Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 511 - 540 of 57908

Full-Text Articles in Physical Sciences and Mathematics

Navigating The Complexities Of Ai: The Critical Role Of Interpretability And Explainability In Ensuring Transparency And Trust, Emily Barnes, James Hutson Jun 2024

Navigating The Complexities Of Ai: The Critical Role Of Interpretability And Explainability In Ensuring Transparency And Trust, Emily Barnes, James Hutson

Faculty Scholarship

The interpretability and explainability of deep neural networks (DNNs) are paramount in artificial intelligence (AI), especially when applied to high-stakes fields such as healthcare, finance, and autonomous driving. The need for this study arises from the growing integration of AI into critical areas where transparency, trust, and ethical decision-making are essential. This paper explores the impact of architectural design choices on DNN interpretability, focusing on how different architectural elements like layer types, network depth, connectivity patterns, and attention mechanisms affect model transparency. Methodologically, the study employs a comprehensive review of case studies and experimental results to analyze the balance between …


Performance Interference Detection For Cloud-Native Applications Using Unsupervised Machine Learning Models, Eli Bakshi Jun 2024

Performance Interference Detection For Cloud-Native Applications Using Unsupervised Machine Learning Models, Eli Bakshi

Master's Theses

Contemporary cloud-native applications frequently adopt the microservice architecture, where applications are deployed within multiple containers that run on cloud virtual machines (VMs). These applications are typically hosted on public cloud platforms, where VMs from multiple cloud subscribers compete for the same physical resources on a cloud server. When a cloud subscriber application running on a VM competes for shared physical resources from other applications running on the same VM or from other VMs co-located on the same cloud server, performance interference may occur when the performance of an application degrades due to shared resource contention. Detecting such interference is crucial …


Morp: Monocular Orientation Regression Pipeline, Jacob Gunderson Jun 2024

Morp: Monocular Orientation Regression Pipeline, Jacob Gunderson

Master's Theses

Orientation estimation of objects plays a pivotal role in robotics, self-driving cars, and augmented reality. Beyond mere position, accurately determining the orientation of objects is essential for constructing precise models of the physical world. While 2D object detection has made significant strides, the field of orientation estimation still faces several challenges. Our research addresses these hurdles by proposing an efficient pipeline which facilitates rapid creation of labeled training data and enables direct regression of object orientation from a single image. We start by creating a digital twin of a physical object using an iPhone, followed by generating synthetic images using …


Interpretable Learning In Multivariate Big Data Analysis For Network Monitoring, José Camacho, Katarzyna Wasielewska, Rasmus Bro, David Kotz Jun 2024

Interpretable Learning In Multivariate Big Data Analysis For Network Monitoring, José Camacho, Katarzyna Wasielewska, Rasmus Bro, David Kotz

Dartmouth Scholarship

There is an increasing interest in the development of new data-driven models useful to assess the performance of communication networks. For many applications, like network monitoring and troubleshooting, a data model is of little use if it cannot be interpreted by a human operator. In this paper, we present an extension of the Multivariate Big Data Analysis (MBDA) methodology, a recently proposed interpretable data analysis tool. In this extension, we propose a solution to the automatic derivation of features, a cornerstone step for the application of MBDA when the amount of data is massive. The resulting network monitoring approach allows …


Automated Sensor Node Malicious Activity Detection With Explainability Analysis, Md Zubair, Helge Janicke, Ahmad Mohsin, Leandros Maglaras, Iqbal H. Sarker Jun 2024

Automated Sensor Node Malicious Activity Detection With Explainability Analysis, Md Zubair, Helge Janicke, Ahmad Mohsin, Leandros Maglaras, Iqbal H. Sarker

Research outputs 2022 to 2026

Cybersecurity has become a major concern in the modern world due to our heavy reliance on cyber systems. Advanced automated systems utilize many sensors for intelligent decision-making, and any malicious activity of these sensors could potentially lead to a system-wide collapse. To ensure safety and security, it is essential to have a reliable system that can automatically detect and prevent any malicious activity, and modern detection systems are created based on machine learning (ML) models. Most often, the dataset generated from the sensor node for detecting malicious activity is highly imbalanced because the Malicious class is significantly fewer than the …


Context In Computer Vision: A Taxonomy, Multi-Stage Integration, And A General Framework, Xuan Wang Jun 2024

Context In Computer Vision: A Taxonomy, Multi-Stage Integration, And A General Framework, Xuan Wang

Dissertations, Theses, and Capstone Projects

Contextual information has been widely used in many computer vision tasks, such as object detection, video action detection, image classification, etc. Recognizing a single object or action out of context could be sometimes very challenging, and context information may help improve the understanding of a scene or an event greatly. However, existing approaches design specific contextual information mechanisms for different detection tasks.

In this research, we first present a comprehensive survey of context understanding in computer vision, with a taxonomy to describe context in different types and levels. Then we proposed MultiCLU, a new multi-stage context learning and utilization framework, …


D-Hacking, Emily Black, Talia B. Gillis, Zara Hall Jun 2024

D-Hacking, Emily Black, Talia B. Gillis, Zara Hall

Faculty Scholarship

Recent regulatory efforts, including Executive Order 14110 and the AI Bill of Rights, have focused on mitigating discrimination in AI systems through novel and traditional application of anti-discrimination laws. While these initiatives rightly emphasize fairness testing and mitigation, we argue that they pay insufficient attention to robust bias measurement and mitigation — and that without doing so, the frameworks cannot effectively achieve the goal of reducing discrimination in deployed AI models. This oversight is particularly concerning given the instability and brittleness of current algorithmic bias mitigation and fairness optimization methods, as highlighted by growing evidence in the algorithmic fairness literature. …


Synthesis Of Dyes Sulfamidazole: Characterization, Evaluation, Molecular Docking And Global Descriptors By Density Functional Theory (Dft)., Athra G. Sager, Jawad Kadhim Abaies, Zeena R. Katoof May 2024

Synthesis Of Dyes Sulfamidazole: Characterization, Evaluation, Molecular Docking And Global Descriptors By Density Functional Theory (Dft)., Athra G. Sager, Jawad Kadhim Abaies, Zeena R. Katoof

Karbala International Journal of Modern Science

In the present work, novel azo compounds of sulfamidazole were created via the reaction of diazonium salt of sulfamidazole with several aromatic molecules including (resorcinol, 2-nitro phenol, 3-nitro phenol, and 4-nitro phenol)) (Z1–Z4). The new compounds (Z1-Z4) were identified using FTIR, 1HNMR techniques, in addition to melting point measurements. The biological activity of compounds (Z1-Z4) was studied against four kinds of bacteria including E. coli, Klebsiella pneumonia, Salmonella, and Staphylococcus aureus. The findings showed that all compounds (Z1-Z4) were active against the examined bacteria. Theoretical studies of the antibacterial ability of the prepared compound against DNA gyrase enzyme …


Nonlinear Classifiers For Wet-Neuromorphic Computing Using Gene Regulatory Neural Network, Adrian Ratwatte, Samitha Somathilaka, Sasitharan Balasubramaniam, Assaf A. Gilad May 2024

Nonlinear Classifiers For Wet-Neuromorphic Computing Using Gene Regulatory Neural Network, Adrian Ratwatte, Samitha Somathilaka, Sasitharan Balasubramaniam, Assaf A. Gilad

School of Computing: Faculty Publications

The gene regulatory network (GRN) of biological cells governs a number of key functionalities that enable them to adapt and survive through different environmental conditions. Close observation of the GRN shows that the structure and operational principles resemble an artificial neural network (ANN), which can pave the way for the development of wet-neuromorphic computing systems. Genes are integrated into gene-perceptrons with transcription factors (TFs) as input, where the TF concentration relative to half-maximal RNA concentration and gene product copy number influences transcription and translation via weighted multiplication before undergoing a nonlinear activation function. This process yields protein concentration as the …


A Survey Of Practical Haskell: Parsing, Interpreting, And Testing, Parker Landon May 2024

A Survey Of Practical Haskell: Parsing, Interpreting, And Testing, Parker Landon

Honors Projects

Strongly typed pure functional programming languages like Haskell have historically been confined to academia as vehicles for programming language research. While features of functional programming have greatly influenced mainstream programming languages, the imperative programming style remains pervasive in practical software development. This paper illustrates the practical utility of Haskell and pure functional programming by exploring “hson,” a scripting language for processing JSON developed in Haskell. After introducing the relevant features of Haskell to the unfamiliar reader, this paper reveals how hson leverages functional programming to implement parsing, interpreting, and testing. By showcasing how Haskell’s language features enable the creation of …


Empirical Exploration Of Software Testing, Samia Alblwi May 2024

Empirical Exploration Of Software Testing, Samia Alblwi

Dissertations

Despite several advances in software engineering research and development, the quality of software products remains a considerable challenge. For all its theoretical limitations, software testing remains the main method used in practice to control, enhance, and certify software quality. This doctoral work comprises several empirical studies aimed at analyzing and assessing common software testing approaches, methods, and assumptions. In particular, the concept of mutant subsumption is generalized by taking into account the possibility for a base program and its mutants to diverge for some inputs, demonstrating the impact of this generalization on how subsumption is defined. The problem of mutant …


Network Slicing And Noma Enabled Mobile Edge Computing For Next-Generation Networks, Mohammad Arif Hossain May 2024

Network Slicing And Noma Enabled Mobile Edge Computing For Next-Generation Networks, Mohammad Arif Hossain

Dissertations

The advent of next-generation wireless networks ushers in a new era of potential, harnessing cutting-edge technologies like mobile edge computing (MEC), non-orthogonal multiple access (NOMA), and network slicing as pivotal drivers of transformation. Within this landscape, an innovative approach is proposed by introducing a NOMA-enabled network slicing technique within MEC networks. This approach aims to achieve multiple objectives: meeting stringent quality of service requirements, minimizing service latency, and enhancing spectral efficiency. By seamlessly integrating NOMA with network slicing in edge computing environments, significant reductions in overall latency are achieved, alongside ensuring optimal resource allocation for NOMA users. To address these …


Information Theoretic Bounds For Capacity And Bayesian Risk, Ian Zieder May 2024

Information Theoretic Bounds For Capacity And Bayesian Risk, Ian Zieder

Dissertations

In this dissertation, the problem of finding lower error bounds on the minimum mean-squared error (MMSE) and the maximum capacity achieving distribution for a specific channel is addressed. Presented are two parts, a new lower bound on the MMSE and upper and lower bounds on the capacity achieving distribution for a Binomial noise channel. The new lower bound on the MMSE is achieved via use of the Poincare inequality. It is compared to the performance of the well known Ziv-Zakai error bound. The second part considers a binomial noise channel and is concerned with the properties of the capacity-achieving distribution. …


Sensing With Integrity: Responsible Sensor Systems In An Era Of Ai, David Eisenberg May 2024

Sensing With Integrity: Responsible Sensor Systems In An Era Of Ai, David Eisenberg

Dissertations

Deep and machine learning now offer immense benefits for consumer choice, decision-making, medicine, mental health and education, smart cities, and intelligent transportation and driver safety. However, as communication and Internet technology further advances, these benefits have the potential to be outweighed by compromises to privacy, personal freedom, consumer trust, and discrimination. While ethical consequences for personal freedom and equity rise from these technological advances, the issue may not be the technology itself but a lack of regulation and policy that allow abuses to occur. A first study examines how emerging sensor-based technologies, limited to only accelerometer and gyroscope data from …


Charting A Path To The Quintuple Aim: Harnessing Ai To Address Social Determinants Of Health, Yash Shah, Zachary Goldberg, Erika Harness, David Nash May 2024

Charting A Path To The Quintuple Aim: Harnessing Ai To Address Social Determinants Of Health, Yash Shah, Zachary Goldberg, Erika Harness, David Nash

College of Population Health Faculty Papers

The Quintuple Aim seeks to improve healthcare by addressing social determinants of health (SDOHs), which are responsible for 70-80% of medical outcomes. SDOH-related concerns have traditionally been addressed through referrals to social workers and community-based organizations (CBOs), but these pathways have had limited success in connecting patients with resources. Given that health inequity is expected to cost the United States nearly USD 300 billion by 2050, new artificial intelligence (AI) technology may aid providers in addressing SDOH. In this commentary, we present our experience with using ChatGPT to obtain SDOH management recommendations for archetypal patients in Philadelphia, PA. ChatGPT identified …


The Next Strike: Pioneering Forward-Thinking Attack Techniques With Rowhammer In Dram Technologies, Nakul Kochar May 2024

The Next Strike: Pioneering Forward-Thinking Attack Techniques With Rowhammer In Dram Technologies, Nakul Kochar

Theses

In the realm of DRAM technologies this study investigates RowHammer vulnerabilities in DDR4 DRAM memory across various manufacturers, employing advanced multi-sided fault injection techniques to impose attack strategies directly on physical memory rows. Our novel approach, diverging from traditional victim-focused methods, involves strategically allocating virtual memory rows to their physical counterparts for more potent attacks. These attacks, exploiting the inherent weaknesses in DRAM design, are capable of inducing bit flips in a controlled manner to undermine system integrity. We employed a strategy that compromised system integrity through a nuanced approach of targeting rows situated at a distance of two rows …


Size-Constrained Weighted Ancestors With Applications, Philip Bille, Yakov Nekrich, Solon P. Pissis May 2024

Size-Constrained Weighted Ancestors With Applications, Philip Bille, Yakov Nekrich, Solon P. Pissis

Michigan Tech Publications, Part 2

The weighted ancestor problem on a rooted node-weighted tree T is a generalization of the classic predecessor problem: construct a data structure for a set of integers that supports fast predecessor queries. Both problems are known to require Ω(log log n) time for queries provided O(n poly log n) space is available, where n is the input size. The weighted ancestor problem has attracted a lot of attention by the combinatorial pattern matching community due to its direct application to suffix trees. In this formulation of the problem, the nodes are weighted by string depth. This research has culminated in …


Try It Together - Qualitative Coding With Atlas.Ti, Danping Dong, Bryan Leow May 2024

Try It Together - Qualitative Coding With Atlas.Ti, Danping Dong, Bryan Leow

2024 AI for Research Week

This hands-on session introduces Atlas.ti, a well-established qualitative data analysis tool for analyzing your transcripts and textual data. The session will cover coding data, extracting insights, creating visualizations, and exploring the tool's latest AI features.


Try It Together: Transcribing Your Audio With Whisper Api, Bella Ratmelia May 2024

Try It Together: Transcribing Your Audio With Whisper Api, Bella Ratmelia

2024 AI for Research Week

In this hands-on session, we will explore using the Whisper API to transcribe audio recordings from interviews, focus groups, and speeches. The session will delve into best practices and address common issues that may arise during the transcription process.


Singleadv: Single-Class Target-Specific Attack Against Interpretable Deep Learning Systems, Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed May 2024

Singleadv: Single-Class Target-Specific Attack Against Interpretable Deep Learning Systems, Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed

Computer Science: Faculty Publications and Other Works

In this paper, we present a novel Single-class target-specific Adversarial attack called SingleADV. The goal of SingleADV is to generate a universal perturbation that deceives the target model into confusing a specific category of objects with a target category while ensuring highly relevant and accurate interpretations. The universal perturbation is stochastically and iteratively optimized by minimizing the adversarial loss that is designed to consider both the classifier and interpreter costs in targeted and non-targeted categories. In this optimization framework, ruled by the first- and second-moment estimations, the desired loss surface promotes high confidence and interpretation score of adversarial samples. By …


Unveiling The Metaverse: A Survey Of User Perceptions And The Impact Of Usability, Social Influence And Interoperability, Mousa Al-Kfairy, Ayham Alomari, Mahmood Al-Bashayreh, Omar Alfandi, Mohammad Tubishat May 2024

Unveiling The Metaverse: A Survey Of User Perceptions And The Impact Of Usability, Social Influence And Interoperability, Mousa Al-Kfairy, Ayham Alomari, Mahmood Al-Bashayreh, Omar Alfandi, Mohammad Tubishat

All Works

This review explores the Metaverse, focusing on user perceptions and emphasizing the critical aspects of usability, social influence, and interoperability within this emerging digital ecosystem. By integrating various academic perspectives, this analysis highlights the Metaverse's significant impact across various sectors, emphasizing its potential to reshape digital interaction paradigms. The investigation reveals usability as a cornerstone for user engagement, demonstrating how social dynamics profoundly influence user behaviors and choices within virtual environments. Furthermore, the study outlines interoperability as a paramount challenge, advocating for establishing unified protocols and technologies to facilitate seamless experiences across disparate Metaverse platforms. It advocates for the adoption …


Measuring Confidentiality With Multiple Observables, John J. Utley May 2024

Measuring Confidentiality With Multiple Observables, John J. Utley

Computer Science Senior Theses

Measuring the confidentiality of programs that need to interact with the outside world can prevent leakages and is important to protect against dangerous attacks. However, information propagation is difficult to follow through a large program with implicit information flow, tricky loops, and complicated instructions. Previous works have tackled this problem in several ways but often measure leakage a program has on average rather than the leakage produced by a set of particularly compromising interactions. We introduce new methods that target a specific set of observables revealed throughout execution to cut down on the resources needed for analysis. Our implementation examines …


Exploring Applications Of Ai In Developer-Side Web Accessibility Practices, Maria H. Cristoforo May 2024

Exploring Applications Of Ai In Developer-Side Web Accessibility Practices, Maria H. Cristoforo

Computer Science Senior Theses

No abstract provided.


Intelligent Solutions For Retroactive Anomaly Detection And Resolution With Log File Systems, Derek G. Rogers, Chanvo Nguyen, Abhay Sharma May 2024

Intelligent Solutions For Retroactive Anomaly Detection And Resolution With Log File Systems, Derek G. Rogers, Chanvo Nguyen, Abhay Sharma

SMU Data Science Review

This paper explores the intricate challenges log files pose from data science and machine learning perspectives. Drawing inspiration from existing methods, LAnoBERT, PULL, LLMs, and the breadth of recent research, this paper aims to push the boundaries of machine learning for log file systems. Our study comprehensively examines the unique challenges presented in our problem setup, delineates the limitations of existing methods, and introduces innovative solutions. These contributions are organized to offer valuable insights, predictions, and actionable recommendations tailored for Microsoft's engineers working on log data analysis.


Leveraging Transformer Models For Genre Classification, Andreea C. Craus, Ben Berger, Yves Hughes, Hayley Horn May 2024

Leveraging Transformer Models For Genre Classification, Andreea C. Craus, Ben Berger, Yves Hughes, Hayley Horn

SMU Data Science Review

As the digital music landscape continues to expand, the need for effective methods to understand and contextualize the diverse genres of lyrical content becomes increasingly critical. This research focuses on the application of transformer models in the domain of music analysis, specifically in the task of lyric genre classification. By leveraging the advanced capabilities of transformer architectures, this project aims to capture intricate linguistic nuances within song lyrics, thereby enhancing the accuracy and efficiency of genre classification. The relevance of this project lies in its potential to contribute to the development of automated systems for music recommendation and genre-based playlist …


Investigating Bias In Mortgage-Rate Machine Learning Models, Will Kalikman May 2024

Investigating Bias In Mortgage-Rate Machine Learning Models, Will Kalikman

Computer Science Senior Theses

Banks and fintech lenders increasingly rely on computer-aided models in lending decisions. Traditional models were interpretable: decisions were based on observable factors, such as whether a borrower's credit score was above a threshold value, and explainable in terms of combinations of these factors. In contrast, modern machine learning models are opaque and non-interpretable. Their opaqueness and reliance on historical data that is the artifact of past racial discrimination means these new models risk embedding and exacerbating such discrimination, even if lenders do not intend to discriminate. We calibrate two random forest classifiers using publicly available HMDA loan data and publicly …


Welfare Maximization In The Airplane Problem, Alina Chadwick May 2024

Welfare Maximization In The Airplane Problem, Alina Chadwick

Computer Science Senior Theses

Given a set of passengers and a set of airplane seats, the goal of the airplane problem is to sit passengers in seats in a way that maximizes the sum of their total welfare, that is, the total happiness of the passengers in the plane. We aim to maximize their welfare subject to three constraints and how much they care about each constraint being satisfied: a group constraint (where passengers may want to sit together), a constraint on where in a row passengers want to sit (i.e. a window seat, a middle seat, or an aisle seat), and finally a …


Open Source Supply Chain Security: A Cost-Benefit Analysis Of Achieving Various Security Thresholds In Build Environments, Carly Retterer May 2024

Open Source Supply Chain Security: A Cost-Benefit Analysis Of Achieving Various Security Thresholds In Build Environments, Carly Retterer

Computer Science Senior Theses

Open source software has become a cornerstone of modern software development, offering unparalleled opportunities for innovation and collaboration. However, its widespread adoption has also introduced a host of security vulnerabilities, particularly in the software supply chain. This paper provides a comprehensive cost-benefit analysis of achieving various security thresholds to harden the build environment, focusing on isolated, hermetic, reproducible, and bootstrappable builds. For each build type, we provide a clear definition and outline the steps required for implementation. We then evaluate the associated costs and benefits of each build, emphasizing their roles in strengthening the build environment and enhancing supply chain …


Detecting Drifts In Data Streams Using Kullback-Leibler (Kl) Divergence Measure For Data Engineering Applications, Jeomoan Francis Kurian, Mohamed Allali May 2024

Detecting Drifts In Data Streams Using Kullback-Leibler (Kl) Divergence Measure For Data Engineering Applications, Jeomoan Francis Kurian, Mohamed Allali

Engineering Faculty Articles and Research

The exponential growth of data coupled with the widespread application of artificial intelligence(AI) presents organizations with challenges in upholding data accuracy, especially within data engineering functions. While the Extraction, Transformation, and Loading process addresses error-free data ingestion, validating the content within data streams remains a challenge. Prompt detection and remediation of data issues are crucial, especially in automated analytical environments driven by AI. To address these issues, this study focuses on detecting drifts in data distributions and divergence within data fields processed from different sample populations. Using a hypothetical banking scenario, we illustrate the impact of data drift on automated …


Connection-Saving Gate Assignment: A Computational Approach, Rob Mailley May 2024

Connection-Saving Gate Assignment: A Computational Approach, Rob Mailley

Computer Science Senior Theses

The growth of the commercial aviation industry has yielded many interesting problems in the field of Operations Research, many of which are now able to be solved as both technology and mathematical optimization improve. A particularly interesting problem in airport operations re- search is the Aircraft Gate Assignment Problem (AGAP), which seeks to create a feasible match- ing between planes and flights at an airport. This problem is well-suited to modeling with Integer Programming, and has attracted research since the 1970s. Researchers of the AGAP have considered many different objectives, ranging from airline-focused objectives to more passenger-focused objective functions. In …