Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (7226)
- China Simulation Federation (3363)
- TÜBİTAK (3020)
- Selected Works (2644)
- Wright State University (2602)
-
- Purdue University (2057)
- Old Dominion University (1452)
- Missouri University of Science and Technology (1360)
- Edith Cowan University (1172)
- Air Force Institute of Technology (1108)
- University of Texas at El Paso (1094)
- Dartmouth College (1017)
- San Jose State University (995)
- University of Nebraska - Lincoln (979)
- Embry-Riddle Aeronautical University (853)
- City University of New York (CUNY) (818)
- Technological University Dublin (792)
- Washington University in St. Louis (785)
- Brigham Young University (759)
- California Polytechnic State University, San Luis Obispo (731)
- Kennesaw State University (713)
- University for Business and Technology in Kosovo (626)
- University of Texas at Arlington (614)
- Nova Southeastern University (535)
- Portland State University (529)
- Western University (524)
- SelectedWorks (522)
- New Jersey Institute of Technology (511)
- Syracuse University (501)
- University of Nebraska at Omaha (484)
- Keyword
-
- Machine learning (1330)
- Deep learning (797)
- Artificial intelligence (653)
- Machine Learning (649)
- Computer Science (638)
-
- Security (620)
- Computer science (435)
- Cybersecurity (409)
- Privacy (408)
- Simulation (377)
- Classification (367)
- Technical Reports (358)
- UTEP Computer Science Department (356)
- Data mining (349)
- Deep Learning (345)
- Algorithms (336)
- Optimization (333)
- Neural networks (307)
- Artificial Intelligence (299)
- Computer vision (291)
- College for Professional Studies (253)
- Software engineering (253)
- Education (252)
- Clustering (251)
- Cloud computing (244)
- Department of Computer Science and Engineering (243)
- Applied sciences (236)
- School of Computer & Information Science (236)
- Visualization (236)
- Social media (230)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6878)
- Journal of System Simulation (3363)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Theses and Dissertations (2498)
- Department of Computer Science Technical Reports (1721)
-
- Computer Science & Engineering Syllabi (1312)
- Departmental Technical Reports (CS) (881)
- Master's Projects (845)
- Electronic Theses and Dissertations (735)
- Computer Science Faculty Publications (724)
- All Computer Science and Engineering Research (683)
- Computer Science Technical Reports (673)
- Computer Science Faculty Research & Creative Works (595)
- Faculty Publications (585)
- Kno.e.sis Publications (543)
- Journal of Digital Forensics, Security and Law (536)
- Computer Science Faculty Publications and Presentations (507)
- Dissertations (500)
- CCE Theses and Dissertations (488)
- All Works (478)
- Walden Dissertations and Doctoral Studies (467)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (463)
- Masters Theses (402)
- Computer Science and Engineering Theses (356)
- Theses (334)
- Electronic Thesis and Dissertation Repository (333)
- Computer Science and Software Engineering (332)
- USF Tampa Graduate Theses and Dissertations (320)
- Computer Science: Faculty Publications (316)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (315)
- Publication Type
Articles 691 - 720 of 57924
Full-Text Articles in Physical Sciences and Mathematics
Formalization Of A Security Framework Design For A Health Prescription Assistant In An Internet Of Things System, Thomas Rolando Mellema
Formalization Of A Security Framework Design For A Health Prescription Assistant In An Internet Of Things System, Thomas Rolando Mellema
Electronic Theses and Dissertations
Security system design flaws will create greater risks and repercussions as the systems being secured further integrate into our daily life. One such application example is incorporating the powerful potential of the concept of the Internet of Things (IoT) into software services engineered for improving the practices of monitoring and prescribing effective healthcare to patients. A study was performed in this application area in order to specify a security system design for a Health Prescription Assistant (HPA) that operated with medical IoT (mIoT) devices in a healthcare environment. Although the efficiency of this system was measured, little was presented to …
Exploring Graph Neural Networks In Reinforcement Learning: A Comparative Study On Architectures For Locomotion Tasks, Gaukhar Nurbek
Exploring Graph Neural Networks In Reinforcement Learning: A Comparative Study On Architectures For Locomotion Tasks, Gaukhar Nurbek
Theses and Dissertations
Deep Reinforcement learning (DRL) has gained importance in optimizing control policies, while Graph Neural Networks (GNNs) offer a robust approach for modeling complex relationships within systems represented as graphs. This thesis investigates the integration of DRL and GNNs to optimize control policies for robotic tasks, with a focus on locomotion. It compares static and dynamic GNN architectures for control policy predictions, revealing their strengths and limitations in adapting to locomotion predictions. The study assesses the impact of model structure complexity on GNNs' predictive capabilities, showcasing how intricate model structure can maximize GNNs' potential in capturing spatial and relational dependencies when …
Advancing Sentiment Analysis Through Emotionally-Agnostic Text Mining In Large Language Models (Llms), Jay Ratican, James Hutson
Advancing Sentiment Analysis Through Emotionally-Agnostic Text Mining In Large Language Models (Llms), Jay Ratican, James Hutson
Faculty Scholarship
The conventional methodology for sentiment analysis within large language models (LLMs) has predominantly drawn upon human emotional frameworks, incorporating physiological cues that are inherently absent in text-only communication. This research proposes a paradigm shift towards an emotionallyagnostic approach to sentiment analysis in LLMs, which concentrates on purely textual expressions of sentiment, circumventing the confounding effects of human physiological responses. The aim is to refine sentiment analysis algorithms to discern and generate emotionally congruent responses strictly from text-based cues. This study presents a comprehensive framework for an emotionally-agnostic sentiment analysis model that systematically excludes physiological indicators whilst maintaining the analytical depth …
Learning, Optimizing, And Simulating Fermions With Quantum Computers, Andrew Zhao
Learning, Optimizing, And Simulating Fermions With Quantum Computers, Andrew Zhao
Physics & Astronomy ETDs
Fermions are fundamental particles which obey seemingly bizarre quantum-mechanical principles, yet constitute all the ordinary matter that we inhabit. As such, their study is heavily motivated from both fundamental and practical incentives. In this dissertation, we will explore how the tools of quantum information and computation can assist us on both of these fronts. We primarily do so through the task of partial state learning: tomographic protocols for acquiring a reduced, but sufficient, classical description of a quantum system. Developing fast methods for partial tomography addresses a critical bottleneck in quantum simulation algorithms, which is a particularly pressing issue for …
Enabling And Optimizing Multi-Modal Sense-Making For Human-Ai Interaction Tasks, Dulanga Kaveesha Weerakoon Weerakoon Mudiyanselage
Enabling And Optimizing Multi-Modal Sense-Making For Human-Ai Interaction Tasks, Dulanga Kaveesha Weerakoon Weerakoon Mudiyanselage
Dissertations and Theses Collection (Open Access)
The rapid pace of adoption of mixed-reality in tandem with advances in NLP and computer vision have opened up unprecedented opportunities for more naturalistic interaction interfaces which underpin Human-AI collaborative applications such as spatial computing and interactive conversational agents. One notable example is the emergence of interactive virtual assistants, which facilitate more natural communication of instructions and queries through modalities like voice and text. This trend is driving the development of innovative ubiquitous, mixed-reality computing applications. Such interactive, natural communication is also critical to support advances in human-robot interactive co-working, across a variety of industrial, commercial and home environments. Conventional …
Enabling Criticality-Aware Optimized Machine Perception At The Edge, Ila Nitin Gokarn
Enabling Criticality-Aware Optimized Machine Perception At The Edge, Ila Nitin Gokarn
Dissertations and Theses Collection (Open Access)
Cyber-physical systems and applications have fundamentally changed people and processes in the way they interact with the physical world, ushering in the fourth industrial revolution. Supported by a variety of sensors, hardware platforms, artificial intelligence and machine learning models, and systems frameworks, CPS applications aim to automate and ease the burden of repetitive, laborious, or unsafe tasks borne by humans. Machine visual perception, encompassing tasks such as object detection, object tracking and activity analysis, is a key technical enabler of such CPS applications. Efficient execution of such machine vision perception tasks on resource-constrained edge devices, especially in terms of ensuring …
Improving The Performance Of Wi-Fi Indoor Localization In Both Dense And Unknown Environments, Quang Truong Hai
Improving The Performance Of Wi-Fi Indoor Localization In Both Dense And Unknown Environments, Quang Truong Hai
Dissertations and Theses Collection (Open Access)
Indoor localization is important for various pervasive applications, garnering considerable research attention over recent decades. Despite numerous proposed solutions, the practical application of these methods in real-world environments with high applicability remains challenging. One compelling use case for building owners is the ability to track individuals as they navigate through the building, whether for security, customer analytics, space utilization planning, or other management purposes. However, this task becomes exceedingly difficult in environments with hundreds or thousands of people in motion. Conversely, the need to track oneself’s location is also meaningful from the perspective of individuals traversing in crowded spaces. These …
Genetic Algorithm Optimization Of Experiment Design For Targeted Uncertainty Reduction, Alexander Amedeo Depillis
Genetic Algorithm Optimization Of Experiment Design For Targeted Uncertainty Reduction, Alexander Amedeo Depillis
Masters Theses
Nuclear cross sections are a set of parameters that capture probability information about various nuclear reactions. Nuclear cross section data must be experimentally measured, and this results in simulations with nuclear data-induced uncertainties on simulation outputs. This nuclear data-induced uncertainty on most parameters of interest can be reduced by adjusting the nuclear data based on the results from an experiment. Integral nuclear experiments are experiments where the results are related to many different cross sections. Nuclear data may be adjusted to have less uncertainty by adjusting them to match the results obtained from integral experiments. Different integral experiments will adjust …
Advancing Compact Modeling Of Electronic Devices: Machine Learning Approaches With Neural Networks, Mixture Density Networks, And Deep Symbolic Regression, Jack Robert Hutchins
Advancing Compact Modeling Of Electronic Devices: Machine Learning Approaches With Neural Networks, Mixture Density Networks, And Deep Symbolic Regression, Jack Robert Hutchins
Masters Theses
This thesis pioneers the integration of deep learning techniques into the realm of compact modeling, presenting three distinct approaches that enhance the precision, efficiency, and adaptability of compact models for electronic devices. The first method introduces a Generalized Multilayer Perception Compact Model, leveraging the function approximation capabilities of neural networks through a multilayer perception (MLP) framework. This approach utilizes hyperband tuning to optimize network hyperparameters, demonstrating its effectiveness on a HfOx memristor and establishing a versatile modeling strategy for both single-state and multistate devices.
The second approach explores the application of Mixture Density Networks (MDNs) to encapsulate the inherent stochasticity …
Understanding Student Experiences With Tls Client Authentication, Clay A. Shubert
Understanding Student Experiences With Tls Client Authentication, Clay A. Shubert
Masters Theses
This thesis presents a comprehensive investigation into student experiences with TLS client authentication, highlighting the usability challenges and learning curves associated with this long term key managament system. We designed a study that required future innovators in technology and security to use modern-day implementations of this certificate-based authentication system. From this study, we analyzed server logs, project reports, and survey responses from students enrolled in the applied cryptography course. We revealed significant hurdles in the initial setup and long-term key management of credentials used in TLS client authentication, emphasizing the gap between theoretical knowledge and practical implementation skills. Through quantitative …
Evaluation Of An End-To-End Radiotherapy Treatment Planning Pipeline For Prostate Cancer, Mohammad Daniel El Basha, Court Laurence, Carlos Eduardo Cardenas, Julianne Pollard-Larkin, Steven Frank, David T. Fuentes, Falk Poenisch, Zhiqian H. Yu
Evaluation Of An End-To-End Radiotherapy Treatment Planning Pipeline For Prostate Cancer, Mohammad Daniel El Basha, Court Laurence, Carlos Eduardo Cardenas, Julianne Pollard-Larkin, Steven Frank, David T. Fuentes, Falk Poenisch, Zhiqian H. Yu
Dissertations & Theses (Open Access)
Radiation treatment planning is a crucial and time-intensive process in radiation therapy. This planning involves carefully designing a treatment regimen tailored to a patient’s specific condition, including the type, location, and size of the tumor with reference to surrounding healthy tissues. For prostate cancer, this tumor may be either local, locally advanced with extracapsular involvement, or extend into the pelvic lymph node chain. Automating essential parts of this process would allow for the rapid development of effective treatment plans and better plan optimization to enhance tumor control for better outcomes.
The first objective of this work, to automate the treatment …
Artificial Intelligence's Ability To Detect Online Predators, Olatilewa Osifeso
Artificial Intelligence's Ability To Detect Online Predators, Olatilewa Osifeso
Electronic Theses, Projects, and Dissertations
Online child predators pose a danger to children who use the Internet. Children fall victim to online predators at an alarming rate, based on the data from the National Center of Missing and Exploited Children. When making online profiles and joining websites, you only need a name, an email and a password without identity verification. Studies have shown that online predators use a variety of methods and tools to manipulate and exploit children, such as blackmail, coercion, flattery, and deception. These issues have created an opportunity for skilled online predators to have fewer obstacles when it comes to contacting and …
Leveraging Blockchain Technology To Revamp The Vehicle Electrification Journey: Perspectives Of Accountability And Economic Circularity, Eva Escobar Brown
Leveraging Blockchain Technology To Revamp The Vehicle Electrification Journey: Perspectives Of Accountability And Economic Circularity, Eva Escobar Brown
Electronic Theses, Projects, and Dissertations
The automotive industry is undergoing a significant transition accelerated by global emission regulations for a phase out of internal combustion engines (ICEs) and a transition toward the adoption of electric vehicles (EVs). While regulatory measures and incentivized adoption for EVs presents opportunities for reducing emissions and promoting sustainability, it also poses complex challenges. The EV industry faces potential production challenges, particularly in the sourcing, manufacturing, and lifecycle management of critical minerals and raw materials for electric vehicle batteries (EVBs). With a heavy reliance on a steady and diversified supply of critical minerals such as lithium, cobalt and rare earth elements, …
Crash Detecting System Using Deep Learning, Yogesh Reddy Muddam
Crash Detecting System Using Deep Learning, Yogesh Reddy Muddam
Electronic Theses, Projects, and Dissertations
Accidents pose a significant risk to both individual and property safety, requiring effective detection and response systems. This work introduces an accident detection system using a convolutional neural network (CNN), which provides an impressive accuracy of 86.40%. Trained on diverse data sets of images and videos from various online sources, the model exhibits complex accident detection and classification and is known for its prowess in image classification and visualization.
CNN ensures better accident detection in various scenarios and road conditions. This example shows its adaptability to a real-world accident scenario and enhances its effectiveness in detecting early events. A key …
Multi-Script Handwriting Identification By Fragmenting Strokes, Joshua Jude Thomas
Multi-Script Handwriting Identification By Fragmenting Strokes, Joshua Jude Thomas
<strong> Theses and Dissertations </strong>
This study tests the effectiveness of Multi-Script Handwriting Identification after simplifying character strokes, by segmenting them into sub-parts. Character simplification is performed through splitting the character by branching-points and end-points, a process called stroke fragmentation in this study. The resulting sub-parts of the character are called stroke fragments and are evaluated individually to identify the writer. This process shares similarities with the concept of stroke decomposition in Optical Character Recognition which attempts to recognize characters through the writing strokes that make them up. The main idea of this study is that the characters of different writing‑scripts (English, Chinese, etc.) may …
Exploring The Relationship Between Anxiety And Virtual Reality Sickness, David Wesley Woolverton
Exploring The Relationship Between Anxiety And Virtual Reality Sickness, David Wesley Woolverton
<strong> Theses and Dissertations </strong>
As virtual reality (VR) becomes more commonly used in education, it is important to understand the technology’s weakness and mitigate any potential negative effects on student success. One adverse side-effect of VR use is simulation-induced motion sickness, known in the context of VR as VR sickness. Previous research by Howard and Van Zandt (2021) found that possessing a phobia had a significant positive correlation with VR sickness, but only if the phobia is triggered by the simulation, suggesting that symptoms are actually connected to the anxiety the phobia induces. This study explored the hypothesized correlation between anxiety and VR sickness, …
Examining Outcomes Of Privacy Risk And Brand Trust On The Adoption Of Consumer Smart Devices, Marianne C. Loes
Examining Outcomes Of Privacy Risk And Brand Trust On The Adoption Of Consumer Smart Devices, Marianne C. Loes
<strong> Theses and Dissertations </strong>
With more connected devices on earth than there are people, Internet of Things (IoT) is arguably just as innovative as the original introduction of the Internet. Though much of the research on technology acceptance and adoption has been conducted in organizational settings, the consumer use of IoT technologies, such as smart devices, is becoming a fertile field of research. The merger of these research streams is especially relevant from a societal perspective as smart devices become more embedded in consumer’s daily lives, particularly with the introduction of the “meta verse.” While original technology acceptance research is limited to two system-specific …
Next-Generation Crop Monitoring Technologies: Case Studies About Edge Image Processing For Crop Monitoring And Soil Water Property Modeling Via Above-Ground Sensors, Nipuna Chamara
Dissertations and Doctoral Documents from University of Nebraska-Lincoln, 2023–
Artificial Intelligence (AI) has advanced rapidly in the past two decades. Internet of Things (IoT) technology has advanced rapidly during the last decade. Merging these two technologies has immense potential in several industries, including agriculture.
We have identified several research gaps in utilizing IoT technology in agriculture. One problem was the digital divide between rural, unconnected, or limited connected areas and urban areas for utilizing images for decision-making, which has advanced with the growth of AI. Another area for improvement was the farmers' demotivation to use in-situ soil moisture sensors for irrigation decision-making due to inherited installation difficulties. As Nebraska …
Asteroidal Sets And Dominating Targets In Graphs, Oleksiy Al-Saadi
Asteroidal Sets And Dominating Targets In Graphs, Oleksiy Al-Saadi
Dissertations and Doctoral Documents from University of Nebraska-Lincoln, 2023–
The focus of this Ph.D. thesis is on various distance and domination properties in graphs. In particular, we prove strong results about the interactions between asteroidal sets and dominating targets. Our results add to or extend a plethora of results on these properties within the literature. We define the class of strict dominating pair graphs and show structural and algorithmic properties of this class. Notably, we prove that such graphs have diameter 3, 4, or contain an asteroidal quadruple. Then, we design an algorithm to to efficiently recognize chordal hereditary dominating pair graphs. We provide new results that describe the …
Aggregate Games: Computations And Applications, Jared Soundy
Aggregate Games: Computations And Applications, Jared Soundy
Dissertations and Doctoral Documents from University of Nebraska-Lincoln, 2023–
Existing computational game theory studies consider compact representations of games that capture agent interaction in real-world environments and examine computation aspects of computing equilibrium concepts to analyze or predict agent behavior.
One of the most well-studied representations that capture many commonly studied real-world environments is aggregate games. Aggregate games, first systematically studied by Nobel laureate Reinhard Selten, have various applications in modeling the decision-making interdependence of agents, where each agent’s utility function depends on their own actions and the aggregations or summarizations of the actions of all agents. These applications include Cournot oligopoly competition, public good contribution, and voting, where …
From Bits To Beds: Design And Implementation Of A Hotel Booking System A Coding Project, Alexa Gilman
From Bits To Beds: Design And Implementation Of A Hotel Booking System A Coding Project, Alexa Gilman
University Honors College
This thesis presents a comprehensive hotel booking system designed and implemented to showcase the transition "From Bits to Beds". There are two main motivations behind this project: firstly, to provide users with a user-friendly and efficient platform for booking accommodations. Secondly, it serves as a great learning opportunity, providing hands-on practice with coding, collaboration with teammates, and exposure to real-world challenges. The system utilizes technologies such as JavaScript, Express.js, and HTML/CSS to offer features like browsing hotels, filtering options, user authentication, and booking management. The implementation of this project demonstrates a successful integration of backend and frontend components, ensuring reliability …
Sustainable Accounting: The Benefits And Challenges Of Its Implementation, Collin Eckstein
Sustainable Accounting: The Benefits And Challenges Of Its Implementation, Collin Eckstein
University Honors College
This thesis is centered around the idea that sustainability is a necessary component within the world. Environmental, social, and governance (ESG) factors are key components of analyzing sustainable practices. Although accountants have historically focused on financial reporting, they now have the added function of sustainable accounting as environmental implications are an area of concern for companies. A substantial component of this thesis centers around analyzing how ESG factors contribute to an organization’s financial performance. It also observes how comprehensive sustainability reports impact investor decisions and examines the challenges that auditors face when providing assurance for sustainability initiatives. Furthermore, it examines …
The Effects Of Using Machine Translators On The Performance Of Second Language Learners, Kasey Myer
The Effects Of Using Machine Translators On The Performance Of Second Language Learners, Kasey Myer
University Honors College
With the rise of technology has also come the development of various online language translators and artificial intelligence that are often utilized by individuals learning a second language. However, there is a wide range of quality between the different machine translation tools, and many people tend to be under the impression that it is inferior to the quality of interpretations provided by human translators. This paper considers the positives and negatives of machine translation as a tool for second language learning. Variations between the input and output languages on a grammatical and cultural level are analyzed. Machine translation is compared …
Ai: Is The Future Robots?, Ruthanne Fischer
Ai: Is The Future Robots?, Ruthanne Fischer
University Honors College
The goal of this thesis is to analyze how Artificial Intelligence is actively changing. The newly developed technology that is known as Artificial Intelligence can potentially have implications that are not yet known. Artificial Intelligence impacts the business world in many ways. Things such as ChatGPT and Deepfakes are some of the biggest forms of Artificial Intelligence today. It is important to know how Artificial Intelligence is changing every day because no one knows the true implications of a technology like this. It is crucial for companies to understand how this technology can potentially be harmful to their employees. Artificial …
Cybervictimization And Depression: A Cultural Standpoint, Paige Heagy
Cybervictimization And Depression: A Cultural Standpoint, Paige Heagy
University Honors College
The author’s aim was to investigate the relationship between cybervictimization and depression, as well as using peer attachment and culture as moderators by giving questionnaires to 1347 participants (age range = 11-15 years) from India and the United States. Through four questionnaires, adolescents reported their levels of endorsement in either individualism or collectivism culture, levels of cybervictimization, levels of depression/depressive symptoms, and their levels of peer attachment. Adolescents reported that there is a significantly positive correlation between cybervictimization and depression. Differences were found according to culture and peer attachment, as well. Cybervictimization has begun to erupt worldwide as internet usage …
In-Between Frame Generation For 2d Animation Using Generative Adversarial Networks, Francisco Arriaga Pazos
In-Between Frame Generation For 2d Animation Using Generative Adversarial Networks, Francisco Arriaga Pazos
Open Access Theses & Dissertations
Traditional 2D animation remains a largely manual process where each frame in a video is hand-drawn, as no robust algorithmic solutions exist to assist in this process. This project introduces a system that generates intermediate frames in an uncolored 2D animated video sequence using Generative Adversarial Networks (GAN), a deep learning approach widely used for tasks within the creative realm. We treat the task as a frame interpolation problem, and show that adding a GAN dynamic to a system significantly improves the perceptual fidelity of the generated images, as measured by perceptual oriented metrics that aim to capture human judgment …
Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy
Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy
Theses/Capstones/Creative Projects
Cryptocurrencies rely on a distributed public ledger (record of transactions) in order to perform their intended functions. However, the public’s ability to audit the network is both its greatest strength and greatest weakness: Anyone can see what address sent currency, and to whom the currency was sent. If cryptocurrency is ever going to take some of the responsibility of fiat currency, then there needs to be a certain level of confidentiality. Thus far, Monero has come out on top as the preferred currency for embodying the ideas of privacy and confidentiality. Through numerous cryptographic procedures, Monero is able to obfuscate …
Creating Interpretable Deep Learning Models To Identify Species Using Environmental Dna Sequences, Samuel Waggoner
Creating Interpretable Deep Learning Models To Identify Species Using Environmental Dna Sequences, Samuel Waggoner
Honors College
This research aims to develop an interpretable and fast machine learning (ML) model for identifying species using environmental DNA (eDNA). eDNA is a technique used to detect the presence or absence of species in an ecosystem by analyzing the DNA that animals naturally leave behind in water or soil. However, there can be millions of sequences to classify and the reference databases are sizeable, so traditional methods such as BLAST are slow. Convolutional neural networks (CNNs) have been shown to be 150 times faster at classifying sequences. In this work, we create a CNN that achieves 92.5% accuracy, surpassing the …
Murmurations And Root Numbers, Alexey Pozdnyakov
Murmurations And Root Numbers, Alexey Pozdnyakov
University Scholar Projects
We report on a machine learning investigation of large datasets of elliptic curves and L-functions. This leads to the discovery of murmurations, an unexpected correlation between the root numbers and Dirichlet coefficients of L-functions. We provide a formal definition of murmurations, describe the connection with 1-level density, and provide three examples for which the murmuration phenomenon has been rigorously proven. Using our understanding of murmurations, we then build new machine learning models in search of a polynomial time algorithm for predicting root numbers. Based on our models and several heuristic arguments, we conclude that it is unlikely for …
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Poster Presentations
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …