Search Results

open access

Paradigm Shift from Vague Legal Contracts to Blockchain-Based Smart Contracts

Description: In this dissertation, we address the problem of vagueness in traditional legal contracts by presenting novel methodologies that aid in the paradigm shift from traditional legal contracts to smart contracts. We discuss key enabling technologies that assist in converting the traditional natural language legal contract, which is full of vague words, phrases, and sentences to the blockchain-based precise smart contract, including metrics evaluation during our conversion experiment. To address the c… more
Date: July 2023
Creator: Upadhyay, Kritagya Raj
open access

A Platform for Aligning Academic Assessments to Industry and Federal Job Postings

Description: The proposed tool will provide users with a platform to access a side-by-side comparison of classroom assessment and job posting requirements. Using techniques and methodologies from NLP, machine learning, data analysis, and data mining: the employed algorithm analyzes job postings and classroom assessments, extracts and classifies skill units within, then compares sets of skills from different input volumes. This effectively provides a predicted alignment between academic and career sources, b… more
Date: July 2023
Creator: Parks, Tyler J.
open access

Privacy Preserving Machine Learning as a Service

Description: Machine learning algorithms based on neural networks have achieved remarkable results and are being extensively used in different domains. However, the machine learning algorithms requires access to raw data which is often privacy sensitive. To address this issue, we develop new techniques to provide solutions for running deep neural networks over encrypted data. In this paper, we develop new techniques to adopt deep neural networks within the practical limitation of current homomorphic encrypt… more
Date: May 2020
Creator: Hesamifard, Ehsan

Red Door: Firewall Based Access Control in ROS

Description: ROS is a set of computer operating system framework designed for robot software development, and Red Door, a lightweight software firewall that serves the ROS, is intended to strengthen its security. ROS has many flaws in security, such as clear text transmission of data, no authentication mechanism, etc. Red Door can achieve identity verification and access control policy with a small performance loss, all without modifying the ROS source code, to ensure the availability and authentication of … more
Date: December 2020
Creator: Shen, Ziyi

Registration of Point Sets with Large and Uneven Non-Rigid Deformation

Description: Non-rigid point set registration of significantly uneven deformations is a challenging problem for many applications such as pose estimation, three-dimensional object reconstruction, human movement tracking. In this dissertation, we present a novel probabilistic non-rigid registration method to align point sets with significantly uneven deformations by enforcing constraints from corresponding key points and preserving local neighborhood structures. The registration method is treated as a densit… more
This item is restricted from view until January 1, 2025.
Date: December 2022
Creator: Maharjan, Amar Man
open access

Reinforcement Learning-Based Test Case Generation with Test Suite Prioritization for Android Application Testing

Description: This dissertation introduces a hybrid strategy for automated testing of Android applications that combines reinforcement learning and test suite prioritization. These approaches aim to improve the effectiveness of the testing process by employing reinforcement learning algorithms, namely Q-learning and SARSA (State-Action-Reward-State-Action), for automated test case generation. The studies provide compelling evidence that reinforcement learning techniques hold great potential in generating tes… more
Date: July 2023
Creator: Khan, Md Khorrom
open access

Reliability and Throughput Improvement in Vehicular Communication by Using 5G Technologies

Description: The vehicular community is moving towards a whole new paradigm with the advancement of new technology. Vehicular communication not only supports safety services but also provides non-safety services like navigation support, toll collection, web browsing, media streaming, etc. The existing communication frameworks like Dedicated Short Range Communication (DSRC) and Cellular V2X (C-V2X) might not meet the required capacity in the coming days. So, the vehicular community needs to adopt new technol… more
Date: December 2022
Creator: Dey, Utpal-Kumar

Reliability Characterization and Performance Analysis of Solid State Drives in Data Centers

Description: NAND flash-based solid state drives (SSDs) have been widely adopted in data centers and high performance computing (HPC) systems due to their better performance compared with hard disk drives. However, little is known about the reliability characteristics of SSDs in production systems. Existing works that study the statistical distributions of SSD failures in the field lack insights into distinct characteristics of SSDs. In this dissertation, I explore the SSD-specific SMART (Self-Monitoring, A… more
Date: December 2021
Creator: Liang, Shuwen (Computer science and engineering researcher)
open access

Scalable Next Generation Blockchains for Large Scale Complex Cyber-Physical Systems and Their Embedded Systems in Smart Cities

Description: The original FlexiChain and its descendants are a revolutionary distributed ledger technology (DLT) for cyber-physical systems (CPS) and their embedded systems (ES). FlexiChain, a DLT implementation, uses cryptography, distributed ledgers, peer-to-peer communications, scalable networks, and consensus. FlexiChain facilitates data structure agreements. This thesis offers a Block Directed Acyclic Graph (BDAG) architecture to link blocks to their forerunners to speed up validation. These data block… more
Date: July 2023
Creator: Alkhodair, Ahmad Jamal M

Secure and Decentralized Data Cooperatives via Reputation Systems and Blockchain

Description: This dissertation focuses on a novel area of secure data management referred to as data cooperatives. A data cooperative solution promises its users better protection and control of their personal data as compared to the traditional way of their handling by the data collectors (such as governments, big data companies, and others). However, despite the many interesting benefits that the data cooperative approach tends to provide its users, it suffers from a few challenges hindering its developme… more
This item is restricted from view until January 1, 2025.
Date: December 2022
Creator: Salau, Abiola
open access

SIMON: A Domain-Agnostic Framework for Secure Design and Validation of Cyber Physical Systems

Description: Cyber physical systems (CPS) are an integration of computational and physical processes, where the cyber components monitor and control physical processes. Cyber-attacks largely target the cyber components with the intention of disrupting the functionality of the components in the physical domain. This dissertation explores the role of semantic inference in understanding such attacks and building resilient CPS systems. To that end, we present SIMON, an ontological design and verification framew… more
Date: December 2021
Creator: Yanambaka Venkata, Rohith
open access

A Study of Mitigation Methods for Speculative Cache Side Channel Attacks

Description: Side channels give attackers the opportunity to reveal private information without accessing it directly. In this study, several novel approaches are presented to mitigate cache side channel attacks including Spectre attack and its variants, resulting in several contributions. CHASM shows the information leakage in several new cache mapping schemes, where different cache address mappings may provide higher or lower protection against cache side channel attacks. GuardCache creates a noisy cache … more
Date: May 2024
Creator: Mosquera Ferrandiz, Fernando
open access

A Study on Usability of Mobile Software Targeted at Elderly People in China

Description: With the rapid development of mobile device technology, smartphones are now not only the tool for young people but also for elderly people. However, the complicated steps of interacting with smartphones are stopping them from having a good user experience. One of the reasons is that application designers do not take consideration of the user group of elderly people. Our pilot survey shows that most elderly people lack the skills required to use a smartphone without obstacles, like typing. We al… more
Date: May 2020
Creator: Jiang, Jingfu

A Top-Down Policy Engineering Framework for Attribute-Based Access Control

Description: The purpose of this study is to propose a top-down policy engineering framework for attribute-based access control (ABAC) that aims to automatically extract ACPs from requirement specifications documents, and then, using the extracted policies, build or update an ABAC model. We specify a procedure that consists of three main components: 1) ACP sentence identification, 2) policy element extraction, and 3) ABAC model creation and update. ACP sentence identification processes unrestricted natural … more
Date: May 2020
Creator: Narouei, Masoud

Toward Leveraging Artificial Intelligence to Support the Identification of Accessibility Challenges

Description: The goal of this thesis is to support the automated identification of accessibility in user reviews or bug reports, to help technology professionals prioritize their handling, and, thus, to create more inclusive apps. Particularly, we propose a model that takes as input accessibility user reviews or bug reports and learns their keyword-based features to make a classification decision, for a given review, on whether it is about accessibility or not. Our empirically driven study follows a mixture… more
Date: May 2023
Creator: Aljedaani, Wajdi Mohammed R M., Sr.
open access

Traffic Forecasting Applications Using Crowdsourced Traffic Reports and Deep Learning

Description: Intelligent transportation systems (ITS) are essential tools for traffic planning, analysis, and forecasting that can utilize the huge amount of traffic data available nowadays. In this work, we aggregated detailed traffic flow sensor data, Waze reports, OpenStreetMap (OSM) features, and weather data, from California Bay Area for 6 months. Using that data, we studied three novel ITS applications using convolutional neural networks (CNNs) and recurrent neural networks (RNNs). The first experimen… more
Date: May 2020
Creator: Alammari, Ali

Understanding and Addressing Accessibility Barriers Faced by People with Visual Impairments on Block-Based Programming Environments

Description: There is an increased use of block-based programming environments in K-12 education and computing outreach activities to introduce novices to programming and computational thinking skills. However, despite their appealing design that allows students to focus on concepts rather than syntax, block-based programming by design is inaccessible to people with visual impairments and people who cannot use the mouse. In addition to this inaccessibility, little is known about the instructional experience… more
Date: December 2022
Creator: Mountapmbeme, Aboubakar

Understanding and Reasoning with Negation

Description: In this dissertation, I start with an analysis of negation in eleven benchmark corpora covering six Natural Language Understanding (NLU) tasks. With a thorough investigation, I first show that (a) these benchmarks contain fewer negations compared to general-purpose English and (b) the few negations they contain are often unimportant. Further, my empirical studies demonstrate that state-of-the-art transformers trained using these corpora obtain substantially worse results with the instances that… more
This item is restricted from view until January 1, 2025.
Date: December 2022
Creator: Hossain, Md Mosharaf
open access

Using Blockchain to Ensure Reputation Credibility in Decentralized Review Management

Description: In recent years, there have been incidents which decreased people's trust in some organizations and authorities responsible for ratings and accreditation. For a few prominent examples, there was a security breach at Equifax (2017), misconduct was found in the Standard & Poor's Ratings Services (2015), and the Accrediting Council for Independent Colleges and Schools (2022) validated some of the low-performing schools as delivering higher standards than they actually were. A natural solution to t… more
Date: December 2023
Creator: Zaccagni, Zachary James
Back to Top of Screen