Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Computer Sciences

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 14970

Full-Text Articles in Physical Sciences and Mathematics

A Nlp Approach To Automating The Generation Of Surveys For Market Research, Anav Chug May 2024

A Nlp Approach To Automating The Generation Of Surveys For Market Research, Anav Chug

Honors College Theses

Market Research is vital but includes activities that are often laborious and time consuming. Survey questionnaires are one possible output of the process and market researchers spend a lot of time manually developing questions for focus groups. The proposed research aims to develop a software prototype that utilizes Natural Language Processing (NLP) to automate the process of generating survey questions for market research. The software uses a pre-trained Open AI language model to generate multiple choice survey questions based on a given product prompt, send it to a targeted email list, and also provides a real-time analysis of the responses …


Analysis And Numerical Simulation Of Tumor Growth Models, Daniel Acosta Soba May 2024

Analysis And Numerical Simulation Of Tumor Growth Models, Daniel Acosta Soba

Masters Theses and Doctoral Dissertations

In this dissertation we focus on the numerical analysis of tumor growth models. Due to the difficulty of developing physically meaningful approximations of such models, we divide the main problem into more simple pieces of work that are addressed in the different chapters. First, in Chapter 2 we present a new upwind discontinuous Galerkin (DG) scheme for the convective Cahn–Hilliard model with degenerate mobility which preserves the pointwise bounds and prevents non-physical spurious oscillations. These ideas are based on a well-suited piecewise constant approximation of convection equations. The proposed numerical scheme is contrasted with other approaches in several numerical experiments. …


Detection And Classification Of Diabetic Retinopathy Using Deep Learning Models, Aishat Olatunji May 2024

Detection And Classification Of Diabetic Retinopathy Using Deep Learning Models, Aishat Olatunji

Electronic Theses and Dissertations

Healthcare analytics leverages extensive patient data for data-driven decision-making, enhancing patient care and results. Diabetic Retinopathy (DR), a complication of diabetes, stems from damage to the retina’s blood vessels. It can affect both type 1 and type 2 diabetes patients. Ophthalmologists employ retinal images for accurate DR diagnosis and severity assessment. Early detection is crucial for preserving vision and minimizing risks. In this context, we utilized a Kaggle dataset containing patient retinal images, employing Python’s versatile tools. Our research focuses on DR detection using deep learning techniques. We used a publicly available dataset to apply our proposed neural network and …


Decentralized Unknown Building Exploration By Frontier Incentivization And Voronoi Segmentation In A Communication Restricted Domain, Huzeyfe M. Kocabas May 2024

Decentralized Unknown Building Exploration By Frontier Incentivization And Voronoi Segmentation In A Communication Restricted Domain, Huzeyfe M. Kocabas

All Graduate Theses and Dissertations, Fall 2023 to Present

Exploring unknown environments using multiple robots poses a complex challenge, particularly in situations where communication between robots is either impossible or limited. Existing exploration techniques exhibit research gaps due to unrealistic communication assumptions or the computational complexities associated with exploration strategies in unfamiliar domains. In our investigation of multi-robot exploration in unknown areas, we employed various exploration and coordination techniques, evaluating their performance in terms of robustness and efficiency across different levels of environmental complexity.

Our research is centered on optimizing the exploration process through strategic agent distribution. We initially address the challenge of city roadway coverage, aiming to minimize …


Detection Of Jamming Attacks In Vanets, Thomas Justice May 2024

Detection Of Jamming Attacks In Vanets, Thomas Justice

Undergraduate Honors Theses

A vehicular network is a type of communication network that enables vehicles to communicate with each other and the roadside infrastructure. The roadside infrastructure consists of fixed nodes such as roadside units (RSUs), traffic lights, road signs, toll booths, and so on. RSUs are devices equipped with communication capabilities that allow vehicles to obtain and share real-time information about traffic conditions, weather, road hazards, and other relevant information. These infrastructures assist in traffic management, emergency response, smart parking, autonomous driving, and public transportation to improve roadside safety, reduce traffic congestion, and enhance the overall driving experience. However, communication between the …


Achieving Responsible Anomaly Detection, Xiao Han May 2024

Achieving Responsible Anomaly Detection, Xiao Han

All Graduate Theses and Dissertations, Fall 2023 to Present

In the digital transformation era, safeguarding online systems against anomalies – unusual patterns indicating potential threats or malfunctions – has become crucial. This dissertation embarks on enhancing the accuracy, explainability, and ethical integrity of anomaly detection systems. By integrating advanced machine learning techniques, it improves anomaly detection performance and incorporates fairness and explainability at its core.

The research tackles performance enhancement in anomaly detection by leveraging few-shot learning, demonstrating how systems can effectively identify anomalies with minimal training data. This approach overcomes data scarcity challenges. Reinforcement learning is employed to iteratively refine models, enhancing decision-making processes. Transfer learning enables the …


Proof-Of-Concept For Converging Beam Small Animal Irradiator, Benjamin Insley May 2024

Proof-Of-Concept For Converging Beam Small Animal Irradiator, Benjamin Insley

Dissertations & Theses (Open Access)

The Monte Carlo particle simulator TOPAS, the multiphysics solver COMSOL., and

several analytical radiation transport methods were employed to perform an in-depth proof-ofconcept

for a high dose rate, high precision converging beam small animal irradiation platform.

In the first aim of this work, a novel carbon nanotube-based compact X-ray tube optimized for

high output and high directionality was designed and characterized. In the second aim, an

optimization algorithm was developed to customize a collimator geometry for this unique Xray

source to simultaneously maximize the irradiator’s intensity and precision. Then, a full

converging beam irradiator apparatus was fit with a multitude …


Multi-Script Handwriting Identification By Fragmenting Strokes, Joshua Jude Thomas May 2024

Multi-Script Handwriting Identification By Fragmenting Strokes, Joshua Jude Thomas

<strong> Theses and Dissertations </strong>

This study tests the effectiveness of Multi-Script Handwriting Identification after simplifying character strokes, by segmenting them into sub-parts. Character simplification is performed through splitting the character by branching-points and end-points, a process called stroke fragmentation in this study. The resulting sub-parts of the character are called stroke fragments and are evaluated individually to identify the writer. This process shares similarities with the concept of stroke decomposition in Optical Character Recognition which attempts to recognize characters through the writing strokes that make them up. The main idea of this study is that the characters of different writing‑scripts (English, Chinese, etc.) may …


Inferring A Hierarchical Input Type For An Sql Query, Santosh Aryal May 2024

Inferring A Hierarchical Input Type For An Sql Query, Santosh Aryal

All Graduate Theses and Dissertations, Fall 2023 to Present

SQL queries are a common method to retrieve information from databases, much like asking a detailed question and getting a precise answer. Plug-and-play queries simplify the process of querying. In a Plug-and-play SQL query a programmer sketches the shape of the input to the query as a hierarchy. But the programmer could make a mistake in specifying the hierarchy and it takes programmer time and effort to specify the hierarchy. A better solution is to automatically infer the hierarchy from a query. This thesis presents a system to infer a hierarchical input type for an SQL query. We consider two …


A Framework That Explores The Cognitive Load Of Cs1 Assignments Using Pausing Behavior, Joshua O. Urry May 2024

A Framework That Explores The Cognitive Load Of Cs1 Assignments Using Pausing Behavior, Joshua O. Urry

All Graduate Theses and Dissertations, Fall 2023 to Present

Pausing behavior in introductory Computer Science (CS1) courses has been related to a student’s performance in the course and could be linked to a student’s cognitive load, or assignment difficulty. Having an objective measure of the cognitive load would be beneficial to course instructors as it would help them design assignments that are not too difficult. Two studies are presented in this work. The first study uses Cognitive Load Theory and Vygotsky’s Zone of Proximal Development as a theoretical framework to analyze pause times between keystrokes to better understand what types of assignments need more educational support than others. The …


Pedestrian Pathing Prediction Using Complex Contextual Behavioral Data In High Foot Traffic Settings, Laurel Bingham May 2024

Pedestrian Pathing Prediction Using Complex Contextual Behavioral Data In High Foot Traffic Settings, Laurel Bingham

All Graduate Theses and Dissertations, Fall 2023 to Present

Ensuring the safe integration of autonomous vehicles into real-world environments requires a comprehensive understanding of pedestrian behavior. This study addresses the challenge of predicting the movement and crossing intentions of pedestrians, a crucial aspect in the development of fully autonomous vehicles.

The research focuses on leveraging Honda's TITAN dataset, comprising 700 unique clips captured by moving vehicles in high-foot-traffic areas of Tokyo, Japan. Each clip provides detailed contextual information, including human-labeled tags for individuals and vehicles, encompassing attributes such as age, motion status, and communicative actions. Long Short-Term Memory (LSTM) networks were employed and trained on various combinations of contextual …


Generative Ai In Education From The Perspective Of Students, Educators, And Administrators, Aashish Ghimire May 2024

Generative Ai In Education From The Perspective Of Students, Educators, And Administrators, Aashish Ghimire

All Graduate Theses and Dissertations, Fall 2023 to Present

This research explores how advanced artificial intelligence (AI), like the technology that powers tools such as ChatGPT, is changing the way we teach and learn in schools and universities. Imagine AI helping to summarize thick legal documents into something you can read over a coffee break or helping students learn how to code by offering personalized guidance. We looked into how teachers feel about using these AI tools in their classrooms, what kind of rules schools have about them, and how they can make learning programming easier for students. We found that most teachers are excited about the possibilities but …


A Review Of Student Attitudes Towards Keystroke Logging And Plagiarism Detection In Introductory Computer Science Courses, Caleb Syndergaard May 2024

A Review Of Student Attitudes Towards Keystroke Logging And Plagiarism Detection In Introductory Computer Science Courses, Caleb Syndergaard

All Graduate Theses and Dissertations, Fall 2023 to Present

The following paper addresses student attitudes towards keystroke logging and plagiarism prevention measures. Specifically, the paper concerns itself with changes made to the “ShowYourWork” plugin, which was implemented to log the keystrokes of students in Utah State University’s introductory Computer Science course, CS1400. Recent work performed by the Edwards Lab provided insights into students’ feelings towards keystroke logging as a measure of deterring plagiarism. As a result of that research, we have concluded that measures need to be taken to enable students to have more control over their data and assist students to feel more comfortable with keystroke logging. This …


An In-Network Approach For Pmu Missing Data Recovery With Data Plane Programmability, Jack Norris May 2024

An In-Network Approach For Pmu Missing Data Recovery With Data Plane Programmability, Jack Norris

Computer Science and Computer Engineering Undergraduate Honors Theses

Phasor measurement unit (PMU) systems often experience unavoidable missing and erroneous measurements, which undermine power system observability and operational effectiveness. Traditional solutions for recovering missing PMU data employ a centralized approach at the control center, resulting in lengthy recovery times due to data transmission and aggregation. In this work, we leverage P4-based programmable networks to expedite missing data recovery. Our approach utilizes the data plane programmability offered by P4 to present an in-network solution for PMU data recovery. We establish a data-plane pipeline on P4 switches, featuring a customized PMU protocol parser, a missing data detection module, and an auto-regressive …


Comprehensive Question And Answer Generation With Llama 2, Matous Hybl Apr 2024

Comprehensive Question And Answer Generation With Llama 2, Matous Hybl

MS in Computer Science Theses

Since the introduction of transformers, large language models have proven capable in many natural language processing fields. However, existing systems still face challenges in generating high-quality extractive questions. Base models and public chatbots fall short if the question source or quantity are critical. Our contribution is a question and answer generator for generating comprehensive, extractive questions and answers. This approach includes fine-tuning a LLaMA 2 base model for answer extraction (AE) and question generation (QG). We evaluate the resulting system using common automated metrics and a manual evaluation. We find that our system is comparable to the latest research and …


Unearthing The Past: A Comprehensive Study Of Natural And Anthropogenic Changes At An Archaeological Site Through Hydrogeologic Connectivity Utilizing Gis, Mehlich Ii Phosphorus Extractant, And Ph, Dana L. F. Herren Apr 2024

Unearthing The Past: A Comprehensive Study Of Natural And Anthropogenic Changes At An Archaeological Site Through Hydrogeologic Connectivity Utilizing Gis, Mehlich Ii Phosphorus Extractant, And Ph, Dana L. F. Herren

Theses

This thesis aims to thoroughly analyze the Mehlich II Phosphorus Extractant and pH levels at the Bains Gap Village Site in Anniston, AL., while examining the impact of various environmental factors and human activities on them. Phosphorus is often used in archaeology as an indicator of human activity. Soil core samples were collected to analyze anomalies in phosphorus levels.

To establish any relationships, phosphorus and pH levels from soil cores were correlated with findings from past excavation units and features. The potential effects of hydrogeologic connectivity on soil phosphorus and pH levels were investigated. Geospatial technologies were used to manage …


Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim Mar 2024

Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim

Masters Theses

Due to significant investment, research, and development efforts over the past decade, deep neural networks (DNNs) have achieved notable advancements in classification and regression domains. As a result, DNNs are considered valuable intellectual property for artificial intelligence providers. Prior work has demonstrated highly effective model extraction attacks which steal a DNN, dismantling the provider’s business model and paving the way for unethical or malicious activities, such as misuse of personal data, safety risks in critical systems, or spreading misinformation. This thesis explores the feasibility of model extraction attacks on mobile devices using aggregated runtime profiles as a side-channel to leak …


An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley Mar 2024

An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley

LSU Master's Theses

The growing cybersecurity workforce gap underscores the urgent need to address deficiencies in cybersecurity education: the current education system is not producing competent cybersecurity professionals, and current efforts are not informing the non-technical general public of basic cybersecurity practices. We argue that this gap is compounded by a fundamental disconnect between cybersecurity education literature and established education theory. Our research addresses this issue by examining the alignment of cybersecurity education literature concerning educational methods and tools with education literature.

In our research, we endeavor to bridge this gap by critically analyzing the alignment of cybersecurity education literature with education theory. …


Sensor Analytics For Subsea Pipeline And Cable Inspection: A Review, Connor R. Vincent Mar 2024

Sensor Analytics For Subsea Pipeline And Cable Inspection: A Review, Connor R. Vincent

LSU Master's Theses

Submarine pipelines and cables are vital for transmitting physical and digital resources across bodies of water, necessitating regular inspection to assess maintenance needs. The safety of subsea pipelines and cables is paramount for sustaining industries such as telecommunications, power transmission, water supply, waste management, and oil and gas. Incidents like those involving the Nord Stream subsea pipeline and the SEA-ME-WE 4 subsea communications cable exemplify the severe economic and environmental consequences of damage to these critical infrastructures. Existing inspection methods often fail to meet accuracy requirements, emphasizing the need for advancements in inspection technologies. This comprehensive survey covers the sensors …


An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou Mar 2024

An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou

Doctoral Dissertations

With the proliferation of video content from surveillance cameras, social media, and live streaming services, the need for efficient video analytics has grown immensely. In recent years, machine learning based computer vision algorithms have shown great success in various video analytic tasks. Specifically, neural network models have dominated in visual tasks such as image and video classification, object recognition, object detection, and object tracking. However, compared with classic computer vision algorithms, machine learning based methods are usually much more compute-intensive. Powerful servers are required by many state-of-the-art machine learning models. With the development of cloud computing infrastructures, people are able …


Automated Identification And Mapping Of Interesting Mineral Spectra In Crism Images, Arun M. Saranathan Mar 2024

Automated Identification And Mapping Of Interesting Mineral Spectra In Crism Images, Arun M. Saranathan

Doctoral Dissertations

The Compact Reconnaissance Imaging Spectrometer for Mars (CRISM) has proven to be an invaluable tool for the mineralogical analysis of the Martian surface. It has been crucial in identifying and mapping the spatial extents of various minerals. Primarily, the identification and mapping of these mineral spectral-shapes have been performed manually. Given the size of the CRISM image dataset, manual analysis of the full dataset would be arduous/infeasible. This dissertation attempts to address this issue by describing an (machine learning based) automated processing pipeline for CRISM data that can be used to identify and map the unique mineral signatures present in …


Data To Science With Ai And Human-In-The-Loop, Gustavo Perez Sarabia Mar 2024

Data To Science With Ai And Human-In-The-Loop, Gustavo Perez Sarabia

Doctoral Dissertations

AI has the potential to accelerate scientific discovery by enabling scientists to analyze vast datasets more efficiently than traditional methods. For example, this thesis considers the detection of star clusters in high-resolution images of galaxies taken from space telescopes, as well as studying bird migration from RADAR images. In these applications, the goal is to make measurements to answer scientific questions, such as how the star formation rate is affected by mass, or how the phenology of bird migration is influenced by climate change. However, current computer vision systems are far from perfect for conducting these measurements directly. They may …


Policy Gradient Methods: Analysis, Misconceptions, And Improvements, Christopher P. Nota Mar 2024

Policy Gradient Methods: Analysis, Misconceptions, And Improvements, Christopher P. Nota

Doctoral Dissertations

Policy gradient methods are a class of reinforcement learning algorithms that optimize a parametric policy by maximizing an objective function that directly measures the performance of the policy. Despite being used in many high-profile applications of reinforcement learning, the conventional use of policy gradient methods in practice deviates from existing theory. This thesis presents a comprehensive mathematical analysis of policy gradient methods, uncovering misconceptions and suggesting novel solutions to improve their performance. We first demonstrate that the update rule used by most policy gradient methods does not correspond to the gradient of any objective function due to the way the …


Multi-Slam Systems For Fault-Tolerant Simultaneous Localization And Mapping, Samer Nashed Mar 2024

Multi-Slam Systems For Fault-Tolerant Simultaneous Localization And Mapping, Samer Nashed

Doctoral Dissertations

Mobile robots need accurate, high fidelity models of their operating environments in order to complete their tasks safely and efficiently. Generating these models is most often done via Simultaneous Localization and Mapping (SLAM), a paradigm where the robot alternatively estimates the most up-to-date model of the environment and its position relative to this model as it acquires new information from its sensors over time. Because robots operate in many different environments with different compute, memory, sensing, and form constraints, the nature and quality of information available to individual instances of different SLAM systems varies substantially. `One-size-fits-all' solutions are thus exceedingly …


Marketing Video Games To Aging Demographics: A Generational Profile Analysis, Brinna Louise Ball Mar 2024

Marketing Video Games To Aging Demographics: A Generational Profile Analysis, Brinna Louise Ball

Theses

Marketing video games to aging demographics like Baby Boomers, Generation X, and Millennials requires a unique approach by video game studios and consumer products divisions alike. The strategies employed for younger generations such as Generation Z and Generation Alpha differ from conventional methods, requiring a fresh outlook and a need for more innovative and inventive approaches. To comprehend the current aging audience more effectively, it's essential to examine four crucial factors: accessibility, exposure, media habits, and motivations to play video games. Examining these factors by generation, we can better grasp how to effectively market video games to these demographics. It's …


A Study On Ethical Hacking In Cybersecurity Education Within The United States, Jordan Chew Mar 2024

A Study On Ethical Hacking In Cybersecurity Education Within The United States, Jordan Chew

Master's Theses

As the field of computer security continues to grow, it becomes increasingly important to educate the next generation of security professionals. However, much of the current education landscape primarily focuses on teaching defensive skills. Teaching offensive security, otherwise known as ethical hacking, is an important component in the education of all students who hope to contribute to the field of cybersecurity. Doing so requires a careful consideration of what ethical, legal, and practical issues arise from teaching students skills that can be used to cause harm. In this thesis, we first examine the current state of cybersecurity education in the …


Future-Proofing The Past: Artificial Intelligence In The Restoration Of Andalusian Architectural Heritage: A Case Study Of The Alhambra Palace, Granada, Spain, Kholoud Bader Hasan Ghaith Mar 2024

Future-Proofing The Past: Artificial Intelligence In The Restoration Of Andalusian Architectural Heritage: A Case Study Of The Alhambra Palace, Granada, Spain, Kholoud Bader Hasan Ghaith

Theses

This thesis explains the contribution of artificial intelligence in heritage restoration as an icon of Andalusian architecture by using the Alhambra as an example. The task of sustaining heritage is increasing dramatically due to the accumulation of heritage assets and the need for modern and innovative operations to cope with preservation tasks. Therefore, this thesis reviews the role of artificial intelligence in improving the restoration operation to improve accuracy and efficiency. I applied the case study as a scientific methodology to explain this work to overcome scientific and subjective obstacles, such as scarce data and software integration while explaining the …


Improving Automatic Transcription Using Natural Language Processing, Anna Kiefer Mar 2024

Improving Automatic Transcription Using Natural Language Processing, Anna Kiefer

Master's Theses

Digital Democracy is a CalMatters and California Polytechnic State University initia-
tive to promote transparency in state government by increasing access to the Califor-
nia legislature. While Digital Democracy is made up of many resources, one founda-
tional step of the project is obtaining accurate, timely transcripts of California Senate
and Assembly hearings. The information extracted from these transcripts provides
crucial data for subsequent steps in the pipeline. In the context of Digital Democracy,
upleveling is when humans verify, correct, and annotate the transcript results after
the legislative hearings have been automatically transcribed. The upleveling process
is done with the …


Attribution Robustness Of Neural Networks, Sunanda Gamage Feb 2024

Attribution Robustness Of Neural Networks, Sunanda Gamage

Electronic Thesis and Dissertation Repository

While deep neural networks have demonstrated excellent learning capabilities, explainability of model predictions remains a challenge due to their black box nature. Attributions or feature significance methods are tools for explaining model predictions, facilitating model debugging, human-machine collaborative decision making, and establishing trust and compliance in critical applications. Recent work has shown that attributions of neural networks can be distorted by imperceptible adversarial input perturbations, which makes attributions unreliable as an explainability method. This thesis addresses the research problem of attribution robustness of neural networks and introduces novel techniques that enable robust training at scale.

Firstly, a novel generic framework …


Mmwave Rat Optimization: Mac Layer Initial Access Design And Transport Layer Integration, Suresh Srinivasan Feb 2024

Mmwave Rat Optimization: Mac Layer Initial Access Design And Transport Layer Integration, Suresh Srinivasan

Dissertations and Theses

MmWave Radio Access Technology (RAT) is a promising technology for wireless communication due its large bandwidth and is already being deployed in 5G cellular and emerging WiFi technologies. MmWave systems use highly directional beams with narrow beamwidths to overcome the high path loss associated with their frequency bands. A mmWave radio can be used either in a standalone mode (where all radios use the same technology) or simultaneously with other technologies such as LTE and low frequency WiFi in a communication mode commonly referred to as integrated mode. This thesis proposes two methods to optimize mmWave RAT performance in both …