Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Science

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 61 - 90 of 667

Full-Text Articles in Physical Sciences and Mathematics

Cyberbullying Detection Using Weakly Supervised And Fully Supervised Learning, Abhinav Abhishek Aug 2022

Cyberbullying Detection Using Weakly Supervised And Fully Supervised Learning, Abhinav Abhishek

ETD Archive

Machine learning is a very useful tool to solve issues in multiple domains such as sentiment analysis, fake news detection, facial recognition, and cyberbullying. In this work, we have leveraged its ability to understand the nuances of natural language to detect cyberbullying. We have further utilized it to detect the subject of cyberbullying such as age, gender, ethnicity, and religion. Further, we have built another layer to detect the cases of misogyny in cyberbullying. In one of our experiments, we created a three-layered architecture to detect cyberbullying , then to detect if it is gender based and finally if it …


The Ukicer 2022 Conference Poster: Techmate: A Best Practice Toolkit For Driving Sustainable Acceleration Towards Gender Equality In Technology Disciplines In Heis., Alina Berry Aug 2022

The Ukicer 2022 Conference Poster: Techmate: A Best Practice Toolkit For Driving Sustainable Acceleration Towards Gender Equality In Technology Disciplines In Heis., Alina Berry

Conference papers

TechMate is a research project that is being developed to enhance gender balance in technology disciplines, in particular computing higher education in Ireland and beyond. Gender imbalance in computing education is a well-known issue: in Ireland, less than 15% of the student population in computer science, ICT and related disciplines are women. Despite a significant amount of research and practical work conducted in the recent decades, the problem still persists and this research initiative aims to improve the situation.

Among the main aims of this project, there is a development of a toolkit to drive sustainable acceleration towards gender equality …


Artifact Development For The Prediction Of Stress Levels On Higher Education Students Using Machine Learning, Valentina Quiroga, Alejandra Hurtado, José Rojas Jul 2022

Artifact Development For The Prediction Of Stress Levels On Higher Education Students Using Machine Learning, Valentina Quiroga, Alejandra Hurtado, José Rojas

ICT

Stress is an adaptative reaction of an organism, human or not, to the demands of fitting in an environment (Kav Vedhara, 1996). When stress originates in an educational context, it is common to refer to it as a student and their mechanisms to adapt and cope with the academic demand. All humans experience stress during their lifetime, but when this overwhelmed feeling is prolonged can affect human behaviour and the ability to deal with physical and emotional pressure, having, as a result, a different range of problems. It is important for higher-level educations institutions, such as colleges and universities, to …


Querai – A Smart Quiz Generator, Elton Da Silva, Fernando Aires Da Silva, Kim Jang Womg, Tai Teei Ho Jul 2022

Querai – A Smart Quiz Generator, Elton Da Silva, Fernando Aires Da Silva, Kim Jang Womg, Tai Teei Ho

ICT

QUERAI is a website powered by an Artificial Intelligence Question & Answer quiz generator model aiming to enhance students' learning experience and improve teachers' qualitative work by giving them more time to deal with other activities such as assignment correction, general grading, and class preparation.


Problem Solving For Industry, Jozimar Basilio Ferreira, Nicholas Chibuike-Eruba, José Fernando González Anavia, Jolomi (Oritsejolomi) Sillo Jul 2022

Problem Solving For Industry, Jozimar Basilio Ferreira, Nicholas Chibuike-Eruba, José Fernando González Anavia, Jolomi (Oritsejolomi) Sillo

ICT

This project seeks to use reinforcement learning to develop AI agents used to controlled NPCs in video game worlds that are capable of mastering decision tasks in their video game environments. Our job will be to develop algorithms and methods that can effectively train the AI agents using Reinforcement learning, which can be used in various gaming environments and scenarios such as racing games and first-person shooters. We then market these agents to video game developers for use in their game worlds. The developer can use our agents as-is in their game without modifications or they can train them further, …


Smart Property Valuation. Problem Solving For Industry, David Silva, Luiz Augusto Dias, Raul M. Fuzita Jul 2022

Smart Property Valuation. Problem Solving For Industry, David Silva, Luiz Augusto Dias, Raul M. Fuzita

ICT

The analysis of this project it is used the CRISP-DM method. Smart Property Valuation (SPV) is a fictional company created by David Silva, Luiz Dias, and Raul Fuzita to analyse, explore, and prove the conception of a model capable of predicting or estimating prices for properties. They believe they can benefit common people, realtors, and construction companies with their solutions. This research is for educational purposes and should be treated as such.


The Use Of Deep Learning Solutions To Develop A Practice Tool To Support Lámh Language For Communication Partners, Gabriel Bueno Pimentel Borges Jul 2022

The Use Of Deep Learning Solutions To Develop A Practice Tool To Support Lámh Language For Communication Partners, Gabriel Bueno Pimentel Borges

ICT

This study has proposed an alternative to promote the learning and enhancement of Lámh language for communication partners that support current users by creating a real time detection tool to recognise 20 chosen Lámh signs based on existing studies in the field. This implementation was carried out by generating primary data composed by MediaPipe landmark numpy arrays of 40 frames and 45 repetitions per sign. The Neural Networks were built using the Python library Keras and the applied SVM models were built with the library sklearn. The real time detection was carried out by integrating the mentioned elements with the …


Defining Financial Risks And Market Trends Through Predictive Data Analysis, Marcelle Louise, Luciana Teixeira, Muhammad Shahbaz, Giovanni Andrade Jul 2022

Defining Financial Risks And Market Trends Through Predictive Data Analysis, Marcelle Louise, Luciana Teixeira, Muhammad Shahbaz, Giovanni Andrade

ICT

This project focuses on Dublin short term rental market opportunities, by developing pricing and rate occupancy prediction models based on machine learning approaches to identify patterns that may impact or aid users in making smarter and cost-effective decisions. The concept of this research is to show the financial feasibility of data services, as well as how data science can improve business and operational efficiency.


Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones May 2022

Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones

Other Student Works

This project will analyze the results of trials implementing various storage methods on Geth nodes to synchronize and maintain a full-archive state of the Ethereum blockchain. The purpose of these trials is to gain deeper insight to the process of lowering cost and increasing efficiency of blockchain storage using available technologies, analyzing results of various storage drives under similar conditions. It provides performance analysis and describes performance of each trial in relation to the others.


Human Trafficking And Machine Learning: A Data Pipeline From Law Agencies To Research Groups, Nathaniel Hites May 2022

Human Trafficking And Machine Learning: A Data Pipeline From Law Agencies To Research Groups, Nathaniel Hites

Computer Science and Engineering Theses and Dissertations

Human trafficking is a form of modern-day slavery that, while highly illegal, is more dangerous with the advancements of modern technology (such as the Internet), which allows such a practice to spread more easily and quickly all over the world. While the number of victims of human trafficking is large (according to non-profit organization Safe House, there are estimated to be about 20.5 million human trafficking victims, worldwide (“Human Trafficking Statistics & Facts.” Safe Horizon)- co-erced or manipulated by traffickers into either forced labor, or sexual exploitation and encounters), the number of heard cases is proportionally low- several thousand successful …


Increasing Perceived Realism Of Objects In A Mixed Reality Environment Using 'Diminished Virtual Reality', Logan Scott Parker May 2022

Increasing Perceived Realism Of Objects In A Mixed Reality Environment Using 'Diminished Virtual Reality', Logan Scott Parker

Honors Theses

With the recent explosion of popularity of virtual and mixed reality, an important question has arisen: “Is there a way to create a better blend of real and virtual worlds in a mixed reality experience?” This research attempts to determine whether a visual filter can be created and applied to virtual objects to better convince the brain into interpreting a composite of virtual and real views as one seamless view. The method devised in this thesis is being called 'Diminished Virtual Reality'. The results found in this study show that when presented with a scene composed of a combination of …


Improved Sensor-Based Human Activity Recognition Via Hybrid Convolutional And Recurrent Neural Networks, Sonia Perez-Gamboa May 2022

Improved Sensor-Based Human Activity Recognition Via Hybrid Convolutional And Recurrent Neural Networks, Sonia Perez-Gamboa

Electronic Theses, Projects, and Dissertations

Non-intrusive sensor-based human activity recognition is utilized in a spectrum of applications including fitness tracking devices, gaming, health care monitoring, and smartphone applications. Deep learning models such as convolutional neural networks (CNNs) and long short-term memory (LSTMs) recurrent neural networks provide a way to achieve human activity recognition accurately and effectively. This project designed and explored a variety of multi-layer hybrid deep learning architectures which aimed to improve human activity recognition performance by integrating local features and was scale invariant with dependencies of activities. We achieved a 94.7% activity recognition rate on the University of California, Irvine public domain dataset …


Building An Understanding Of Human Activities In First Person Video Using Fuzzy Inference, Bradley A. Schneider Jan 2022

Building An Understanding Of Human Activities In First Person Video Using Fuzzy Inference, Bradley A. Schneider

Browse all Theses and Dissertations

Activities of Daily Living (ADL’s) are the activities that people perform every day in their home as part of their typical routine. The in-home, automated monitoring of ADL’s has broad utility for intelligent systems that enable independent living for the elderly and mentally or physically disabled individuals. With rising interest in electronic health (e-Health) and mobile health (m-Health) technology, opportunities abound for the integration of activity monitoring systems into these newer forms of healthcare. In this dissertation we propose a novel system for describing ’s based on video collected from a wearable camera. Most in-home activities are naturally defined by …


Developing A Virtual Modular Synthesizer For Sound Waves And Midi, Margaret Jagger Jan 2022

Developing A Virtual Modular Synthesizer For Sound Waves And Midi, Margaret Jagger

Senior Independent Study Theses

Modular synthesis involves the alteration and modification of digital sound signals. Thus, this modular synthesizer allows a user the option of supplying their own MIDI-compatible controller to serve as an input source, or to use the built-in pure sound waves instead. Either input will be fed into the domain-specific language SuperCollider and altered, with specific sound modifications dependent on the input source used. Using theoretical knowledge of the physics behind the motion of sound waves, various modules and functionalities are created. Then, with SuperCollider, these modules are implemented into a synthesizer which accepts either pure sound waves or MIDI as …


Covidalert - A Wristwatch-Based System To Alert Users From Face Touching, Mrinmoy Roy Jan 2022

Covidalert - A Wristwatch-Based System To Alert Users From Face Touching, Mrinmoy Roy

Graduate Research Theses & Dissertations

Worldwide 219 million people have been infected and 4.5 million have lost their lives in ongoing Covid-19 pandemic. Until vaccines became widely available, precautions and safety measures like wearing masks, physical distancing, avoiding face touching were some of the primary means to curb the spread of virus. Face touching is a compulsive human behavior that can not be prevented without constantly making a conscious effort, even then it is inevitable. To address this problem, we have designed a smartwatch-based solution, CovidAlert, that leverages Random Forest algorithm trained on accelerometer and gyroscope data from the smartwatch to detect hand transition to …


The 4c’S Of Pal – An Evidence-Based Model For Implementing Peer Assisted Learning For Mature Students, Nevan Bermingham, Frances Boylan, Barry J. Ryan Jan 2022

The 4c’S Of Pal – An Evidence-Based Model For Implementing Peer Assisted Learning For Mature Students, Nevan Bermingham, Frances Boylan, Barry J. Ryan

Articles

Peer Assisted Leaning (PAL) programmes have been shown to enhance learner confidence and have an overall positive effect on learner comprehension, particularly in subjects traditionally perceived as difficult. This research describes the findings of a three-cycle Action Research study into the perceived benefits of implementing such a programme for mature students enrolled on a computer science programming module on an Access Foundation Programme in an Irish University. The findings from this study suggest that peer learning programmes offer students a valued support structure that aids transition and acculturation into tertiary education whilst simultaneously improving their subject-matter comprehension and confidence. An …


Validating Software States Using Reverse Execution, Nathaniel Christian Boland Jan 2022

Validating Software States Using Reverse Execution, Nathaniel Christian Boland

Browse all Theses and Dissertations

A key feature of software analysis is determining whether it is possible for a program to reach a certain state. Various methods have been devised to accomplish this including directed fuzzing and dynamic execution. In this thesis we present a reverse execution engine to validate states, the Complex Emulator. The Complex Emulator seeks to validate a program state by emulating it in reverse to discover if a contradiction exists. When unknown variables are found during execution, the emulator is designed to use constraint solving to compute their values. The Complex Emulator has been tested on small assembly programs and is …


Synthetic Aperture Ladar Automatic Target Recognizer Design And Performance Prediction Via Geometric Properties Of Targets, Jacob W. Ross Jan 2022

Synthetic Aperture Ladar Automatic Target Recognizer Design And Performance Prediction Via Geometric Properties Of Targets, Jacob W. Ross

Browse all Theses and Dissertations

Synthetic Aperture LADAR (SAL) has several phenomenology differences from Synthetic Aperture RADAR (SAR) making it a promising candidate for automatic target recognition (ATR) purposes. The diffuse nature of SAL results in more pixels on target. Optical wavelengths offers centimeter class resolution with an aperture baseline that is 10,000 times smaller than an SAR baseline. While diffuse scattering and optical wavelengths have several advantages, there are also a number of challenges. The diffuse nature of SAL leads to a more pronounced speckle effect than in the SAR case. Optical wavelengths are more susceptible to atmospheric noise, leading to distortions in formed …


Novel Natural Language Processing Models For Medical Terms And Symptoms Detection In Twitter, Farahnaz Golrooy Motlagh Jan 2022

Novel Natural Language Processing Models For Medical Terms And Symptoms Detection In Twitter, Farahnaz Golrooy Motlagh

Browse all Theses and Dissertations

This dissertation focuses on disambiguation of language use on Twitter about drug use, consumption types of drugs, drug legalization, ontology-enhanced approaches, and prediction analysis of data-driven by developing novel NLP models. Three technical aims comprise this work: (a) leveraging pattern recognition techniques to improve the quality and quantity of crawled Twitter posts related to drug abuse; (b) using an expert-curated, domain-specific DsOn ontology model that improve knowledge extraction in the form of drug-to-symptom and drug-to-side effect relations; and (c) modeling the prediction of public perception of the drug’s legalization and the sentiment analysis of drug consumption on Twitter. We collected …


A Solder-Defined Computer Architecture For Backdoor And Malware Resistance, Marc W. Abel Jan 2022

A Solder-Defined Computer Architecture For Backdoor And Malware Resistance, Marc W. Abel

Browse all Theses and Dissertations

This research is about securing control of those devices we most depend on for integrity and confidentiality. An emerging concern is that complex integrated circuits may be subject to exploitable defects or backdoors, and measures for inspection and audit of these chips are neither supported nor scalable. One approach for providing a “supply chain firewall” may be to forgo such components, and instead to build central processing units (CPUs) and other complex logic from simple, generic parts. This work investigates the capability and speed ceiling when open-source hardware methodologies are fused with maker-scale assembly tools and visible-scale final inspection.

The …


Deep Understanding Of Technical Documents : Automated Generation Of Pseudocode From Digital Diagrams & Analysis/Synthesis Of Mathematical Formulas, Nikolaos Gkorgkolis Jan 2022

Deep Understanding Of Technical Documents : Automated Generation Of Pseudocode From Digital Diagrams & Analysis/Synthesis Of Mathematical Formulas, Nikolaos Gkorgkolis

Browse all Theses and Dissertations

The technical document is an entity that consists of several essential and interconnected parts, often referred to as modalities. Despite the extensive attention that certain parts have already received, per say the textual information, there are several aspects that severely under researched. Two such modalities are the utility of diagram images and the deep automated understanding of mathematical formulas. Inspired by existing holistic approaches to the deep understanding of technical documents, we develop a novel formal scheme for the modelling of digital diagram images. This extends to a generative framework that allows for the creation of artificial images and their …


Highlights Generation For Tennis Matches Using Computer Vision, Natural Language Processing And Audio Analysis, Alon Liberman Jan 2022

Highlights Generation For Tennis Matches Using Computer Vision, Natural Language Processing And Audio Analysis, Alon Liberman

Senior Independent Study Theses

This project uses computer vision, natural language processing and audio analysis to automatize the highlights generation task for tennis matches. Computer vision techniques such as camera shot detection, hough transform and neural networks are used to extract the time intervals of the points. To detect the best points, three approaches are used. Point length suggests which points correspond to rallies and aces. The audio waves are analyzed to search for the highest audio peaks, which indicate the moments where the crowd cheers the most. Sentiment analysis, a natural language processing technique, is used to look for points where the commentators …


Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer Jan 2022

Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer

Browse all Theses and Dissertations

Vulnerabilities in source code can be compiled for multiple processor architectures and make their way into several different devices. Security researchers frequently have no way to obtain this source code to analyze for vulnerabilities. Therefore, the ability to effectively analyze binary code is essential. Similarity detection is one facet of binary code analysis. Because source code can be compiled for different architectures, the need can arise for detecting code similarity across architectures. This need is especially apparent when analyzing firmware from embedded computing environments such as Internet of Things devices, where the processor architecture is dependent on the product and …


Humanizing Computational Literature Analysis Through Art-Based Visualizations, Alexandria Leto Jan 2022

Humanizing Computational Literature Analysis Through Art-Based Visualizations, Alexandria Leto

Electronic Theses and Dissertations

Inequalities in gender representation and characterization in fictional works are issues that have long been discussed by social scientists. This work addresses these inequalities with two interrelated components. First, it contributes a sentiment and word frequency analysis task focused on gender-specific nouns and pronouns in 15,000 fictional works taken from the online library, Project Gutenberg. This analysis allows for both quantifying and offering further insight on the nature of this disparity in gender representation. Then, the outcomes of the analysis are harnessed to explore novel data visualization formats using computational and studio art techniques. Our results call attention to the …


Topological Hierarchies And Decomposition: From Clustering To Persistence, Kyle A. Brown Jan 2022

Topological Hierarchies And Decomposition: From Clustering To Persistence, Kyle A. Brown

Browse all Theses and Dissertations

Hierarchical clustering is a class of algorithms commonly used in exploratory data analysis (EDA) and supervised learning. However, they suffer from some drawbacks, including the difficulty of interpreting the resulting dendrogram, arbitrariness in the choice of cut to obtain a flat clustering, and the lack of an obvious way of comparing individual clusters. In this dissertation, we develop the notion of a topological hierarchy on recursively-defined subsets of a metric space. We look to the field of topological data analysis (TDA) for the mathematical background to associate topological structures such as simplicial complexes and maps of covers to clusters in …


Secure Authenticated Key Exchange For Enhancing The Security Of Routing Protocol For Low-Power And Lossy Networks, Sarah Mohammed Alzahrani Jan 2022

Secure Authenticated Key Exchange For Enhancing The Security Of Routing Protocol For Low-Power And Lossy Networks, Sarah Mohammed Alzahrani

Browse all Theses and Dissertations

The current Routing Protocol for Low Power and Lossy Networks (RPL) standard provides three security modes Unsecured Mode (UM), Preinstalled Secure Mode (PSM), and Authenticated Secure Mode (ASM). The PSM and ASM are designed to prevent external routing attacks and specific replay attacks through an optional replay protection mechanism. RPL's PSM mode does not support key replacement when a malicious party obtains the key via differential cryptanalysis since it considers the key to be provided to nodes during the configuration of the network. This thesis presents an approach to implementing a secure authenticated key exchange mechanism for RPL, which ensures …


Locality Analysis Of Patched Php Vulnerabilities, Luke N. Holt Jan 2022

Locality Analysis Of Patched Php Vulnerabilities, Luke N. Holt

Browse all Theses and Dissertations

The size and complexity of modern software programs is constantly growing making it increasingly difficult to diligently find and diagnose security exploits. The ability to quickly and effectively release patches to prevent existing vulnerabilities significantly limits the exploitation of users and/or the company itself. Due to this it has become crucial to provide the capability of not only releasing a patched version, but also to do so quickly to mitigate the potential damage. In this thesis, we propose metrics for evaluating the locality between exploitable code and its corresponding sanitation API such that we can statistically determine the proximity of …


Design, Analysis, And Optimization Of Traffic Engineering For Software Defined Networks, Mohammed Ibrahim Salman Jan 2022

Design, Analysis, And Optimization Of Traffic Engineering For Software Defined Networks, Mohammed Ibrahim Salman

Browse all Theses and Dissertations

Network traffic has been growing exponentially due to the rapid development of applications and communications technologies. Conventional routing protocols, such as Open-Shortest Path First (OSPF), do not provide optimal routing and result in weak network resources. Optimal traffic engineering (TE) is not applicable in practice due to operational constraints such as limited memory on the forwarding devices and routes oscillation. Recently, a new way of centralized management of networks enabled by Software-Defined Networking (SDN) made it easy to apply most traffic engineering ideas in practice. \par Toward creating an applicable traffic engineering system, we created a TE simulator for experimenting …


Development Of Enhanced User Interaction And User Experience For Supporting Serious Role-Playing Games In A Healthcare Setting, Mark Lee Alow Jan 2022

Development Of Enhanced User Interaction And User Experience For Supporting Serious Role-Playing Games In A Healthcare Setting, Mark Lee Alow

Browse all Theses and Dissertations

Education about implicit bias in clinical settings is essential for improving the quality of healthcare for underrepresented groups. Such a learning experience can be delivered in the form of a serious game simulation. WrightLIFE (Lifelike Immersion for Equity) is a project that combines two serious game simulations, with each addressing the group that faces implicit bias. These groups are individuals that identify as LGBTQIA+ and people with autism spectrum disorder (ASD). The project presents healthcare providers with a training tool that puts them in the roles of the patient and a medical specialist and immerses them in social and clinical …


Few-Shot Malware Detection Using A Novel Adversarial Reprogramming Model, Ekula Praveen Kumar Jan 2022

Few-Shot Malware Detection Using A Novel Adversarial Reprogramming Model, Ekula Praveen Kumar

Browse all Theses and Dissertations

The increasing sophistication of malware has made detecting and defending against new strains a major challenge for cybersecurity. One promising approach to this problem is using machine learning techniques that extract representative features and train classification models to detect malware in an early stage. However, training such machine learning-based malware detection models represents a significant challenge that requires a large number of high-quality labeled data samples while it is very costly to obtain them in real-world scenarios. In other words, training machine learning models for malware detection requires the capability to learn from only a few labeled examples. To address …