false alarms. In this study, I focus on the reliable detection of harassment on Twitter by better understanding …
Development Of An Android Based Performance Assessment System For Motivational Interviewing Training, Sowmya Pappu
Development Of An Android Based Performance Assessment System For Motivational Interviewing Training, Sowmya Pappu
Browse all Theses and Dissertations
Motivational Interviewing (MI) has been proved to be an effective Screening, Brief Intervention, and Referral to Treatment (SBIRT) technique. It is an evidence-based practice used to identify, reduce, and prevent problematic use, abuse, and dependence on alcohol and illicit drugs. It emphasizes on patient-centered counseling approach that can help resolve their ambivalence through a non-confrontational, goal-oriented style for eliciting behavior change from the patient, almost like patients talk themselves into change. This approach provokes less resistance and stimulates the progress of patients at their own pace towards deciding about planning, making and sustaining positive behavioral change. Thus, training medical professionals …
Development Of An Ultra-Portable Non-Contact Wound Measurement System, Anka Babu Billa
Development Of An Ultra-Portable Non-Contact Wound Measurement System, Anka Babu Billa
Browse all Theses and Dissertations
Continuous monitoring of changes in wound size is key to correctly predict whether wounds will heal readily with conventional treatment or require more aggressive treatment strategies. Unfortunately, existing wound measurement solutions don't meet the clinical demand due to their limitations in accuracy, operating complexity and time, acquisition and operation cost, or reproducibility, resulting in unnecessarily lengthy recovery or extra treatment procedures, incurring an excessively high financial cost, and in many cases extended usage of addictive painkillers. In this thesis, we proposed and developed a low cost, a portable non-contact solution that combines multi-spectral imaging and a portfolio of imaging processing …
Efficient Reasoning Algorithms For Fragments Of Horn Description Logics, David Carral
Efficient Reasoning Algorithms For Fragments Of Horn Description Logics, David Carral
Browse all Theses and Dissertations
We characterize two fragments of Horn Description Logics and we define two specialized reasoning algorithms that effectively solve the standard reasoning tasks over each of such fragments. We believe our work to be of general interest since (1) a rather large proportion of real-world Horn ontologies belong to some of these two fragments and (2) the implementations based on our reasoning approach significantly outperform state-of-the-art reasoners. Claims (1) and (2) are extensively proven via empirically evaluation.
Settings Protection Add-On: A User-Interactive Browser Extension To Prevent The Exploitation Of Preferences, Venkata Naga Siva Seelam
Settings Protection Add-On: A User-Interactive Browser Extension To Prevent The Exploitation Of Preferences, Venkata Naga Siva Seelam
Browse all Theses and Dissertations
The abuse of browser preferences is a significant application security issue, despite numerous protections against automated software changing these preferences. Browser hijackers modify user’s desired preferences by injecting malicious software into the browser. Users are not aware of these modifications, and the unwanted changes can annoy the user and circumvent security preferences. Reverting these changes is not easy, and users often have to go through complicated sequences of steps to restore their preferences to the previous values. Tasks to resolve this issue include uninstalling and re-installing the browser, resetting browser preferences, and installing malware removal tools. This thesis describes a …
Distance Learning And Attribute Importance Analysis By Linear Regression On Idealized Distance Functions, Rupesh Kumar Singh
Distance Learning And Attribute Importance Analysis By Linear Regression On Idealized Distance Functions, Rupesh Kumar Singh
Browse all Theses and Dissertations
A good distance metric is instrumental on the performance of many tasks including classification and data retrieval. However, designing an optimal distance function is very challenging, especially when the data has high dimensions.Recently, a number of algorithms have been proposed to learn an optimal distance function in a supervised manner, using data with class labels. In this thesis we proposed methods to learn an optimal distance function that can also indicate the importance of attributes. Specifically, we present several ways to define idealized distance functions, two of which involving distance error correction involving KNN classification, and another involving a two-constant …
Semantics-Based Summarization Of Entities In Knowledge Graphs, Kalpa Gunaratna
Semantics-Based Summarization Of Entities In Knowledge Graphs, Kalpa Gunaratna
Browse all Theses and Dissertations
The processing of structured and semi-structured content on the Web has been gaining attention with the rapid progress in the Linking Open Data project and the development of commercial knowledge graphs. Knowledge graphs capture domain-specific or encyclopedic knowledge in the form of a data layer and add rich and explicit semantics on top of the data layer to infer additional knowledge. The data layer of a knowledge graph represents entities and their descriptions. The semantic layer on top of the data layer is called the schema (ontology), where relationships of the entity descriptions, their classes, and the hierarchy of the …
An Optimization Compiler Framework Based On Polyhedron Model For Gpgpus, Lifeng Liu
An Optimization Compiler Framework Based On Polyhedron Model For Gpgpus, Lifeng Liu
Browse all Theses and Dissertations
General purpose GPU (GPGPU) is an effective many-core architecture that can yield high throughput for many scientific applications with thread-level parallelism. However, several challenges still limit further performance improvements and make GPU programming challenging for programmers who lack the knowledge of GPU hardware architecture. In this dissertation, we describe an Optimization Compiler Framework Based on Polyhedron Model for GPGPUs to bridge the speed gap between the GPU cores and the off-chip memory and improve the overall performance of the GPU systems. The optimization compiler framework includes a detailed data reuse analyzer based on the extended polyhedron model for GPU kernels, …
Structure Stability And Optical Response Of Lead Halide Hybrid Perovskite Photovoltaic Materials: A First-Principles Simulation Study, Siddharth Narendrakumar Rathod
Structure Stability And Optical Response Of Lead Halide Hybrid Perovskite Photovoltaic Materials: A First-Principles Simulation Study, Siddharth Narendrakumar Rathod
Browse all Theses and Dissertations
A third-generation of solar cell is based on organic-inorganic hybrid perovskite materials. These have reached up to 22.1% conversion efficiency through exponential growth just within the last decade, compared to much longer improvement times for other photovoltaic technologies. Lead halide perovskites are among the most commonly used materials in this context. Despite the relatively large number of available works on some of these materials, in particular CH3NH3PbI3, others are less investigated. Here, we focused on CH3NH3PbCl3, CH3NH3PbBr3 and CH3NH3PbI3 for assessing structure stability and optical response. Using quantum-mechanics-based first principles approaches, we calculated the optimized structures of these three materials …
Oclep+: One-Class Intrusion Detection Using Length Of Patterns, Sai Kiran Pentukar
Oclep+: One-Class Intrusion Detection Using Length Of Patterns, Sai Kiran Pentukar
Browse all Theses and Dissertations
In an earlier paper, a method called One-class Classification using Length statistics of (jumping) Emerging Patterns (OCLEP) was introduced for masquerader detection. Jumping emerging patterns (JEPs) for a test instance are minimal patterns that match the test instance but they do not match any normal instances. OCLEP was based on the observation that one needs long JEPs to differentiate an instance of one class from instances of the same class, but needs short JEPs to differentiate an instance of one class from instances of a different class. In this thesis, we present OCLEP+, One-class Classification using Length statistics of Emerging …
Smart Ev Charging For Improved Sustainable Mobility, Ashutosh Shivakumar
Smart Ev Charging For Improved Sustainable Mobility, Ashutosh Shivakumar
Browse all Theses and Dissertations
The landscape of energy generation and utilization is witnessing an unprecedented change. We are at the threshold of a major shift in electricity generation from utilization of conventional sources of energy like coal to sustainable and renewable sources of energy like solar and wind. On the other hand, electricity consumption, especially in the field of transportation, due to advancements in the field of battery research and exponential technologies like vehicle telematics, is seeing a shift from carbon based to Lithium based fuel. Encouraged by 1. Decrease in the cost of Li – ion based batteries 2. Breakthroughs in battery chemistry …
Exploiting Alignments In Linked Data For Compression And Query Answering, Amit Krishna Joshi
Exploiting Alignments In Linked Data For Compression And Query Answering, Amit Krishna Joshi
Browse all Theses and Dissertations
Linked data has experienced accelerated growth in recent years due to its interlinking ability across disparate sources, made possible via machine-processable RDF data. Today, a large number of organizations, including governments and news providers, publish data in RDF format, inviting developers to build useful applications through reuse and integration of structured data. This has led to tremendous increase in the amount of RDF data on the web. Although the growth of RDF data can be viewed as a positive sign for semantic web initiatives, it causes performance bottlenecks for RDF data management systems that store and provide access to data. …
Conditional Correlation Analysis, Sanjeev Bhatta
Conditional Correlation Analysis, Sanjeev Bhatta
Browse all Theses and Dissertations
Correlation analysis is a frequently used statistical measure to examine the relationship among variables in different practical applications. However, the traditional correlation analysis uses an overly simplistic method to do so. It measures how two variables are related in an application by examining only their relationship in the entire underlying data space. As a result, traditional correlation analysis may miss a strong correlation between those variables especially when that relationship exists in the small subpopulation of the larger data space. This is no longer acceptable and may lose a fair share of information in this era of Big Data which …
Mathematical Modeling Of A P-N Junction Solar Cell Using The Transport Equations, Surjeet Singh
Mathematical Modeling Of A P-N Junction Solar Cell Using The Transport Equations, Surjeet Singh
Browse all Theses and Dissertations
While analytical models are limited in the situations that they can simulate, they are generally easier to implement than numerical models and provide a rapid view of the variables which affect a certain quantity. Analytical models are also very useful in educational situations; such as a graduate class on photovoltaics. The modeling of the interior workings of a solar cell can be complex and involved; and some of the equations can become quite lengthy. A focus of this thesis work is the derivation of the minority carrier density and minority current density equations for a p-n junction solar cell. The …
Intelligent Tutoring System Effects On The Learning Process, Ali Talib Qasim Al-Aqbi
Intelligent Tutoring System Effects On The Learning Process, Ali Talib Qasim Al-Aqbi
Browse all Theses and Dissertations
The traditional education systems that have been used for several centuries have evolved very slowly and might be ineffective for addressing diverse learning styles and levels of preparation. This system is characterized by many students interacting with a single teacher, who is unable to address the individual needs of every student. Therefore, some students can become frustrated and fail to reach their educational potential. An Intelligent Tutoring System (ITS), which is a computer application used to provide students with one-to-one supplemental tutoring tailored to the student's learning style and pace, is of interest to educators for improving student learning. To …
Implementation And Evaluation Of Goal Selection In A Cognitive Architecture, Sravya Kondrakunta
Implementation And Evaluation Of Goal Selection In A Cognitive Architecture, Sravya Kondrakunta
Browse all Theses and Dissertations
A cognitive system attempts to achieve its goals by utilizing the appropriate resources present to yield the best possible outcome within a short duration. To achieve the goals in such an efficient manner, it is important for the agent to manage its goals well. Goal management not only makes the agent efficient but also flexible, more durable to the sudden changes in the environment, and self-reliant. Goal Management consists of various goal operations including goal formulation, selection, change, delegation, achievement, and monitoring. Each operation is unique and has its own significance in aiding the performance of the agent. The thesis …
Rendering Owl In Latex For Improved Readability: Extensions To The Owlapi, Cogan M. Shimizu
Rendering Owl In Latex For Improved Readability: Extensions To The Owlapi, Cogan M. Shimizu
Browse all Theses and Dissertations
As ontology engineering is inherently a multidisciplinary process, it is necessary to utilize multiple vehicles to present an ontology to a user. In order to examine the content of an ontology, formal logic renderings of the axioms appear to be a very helpful approach for some. This thesis introduces a number of incremental improvements to the OWLAPI's \LaTeX{} rendering framework in order to improve the readability, concision, and correctness of OWL files translated into Description Logic and First Order Logic. In addition, we examine the efficacy of these renderings as vehicles for understanding an ontology.
Model Preparation And User Interface Aspects For Microsoft Hololens Medical Tutorial Applications, Andrew J. Mcnutt
Model Preparation And User Interface Aspects For Microsoft Hololens Medical Tutorial Applications, Andrew J. Mcnutt
Browse all Theses and Dissertations
Augmented Reality (AR) is the combination of computer vision and graphics to allow a device to derive context about the environment and to display relevant information to the user. The Microsoft Hololens is the latest wearable AR device that includes a series of infrared sensors to perform hand tracking and Simultaneous Localization and Mapping, a wave guide optics system to project holograms, and an independent untethered operating system. This thesis will explore the hardware and software capabilities of the device, prepare 3D graphical models, and understand the user interface. Specifically, in our research the target application is a tutorial on …