This Is AuburnElectronic Theses and Dissertations

Browsing by Department "Computer Science and Software Engineering"

Now showing items 21-40 of 214

Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Model Features 

Gaston, Joshua (2018-11-05)
Authorship Attribution is a well-studied topic with deep roots in the field of Stylometry. This thesis examines three less traditional feature sets for the purpose of Authorship Attribution. Each feature set is examined ...

The Automated Design of Network Graph Algorithms with Applications in Cybersecurity 

Pope, Aaron (2020-01-06)  ETD File Embargoed
Graph representations and graph algorithms are commonplace in a wide variety of research domains, including computer and network security. Many problems can be expressed in terms of graphs in order to leverage the strengths ...

Automated Source Code Measurement Environment For Software Quality 

Lee, Young (2007-12-15)
Measuring how well software component can be reused and maintained helps programmers not only write reusable and maintainable software, but also identifies reusable or maintainable components. We develop an automated ...

Automatic Detection of Software Security Vulnerabilities in Executable Program Files 

Tevis, Jay-Evan (2005-08-15)
Secure programming describes those techniques that software developers use to provide security features in their applications. In addition to these techniques, software practitioners use static code security checkers to ...

Bandwidth-Aware Routing Tree (BART) for Underwater 3-D Geographic Routing 

Kim, Tae (2008-08-15)
The limited bandwidth and power resources in underwater sensor networks have made geographic routing a favorite choice. While many detouring strategies in geographic routing do not work for 3-D underwater network topology, ...

Behavior Analysis and Enhancement of Robustness for Deep Neural Networks 

Wang, Longwei (2022-08-01)  ETD File Embargoed
Apart from the remarkable success of machine learning models utilizing deep neural networks in solving a variety of problems including image classifications, these models are highly vulnerable to small and carefully chosen ...

Beyond The Accuracy In Deep Learning: Robustness, Privacy and Fairness 

Ren, Jiaxiang (2023-11-15)  ETD File Embargoed
While Deep Learning (DL) has achieved great success across various domains, its trustworthiness remains a concern. This dissertation delves into threats associated with robustness, privacy, and fairness, offering novel ...

Boosting Cloud Computing Frameworks with High Performance Computing Features 

Ramsey, Jared (2016-10-26)
High Performance Computing (HPC) often employs a set of networked and/or distributed computers working together to solve extremely large problems. Since the early 1990's, HPC has made use of technologies such as the Message ...

Building a High-resolution Scalable Visualization Wall 

Li, Zhenni (2006-12-15)
High-resolution and scalable displays are increasingly being used for interactive 3D graphics applications, including large-scale data visualization, immersive virtual environments, and scalable 3D rendering subsystems. ...

Business Rules Discovery in Web Application through Process Mining 

Alkofahi, Hamza (2020-07-20)
Advances in information technologies have allowed businesses to deliver their services to new markets that did not exist before, especially in fields such as e-commerce, healthcare, e-education, and cloud services. Web ...

Clustering and Predictive Modeling: An Ensemble Approach 

Williams, Philicity (2008-08-15)
Today’s data storage and collection abilities have allowed the accumulation of enormous amounts of data. Data mining can be a useful tool in transforming these large amounts of raw data into useful information. Predictive ...

Cogent: A Coherence-Driven Cognitive Agent Modeling and Simulation Framework 

Sivaraj, Sunit (2018-04-16)
Agent based modeling is an effective methodology for understanding complex cognitive systems through generative mechanisms that explain emergent behavior. However, most agent modeling languages use general-purpose imperative ...

Collaboration and Competition in Interest-Driven Cyber Ecosystems 

Hou, Jing (2021-12-08)  ETD File Embargoed
The next-generation cyber ecosystems are characterized by novel distributed paradigms composed of various network entities, such as individuals, devices, and software. The efficiency, scalability, and security of the systems ...

A Collaborative, Adaptive-Based Approach to Informal E-Learning Technology Design 

Adams, Candice (2017-04-25)
Significant innovations in learning technologies are encouraging individuals, especially high school students, to seek enrichment learning opportunities that they normally are not able to take advantage of due to the ...

Comparison of IoT Application Layer Protocols 

Cui, Pinchen (2017-04-25)
It has been almost 20 years since the concept of the Internet of Things was first proposed. Now, IoT has become a leading technology that is becoming pervasive in our lives. However, behind the wide deployment of IoT ...

Computational Methods for Evaluation of Protein Structural Models 

Alapati, Rahul (2019-04-23)
Proteins are essential parts of organisms and participate in virtually every process within the cells. The function of a protein is closely related to its structure than to its amino acid sequence. Hence, the study of the ...

Computer Vision Based Cooperative Navigation for UAVs and Ground Vehicles 

Kamrath, Daniel (2022-06-30)
This thesis is not approved for public release.

Continuous TCP Connection to the Internet on Fast-changing Mobile Ad-hoc Network 

Lan, Tianhang (2019-05-01)
As more and more sensors are being used in all industries, especially the Internet of Things, Mobile Ad-hoc Networks (MANET) are also becoming more popular as good ways to organize wireless devices in the same area. Since ...

COURSEBUILDER: Design and Development of an eLearning System 

Ramesh, Nandakrishnan (2017-11-28)
Web-based learning environments have the potential to support collaboration among teachers and students and encourage interaction in the classroom by providing quality Internet resources for learning. By incorporating these ...

CSSE Document Management System: Implementation and Usability Evaluation 

Wang, Chao (2006-08-15)
The design and implementation of an application like CSSE Document Management System (CSSEDMS) involves many considerations. Among all these considerations, usability is the key for success. “If you could build a system ...