Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 30 of 51
Full-Text Articles in Physical Sciences and Mathematics
The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii
The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii
Browse all Theses and Dissertations
The widespread expansion of Electric Vehicles (EV) throughout the world creates a requirement for charging stations. While Cybersecurity research is rapidly expanding in the field of Electric Vehicle Infrastructure, efforts are impacted by the availability of testing platforms. This paper presents a solution called the “Open Charge Point Protocol (OCPP) Cyber Range.” Its purpose is to conduct Cybersecurity research against vulnerabilities in the OCPP v1.6 protocol. The OCPP Cyber Range can be used to enable current or future research and to train operators and system managers of Electric Charge Vehicle Supply Equipment (EVSE). This paper demonstrates this solution using three …
Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan
Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan
Browse all Theses and Dissertations
Deploying Mandatory Access Controls (MAC) is a popular way to provide host protection against malware. Unfortunately, current implementations lack the flexibility to adapt to emergent malware threats and are known for being difficult to configure. A core tenet of MAC security systems is that the policies they are deployed with are immutable from the host while they are active. This work looks at deploying a MAC system that leverages using encrypted security tokens to allow for redeploying policy configurations in real-time without the need to stop a running process. This is instrumental in developing an adaptive framework for security systems …
Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte
Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte
Browse all Theses and Dissertations
Modern web development has grown increasingly reliant on scripting languages such as PHP. The complexities of an interpreted language means it is very difficult to account for every use case as unusual interactions can cause unintended side effects. Automatically generating test input to detect bugs or fuzzing, has proven to be an effective technique for JavaScript engines. By extending this concept to PHP, existing vulnerabilities that have since gone undetected can be brought to light. While PHP fuzzers exist, they are limited to testing a small quantity of test seeds per second. In this thesis, we propose a solution for …
Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula
Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula
Browse all Theses and Dissertations
Malware detection is a critical task in ensuring the security of computer systems. Due to a surge in malware and the malware program sophistication, machine learning methods have been developed to perform such a task with great success. To further learn structural semantics, Graph Neural Networks abbreviated as GNNs have emerged as a recent practice for malware detection by modeling the relationships between various components of a program as a graph, which deliver promising detection performance improvement. However, this line of research attends to individual programs while overlooking program interactions; also, these GNNs tend to perform feature aggregation from neighbors …
Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams
Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams
Browse all Theses and Dissertations
Most of today’s time series data contain anomalies and multiple seasonalities, and accurate anomaly detection in these data is critical to almost any type of business. However, most mainstream forecasting models used for anomaly detection can only incorporate one or no seasonal component into their forecasts and cannot capture every known seasonal pattern in time series data. In this thesis, we propose a new multi-seasonal forecasting model for anomaly detection in time series data that extends the popular Seasonal Autoregressive Integrated Moving Average (SARIMA) model. Our model, named multi-SARIMA, utilizes a time series dataset’s multiple pre-determined seasonal trends to increase …
Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula
Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula
Browse all Theses and Dissertations
Machine learning techniques utilize training data samples to help understand, predict, classify, and make valuable decisions for different applications such as medicine, email filtering, speech recognition, agriculture, and computer vision, where it is challenging or unfeasible to produce traditional algorithms to accomplish the needed tasks. Unsupervised ML-based approaches have emerged for building groups of data samples known as data clusters for driving necessary decisions about these data samples and helping solve challenges in critical applications. Data clustering is used in multiple fields, including health, finance, social networks, education, and science. Sequential processing of clustering algorithms, like the K-Means, Minibatch K-Means, …
Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal
Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal
Browse all Theses and Dissertations
Heart failure is a syndrome which effects a patient’s quality of life adversely. It can be caused by different underlying conditions or abnormalities and involves both cardiovascular and non-cardiovascular comorbidities. Heart failure cannot be cured but a patient’s quality of life can be improved by effective treatment through medicines and surgery, and lifestyle management. As effective treatment of heart failure incurs cost for the patients and resource allocation for the hospitals, predicting length of stay of these patients during each hospitalization becomes important. Heart failure can be classified into two types: left sided heart failure and right sided heart failure. …
Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha
Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha
Browse all Theses and Dissertations
Smart cities have emerged to tackle many critical problems that can thwart the overwhelming urbanization process, such as traffic jams, environmental pollution, expensive health care, and increasing energy demand. This Master thesis proposes efficient and high-quality cloud-based machine-learning solutions for efficient and sustainable smart cities environment. Different supervised machine-learning models for air quality predication (AQP) in efficient and sustainable smart cities environment is developed. For that, ML-based techniques are implemented using cloud-based solutions. For example, regression and classification methods are implemented using distributed cloud computing to forecast air execution time and accuracy of the implemented ML solution. These models are …
Contributors To Pathologic Depolarization In Myotonia Congenita, Jessica Hope Myers
Contributors To Pathologic Depolarization In Myotonia Congenita, Jessica Hope Myers
Browse all Theses and Dissertations
Myotonia congenita is an inherited skeletal muscle disorder caused by loss-of-function mutation in the CLCN1 gene. This gene encodes the ClC-1 chloride channel, which is almost exclusively expressed in skeletal muscle where it acts to stabilize the resting membrane potential. Loss of this chloride channel leads to skeletal muscle hyperexcitability, resulting in involuntary muscle action potentials (myotonic discharges) seen clinically as muscle stiffness (myotonia). Stiffness affects the limb and facial muscles, though specific muscle involvement can vary between patients. Interestingly, respiratory distress is not part of this disease despite muscles of respiration such as the diaphragm muscle also carrying this …
Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman
Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman
Browse all Theses and Dissertations
Insider threats to information security have become a burden for organizations. Understanding insider activities leads to an effective improvement in identifying insider attacks and limits their threats. This dissertation presents three systems to detect insider threats effectively. The aim is to reduce the false negative rate (FNR), provide better dataset use, and reduce dimensionality and zero padding effects. The systems developed utilize deep learning techniques and are evaluated using the CERT 4.2 dataset. The dataset is analyzed and reformed so that each row represents a variable length sample of user activities. Two data representations are implemented to model extracted features …
A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham
A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham
Browse all Theses and Dissertations
The Industrial Internet of Things (IIoT) refers to a set of smart devices, i.e., actuators, detectors, smart sensors, and autonomous systems connected throughout the Internet to help achieve the purpose of various industrial applications. Unfortunately, IIoT applications are increasingly integrated into insecure physical environments leading to greater exposure to new cyber and physical system attacks. In the current IIoT security realm, effective anomaly detection is crucial for ensuring the integrity and reliability of critical infrastructure. Traditional security solutions may not apply to IIoT due to new dimensions, including extreme energy constraints in IIoT devices. Deep learning (DL) techniques like Convolutional …
Accelerating Precision Station Keeping For Automated Aircraft, James D. Anderson
Accelerating Precision Station Keeping For Automated Aircraft, James D. Anderson
Browse all Theses and Dissertations
Automated vehicles pose challenges in various research domains, including robotics, machine learning, computer vision, public safety, system certification, and beyond. These vehicles autonomously handle navigation and locomotion, often requiring minimal user interaction, and can operate on land, in water, or in the air. In the context of aircraft, one specific application is Automated Aerial Refueling (AAR). Traditional aerial refueling involves a "tanker" aircraft using a mechanism, such as a rigid boom arm or a flexible hose, to transfer fuel to another aircraft designated as the "receiver". For AAR, the boom arm may be maneuvered automatically, or in certain instances the …
Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams
Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams
Browse all Theses and Dissertations
Obtaining accurate inferences from deep neural networks is difficult when models are trained on instances with conflicting labels. Algorithmic recognition of online hate speech illustrates this. No human annotator is perfectly reliable, so multiple annotators evaluate and label online posts in a corpus. Labeling scheme limitations, differences in annotators' beliefs, and limits to annotators' honesty and carefulness cause some labels to disagree. Consequently, decisive and accurate inferences become less likely. Some practical applications such as social research can tolerate some indecisiveness. However, an online platform using an indecisive classifier for automated content moderation could create more problems than it solves. …
Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee
Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee
Browse all Theses and Dissertations
This research explores data-driven AI techniques to extract insights from relevant medical data for pain management in patients with Sickle Cell Disease (SCD). SCD is an inherited red blood cell disorder that can cause a multitude of complications throughout an individual’s life. Most patients with SCD experience repeated, unpredictable episodes of severe pain. Arguably, the most challenging aspect of treating pain episodes in SCD is assessing and interpreting the patient’s pain intensity level due to the subjective nature of pain. In this study, we leverage multiple data-driven AI techniques to improve pain management in patients with SCD. The proposed approaches …
Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani
Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani
Browse all Theses and Dissertations
Identifying the version of the Solidity compiler used to create an Ethereum contract is a challenging task, especially when the contract bytecode is obfuscated and lacks explicit metadata. Ethereum bytecode is highly complex, as it is generated by the Solidity compiler, which translates high-level programming constructs into low-level, stack-based code. Additionally, the Solidity compiler undergoes frequent updates and modifications, resulting in continuous evolution of bytecode patterns. To address this challenge, we propose using deep learning models to analyze Ethereum bytecodes and infer the compiler version that produced them. A large number of Ethereum contracts and the corresponding compiler versions is …
Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh
Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh
Browse all Theses and Dissertations
The Internet of Things (IoT) is used in many fields that generate sensitive data, such as healthcare and surveillance. Increased reliance on IoT raised serious information security concerns. This dissertation presents three systems for analyzing and classifying IoT traffic using Deep Learning (DL) models, and a large dataset is built for systems training and evaluation. The first system studies the effect of combining raw data and engineered features to optimize the classification of encrypted and compressed IoT traffic using Engineered Features Classification (EFC), Raw Data Classification (RDC), and combined Raw Data and Engineered Features Classification (RDEFC) approaches. Our results demonstrate …
Automatically Inferring Image Bases Of Arm32 Binaries, Daniel T. Chong
Automatically Inferring Image Bases Of Arm32 Binaries, Daniel T. Chong
Browse all Theses and Dissertations
Reverse engineering tools rely on the critical image base value for tasks such as correctly mapping code into virtual memory for an emulator or accurately determining branch destinations for a disassembler. However, binaries are often stripped and therefore, do not explicitly state this value. Currently available solutions for calculating this essential value generally require user input in the form of parameter configurations or manual binary analysis, thus these methods are limited by the experience and knowledge of the user. In this thesis, we propose a user-independent solution for determining the image base of ARM32 binaries and describe our implementation. Our …
A Solder-Defined Computer Architecture For Backdoor And Malware Resistance, Marc W. Abel
A Solder-Defined Computer Architecture For Backdoor And Malware Resistance, Marc W. Abel
Browse all Theses and Dissertations
This research is about securing control of those devices we most depend on for integrity and confidentiality. An emerging concern is that complex integrated circuits may be subject to exploitable defects or backdoors, and measures for inspection and audit of these chips are neither supported nor scalable. One approach for providing a “supply chain firewall” may be to forgo such components, and instead to build central processing units (CPUs) and other complex logic from simple, generic parts. This work investigates the capability and speed ceiling when open-source hardware methodologies are fused with maker-scale assembly tools and visible-scale final inspection.
The …
Locality Analysis Of Patched Php Vulnerabilities, Luke N. Holt
Locality Analysis Of Patched Php Vulnerabilities, Luke N. Holt
Browse all Theses and Dissertations
The size and complexity of modern software programs is constantly growing making it increasingly difficult to diligently find and diagnose security exploits. The ability to quickly and effectively release patches to prevent existing vulnerabilities significantly limits the exploitation of users and/or the company itself. Due to this it has become crucial to provide the capability of not only releasing a patched version, but also to do so quickly to mitigate the potential damage. In this thesis, we propose metrics for evaluating the locality between exploitable code and its corresponding sanitation API such that we can statistically determine the proximity of …
Development Of Enhanced User Interaction And User Experience For Supporting Serious Role-Playing Games In A Healthcare Setting, Mark Lee Alow
Development Of Enhanced User Interaction And User Experience For Supporting Serious Role-Playing Games In A Healthcare Setting, Mark Lee Alow
Browse all Theses and Dissertations
Education about implicit bias in clinical settings is essential for improving the quality of healthcare for underrepresented groups. Such a learning experience can be delivered in the form of a serious game simulation. WrightLIFE (Lifelike Immersion for Equity) is a project that combines two serious game simulations, with each addressing the group that faces implicit bias. These groups are individuals that identify as LGBTQIA+ and people with autism spectrum disorder (ASD). The project presents healthcare providers with a training tool that puts them in the roles of the patient and a medical specialist and immerses them in social and clinical …
Few-Shot Malware Detection Using A Novel Adversarial Reprogramming Model, Ekula Praveen Kumar
Few-Shot Malware Detection Using A Novel Adversarial Reprogramming Model, Ekula Praveen Kumar
Browse all Theses and Dissertations
The increasing sophistication of malware has made detecting and defending against new strains a major challenge for cybersecurity. One promising approach to this problem is using machine learning techniques that extract representative features and train classification models to detect malware in an early stage. However, training such machine learning-based malware detection models represents a significant challenge that requires a large number of high-quality labeled data samples while it is very costly to obtain them in real-world scenarios. In other words, training machine learning models for malware detection requires the capability to learn from only a few labeled examples. To address …
Computer Enabled Interventions To Communication And Behavioral Problems In Collaborative Work Environments, Ashutosh Shivakumar
Computer Enabled Interventions To Communication And Behavioral Problems In Collaborative Work Environments, Ashutosh Shivakumar
Browse all Theses and Dissertations
Task success in co-located and distributed collaborative work settings is characterized by clear and efficient communication between participating members. Communication issues like 1) Unwanted interruptions and 2) Delayed feedback in collaborative work based distributed scenarios have the potential to impede task coordination and significantly decrease the probability of accomplishing task objective. Research shows that 1) Interrupting tasks at random moments can cause users to take up to 30% longer to resume tasks, commit up to twice the errors, and experience up to twice the negative effect than when interrupted at boundaries 2) Skill retention in collaborative learning tasks improves with …
Semantics-Driven Abstractive Document Summarization, Amanuel Alambo
Semantics-Driven Abstractive Document Summarization, Amanuel Alambo
Browse all Theses and Dissertations
The evolution of the Web over the last three decades has led to a deluge of scientific and news articles on the Internet. Harnessing these publications in different fields of study is critical to effective end user information consumption. Similarly, in the domain of healthcare, one of the key challenges with the adoption of Electronic Health Records (EHRs) for clinical practice has been the tremendous amount of clinical notes generated that can be summarized without which clinical decision making and communication will be inefficient and costly. In spite of the rapid advances in information retrieval and deep learning techniques towards …
A Cloud Computing-Based Dashboard For The Visualization Of Motivational Interviewing Metrics, E Jinq Heng
A Cloud Computing-Based Dashboard For The Visualization Of Motivational Interviewing Metrics, E Jinq Heng
Browse all Theses and Dissertations
Motivational Interviewing (MI) is an evidence-based brief interventional technique that has been demonstrated to be effective in triggering behavior change in patients. To facilitate behavior change, healthcare practitioners adopt a nonconfrontational, empathetic dialogic style, a core component of MI. Despite its advantages, MI has been severely underutilized mainly due to the cognitive overload on the part of the MI dialogue evaluator, who has to assess MI dialogue in real-time and calculate MI characteristic metrics (number of open-ended questions, close-ended questions, reflection, and scale-based sentences) for immediate post-session evaluation both in MI training and clinical settings. To automate dialogue assessment and …
Sample Mislabeling Detection And Correction In Bioinformatics Experimental Data, Soon Jye Kho
Sample Mislabeling Detection And Correction In Bioinformatics Experimental Data, Soon Jye Kho
Browse all Theses and Dissertations
Sample mislabeling or incorrect annotation has been a long-standing problem in biomedical research and contributes to irreproducible results and invalid conclusions. These problems are especially prevalent in multi-omics studies in which a large set of biological samples are characterized by multiple types of omics platforms at different times or different labs. While multi-omics studies have demonstrated tremendous value in understanding disease biology and improving patient outcomes, the complexity of these studies may increase opportunities for human error. Fortunately, the interrelated nature of the data collected in multi-omics studies can be exploited to facilitate the identification and, in some cases, correction …
Edge Processing Of Image For Uas Sense And Avoidance, Christopher J. Rave
Edge Processing Of Image For Uas Sense And Avoidance, Christopher J. Rave
Browse all Theses and Dissertations
Today there is a large market for Unmanned Aerial Systems. Although most current systems are remotely piloted by operators on the ground, increasingly, many of these systems will use some sort of automatic flight controller to help mitigate new challenges, due to their deployment at growing scale. These challenges include, but are not limited to, shortage of FAA-certified UAS pilots, transmission bandwidth and delay constraints and cyber security threats associated with wireless networking, profitability of operations constrained by energy capacity and efficiency and air dynamics planning, and etc. In order to address these rising challenges, this thesis is a part …
Deep Learning For Compressive Sar Imaging With Train-Test Discrepancy, Morgan R. Mccamey
Deep Learning For Compressive Sar Imaging With Train-Test Discrepancy, Morgan R. Mccamey
Browse all Theses and Dissertations
We consider the problem of compressive synthetic aperture radar (SAR) imaging with the goal of reconstructing SAR imagery in the presence of under sampled phase history. While this problem is typically considered in compressive sensing (CS) literature, we consider a variety of deep learning approaches where a deep neural network (DNN) is trained to form SAR imagery from limited data. At the cost of computationally intensive offline training, on-line test-time DNN-SAR has demonstrated orders of magnitude faster reconstruction than standard CS algorithms. A limitation of the DNN approach is that any change to the operating conditions necessitates a costly retraining …
Adaptive Two-Stage Edge-Centric Architecture For Deeply-Learned Embedded Real-Time Target Classification In Aerospace Sense-And-Avoidance Applications, Nicholas A. Speranza
Adaptive Two-Stage Edge-Centric Architecture For Deeply-Learned Embedded Real-Time Target Classification In Aerospace Sense-And-Avoidance Applications, Nicholas A. Speranza
Browse all Theses and Dissertations
With the growing number of Unmanned Aircraft Systems, current network-centric architectures present limitations in meeting real-time and time-critical requirements. Current methods utilizing centralized off-platform processing have inherent energy inefficiencies, scalability challenges, performance concerns, and cyber vulnerabilities. In this dissertation, an adaptive, two-stage, energy-efficient, edge-centric architecture is proposed to address these limitations. A novel, edge-centric Sense-and-Avoidance architecture framework is presented, and a corresponding prototype is developed using commercial hardware to validate the proposed architecture. Instead of a network-centric approach, processing is distributed at the logical edge of the sensors, and organized as Detection and Classification Subsystems. Classical machine vision algorithms are …
Partial Facial Re-Imaging Using Generative Adversarial Networks, Derek Desentz
Partial Facial Re-Imaging Using Generative Adversarial Networks, Derek Desentz
Browse all Theses and Dissertations
Existing facial recognition software relies heavily on using neural networks to extract key facial features to accurately classify known individuals. Some of these key features include the shape, size, and distance between an individual’s eyes, nose, and mouth. When these key features cannot be extracted due to facial coverings, existing applications become inaccurate and unreliable. The accuracy and reliability of these technologies are growing concerns as the facial recognition market continues to grow at an exponential rate. In this thesis, we have developed a web-based application service that is able to take in a partially covered face image and generate …
Evaluating The Performance Of Using Speaker Diarization For Speech Separation Of In-Person Role-Play Dialogues, Raveendra Medaramitta
Evaluating The Performance Of Using Speaker Diarization For Speech Separation Of In-Person Role-Play Dialogues, Raveendra Medaramitta
Browse all Theses and Dissertations
Development of professional communication skills, such as motivational interviewing, often requires experiential learning through expert instructor-guided role-plays between the trainee and a standard patient/actor. Due to the growing demand for such skills in practices, e.g., for health care providers in the management of mental health challenges, chronic conditions, substance misuse disorders, etc., there is an urgent need to improve the efficacy and scalability of such role-play based experiential learning, which are often bottlenecked by the time-consuming performance assessment process. WSU is developing ReadMI (Real-time Assessment of Dialogue in Motivational Interviewing) to address this challenge, a mobile AI solution aiming to …