Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Master of Science in Computer Science Theses

Theses/Dissertations

Discipline
Keyword
Publication Year

Articles 1 - 29 of 29

Full-Text Articles in Physical Sciences and Mathematics

Cm-Ii Meditation As An Intervention To Reduce Stress And Improve Attention: A Study Of Ml Detection, Spectral Analysis, And Hrv Metrics, Sreekanth Gopi Dec 2023

Cm-Ii Meditation As An Intervention To Reduce Stress And Improve Attention: A Study Of Ml Detection, Spectral Analysis, And Hrv Metrics, Sreekanth Gopi

Master of Science in Computer Science Theses

Students frequently face heightened stress due to academic and social pressures, particularly in de- manding fields like computer science and engineering. These challenges are often associated with serious mental health issues, including ADHD (Attention Deficit Hyperactivity Disorder), depression, and an increased risk of suicide. The average student attention span has notably decreased from 21⁄2 minutes to just 47 seconds, and now it typically takes about 25 minutes to switch attention to a new task (Mark, 2023). Research findings suggest that over 95% of individuals who die by suicide have been diagnosed with depression (Shahtahmasebi, 2013), and almost 20% of students …


On Training Neurons With Bounded Compilations, Lance Kennedy Jul 2023

On Training Neurons With Bounded Compilations, Lance Kennedy

Master of Science in Computer Science Theses

Knowledge compilation offers a formal approach to explaining and verifying the behavior of machine learning systems, such as neural networks. Unfortunately, compiling even an individual neuron into a tractable representation such as an Ordered Binary Decision Diagram (OBDD), is an NP-hard problem. In this thesis, we consider the problem of training a neuron from data, subject to the constraint that it has a compact representation as an OBDD. Our approach is based on the observation that a neuron can be compiled into an OBDD in polytime if (1) the neuron has integer weights, and (2) its aggregate weight is bounded. …


Using Machine Learning Techniques To Model Encoder/Decoder Pair For Non-Invasive Electroencephalographic Wireless Signal Transmission, Ernst Fanfan Jul 2023

Using Machine Learning Techniques To Model Encoder/Decoder Pair For Non-Invasive Electroencephalographic Wireless Signal Transmission, Ernst Fanfan

Master of Science in Computer Science Theses

This study investigated the application and enhancement of Non-Invasive Brain-Computer Interfaces (NI-BCIs), focused on enhancing the efficiency and effectiveness of this technology for individuals with severe physical limitations. The core research goal was to improve current limitations associated with wires, noise, and invasive procedures often associated with BCI technology. The key discussed solution involves developing an optimized Encoder/Decoder (E/D) pair using machine learning techniques, particularly those borrowed from Generative Adversarial Networks (GAN) and other Deep Neural Networks, to minimize data transmission and ensure robustness against data degradation. The study highlighted the crucial role of machine learning in self-adjusting and isolating …


Fairness And Privacy In Machine Learning Algorithms, Neha Bhargava Dec 2022

Fairness And Privacy In Machine Learning Algorithms, Neha Bhargava

Master of Science in Computer Science Theses

Roughly 2.5 quintillion bytes of data is generated daily in this digital era. Manual processing of such huge amounts of data to extract useful information is nearly impossible but with the widespread use of machine learning algorithms and their ability to process enormous data in a fast, cost-effective, and scalable way has proven to be a preferred choice to glean useful insights and solve business problems in many domains. With this widespread use of machine learning algorithms there has always been concerns about the ethical issues that may arise from the use of this modern technology. While achieving high accuracies, …


Using Big Data Analytics To Optimize Practical Large Databases, Po-Chun Lu Jul 2021

Using Big Data Analytics To Optimize Practical Large Databases, Po-Chun Lu

Master of Science in Computer Science Theses

Big data analytics is gaining popularity for enterprises in optimizing their business processes ranging from retailers, supply chains, to online shopping stores. Existing practical raw data are far from usable to achieve the goal. Therefore, a good data pre-processing approach is required and is a key step to success. We propose to research on the effectiveness of data pre-processing and the business process based on a real world database. Our methodology involves natural language processing. Our key goal is to study appropriate methods with big data analysis techniques that can handle errors, ambiguity, and repeated descriptions caused by human languages. …


A Predictive Model For Diabetes Using Machine Learning Techniques (A Case Studyof Some Selected Hospitals In Kaduna Metropolis), A E. Evwiekpaefe, Nafisat Abdulkadir Jan 2021

A Predictive Model For Diabetes Using Machine Learning Techniques (A Case Studyof Some Selected Hospitals In Kaduna Metropolis), A E. Evwiekpaefe, Nafisat Abdulkadir

Master of Science in Computer Science Theses

Diabetes Mellitus (DM) which refers to a metabolic disorder that occurs when the level of blood sugar in the body is considered high, which could be a resulting effect of inadequate availability of insulin in the body. It is a chronic disease which may lead to myriads of complications in the body system. Statistics by the World Health Organization (WHO) in 2013, indicated that DM was the cause of death of over 1.5 million people around the world and in 2016, 8.5% of adults within age seventeen (17) and above were reported to be diabetic and diabetic patients have continued …


A Federated Deep Autoencoder For Detecting Iot Cyber Attacks, Christopher M. Regan Dec 2020

A Federated Deep Autoencoder For Detecting Iot Cyber Attacks, Christopher M. Regan

Master of Science in Computer Science Theses

Internet of Things (IoT) devices are mass-produced and rapidly released to the public in a rough state. IoT devices are produced by various companies satisfying various goals, such as monitoring the environment, senor trigger cameras, on-demand electrical switches. These IoT devices are produced by companies to meet a market demand quickly, producing a rough software solution that customers or other enterprises willingly buy with the expectation they will have software updates after production. These IoT devices are often heterogeneous in nature, only to receive updates at infrequently intervals, and can remain out of sight on a home or office network …


Classifying Imbalanced Financial Fraud Data Utilizing Enhanced Random Forest Algorithm, Charles Gardner Dec 2020

Classifying Imbalanced Financial Fraud Data Utilizing Enhanced Random Forest Algorithm, Charles Gardner

Master of Science in Computer Science Theses

Imbalanced datasets have been a unique challenge for machine learning, requiring specialized approaches to correctly classify the minority class. Financial fraud detection involves using highly imbalanced datasets with a class imbalance of up to .01% frauds to 99.99% regular transactions. It is essential to identify all frauds in financial fraud detection, even if some classifications' precision is low. I developed a random forest assembly that separates fraudulent transactions into tiers of precision. With this approach, 96% of fraudulent transactions are identified, showing an 8% increase in recall when compared to standard approaches. 59% of fraud classifications' precision increases by 10% …


Data Mining And Image Classification Using Genetic Programming, Mahsa Shokri Varniab Jul 2020

Data Mining And Image Classification Using Genetic Programming, Mahsa Shokri Varniab

Master of Science in Computer Science Theses

Genetic programming (GP), a capable machine learning and search method, motivated by Darwinian-evolution, is an evolutionary learning algorithm which automatically evolves computer programs in the form of trees to solve problems. This thesis studies the application of GP for data mining and image processing. Knowledge discovery and data mining have been widely used in business, healthcare, and scientific fields. In data mining, classification is supervised learning that identifies new patterns and maps the data to predefined targets. A GP based classifier is developed in order to perform these mappings. GP has been investigated in a series of studies to classify …


Deep Learning For Identifying Lung Diseases, Lin Wang Jul 2020

Deep Learning For Identifying Lung Diseases, Lin Wang

Master of Science in Computer Science Theses

Growing health problems, such as lung diseases, especially for children and the elderly, require better diagnostic methods, such as computer-based solutions, and it is crucial to detect and treat these problems early. The purpose of this article is to design and implement a new computer vision-based algorithm based on lung disease diagnosis, which has better performance in lung disease recognition than previous models to reduce lung-related health problems and costs . In addition, we have improved the accuracy of the five lung diseases detection, which helps doctors and doctors use computers to solve this problem at an early stage.


Deep Learning For Identifying Breast Cancer, Yihong Li Jul 2020

Deep Learning For Identifying Breast Cancer, Yihong Li

Master of Science in Computer Science Theses

Medical images are playing an increasingly important role in the prevention and diagnosis of diseases. Medical images often contain massive amounts of data. Professional interpretation usually requires a long time of professional study and experience accumulation by doctors. Therefore, the use of super storage and computing power in deep learning as a basis can effectively process a large amount of medical data. Breast cancer brings great harm to female patients, and early diagnosis is the most effective prevention and treatment method, so this project will create a new optimized breast cancer auxiliary diagnosis model based on ResNet. Analyze and process, …


Graphical Representation Of Text Semantics, Karl Kevin Tiba Fossoh May 2020

Graphical Representation Of Text Semantics, Karl Kevin Tiba Fossoh

Master of Science in Computer Science Theses

A text is a set of words conveying a particular semantic based on their order, representation and structure. Those elements can be associated through a different set of interpretations, based on frequency and proportionality. The problem with context is that numbers do not help understand the semantics and fall short to convey the message of the text. The graphical representation of text semantics focuses on the conversion of text to images. Contrarily to word clouds that simply produce frequency mapping of words within the text and topic models that essentially give context to word frequencies and proportionalities, images keep intact …


Superb: Superior Behavior-Based Anomaly Detection Defining Authorized Users' Traffic Patterns, Daniel Karasek May 2020

Superb: Superior Behavior-Based Anomaly Detection Defining Authorized Users' Traffic Patterns, Daniel Karasek

Master of Science in Computer Science Theses

Network anomalies are correlated to activities that deviate from regular behavior patterns in a network, and they are undetectable until their actions are defined as malicious. Current work in network anomaly detection includes network-based and host-based intrusion detection systems. However, network anomaly detection schemes can suffer from high false detection rates due to the base rate fallacy. When the detection rate is less than the false positive rate, which is found in network anomaly detection schemes working with live data, a high false detection rate can occur. To overcome such a drawback, this paper proposes a superior behavior-based anomaly detection …


Fast Clustering Using A Grid-Based Underlying Density Function Approximation, Daniel Brown Apr 2020

Fast Clustering Using A Grid-Based Underlying Density Function Approximation, Daniel Brown

Master of Science in Computer Science Theses

Clustering is an unsupervised machine learning task that seeks to partition a set of data into smaller groupings, referred to as “clusters”, where items within the same cluster are somehow alike, while differing from those in other clusters. There are many different algorithms for clustering, but many of them are overly complex and scale poorly with larger data sets. In this paper, a new algorithm for clustering is proposed to solve some of these issues. Density-based clustering algorithms use a concept called the “underlying density function”, which is a conceptual higher-dimension function that describes the possible results from the continuous …


Finding A Viable Neural Network Architecture For Use With Upper Limb Prosthetics, Maxwell Lavin Dec 2019

Finding A Viable Neural Network Architecture For Use With Upper Limb Prosthetics, Maxwell Lavin

Master of Science in Computer Science Theses

This paper attempts to answer the question of if it’s possible to produce a simple, quick, and accurate neural network for the use in upper-limb prosthetics. Through the implementation of convolutional and artificial neural networks and feature extraction on electromyographic data different possible architectures are examined with regards to processing time, complexity, and accuracy. It is found that the most accurate architecture is a multi-entry categorical cross entropy convolutional neural network with 100% accuracy. The issue is that it is also the slowest method requiring 9 minutes to run. The next best method found was a single-entry binary cross entropy …


Development Of Spatiotemporal Congestion Pattern Observation Model Using Historical And Near Real Time Data, Betty Kretlow Oct 2019

Development Of Spatiotemporal Congestion Pattern Observation Model Using Historical And Near Real Time Data, Betty Kretlow

Master of Science in Computer Science Theses

Traffic congestion is not foreign to major metropolitan areas. Congestion in large cities often is associated with dense land developments and continued economic growth. In general, congestion can be classified into two categories: recurring and nonrecurring. Recurring congestion often occurs at certain parts of highway networks, referred to as bottleneck locations. Nonrecurring congestion, on the other hand, can be caused by different reasons, including work zones, special events, accidents, inclement weather, poor signal timing, etc. The work presented here demonstrates an approach to effectively identifying spatiotemporal patterns of traffic congestion at a network level. The Metro Atlanta highway network was …


Texture-Based Deep Neural Network For Histopathology Cancer Whole Slide Image (Wsi) Classification, Nelson Zange Tsaku Aug 2019

Texture-Based Deep Neural Network For Histopathology Cancer Whole Slide Image (Wsi) Classification, Nelson Zange Tsaku

Master of Science in Computer Science Theses

Automatic histopathological Whole Slide Image (WSI) analysis for cancer classification has been highlighted along with the advancements in microscopic imaging techniques. However, manual examination and diagnosis with WSIs is time-consuming and tiresome. Recently, deep convolutional neural networks have succeeded in histopathological image analysis. In this paper, we propose a novel cancer texture-based deep neural network (CAT-Net) that learns scalable texture features from histopathological WSIs. The innovation of CAT-Net is twofold: (1) capturing invariant spatial patterns by dilated convolutional layers and (2) Reducing model complexity while improving performance. Moreover, CAT-Net can provide discriminative texture patterns formed on cancerous regions of histopathological …


Static Analysis Of Android Secure Application Development Process With Findsecuritybugs, Xianyong Meng Nov 2018

Static Analysis Of Android Secure Application Development Process With Findsecuritybugs, Xianyong Meng

Master of Science in Computer Science Theses

Mobile devices have been growing more and more powerful in recent decades, evolving from a simple device for SMS messages and phone calls to a smart device that can install third party apps. People are becoming more heavily reliant on their mobile devices. Due to this increase in usage, security threats to mobile applications are also growing explosively. Mobile app flaws and security defects can provide opportunities for hackers to break into them and access sensitive information. Defensive coding needs to be an integral part of coding practices to improve the security of our code.

We need to consider data …


Virtual Reality As Navigation Tool: Creating Interactive Environments For Individuals With Visual Impairments, Nick Murphy Nov 2018

Virtual Reality As Navigation Tool: Creating Interactive Environments For Individuals With Visual Impairments, Nick Murphy

Master of Science in Computer Science Theses

Research into the creation of assistive technologies is increasingly incorporating the use of virtual reality experiments. One area of application is as an orientation and mobility assistance tool for people with visual impairments. Some of the challenges are developing useful knowledge of the user’s surroundings and effectively conveying that information to the user. This thesis examines the feasibility of using virtual environments conveyed via auditory feedback as part of an autonomous mobility assistance system. Two separate experiments were conducted to study key aspects of a potential system: navigation assistance and map generation. The results of this research include mesh models …


Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie Nov 2018

Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie

Master of Science in Computer Science Theses

The evolution of machine learning and computer vision in technology has driven a lot of

improvements and innovation into several domains. We see it being applied for credit decisions, insurance quotes, malware detection, fraud detection, email composition, and any other area having enough information to allow the machine to learn patterns. Over the years the number of sensors, cameras, and cognitive pieces of equipment placed in the wilderness has been growing exponentially. However, the resources (human) to leverage these data into something meaningful are not improving at the same rate. For instance, a team of scientist volunteers took 8.4 years, …


Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli Oct 2018

Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli

Master of Science in Computer Science Theses

With the recent advances in the power grid system connecting to the internet, data sharing, and networking enables space for hackers to maliciously attack them based on their vulnerabilities. Vital stations in the smart grid are the generation, transmission, distribution, and customer substations are connected and controlled remotely by the network. Every substation is controlled by a Supervisory Control and Data Acquisition (SCADA) system which communicates on DNP3 protocol on Internet/IP which has many security vulnerabilities. This research will focus on Distributed Network Protocol (DNP3) communication which is used in the smart grid to communicate between the controller devices. We …


Improvement Of Decision On Coding Unit Split Mode And Intra-Picture Prediction By Machine Learning, Wenchan Jiang Aug 2018

Improvement Of Decision On Coding Unit Split Mode And Intra-Picture Prediction By Machine Learning, Wenchan Jiang

Master of Science in Computer Science Theses

High efficiency Video Coding (HEVC) has been deemed as the newest video coding standard of the ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group. The reference software (i.e., HM) have included the implementations of the guidelines in appliance with the new standard. The software includes both encoder and decoder functionality.

Machine learning (ML) works with data and processes it to discover patterns that can be later used to analyze new trends. ML can play a key role in a wide range of critical applications, such as data mining, natural language processing, image recognition, and expert systems. …


Malware Image Classification Using Machine Learning With Local Binary Pattern, Jhu-Sin Luo, Dan Lo May 2018

Malware Image Classification Using Machine Learning With Local Binary Pattern, Jhu-Sin Luo, Dan Lo

Master of Science in Computer Science Theses

Malware classification is a critical part in the cybersecurity.

Traditional methodologies for the malware classification

typically use static analysis and dynamic analysis to identify malware.

In this paper, a malware classification methodology based

on its binary image and extracting local binary pattern (LBP)

features are proposed. First, malware images are reorganized into

3 by 3 grids which is mainly used to extract LBP feature. Second,

the LBP is implemented on the malware images to extract features

in that it is useful in pattern or texture classification. Finally,

Tensorflow, a library for machine learning, is applied to classify

malware images with …


A Multiple Classifier System For Predicting Best-Selling Amazon Products, Michael Kranzlein May 2018

A Multiple Classifier System For Predicting Best-Selling Amazon Products, Michael Kranzlein

Master of Science in Computer Science Theses

In this work, I examine a dataset of Amazon product metadata and propose a heterogeneous multiple classifier system for the task of identifying best-selling products in multiple categories. This system of classifiers consumes the product description and the featured product image as input and feeds them through binary classifiers of the following types: Convolutional Neural Network, Na¨ıve Bayes, Random Forest, Ridge Regression, and Support Vector Machine. While each individual model is largely successful in identifying best-selling products from non best-selling products and from worst-selling products, the multiple classifier system is shown to be stronger than any individual model in the …


Improving The Prediction Accuracy Of Text Data And Attribute Data Mining With Data Preprocessing, Priyanga Chandrasekar Dec 2016

Improving The Prediction Accuracy Of Text Data And Attribute Data Mining With Data Preprocessing, Priyanga Chandrasekar

Master of Science in Computer Science Theses

Data Mining is the extraction of valuable information from the patterns of data and turning it into useful knowledge. Data preprocessing is an important step in the data mining process. The quality of the data affects the result and accuracy of the data mining results. Hence, Data preprocessing becomes one of the critical steps in a data mining process.

In the research of text mining, document classification is a growing field. Even though we have many existing classifying approaches, Naïve Bayes Classifier is good at classification because of its simplicity and effectiveness. The aim of this paper is to identify …


Definition Of A Method For The Formulation Of Problems To Be Solved With High Performance Computing, Ramya Peruri Aug 2016

Definition Of A Method For The Formulation Of Problems To Be Solved With High Performance Computing, Ramya Peruri

Master of Science in Computer Science Theses

Computational power made available by current technology has been continuously increasing, however today’s problems are larger and more complex and demand even more computational power. Interest in computational problems has also been increasing and is an important research area in computer science. These complex problems are solved with computational models that use an underlying mathematical model and are solved using computer resources, simulation, and are run with High Performance Computing. For such computations, parallel computing has been employed to achieve high performance. This thesis identifies families of problems that can best be solved using modelling and implementation techniques of parallel …


Color Image Segmentation Using The Bee Algorithm In The Markovian Framework, Vehbi Dragaj Jul 2016

Color Image Segmentation Using The Bee Algorithm In The Markovian Framework, Vehbi Dragaj

Master of Science in Computer Science Theses

This thesis presents color image segmentation as a vital step of image analysis in computer vision. A survey of the Markov Random Field (MRF) with four different implementation methods for its parameter estimation is provided. In addition, a survey of swarm intelligence and a number of swarm based algorithms are presented. The MRF model is used for color image segmentation in the framework. This thesis introduces a new image segmentation implementation that uses the bee algorithm as an optimization tool in the Markovian framework. The experiments show that the new proposed method performs faster than the existing implementation methods with …


Towards Understanding And Developing Virtual Environments To Increase Accessibilities For People With Visual Impairments, Miao Dong Jul 2016

Towards Understanding And Developing Virtual Environments To Increase Accessibilities For People With Visual Impairments, Miao Dong

Master of Science in Computer Science Theses

The primary goal of this research is to investigate the possibilities of utilizing audio feedback to support effective Human-Computer Interaction Virtual Environments (VEs) without visual feedback for people with Visual Impairments. Efforts have been made to apply virtual reality (VR) technology for training and educational applications for diverse population groups, such as children and stroke patients. Those applications had already shown effects of increasing motivations, providing safer training environments and more training opportunities. However, they are all based on visual feedback. With the head related transfer functions (HRTFs), it is possible to design and develop considerably safer, but diversified training …


Internet Of Things-Based Smart Classroom Environment, Amir R. Atabekov May 2016

Internet Of Things-Based Smart Classroom Environment, Amir R. Atabekov

Master of Science in Computer Science Theses

Internet of Things (IoT) is a novel paradigm that is gaining ground in the Computer Science field. There’s no doubt that IoT will make our lives easier with the advent of smart thermostats, medical wearable devices, connected vending machines and others. One important research direction in IoT is Resource Management Systems (RMS). In the current state of RMS research, very few studies were able to take advantage of indoor localization which can be very valuable, especially in the context of smart classrooms. For example, indoor localization can be used to dynamically generate seat map of students in a classroom. Indoor …