- AUETD Home
- Browsing by Author
Browsing by Author "Dozier, Gerry"
Now showing items 1-20 of 28
- Sort by:
- title
- issue date
- submit date
- Order:
- ascending
- descending
- Results:
- 5
- 10
- 20
- 40
- 60
- 80
- 100
Academic Virtual Advisor
Nobles, Kathryn (2007-05-15)
With the increasing aptitude of artificial intelligence and expert systems, new and
innovative uses are being discovered. The objective of this research was to examine the use
of an expert system to solve the problem of ...
Agent-Based Simulation of Behavioral Anticipation in Computer Networks: A Comparative Study of Anticipatory Fault Management
Saple, Avdhootkishore (2006-05-15)
Network fault management is concerned with the detection, isolation and correction of anomalous conditions that occur in a computer network. Present state of art in fault management classifies existing methodologies into ...
Alleviating Escape Panic Using Evolutionary Intelligence
Darnell, Shelby (2006-05-15)
Reducing damage, danger, and panic by evolving room designs is possible with artificial intelligence. Escape panic, brought on by groups of people being in a life-threatening situation, increases the fatality rate and ...
Applications of Augmented and Virtual Reality at Museums and Archaeological Parks to Improve Sustainability
Sargsyan, Nikolay (2022-05-24)
Augmented and Virtual Reality are relatively novel technologies that have gained popularity during the past decade. Virtual Reality allows one to be immersed in virtual worlds, while Augmented Reality combines virtual and ...
Applications of Computer Vision for the Improvement of Autonomous Vehicle Design
Kauten, James (2021-07-28)
This dissertation approaches methods of improving autonomous vehicle design through two separate lenses. In the first study, we investigate how technological transparency can improve driver trust in artificial intelligence ...
Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Model Features
Gaston, Joshua (2018-11-05)
Authorship Attribution is a well-studied topic with deep roots in the field of Stylometry. This thesis examines three less traditional feature sets for the purpose of Authorship Attribution. Each feature set is examined ...
The Automated Design of Network Graph Algorithms with Applications in Cybersecurity
Pope, Aaron (2020-01-06) ETD File Embargoed
Graph representations and graph algorithms are commonplace in a wide variety of research domains, including computer and network security. Many problems can be expressed in terms of graphs in order to leverage the strengths ...
Computational Methods for Evaluation of Protein Structural Models
Alapati, Rahul (2019-04-23)
Proteins are essential parts of organisms and participate in virtually every process within the cells. The function of a protein is closely related to its structure than to its amino acid sequence. Hence, the study of the ...
Computer Vision Based Cooperative Navigation for UAVs and Ground Vehicles
Kamrath, Daniel (2022-06-30)
This thesis is not approved for public release.
A Data Element Mapping and Analysis (DEMA) Approach for Implementing a Complete Digital Thread
Ledford, Allison (2023-08-04)
In the age of digitalization and the fourth industrial revolution, the concept of the Digital
Thread and the Model-Based Enterprise has captured both the attention and resources of countless establishments. However, despite ...
Defense Against the Adversarial Arts: Applying Green Team Evaluations to Harden Machine Learning Algorithms from Adversarial Attacks
Kalin, Joshua (2022-04-28)
Machine Learning permeates all facets of our lives today. Given these models are trusted to make important determinations in our lives like credit decisions, how susceptible are those models to attacks? Adversarial machine ...
The Development and Representation of Occupant Performance in Building Evacuation Modeling
Muhdi, Rani (2008-05-15)
Occupant characteristics are considered important features incorporated into most evacuation models. The relative scarcity of evacuation experiments in the literature, contributes to some extent to the continuous challenge ...
The Effects of Genetic-based and Swarm Intelligence-based Feature Selection on Adversarial Author Identification
Halladay, Steve (2022-04-25)
Within the realm of author identification, where researchers work to classify writing samples by author, researchers are using more and diverse feature sets to try to improve classification accuracy. From a computational ...
Employing Supportive Coevolution for the Automated Design and Configuration of Evolutionary Algorithm Operators and Parameters
Kamrath, Nathaniel (2021-11-17)
Evolutionary Algorithms (EAs) can be highly complex structures requiring many operators and parameters to function. Since EA performance can be highly dependent on these parameters and operators, creating automatic methods ...
Evolutionary Computation and Machine Learning for Fake News Detection
Smith, Marcellus (2022-05-06) ETD File Embargoed
Misinformation or fake news has a history of being weaponized in order to deceive or mislead a target audience. Presently, the ease of generation, dissemination, and effects that are achievable by leveraging fake news makes ...
Exploring Machine Learning Methods for Author Identification on Micro-Messages
Aykent, Sarp (2023-04-17) ETD File Embargoed
Author Identification, also known as Authorship Attribution, is the task of identifying an author of unknown text based on the writing style captured within a dataset of writing samples. Author Identification is used in a ...
A Framework Supporting Human-AI Adversarial Authorship: The Analysis of User Frustration to Improve System Efficiency
Packer, Sadaira (2023-08-03) ETD File Embargoed
Writing style can be traced back to a specific author with the use of authorship attribution techniques. These techniques use machine learning algorithms to classify the authors. This document discusses research focused ...
GENERTIA: A System for Vulnerability Analysis, Design and Redesign of Immunity-Based Anomaly Detection System
Hou, Haiyu (2006-12-15)
The principles of immunology have been applied to the design and implementation of artificial systems and algorithms for solving a broad range of mathematical and engineering problems, which results in a new computation ...
Genetic and Evolutionary Protocols for Solving Distributed Asymmetric Constraint Satisfaction Problems
Fu, Ser-Geon (2007-08-15)
Processor speed has been growing at an exponential rate over the past 50 years. Computers are getting smaller, cheaper and faster. Over the past 30 years, with the growth of the internet, new forms of decentralized ...
Heuristic Optimization Methods for the Characterization of Dynamic Mechanical Properties of Composite Materials
Hornig, Klaus (2007-05-15)
Generally speaking, of the fundamental dynamic mechanical properties - mass, damping, and stiffness, damping is usually the most difficult to quantify. This is perhaps particularly true for composite materials which tend ...