Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Science

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 667

Full-Text Articles in Physical Sciences and Mathematics

The Future Between Quantum Computing And Cybersecurity, Daniel Dorazio Jan 2023

The Future Between Quantum Computing And Cybersecurity, Daniel Dorazio

Williams Honors College, Honors Research Projects

Quantum computing, a novel branch of technology based on quantum theory, processes information in ways beyond the capabilities of classical computers. Traditional computers use binary digits [bits], but quantum computers use quantum binary digits [qubits] that can exist in multiple states simultaneously. Since developing the first two-qubit quantum computer in 1998, the quantum computing field has experienced rapid growth.

Cryptographic algorithms such as RSA and ECC, essential for internet security, rely on the difficulty of complex math problems that classical computers can’t solve. However, the advancement of quantum technology threatens these encryption systems. Algorithms, such as Shor’s, leverage the power …


The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii Jan 2023

The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii

Browse all Theses and Dissertations

The widespread expansion of Electric Vehicles (EV) throughout the world creates a requirement for charging stations. While Cybersecurity research is rapidly expanding in the field of Electric Vehicle Infrastructure, efforts are impacted by the availability of testing platforms. This paper presents a solution called the “Open Charge Point Protocol (OCPP) Cyber Range.” Its purpose is to conduct Cybersecurity research against vulnerabilities in the OCPP v1.6 protocol. The OCPP Cyber Range can be used to enable current or future research and to train operators and system managers of Electric Charge Vehicle Supply Equipment (EVSE). This paper demonstrates this solution using three …


Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan Jan 2023

Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan

Browse all Theses and Dissertations

Deploying Mandatory Access Controls (MAC) is a popular way to provide host protection against malware. Unfortunately, current implementations lack the flexibility to adapt to emergent malware threats and are known for being difficult to configure. A core tenet of MAC security systems is that the policies they are deployed with are immutable from the host while they are active. This work looks at deploying a MAC system that leverages using encrypted security tokens to allow for redeploying policy configurations in real-time without the need to stop a running process. This is instrumental in developing an adaptive framework for security systems …


A Symbolic Music Transformer For Real-Time Expressive Performance And Improvisation, Arnav Shirodkar Jan 2023

A Symbolic Music Transformer For Real-Time Expressive Performance And Improvisation, Arnav Shirodkar

Senior Projects Fall 2023

With the widespread proliferation of AI technology, deep architectures — many of which are based on neural networks — have been incredibly successful in a variety of different research areas and applications. Within the relatively new domain of Music Information Retrieval (MIR), deep neural networks have also been successful for a variety of tasks, including tempo estimation, beat detection, genre classification, and more. Drawing inspiration from projects like George E. Lewis's Voyager and Al Biles's GenJam, two pioneering endeavors in human-computer interaction, this project attempts to tackle the problem of expressive music generation and seeks to create a Symbolic Music …


Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte Jan 2023

Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte

Browse all Theses and Dissertations

Modern web development has grown increasingly reliant on scripting languages such as PHP. The complexities of an interpreted language means it is very difficult to account for every use case as unusual interactions can cause unintended side effects. Automatically generating test input to detect bugs or fuzzing, has proven to be an effective technique for JavaScript engines. By extending this concept to PHP, existing vulnerabilities that have since gone undetected can be brought to light. While PHP fuzzers exist, they are limited to testing a small quantity of test seeds per second. In this thesis, we propose a solution for …


Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula Jan 2023

Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula

Browse all Theses and Dissertations

Malware detection is a critical task in ensuring the security of computer systems. Due to a surge in malware and the malware program sophistication, machine learning methods have been developed to perform such a task with great success. To further learn structural semantics, Graph Neural Networks abbreviated as GNNs have emerged as a recent practice for malware detection by modeling the relationships between various components of a program as a graph, which deliver promising detection performance improvement. However, this line of research attends to individual programs while overlooking program interactions; also, these GNNs tend to perform feature aggregation from neighbors …


Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams Jan 2023

Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams

Browse all Theses and Dissertations

Most of today’s time series data contain anomalies and multiple seasonalities, and accurate anomaly detection in these data is critical to almost any type of business. However, most mainstream forecasting models used for anomaly detection can only incorporate one or no seasonal component into their forecasts and cannot capture every known seasonal pattern in time series data. In this thesis, we propose a new multi-seasonal forecasting model for anomaly detection in time series data that extends the popular Seasonal Autoregressive Integrated Moving Average (SARIMA) model. Our model, named multi-SARIMA, utilizes a time series dataset’s multiple pre-determined seasonal trends to increase …


Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula Jan 2023

Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula

Browse all Theses and Dissertations

Machine learning techniques utilize training data samples to help understand, predict, classify, and make valuable decisions for different applications such as medicine, email filtering, speech recognition, agriculture, and computer vision, where it is challenging or unfeasible to produce traditional algorithms to accomplish the needed tasks. Unsupervised ML-based approaches have emerged for building groups of data samples known as data clusters for driving necessary decisions about these data samples and helping solve challenges in critical applications. Data clustering is used in multiple fields, including health, finance, social networks, education, and science. Sequential processing of clustering algorithms, like the K-Means, Minibatch K-Means, …


Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal Jan 2023

Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal

Browse all Theses and Dissertations

Heart failure is a syndrome which effects a patient’s quality of life adversely. It can be caused by different underlying conditions or abnormalities and involves both cardiovascular and non-cardiovascular comorbidities. Heart failure cannot be cured but a patient’s quality of life can be improved by effective treatment through medicines and surgery, and lifestyle management. As effective treatment of heart failure incurs cost for the patients and resource allocation for the hospitals, predicting length of stay of these patients during each hospitalization becomes important. Heart failure can be classified into two types: left sided heart failure and right sided heart failure. …


Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha Jan 2023

Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha

Browse all Theses and Dissertations

Smart cities have emerged to tackle many critical problems that can thwart the overwhelming urbanization process, such as traffic jams, environmental pollution, expensive health care, and increasing energy demand. This Master thesis proposes efficient and high-quality cloud-based machine-learning solutions for efficient and sustainable smart cities environment. Different supervised machine-learning models for air quality predication (AQP) in efficient and sustainable smart cities environment is developed. For that, ML-based techniques are implemented using cloud-based solutions. For example, regression and classification methods are implemented using distributed cloud computing to forecast air execution time and accuracy of the implemented ML solution. These models are …


Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman Jan 2023

Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman

Browse all Theses and Dissertations

Insider threats to information security have become a burden for organizations. Understanding insider activities leads to an effective improvement in identifying insider attacks and limits their threats. This dissertation presents three systems to detect insider threats effectively. The aim is to reduce the false negative rate (FNR), provide better dataset use, and reduce dimensionality and zero padding effects. The systems developed utilize deep learning techniques and are evaluated using the CERT 4.2 dataset. The dataset is analyzed and reformed so that each row represents a variable length sample of user activities. Two data representations are implemented to model extracted features …


A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham Jan 2023

A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham

Browse all Theses and Dissertations

The Industrial Internet of Things (IIoT) refers to a set of smart devices, i.e., actuators, detectors, smart sensors, and autonomous systems connected throughout the Internet to help achieve the purpose of various industrial applications. Unfortunately, IIoT applications are increasingly integrated into insecure physical environments leading to greater exposure to new cyber and physical system attacks. In the current IIoT security realm, effective anomaly detection is crucial for ensuring the integrity and reliability of critical infrastructure. Traditional security solutions may not apply to IIoT due to new dimensions, including extreme energy constraints in IIoT devices. Deep learning (DL) techniques like Convolutional …


Accelerating Precision Station Keeping For Automated Aircraft, James D. Anderson Jan 2023

Accelerating Precision Station Keeping For Automated Aircraft, James D. Anderson

Browse all Theses and Dissertations

Automated vehicles pose challenges in various research domains, including robotics, machine learning, computer vision, public safety, system certification, and beyond. These vehicles autonomously handle navigation and locomotion, often requiring minimal user interaction, and can operate on land, in water, or in the air. In the context of aircraft, one specific application is Automated Aerial Refueling (AAR). Traditional aerial refueling involves a "tanker" aircraft using a mechanism, such as a rigid boom arm or a flexible hose, to transfer fuel to another aircraft designated as the "receiver". For AAR, the boom arm may be maneuvered automatically, or in certain instances the …


The Proof Is In The Pudding – Using Perceived Stress To Measure Short-Term Impact In Initiatives To Enhance Gender Balance In Computing Education, Alina Berry, Sarah Jane Delany Jan 2023

The Proof Is In The Pudding – Using Perceived Stress To Measure Short-Term Impact In Initiatives To Enhance Gender Balance In Computing Education, Alina Berry, Sarah Jane Delany

Academic Posters Collection

The problem of gender imbalance in computing higher education has forced academics and professionals to implement a wide range of initiatives. Many initiatives use recruitment or retention numbers as their most obvious evidence of impact. This type of evidence of impact is, however, more resource heavy to obtain, as well as often requires a longitudinal approach. There are many shorter term initiatives that use other ways to measure their success.

First, this poster presents with a review of existing evaluation measures in interventions to recruit and retain women in computing education across the board. Three main groups of evaluation come …


Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams Jan 2023

Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams

Browse all Theses and Dissertations

Obtaining accurate inferences from deep neural networks is difficult when models are trained on instances with conflicting labels. Algorithmic recognition of online hate speech illustrates this. No human annotator is perfectly reliable, so multiple annotators evaluate and label online posts in a corpus. Labeling scheme limitations, differences in annotators' beliefs, and limits to annotators' honesty and carefulness cause some labels to disagree. Consequently, decisive and accurate inferences become less likely. Some practical applications such as social research can tolerate some indecisiveness. However, an online platform using an indecisive classifier for automated content moderation could create more problems than it solves. …


Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee Jan 2023

Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee

Browse all Theses and Dissertations

This research explores data-driven AI techniques to extract insights from relevant medical data for pain management in patients with Sickle Cell Disease (SCD). SCD is an inherited red blood cell disorder that can cause a multitude of complications throughout an individual’s life. Most patients with SCD experience repeated, unpredictable episodes of severe pain. Arguably, the most challenging aspect of treating pain episodes in SCD is assessing and interpreting the patient’s pain intensity level due to the subjective nature of pain. In this study, we leverage multiple data-driven AI techniques to improve pain management in patients with SCD. The proposed approaches …


Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani Jan 2023

Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani

Browse all Theses and Dissertations

Identifying the version of the Solidity compiler used to create an Ethereum contract is a challenging task, especially when the contract bytecode is obfuscated and lacks explicit metadata. Ethereum bytecode is highly complex, as it is generated by the Solidity compiler, which translates high-level programming constructs into low-level, stack-based code. Additionally, the Solidity compiler undergoes frequent updates and modifications, resulting in continuous evolution of bytecode patterns. To address this challenge, we propose using deep learning models to analyze Ethereum bytecodes and infer the compiler version that produced them. A large number of Ethereum contracts and the corresponding compiler versions is …


Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh Jan 2023

Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh

Browse all Theses and Dissertations

The Internet of Things (IoT) is used in many fields that generate sensitive data, such as healthcare and surveillance. Increased reliance on IoT raised serious information security concerns. This dissertation presents three systems for analyzing and classifying IoT traffic using Deep Learning (DL) models, and a large dataset is built for systems training and evaluation. The first system studies the effect of combining raw data and engineered features to optimize the classification of encrypted and compressed IoT traffic using Engineered Features Classification (EFC), Raw Data Classification (RDC), and combined Raw Data and Engineered Features Classification (RDEFC) approaches. Our results demonstrate …


Crosshair Optimizer, Jason Torrence Jan 2023

Crosshair Optimizer, Jason Torrence

All Master's Theses

Metaheuristic optimization algorithms are heuristics that are capable of creating a "good enough'' solution to a computationally complex problem. Algorithms in this area of study are focused on the process of exploration and exploitation: exploration of the solution space and exploitation of the results that have been found during that exploration, with most resources going toward the former half of the process. The novel Crosshair optimizer developed in this thesis seeks to take advantage of the latter, exploiting the best possible result as much as possible by directly searching the area around that best result with a stochastic approach. This …


Terrain Cost Learning From Human Preferences For Robot Path Planning Using A Visual User Interface, Kaivalya Velagapudi Jan 2023

Terrain Cost Learning From Human Preferences For Robot Path Planning Using A Visual User Interface, Kaivalya Velagapudi

Electronic Theses and Dissertations

Robot navigation in terrains with limited exploration and limited knowledge has been a problem of interest in robotics due to the potential dangers that may arise during traversal. Due to the large number of path permutations within a complex and feature-rich real-world environment, and in the interest of saving time and ensuring safety, the robot should learn the optimal path without repeated exploration of the terrain. This can be accomplished by leveraging the path preferences of a human operator so that, with selective inputs, the agent can effectively learn a terrain-cost mapping in order to determine the optimal route, thereby …


Credit Worthiness Tool For Credit Unions, Rylee Christoffersen, Mario Ramalho Jan 2023

Credit Worthiness Tool For Credit Unions, Rylee Christoffersen, Mario Ramalho

ICT

The core objectives for the Capstone project were to mine data in order to create a tool for Credit Unions (and banks) that will evaluate customers credit worthiness based on an ethical standardised criteria that is transparent to all. We explored why this was necessary and explored how important it could be to the business. Our focus is on helping Credit Unions have a stronger online presence as the banking sector has been changing rapidly and moving online and Credit Unions are currently behind in the market in this regard .This tool would help automate the credit approval process, reducing …


Facial Recognition Using Neural Network, Georges Diego Hawile Pinheiro, Allison Alves De Moura Jan 2023

Facial Recognition Using Neural Network, Georges Diego Hawile Pinheiro, Allison Alves De Moura

ICT

Face recognition technology using machine learning and neural networks has become increasingly prevalent in recent years, revolutionizing various fields such as security, law enforcement, and marketing. The development of an AI-based system that can perform face recognition using these technologies has become a significant focus for researchers and developers worldwide. This project aims to create such a system that can recognize and classify faces accurately using machine learning algorithms and neural networks. By leveraging these advanced technologies, the system can learn and improve over time, leading to higher accuracy rates and enhanced performance.


Predicting The Effects Of Climate Change On Irish Agriculture, Rodrigo Matsumoto, Sarah Kuprian Carrinho Jan 2023

Predicting The Effects Of Climate Change On Irish Agriculture, Rodrigo Matsumoto, Sarah Kuprian Carrinho

ICT

The impact of climate change on agriculture is a growing concern worldwide, and Ireland is no exception. The purpose of this project is to use machine learning techniques to predict the effects of climate change on Irish agriculture and identify strategies for adaptation and mitigation. The project uses the Cross-Industry Standard Process for Data Mining (CRISP-DM) methodology to guide the data analysis process, MoSCoW prioritization to identify the most critical needs, and SWOT analysis to evaluate the strengths, weaknesses, opportunities, and threats our project may encounter. Historical temperature data for Ireland and Dublin will be used as our data sources. …


Fake News Detection Using Natural Language Processing, Fabiolla Mayrink Costa, Rael Guimaraes Jan 2023

Fake News Detection Using Natural Language Processing, Fabiolla Mayrink Costa, Rael Guimaraes

ICT

Nowadays with the advance of technologies we have vast access to any sort of information. We are able to use our phone/computer to access the news of any part of the world. It is great to keep us informed about everything that is happening around the world. It is also a powerful tool used for companies while making strategic business decisions. The biggest issue is that technology can and is being used to manipulate people/companies by propagating fake news. Fake news can mislead people's perceptions while forming opinions on a determined subject. It can also have a big impact on …


Menu Recommendation System Using Machine Learning, Kelly Crystine Ferreira Jesus, Leo Jaime Kayser Macieski Jan 2023

Menu Recommendation System Using Machine Learning, Kelly Crystine Ferreira Jesus, Leo Jaime Kayser Macieski

ICT

Developing a recommendation menu system for restaurants based on the restaurant data and/or city food purchase data to help and change the way restaurants build their menu. Using Data Analysis and Machine Learning to build a project that aims to solve the problem of restaurants and chefs when it comes to preparing menus, the latter with ingredients and dishes that encourage their customers to order more, come back and recommend the restaurant. Helping chefs to create dishes for their restaurants with more accuracy and higher probability to be ordered by their customers. The project will cover tools to build the …


Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn Dec 2022

Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn

Culminating Experience Projects

This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …


Wordmuse, John M. Nelson Dec 2022

Wordmuse, John M. Nelson

Computer Science and Software Engineering

Wordmuse is an application that allows users to enter a song and a list of keywords to create a new song. Built on Spotify's API, this project showcases the fusion of music composition and artificial intelligence. This paper also discusses the motivation, design, and creation of Wordmuse.


Predicting Startup Success Using Publicly Available Data, Emily Gavrilenko Dec 2022

Predicting Startup Success Using Publicly Available Data, Emily Gavrilenko

Master's Theses

Predicting the success of an early-stage startup has always been a major effort for investors and venture funds. Statistically, there are about 305 million total startups created in a year, but less than 10% of them succeed to become profitable businesses. Accurately identifying the signs of startup growth is the work of countless investors, and in recent years, research has turned to machine learning in hopes of improving the accuracy and speed of startup success prediction.

To learn about a startup, investors have to navigate many different internet sources and often rely on personal intuition to determine the startup’s potential …


Applying Expansive Framing To An Integrated Mathematics-Computer Science Unit, Kimberly Evagelatos Beck, Jessica F. Shumway Sep 2022

Applying Expansive Framing To An Integrated Mathematics-Computer Science Unit, Kimberly Evagelatos Beck, Jessica F. Shumway

Publications

In this research report for the National Council of Teachers of Mathematics 2022 Research Conference, we discuss the theory of Expansive Framing and its application to an interdisciplinary mathematics-computer science curricular unit.


Protection Against Contagion In Complex Networks, Pegah Hozhabrierdi Aug 2022

Protection Against Contagion In Complex Networks, Pegah Hozhabrierdi

Dissertations - ALL

In real-world complex networks, harmful spreads, commonly known as contagions, are common and can potentially lead to catastrophic events if uncontrolled. Some examples include pandemics, network attacks on crucial infrastructure systems, and the propagation of misinformation or radical ideas. Thus, it is critical to study the protective measures that inhibit or eliminate contagion in these networks. This is known as the network protection problem.

The network protection problem investigates the most efficient graph manipulations (e.g., node and/or edge removal or addition) to protect a certain set of nodes known as critical nodes. There are two types of critical nodes: (1) …