Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Computer Sciences

Theses/Dissertations

Keyword
Publication Year
Publication

Articles 1 - 30 of 350

Full-Text Articles in Physical Sciences and Mathematics

Tracing And Segmentation Of Molecular Patterns In 3-Dimensional Cryo-Et/Em Density Maps Through Algorithmic Image Processing And Deep Learning-Based Techniques, Salim Sazzed Oct 2023

Tracing And Segmentation Of Molecular Patterns In 3-Dimensional Cryo-Et/Em Density Maps Through Algorithmic Image Processing And Deep Learning-Based Techniques, Salim Sazzed

Computer Science Theses & Dissertations

Understanding the structures of biological macromolecules is highly important as they are closely associated with cellular functionalities. Comprehending the precise organization of actin filaments is crucial because they form the dynamic cytoskeleton, which offers structural support to cells and connects the cell’s interior with its surroundings. However, determining the precise organization of actin filaments is challenging due to the poor quality of cryo-electron tomography (cryo-ET) images, which suffer from low signal-to-noise (SNR) ratios and the presence of missing wedge, as well as diverse shape characteristics of actin filaments. To address these formidable challenges, the primary component of this dissertation focuses …


Machine Learning Approach To Activity Categorization In Young Adults Using Biomechanical Metrics, Nathan Q. C. Holland Oct 2023

Machine Learning Approach To Activity Categorization In Young Adults Using Biomechanical Metrics, Nathan Q. C. Holland

Mechanical & Aerospace Engineering Theses & Dissertations

Inactive adults often have decreased musculoskeletal health and increased risk factors for chronic diseases. However, there is limited data linking biomechanical measurements of generally healthy young adults to their physical activity levels assessed through questionnaires. Commonly used data collection methods in biomechanics for assessing musculoskeletal health include but are not limited to muscle quality (measured as echo intensity when using ultrasound), isokinetic (i.e., dynamic) muscle strength, muscle activations, and functional movement assessments using motion capture systems. These assessments can be time consuming for both data collection and processing. Therefore, understanding if all biomechanical assessments are necessary to classify the activity …


Faster, Cheaper, And Better Cfd: A Case For Machine Learning To Augment Reynolds-Averaged Navier-Stokes, John Peter Romano Ii Oct 2023

Faster, Cheaper, And Better Cfd: A Case For Machine Learning To Augment Reynolds-Averaged Navier-Stokes, John Peter Romano Ii

Mechanical & Aerospace Engineering Theses & Dissertations

In recent years, the field of machine learning (ML) has made significant advances, particularly through applying deep learning (DL) algorithms and artificial intelligence (AI). The literature shows several ways that ML may enhance the power of computational fluid dynamics (CFD) to improve its solution accuracy, reduce the needed computational resources and reduce overall simulation cost. ML techniques have also expanded the understanding of underlying flow physics and improved data capture from experimental fluid dynamics.

This dissertation presents an in-depth literature review and discusses ways the field of fluid dynamics has leveraged ML modeling to date. The author selects and describes …


Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla Aug 2023

Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla

Computer Science Theses & Dissertations

The definition of scholarly content has expanded to include the data and source code that contribute to a publication. While major archiving efforts to preserve conventional scholarly content, typically in PDFs (e.g., LOCKSS, CLOCKSS, Portico), are underway, no analogous effort has yet emerged to preserve the data and code referenced in those PDFs, particularly the scholarly code hosted online on Git Hosting Platforms (GHPs). Similarly, Software Heritage is working to archive public source code, but there is value in archiving the surrounding ephemera that provide important context to the code while maintaining their original URIs. In current implementations, source code …


Towards Intelligent Runtime Framework For Distributed Heterogeneous Systems, Polykarpos Thomadakis Aug 2023

Towards Intelligent Runtime Framework For Distributed Heterogeneous Systems, Polykarpos Thomadakis

Computer Science Theses & Dissertations

Scientific applications strive for increased memory and computing performance, requiring massive amounts of data and time to produce results. Applications utilize large-scale, parallel computing platforms with advanced architectures to accommodate their needs. However, developing performance-portable applications for modern, heterogeneous platforms requires lots of effort and expertise in both the application and systems domains. This is more relevant for unstructured applications whose workflow is not statically predictable due to their heavily data-dependent nature. One possible solution for this problem is the introduction of an intelligent Domain-Specific Language (iDSL) that transparently helps to maintain correctness, hides the idiosyncrasies of lowlevel hardware, and …


Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane Aug 2023

Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane

Engineering Management & Systems Engineering Theses & Dissertations

Cloud Manufacturing(CMfg) is an advanced manufacturing model that caters to fast-paced agile requirements (Putnik, 2012). For manufacturing complex products that require extensive resources, manufacturers explore advanced manufacturing techniques like CMfg as it becomes infeasible to achieve high standards through complete ownership of manufacturing artifacts (Kuan et al., 2011). CMfg, with other names such as Manufacturing as a Service (MaaS) and Cyber Manufacturing (NSF, 2020), addresses the shortcoming of traditional manufacturing by building a virtual cyber enterprise of geographically distributed entities that manufacture custom products through collaboration.

With manufacturing venturing into cyberspace, Digital Trust issues concerning product quality, data, and intellectual …


Towards A Robust Defense: A Multifaceted Approach To The Detection And Mitigation Of Neural Backdoor Attacks Through Feature Space Exploration And Analysis, Liuwan Zhu Aug 2023

Towards A Robust Defense: A Multifaceted Approach To The Detection And Mitigation Of Neural Backdoor Attacks Through Feature Space Exploration And Analysis, Liuwan Zhu

Electrical & Computer Engineering Theses & Dissertations

From voice assistants to self-driving vehicles, machine learning(ML), especially deep learning, revolutionizes the way we work and live, through the wide adoption in a broad range of applications. Unfortunately, this widespread use makes deep learning-based systems a desirable target for cyberattacks, such as generating adversarial examples to fool a deep learning system to make wrong decisions. In particular, many recent studies have revealed that attackers can corrupt the training of a deep learning model, e.g., through data poisoning, or distribute a deep learning model they created with “backdoors” planted, e.g., distributed as part of a software library, so that the …


Inverse Mappers For Qcd Global Analysis, Manal Almaeen Aug 2023

Inverse Mappers For Qcd Global Analysis, Manal Almaeen

Computer Science Theses & Dissertations

Inverse problems – using measured observations to determine unknown parameters – are well motivated but challenging in many scientific problems. Mapping parameters to observables is a well-posed problem with unique solutions, and therefore can be solved with differential equations or linear algebra solvers. However, the inverse problem requires backward mapping from observable to parameter space, which is often nonunique. Consequently, solving inverse problems is ill-posed and a far more challenging computational problem.

Our motivated application in this dissertation is the inverse problems in nuclear physics that characterize the internal structure of the hadrons. We first present a machine learning framework …


Opportunities And Challenges From Major Disasters Lessons Learned Of Long-Term Recovery Group Members, Eduardo E. Landaeta May 2023

Opportunities And Challenges From Major Disasters Lessons Learned Of Long-Term Recovery Group Members, Eduardo E. Landaeta

Graduate Program in International Studies Theses & Dissertations

Natural hazards caused by the alteration of weather patterns expose populations at risk, with an outcome of economic loss, property damage, personal injury, and loss of life. The unpredictability of disasters is a topic of concern to most governments. Disaster policies need more attention in aligning mitigation opportunities with disaster housing recovery (DHR). The effect of flooding, which primarily impacts housing in coastal areas, is one of the most serious issues associated with natural hazard. Flooding has a variety of causes and implications, especially for vulnerable populations who are exposed to it. DHR is complex, involving the need for effective …


Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego May 2023

Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego

Electrical & Computer Engineering Theses & Dissertations

World Health Organization (WHO) data show that around 684,000 people die from falls yearly, making it the second-highest mortality rate after traffic accidents [1]. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. In light of the recent widespread adoption of wearable sensors, it has become increasingly critical that fall detection models are developed that can effectively process large and sequential sensor signal data. Several researchers have recently developed fall detection algorithms based on wearable sensor data. However, real-time fall detection remains challenging because of the wide …


Supporting Account-Based Queries For Archived Instagram Posts, Himarsha R. Jayanetti May 2023

Supporting Account-Based Queries For Archived Instagram Posts, Himarsha R. Jayanetti

Computer Science Theses & Dissertations

Social media has become one of the primary modes of communication in recent times, with popular platforms such as Facebook, Twitter, and Instagram leading the way. Despite its popularity, Instagram has not received as much attention in academic research compared to Facebook and Twitter, and its significant role in contemporary society is often overlooked. Web archives are making efforts to preserve social media content despite the challenges posed by the dynamic nature of these sites. The goal of our research is to facilitate the easy discovery of archived copies, or mementos, of all posts belonging to a specific Instagram account …


Machine Learning-Based Event Generator, Yasir Alanazi Dec 2022

Machine Learning-Based Event Generator, Yasir Alanazi

Computer Science Theses & Dissertations

Monte Carlo-based event generators have been the primary source for simulating particle collision experiments for the study of interesting physics scenarios. Monte Carlo generators rely on theoretical assumptions, which limit their ability to capture the full range of possible correlations between particle’s momenta. In addition, the simulations of the complete pipeline often take minutes to generate a single event even with the help of supercomputers.

In recent years, much attention has been devoted to the development of machine learning event generators. They demonstrate attractive advantages, including fast simulations, data compression, and being agnostic of theoretical assumptions. However, most of the …


A Relevance Model For Threat-Centric Ranking Of Cybersecurity Vulnerabilities, Corren G. Mccoy Dec 2022

A Relevance Model For Threat-Centric Ranking Of Cybersecurity Vulnerabilities, Corren G. Mccoy

Computer Science Theses & Dissertations

The relentless and often haphazard process of tracking and remediating vulnerabilities is a top concern for cybersecurity professionals. The key challenge they face is trying to identify a remediation scheme specific to in-house, organizational objectives. Without a strategy, the result is a patchwork of fixes applied to a tide of vulnerabilities, any one of which could be the single point of failure in an otherwise formidable defense. This means one of the biggest challenges in vulnerability management relates to prioritization. Given that so few vulnerabilities are a focus of real-world attacks, a practical remediation strategy is to identify vulnerabilities likely …


Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque Dec 2022

Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque

Electrical & Computer Engineering Theses & Dissertations

Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components dealing with physical processes and real-time computations, along with networking. CPSs often incorporate approaches merging from different scientific fields such as embedded systems, control systems, operational technology, information technology systems (ITS), and cybernetics. Today critical infrastructures (CIs) (e.g., energy systems, electric grids, etc.) and other CPSs (e.g., manufacturing industries, autonomous transportation systems, etc.) are experiencing challenges in dealing with cyberattacks. Major cybersecurity concerns are rising around CPSs because of their ever-growing use of information technology based automation. Often the security concerns are limited to probability-based possible attack …


Towards Privacy And Security Concerns Of Adversarial Examples In Deep Hashing Image Retrieval, Yanru Xiao Dec 2022

Towards Privacy And Security Concerns Of Adversarial Examples In Deep Hashing Image Retrieval, Yanru Xiao

Computer Science Theses & Dissertations

With the explosive growth of images on the internet, image retrieval based on deep hashing attracts spotlights from both research and industry communities. Empowered by deep neural networks (DNNs), deep hashing enables fast and accurate image retrieval on large-scale data. However, inheriting from deep learning, deep hashing remains vulnerable to specifically designed input, called adversarial examples. By adding imperceptible perturbations on inputs, adversarial examples fool DNNs to make wrong decisions. The existence of adversarial examples not only raises security concerns for real-world deep learning applications, but also provides us with a technique to confront malicious applications.

In this dissertation, we …


Hard-Real-Time Computing Performance In A Cloud Environment, Alvin Cornelius Murphy Dec 2022

Hard-Real-Time Computing Performance In A Cloud Environment, Alvin Cornelius Murphy

Engineering Management & Systems Engineering Theses & Dissertations

The United States Department of Defense (DoD) is rapidly working with DoD Services to move from multi-year (e.g., 7-10) traditional acquisition programs to a commercial industrybased approach for software development. While commercial technologies and approaches provide an opportunity for rapid fielding of mission capabilities to pace threats, the suitability of commercial technologies to meet hard-real-time requirements within a surface combat system is unclear. This research establishes technical data to validate the effectiveness and suitability of current commercial technologies to meet the hard-real-time demands of a DoD combat management system. (Moreland Jr., 2013) conducted similar research; however, microservices, containers, and container …


Adaptive Risk Network Dependency Analysis Of Complex Hierarchical Systems, Katherine L. Smith Aug 2022

Adaptive Risk Network Dependency Analysis Of Complex Hierarchical Systems, Katherine L. Smith

Computational Modeling & Simulation Engineering Theses & Dissertations

Recently the number, variety, and complexity of interconnected systems have been increasing while the resources available to increase resilience of those systems have been decreasing. Therefore, it has become increasingly important to quantify the effects of risks and the resulting disruptions over time as they ripple through networks of systems. This dissertation presents a novel modeling and simulation methodology which quantifies resilience, as impact on performance over time, and risk, as the impact of probabilistic disruptions. This work includes four major contributions over the state-of-the-art which are: (1) cyclic dependencies are captured by separation of performance variables into layers which …


Evaluation Of Generative Models For Predicting Microstructure Geometries In Laser Powder Bed Fusion Additive Manufacturing, Andy Ramlatchan Aug 2022

Evaluation Of Generative Models For Predicting Microstructure Geometries In Laser Powder Bed Fusion Additive Manufacturing, Andy Ramlatchan

Computer Science Theses & Dissertations

In-situ process monitoring for metals additive manufacturing is paramount to the successful build of an object for application in extreme or high stress environments. In selective laser melting additive manufacturing, the process by which a laser melts metal powder during the build will dictate the internal microstructure of that object once the metal cools and solidifies. The difficulty lies in that obtaining enough variety of data to quantify the internal microstructures for the evaluation of its physical properties is problematic, as the laser passes at high speeds over powder grains at a micrometer scale. Imaging the process in-situ is complex …


Cyber Deception For Critical Infrastructure Resiliency, Md Ali Reza Al Amin Aug 2022

Cyber Deception For Critical Infrastructure Resiliency, Md Ali Reza Al Amin

Computational Modeling & Simulation Engineering Theses & Dissertations

The high connectivity of modern cyber networks and devices has brought many improvements to the functionality and efficiency of networked systems. Unfortunately, these benefits have come with many new entry points for attackers, making systems much more vulnerable to intrusions. Thus, it is critically important to protect cyber infrastructure against cyber attacks. The static nature of cyber infrastructure leads to adversaries performing reconnaissance activities and identifying potential threats. Threats related to software vulnerabilities can be mitigated upon discovering a vulnerability and-, developing and releasing a patch to remove the vulnerability. Unfortunately, the period between discovering a vulnerability and applying a …


Applied Deep Learning: Case Studies In Computer Vision And Natural Language Processing, Md Reshad Ul Hoque Aug 2022

Applied Deep Learning: Case Studies In Computer Vision And Natural Language Processing, Md Reshad Ul Hoque

Electrical & Computer Engineering Theses & Dissertations

Deep learning has proved to be successful for many computer vision and natural language processing applications. In this dissertation, three studies have been conducted to show the efficacy of deep learning models for computer vision and natural language processing. In the first study, an efficient deep learning model was proposed for seagrass scar detection in multispectral images which produced robust, accurate scars mappings. In the second study, an arithmetic deep learning model was developed to fuse multi-spectral images collected at different times with different resolutions to generate high-resolution images for downstream tasks including change detection, object detection, and land cover …


Predictors Of Email Response: Determinants Of The Intention Of Not Following Security Recommendations, Miguel Angel Toro-Jarrin Aug 2022

Predictors Of Email Response: Determinants Of The Intention Of Not Following Security Recommendations, Miguel Angel Toro-Jarrin

Engineering Management & Systems Engineering Theses & Dissertations

Organizations and government leaders are concerned about cyber incidents. For some time, researchers have studied what motivates people to act in ways that put the confidentiality, integrity, and availability of information in organizations at risk. Still, several areas remained unexplored, including the role of employees’ evaluation of the organizational systems and the role of value orientation at work as precursors of secure and insecure actions in relation to information technologies (information security [IS] action). The objective of this research project was to examine how the evaluations of formal and informal security norms are associated with the intention to follow them …


Using Ensemble Learning Techniques To Solve The Blind Drift Calibration Problem, Devin Scott Drake Aug 2022

Using Ensemble Learning Techniques To Solve The Blind Drift Calibration Problem, Devin Scott Drake

Computer Science Theses & Dissertations

Large sets of sensors deployed in nearly every practical environment are prone to drifting out of calibration. This drift can be sensor-based, with one or several sensors falling out of calibration, or system-wide, with changes to the physical system causing sensor-reading issues. Recalibrating sensors in either case can be both time and cost prohibitive. Ideally, some technique could be employed between the sensors and the final reading that recovers the drift-free sensor readings. This paper covers the employment of two ensemble learning techniques — stacking and bootstrap aggregation (or bagging) — to recover drift-free sensor readings from a suite of …


Emotion Detection Using An Ensemble Model Trained With Physiological Signals And Inferred Arousal-Valence States, Matthew Nathanael Gray Aug 2022

Emotion Detection Using An Ensemble Model Trained With Physiological Signals And Inferred Arousal-Valence States, Matthew Nathanael Gray

Electrical & Computer Engineering Theses & Dissertations

Affective computing is an exciting and transformative field that is gaining in popularity among psychologists, statisticians, and computer scientists. The ability of a machine to infer human emotion and mood, i.e. affective states, has the potential to greatly improve human-machine interaction in our increasingly digital world. In this work, an ensemble model methodology for detecting human emotions across multiple subjects is outlined. The Continuously Annotated Signals of Emotion (CASE) dataset, which is a dataset of physiological signals labeled with discrete emotions from video stimuli as well as subject-reported continuous emotions, arousal and valence, from the circumplex model, is used for …


Deep Learning Object-Based Detection Of Manufacturing Defects In X-Ray Inspection Imaging, Juan C. Parducci May 2022

Deep Learning Object-Based Detection Of Manufacturing Defects In X-Ray Inspection Imaging, Juan C. Parducci

Mechanical & Aerospace Engineering Theses & Dissertations

Current analysis of manufacturing defects in the production of rims and tires via x-ray inspection at an industry partner’s manufacturing plant requires that a quality control specialist visually inspect radiographic images for defects of varying sizes. For each sample, twelve radiographs are taken within 35 seconds. Some defects are very small in size and difficult to see (e.g., pinholes) whereas others are large and easily identifiable. Implementing this quality control practice across all products in its human-effort driven state is not feasible given the time constraint present for analysis.

This study aims to identify and develop an object detector capable …


Development Of Modeling And Simulation Platform For Path-Planning And Control Of Autonomous Underwater Vehicles In Three-Dimensional Spaces, Sai Krishna Abhiram Kondapalli May 2022

Development Of Modeling And Simulation Platform For Path-Planning And Control Of Autonomous Underwater Vehicles In Three-Dimensional Spaces, Sai Krishna Abhiram Kondapalli

Mechanical & Aerospace Engineering Theses & Dissertations

Autonomous underwater vehicles (AUVs) operating in deep sea and littoral environments have diverse applications including marine biology exploration, ocean environment monitoring, search for plane crash sites, inspection of ship-hulls and pipelines, underwater oil rig maintenance, border patrol, etc. Achieving autonomy in underwater vehicles relies on a tight integration between modules of sensing, navigation, decision-making, path-planning, trajectory tracking, and low-level control. This system integration task benefits from testing the related algorithms and techniques in a simulated environment before implementation in a physical test bed. This thesis reports on the development of a modeling and simulation platform that supports the design and …


Machine Learning Classification Of Digitally Modulated Signals, James A. Latshaw May 2022

Machine Learning Classification Of Digitally Modulated Signals, James A. Latshaw

Electrical & Computer Engineering Theses & Dissertations

Automatic classification of digitally modulated signals is a challenging problem that has traditionally been approached using signal processing tools such as log-likelihood algorithms for signal classification or cyclostationary signal analysis. These approaches are computationally intensive and cumbersome in general, and in recent years alternative approaches that use machine learning have been presented in the literature for automatic classification of digitally modulated signals. This thesis studies deep learning approaches for classifying digitally modulated signals that use deep artificial neural networks in conjunction with the canonical representation of digitally modulated signals in terms of in-phase and quadrature components. Specifically, capsule networks are …


Tiktok As A Digital Activism Space: Social Justice Under Algorithmic Control, Brittany Haslem May 2022

Tiktok As A Digital Activism Space: Social Justice Under Algorithmic Control, Brittany Haslem

Institute for the Humanities Theses

TikTok, a video sharing application, has become the center of viral internet culture. The app has risen in popularity so quickly that scholarly literature investigating its vast societal impact is still nascent. TikTok is not only used to discuss popular culture topics and create trends, but also being utilized as a tool for social justice activism in the United States in the wake of a tumultuous year with major events such as the coronavirus pandemic, a resurgence of the Black Lives Matter movement, and the 2020 presidential election. TikTok activism is not without critiques, ranging from concerns of foreign government …


Transparscit: A Transformer-Based Citation Parser Trained On Large-Scale Synthesized Data, Md Sami Uddin May 2022

Transparscit: A Transformer-Based Citation Parser Trained On Large-Scale Synthesized Data, Md Sami Uddin

Computer Science Theses & Dissertations

Accurately parsing citation strings is key to automatically building large-scale citation graphs, so a robust citation parser is an essential module in academic search engines. One limitation of the state-of-the-art models (such as ParsCit and Neural-ParsCit) is the lack of a large-scale training corpus. Manually annotating hundreds of thousands of citation strings is laborious and time-consuming. This thesis presents a novel transformer-based citation parser by leveraging the GIANT dataset, consisting of 1 billion synthesized citation strings covering over 1500 citation styles. As opposed to handcrafted features, our model benefits from word embeddings and character-based embeddings by combining the bidirectional long …


Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny May 2022

Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny

Civil & Environmental Engineering Theses & Dissertations

Ride-sourcing transportation services offered by transportation network companies (TNCs) like Uber and Lyft are disrupting the transportation landscape. The growing demand on these services, along with their potential short and long-term impacts on the environment, society, and infrastructure emphasize the need to further understand the ride-sourcing system. There were no sufficient data to fully understand the system and integrate it within regional multimodal transportation frameworks. This can be attributed to commercial and competition reasons, given the technology-enabled and innovative nature of the system. Recently, in 2019, the City of Chicago the released an extensive and complete ride-sourcing trip-level data for …


Joint Linear And Nonlinear Computation With Data Encryption For Efficient Privacy-Preserving Deep Learning, Qiao Zhang Dec 2021

Joint Linear And Nonlinear Computation With Data Encryption For Efficient Privacy-Preserving Deep Learning, Qiao Zhang

Electrical & Computer Engineering Theses & Dissertations

Deep Learning (DL) has shown unrivalled performance in many applications such as image classification, speech recognition, anomalous detection, and business analytics. While end users and enterprises own enormous data, DL talents and computing power are mostly gathered in technology giants having cloud servers. Thus, data owners, i.e., the clients, are motivated to outsource their data, along with computationally-intensive tasks, to the server in order to leverage the server’s abundant computation resources and DL talents for developing cost-effective DL solutions. However, trust is required between the server and the client to finish the computation tasks (e.g., conducting inference for the newly-input …