Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 41

Full-Text Articles in Physical Sciences and Mathematics

Towards Energy-Efficient Edge Computing For Tiny Ai Applications, Vamsi Krishna Bhagavathula Jan 2024

Towards Energy-Efficient Edge Computing For Tiny Ai Applications, Vamsi Krishna Bhagavathula

Theses and Dissertations

As artificial intelligence (AI) applications become more common on the edge of networks, like Raspberry Pi servers, it is crucial to optimize their energy use. This research project investigates how AI algorithms affect energy efficiency and resource usage on Raspberry Pi servers. Two models were created: one predicts resource usage, and the other predicts power consumption of AI algorithms on Raspberry Pi. Several factors are considered like CPU and memory use, algorithm speed, dataset size, and types of algorithms and datasets. Using regression-based methods, we model how these factors affect energy use. By converting categorical factors into numerical ones, we …


Docker Technology For Small Scenario-Based Excercises In Cybersecurity, Zeinab Ahmed Oct 2023

Docker Technology For Small Scenario-Based Excercises In Cybersecurity, Zeinab Ahmed

Theses and Dissertations

This study aims to better prepare students for cybersecurity roles by providing practical tools that bridge the gap between theory and real-world applications. We investigate the role of small scenario-based exercises for students’ understanding of cybersecurity concepts. In particular, we assess the use of Docker technology to deliver training that includes a simple small scenario on html code injection. The effectiveness of scenario-based learning has long been defined and by using SBL, we are going to create hands-on activity that involves the fundamental topics in cybersecurity using Docker technology, allowing students to see the exploitation of the vulnerabilities and defense …


Smart Homes And You: Iot Device Data Risks In An Ever-Changing World, Autumn Person Oct 2023

Smart Homes And You: Iot Device Data Risks In An Ever-Changing World, Autumn Person

Theses and Dissertations

Social media applications are increasingly seen as a national security threat and a cause for concern because they can be used to create user profiles on government personnel and on US citizens. These profiles could be used for big data and artificial intelligence purposes of interest to foreign governments. With the rise of big data and AI being used, foreign governments could use this data for a variety of purposes that can affect normal everyday citizens, not just high value personnel. IoT (Internet of Things) devices that the population uses everyday can also pose the same threat. These devices can …


Proactive Management In Academic Libraries: Promoting Improved Communication And Inclusion Of Academic Librarians And Archivists In Cybersecurity Policy Creation, Paul J. Luft Dec 2020

Proactive Management In Academic Libraries: Promoting Improved Communication And Inclusion Of Academic Librarians And Archivists In Cybersecurity Policy Creation, Paul J. Luft

Theses and Dissertations

Although increasing cybersecurity threats continue in libraries, not many studies are available which examine surrounding cybersecurity policies. Even less has been done on specific types of libraries such as academic and archives. When it comes to academic libraries, cybersecurity policies take a top-down approach to managing and creating policies. The problem is that both academic libraries and archives are unique areas within a university setting. Some of the general policies do not always handle specific issues dealt with in an academic library or archives. This paper investigates if an actual gap or void in policy exists which could create issues …


In-Depth Analysis Of College Students’ Data Privacy Awareness, Vernon D. Andrews Dec 2020

In-Depth Analysis Of College Students’ Data Privacy Awareness, Vernon D. Andrews

Theses and Dissertations

While attending university, college students need to be aware of issues related to data privacy. Regardless of the age, gender, race, or education level of college students, every student can relate to the advancement of the internet within the last decades. The internet has completely transformed the way the world receives and stores messages. Positively, the internet allows messages to be sent across the globe within the fraction of a second and provides students with access to potentially unlimited information on a variety of subjects. On the downside, there are issues on the internet that can cause more harm than …


Improving Energy-Efficiency Through Smart Data Placement In Hadoop Clusters, Ahmed Mostafa May 2020

Improving Energy-Efficiency Through Smart Data Placement In Hadoop Clusters, Ahmed Mostafa

Theses and Dissertations

Hadoop, a pioneering open source framework, has revolutionized the big data world because of its ability to process vast amounts of unstructured and semi-structured data. This ability makes Hadoop the ‘go-to’ technology for many industries that generate big data, thus it also aids in being cost effective, unlike other legacy systems. Hadoop MapReduce is used in large scale data parallel applications to process massive amounts of data across a cluster and is used for scheduling, processing, and executing jobs. Basically, MapReduce is the right hand of Hadoop, as its library is needed to process these large data sets. In this …


Data Gathering In Cognitive Radio Ad Hoc And Sensor Wireless Networks, Kimberly A. Brown May 2019

Data Gathering In Cognitive Radio Ad Hoc And Sensor Wireless Networks, Kimberly A. Brown

Theses and Dissertations

Data gathering is a network communication task in which all of the network’s nodes send their individual messages to a distinguished sink node. In cognitive radio ad hoc and sensor wireless networks (CR-AHSWNs), unlicensed secondary users (SUs) opportunistically use channels when the licensed primary users are not using them. Therefore, the channels available to each SU vary with time and location, which makes the development of data gathering algorithms for CR-AHSWNs challenging. In this thesis, a data gathering protocol for CR-AHSWNs is proposed. The protocol consists of several distributed SU action selection and channel selection algorithms. An algorithm that can …


Conversational Agent: Developing A Model For Intelligent Agents With Transient Emotional States, Angie Dowdell Mar 2019

Conversational Agent: Developing A Model For Intelligent Agents With Transient Emotional States, Angie Dowdell

Theses and Dissertations

The inclusion of human characteristics (i.e., emotions, personality) within an intelligent agent can often increase the effectiveness of information delivery and retrieval. Chat-bots offer a plethora of benefits within an eclectic range of disciplines (e.g., education, medicine, clinical and mental health). Hence, chatbots offer an effective way to observe, assess, and evaluate human communication patterns. Current research aims to develop a computational model for conversational agents with an emotional component to be applied to the army leadership training program that will allow for the examination of interpersonal skills in future research. Overall, the current research explores the application of the …


Adapting Financial Technology Standards To Blockchain Platforms, Gabriel Bello Jan 2019

Adapting Financial Technology Standards To Blockchain Platforms, Gabriel Bello

Theses and Dissertations

Traditional payment systems have standards designed to keep transaction data secure, but blockchain systems are not in scope for such security standards. We compare the Payment Application Data Security Standard’s (PA-DSS) applicability towards transaction-supported blockchain platforms to test the standard’s applicability. By highlighting the differences in implementation on traditional and decentralized transaction platforms, we critique and adapt the standards to fit the decentralized model. In two case studies, we analyze the QTUM and Ethereum blockchain platforms’ industry compliance, as their payment platforms support transactions equivalent to that of applications governed by the PA-DSS. We determine QTUM’s and Ethereum’s capabilities to …


Automated Essay Evaluation Using Natural Language Processing And Machine Learning, Harshanthi Ghanta Jan 2019

Automated Essay Evaluation Using Natural Language Processing And Machine Learning, Harshanthi Ghanta

Theses and Dissertations

The goal of automated essay evaluation is to assign grades to essays and provide feedback using computers. Automated evaluation is increasingly being used in classrooms and online exams. The aim of this project is to develop machine learning models for performing automated essay scoring and evaluate their performance. In this research, a publicly available essay data set was used to train and test the efficacy of the adopted techniques. Natural language processing techniques were used to extract features from essays in the dataset. Three different existing machine learning algorithms were used on the chosen dataset. The data was divided into …


Design And Evaluation Of A Wearable System For Facial Privacy, Scott Griffith Jan 2019

Design And Evaluation Of A Wearable System For Facial Privacy, Scott Griffith

Theses and Dissertations

Through the increasingly common use of devices that provide ubiquitous sensor data such as wearables, mobile phones, and Internet-connected devices of the sort, privacy challenges are becoming even more significant. One major challenge that requires more focus is bystanders' privacy, as there are too few solutions that solve the issue. Of the solutions available, many of them do not give bystanders a choice in how their private data is used, Bystanders' privacy has become an afterthought when it comes to data capture in the forms of photographs, videos, voice recordings, etc. and continues to remain that way. This thesis provides …


Curtus: An Nlp Tool To Map Job Skills To Academic Courses, Daniel Rockwell Jan 2019

Curtus: An Nlp Tool To Map Job Skills To Academic Courses, Daniel Rockwell

Theses and Dissertations

Many businesses are burdened with the need to train students for the job instead of finding them prepared for it. Few business leaders feel that colleges prepare students for future jobs from day one. It can be a challenge for colleges to determine if their curricula meet the industry needs. Mapping industry needs to academic courses can be advantageous to both parties as it will allow colleges to be aligned with the industry needs and accordingly satisfy those needs and will allow the industry to hire better prepared graduates. In an attempt to address this, a system prototype that uses …


Al Planning Assistant For Scheduling Daily Activities, Priyanka Ahuja May 2018

Al Planning Assistant For Scheduling Daily Activities, Priyanka Ahuja

Theses and Dissertations

Artificial conversational agents are software agents that can interact with humans in the way humans do. Siri Cortana, and Alexa are examples of intelligent agents that can help us with almost all the basic tasks. These agents are smart enough to do the basic tasks, but not as much when it comes to complex tasks, such as analyzing traffic data, reviewing scheduling conflicts, rescheduling meetings while resolving conflicts, and offering suggestions based upon data analyses (e.g. traffic patterns, weather, etc.) The actual potential of dialogue-based task agent potential remains untapped. The reason is the fact agents lack the ability to …


Stress Levels Of Cs1 Students During Programming- Measurement And A Cause And Effect Analysis, Gopi Satya Sainadh Raju Sarikonda May 2018

Stress Levels Of Cs1 Students During Programming- Measurement And A Cause And Effect Analysis, Gopi Satya Sainadh Raju Sarikonda

Theses and Dissertations

Stress is a kind of feeling we experience when we are under pressure. Stress is the word that we use when we feel that we are overloaded mentally in our thoughts and wonder whether we can cope with those placed upon us. The effects of stress are different for different people when we take their age, profession, gender and other aspects into consideration. Many studies show that stress in a learning environment impacts learning negatively. In this thesis, the role of stress on students in an introductory programming course (CS1) at CSU has been explored. Introductory programming course has a …


A Trivium-Inspired Pseudorandom Number Generator With A Statistical Comparison To The Randomness Of Securerandom And Trivium, Latoya Niesha Jackson May 2017

A Trivium-Inspired Pseudorandom Number Generator With A Statistical Comparison To The Randomness Of Securerandom And Trivium, Latoya Niesha Jackson

Theses and Dissertations

A pseudorandom number generator (PRNG) is an algorithm that produces a sequence of numbers which emulates the characteristics of a random sequence. In comparison to its genuine counterpart, PRNGs are considered more suitable for computing devices in that they do not consume a lot of resources (in terms of memory) and their portability; they can also be used on a wide range of devices. Cryptographically Secure PRNGs (CSPRNGs) are the only type of PRNGs suitable for cryptographic applications. They are specially designed to withstand security attacks. In this thesis, we provide descriptions of two CSPRNGs: Trivium, a hardware-based stream cipher …


Evaluating A Personal Stress Monitoring System, Sneha Gogineni May 2017

Evaluating A Personal Stress Monitoring System, Sneha Gogineni

Theses and Dissertations

Now-a-days, Life is generally much more stressful than in the past. "Stress" is the word that we use when we feel that we are overloaded mentally in our thoughts and wonder whether we can really cope with those placed upon us. Sometimes, stress gets us going and they are good for us but at other times, it could be the cause to undermine both our mental and physical health. The way we respond to a challenge can be considered as a kind of stress. Part of our response to a challenge is physiological and affects our own physical state. When …


A Comparative Study Of Cognitive Systems For Learning, Praneetha Mandava May 2017

A Comparative Study Of Cognitive Systems For Learning, Praneetha Mandava

Theses and Dissertations

Learning is the modification of a behavioral tendency by experience. Memory and reasoning are the most important aspects for learning in humans; information is temporarily stored in the short-term memory and processed, compared with existing memories and stored in long-term memory, and can be re-used when needed. One way to describe an organized pattern of thought or behavior and the categories of information along with their relationships is by using schemas. A cognitive script is one form of a schema that evolves over multiple exposures to the same set of stimuli and/or repeated enactment of a particular behavior. This research …


Using Self-Organizing Maps For Computer Network Intrusion Detection, Manuel R. Parrachavez Jan 2017

Using Self-Organizing Maps For Computer Network Intrusion Detection, Manuel R. Parrachavez

Theses and Dissertations

Anomaly detection in user access patterns using artificial neural networks is a novel way of combating the ever-present concern of computer network intrusion detection for many entities around the world. Anomaly detection is a technique in network security in which a profile is built around a user's normal daily actions. The data collected for these profiles can be as following: file access attempts; failed login attempts; file creations; file access failures; and countless others. This data is collected and used as training data for a neural network. There are many types of neural networks, such as multi-layer feed-forward network; recurrent …


Addsmart: Address Digitization And Smart Mailbox With Rfid Technology, Jonathon Ross Tew Aug 2016

Addsmart: Address Digitization And Smart Mailbox With Rfid Technology, Jonathon Ross Tew

Theses and Dissertations

ADDSMART is a research project focused on digitizing addresses of locations and building a smart mailbox by combining wireless sensors, cameras, locks, and RFID readers and tags into a system controlled by an Arduino board. The aim of the project is to explore the idea of address digitization (using RFID tags to store addresses) and incorporate it into a mailbox that can communicate wirelessly with the homeowner to provide mail status updates and home security footage through digital photographs. This paper demonstrates the proposed ideas, describes the design of a smart mailbox, the technology that has been used, and the …


A Step Towards An Intelligent Digital Training Management System (I-Dtms), Andrew Dugger Jul 2016

A Step Towards An Intelligent Digital Training Management System (I-Dtms), Andrew Dugger

Theses and Dissertations

The U.S. Army Digital Training Management System (DTMS) is a web-based system designed to create a single point of entry for units to schedule unit training, manage training resources, and create schedules and master calendars for training. Currently, the U.S. Army uses DTMS to manage unit training and help commanders at each step of the training management process from planning and preparing to execute and assessing the training plans. This research aims to add intelligent features to DTMS through augmenting it with an intelligent decision support system (ITPSS) that utilizes artificial intelligence techniques (case-based reasoning, in particular) to determine if …


Application Of Computer Modeling And Simulation Techniques For Optimization Of Factory Floor Operations In Small To Medium- Sized Businesses, Brian P. Romano Jun 2016

Application Of Computer Modeling And Simulation Techniques For Optimization Of Factory Floor Operations In Small To Medium- Sized Businesses, Brian P. Romano

Theses and Dissertations

The rationale and motive for this thesis was to prove that no matter the size of a company and its particular value stream, the application of applied computer science principles with a reliance on computer modeling and simulation onto the factory floor process improves efficiencies and throughput through the reduction of downtime and/or process waiting. This thesis research specifically emphasized small businesses of between $2 and $20 million and was purposely limited to factory floor production processes and utilized standardized applied computer science techniques including simulation and modeling, microprocessor based factory floor intelligence devices. The results of this applied technology …


Fuzzy Decision Tree-Based Inference System For Liver Disease Diagnosis, Himaja Sivaraju Jan 2016

Fuzzy Decision Tree-Based Inference System For Liver Disease Diagnosis, Himaja Sivaraju

Theses and Dissertations

Medical diagnosis can be challenging because of a number of factors. Uncertainty in the diagnosis process arises from inaccuracy in the measurement of patient attributes, missing attribute data and limitation in the medical expert’s ability to define cause and effect relationships when there are multiple interrelated variables. Given this situation, a decision support system, which can help doctors come up with a more reliable diagnosis, can have a lot of potential. Decision trees are used in data mining for classification and regression. They are simple to understand and interpret as they can be visualized. But, one of the disadvantages of …


An Investigation Of Complex Systems In 16 Dimensions, Jordon M. Huffman Jan 2014

An Investigation Of Complex Systems In 16 Dimensions, Jordon M. Huffman

Theses and Dissertations

Sir Isaac Newton studied the world around him. He observed unexplainable phenomena that the math of his time could not prove. With the help of Gottfried Leibniz, he created infinitesimal calculus to prove his theories. The new concepts he created revolutionized science, and opened new realms of science previously unthought of. In 2002, Dr. Stephen Wolfram published A New Kind of Science, He argues that the processes of understanding cellular automata can be applied to other aspects of science. Dr. Rodrigo Obando of Columbus State University took Dr. Wolfram's work and dissected it. By breaking down the rules, he started …


Cmsvega: A Content Management System For The Layman, Roshan P.J. Nedumpurath Jan 2014

Cmsvega: A Content Management System For The Layman, Roshan P.J. Nedumpurath

Theses and Dissertations

Content management systems are becoming increasingly convoluted to use. Existing website creation systems require users without programming knowledge to scour documentation. A CMS should be intuitive, something a user can pick up and use right away. Simplicity is key when targeting layman users who have no web development knowledge. This project aims to create a simple and intuitive content management system, CMSVega, which users can pick up and use with minimal web development knowledge. A blind study was conducted to compare CMSVega against popular Wordpress, Drupal and Joomla systems. After having recreated a webpage using each CMS, participants were asked …


Detecting Student Dropouts Using Fuzzy Inferencing, Shahriar Husainy May 2013

Detecting Student Dropouts Using Fuzzy Inferencing, Shahriar Husainy

Theses and Dissertations

Fuzzy logic provides a methodology for reasoning using imprecise rules and assertions. Fuzzy inference is the process of formulating the mapping from a given input to an output using fuzzy logic. The mapping then provides a basis from which decisions can be made, or patterns discerned. This study concerns the development of a Fuzzy Inference System (FIS) for identifying likely student dropouts at Columbus State University (CSU). The fuzzy inference based model uses a hybrid knowledge extraction process to predict how likely each freshman student will be to drop their program of study at the end of their first semester. …


Developing A Mobile-Commerce Financial Transaction Processing Model, Edward Nathaniel Thomas Charles Williams Jr. May 2013

Developing A Mobile-Commerce Financial Transaction Processing Model, Edward Nathaniel Thomas Charles Williams Jr.

Theses and Dissertations

The topic for this Master’s Thesis is selected in compliance with the guidelines to complete a Master of Science in Applied Computer Science at Columbus State University. The problem to be addressed by this thesis is to produce an open standard for an m-commerce financial transaction processing system based on current e-commerce standards and mobile technology. This solution was to be specifically designed to build upon the strengths of a mobile platform using current smartphone and tablet technology.

An open source software stack in combination with a cloud computing solution was used to create a working example of the specification. …


An Investigation Into A Hybrid Genetic Programming And Ant Colony Optimization Method For Credit Scoring, Rojin Aliehyaei Jan 2012

An Investigation Into A Hybrid Genetic Programming And Ant Colony Optimization Method For Credit Scoring, Rojin Aliehyaei

Theses and Dissertations

This thesis proposes and investigates a new hybrid technique based on Genetic Programming (GP) and Ant Colony Optimization (ACO) techniques for inducing data classification rules. The proposed hybrid approach aims to improve on the accuracy of data classification rules produced by the original GP technique, which uses randomly generated initial populations. This hybrid technique relies on the ACO technique to produce the initial populations for the GP technique. To evaluate and compare their effectiveness in producing good data classification rules, GP, ACO, and hybrid techniques were implemented in the C programming language. The data classification rules were created and evaluated …


Advanced I/O Techniques For Efficient And Highly Available Process Crash Recovery Protocols, Jason Cornwell Mar 2011

Advanced I/O Techniques For Efficient And Highly Available Process Crash Recovery Protocols, Jason Cornwell

Theses and Dissertations

As the number of CPU cores in high-performance computing platforms continues to grow, the availability and reliability of these systems become a primary concern. As such, some solutions are physical (ie. power backup) and some are software driven. Lawrence Berkeley National Laboratory has created a system-level fault-tolerant checkpoint/restart implementation for Linux Clusters. This allows processes to restart computations at the last known checkpoint in the event the system crashes. The checkpoint data creation is highly dependent on system input and output operations. This paper proposes: (i) a technique to improve the efficiency of these I/O operations and (ii) an alternative …


Windows Azure: Using Windows Azure's Service Bus To Solve Data Security Issues, Don Chambers Aug 2010

Windows Azure: Using Windows Azure's Service Bus To Solve Data Security Issues, Don Chambers

Theses and Dissertations

Many of the largest technology companies are heavily investing in Cloud Computing technology, making this a major force in the realm of software development. However, this software paradigm brings with it significantdata related security issues. This paper discusses some of these security issues and presents a solution. The solution calls for storing data outside of the cloud, and under the control of the cloud consumer. In addition, the solution provides the ability to manipulate data using only the standard HTTP ports that are typically opened at most locations. This solution is implemented using Microsoft's Windows Azure Cloud Computing operating system. …


Implementing The Intelligent Mail Barcode In The N-Tiered Service Library Of A Print Mail Enterprise, Christopher E. Bunch May 2010

Implementing The Intelligent Mail Barcode In The N-Tiered Service Library Of A Print Mail Enterprise, Christopher E. Bunch

Theses and Dissertations

Starting in autumn, 2009, the Intelligent Mail Barcode fully replaced the PostNet barcode for the United States Postal Service. This barcode enables a sender of a mailpiece to track the mailpiece through the entire mail stream, as well as track any remit mail returned to the sender. This thesis explains how the Intelligent Mail Barcode was implemented in the n- tiered Windows Communication Foundation service architecture of the Emdeon, Inc. print-mail engine. To help provide a full understanding of the environment, this document, also, explains the operation of the print mail engine at Emdeon.