This Is AuburnElectronic Theses and Dissertations

Browsing by Author "Dozier, Gerry"

Now showing items 1-20 of 28

Academic Virtual Advisor 

Nobles, Kathryn (2007-05-15)
With the increasing aptitude of artificial intelligence and expert systems, new and innovative uses are being discovered. The objective of this research was to examine the use of an expert system to solve the problem of ...

Agent-Based Simulation of Behavioral Anticipation in Computer Networks: A Comparative Study of Anticipatory Fault Management 

Saple, Avdhootkishore (2006-05-15)
Network fault management is concerned with the detection, isolation and correction of anomalous conditions that occur in a computer network. Present state of art in fault management classifies existing methodologies into ...

Alleviating Escape Panic Using Evolutionary Intelligence 

Darnell, Shelby (2006-05-15)
Reducing damage, danger, and panic by evolving room designs is possible with artificial intelligence. Escape panic, brought on by groups of people being in a life-threatening situation, increases the fatality rate and ...

Applications of Augmented and Virtual Reality at Museums and Archaeological Parks to Improve Sustainability 

Sargsyan, Nikolay (2022-05-24)
Augmented and Virtual Reality are relatively novel technologies that have gained popularity during the past decade. Virtual Reality allows one to be immersed in virtual worlds, while Augmented Reality combines virtual and ...

Applications of Computer Vision for the Improvement of Autonomous Vehicle Design 

Kauten, James (2021-07-28)
This dissertation approaches methods of improving autonomous vehicle design through two separate lenses. In the first study, we investigate how technological transparency can improve driver trust in artificial intelligence ...

Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Model Features 

Gaston, Joshua (2018-11-05)
Authorship Attribution is a well-studied topic with deep roots in the field of Stylometry. This thesis examines three less traditional feature sets for the purpose of Authorship Attribution. Each feature set is examined ...

The Automated Design of Network Graph Algorithms with Applications in Cybersecurity 

Pope, Aaron (2020-01-06)  ETD File Embargoed
Graph representations and graph algorithms are commonplace in a wide variety of research domains, including computer and network security. Many problems can be expressed in terms of graphs in order to leverage the strengths ...

Computational Methods for Evaluation of Protein Structural Models 

Alapati, Rahul (2019-04-23)
Proteins are essential parts of organisms and participate in virtually every process within the cells. The function of a protein is closely related to its structure than to its amino acid sequence. Hence, the study of the ...

Computer Vision Based Cooperative Navigation for UAVs and Ground Vehicles 

Kamrath, Daniel (2022-06-30)
This thesis is not approved for public release.

A Data Element Mapping and Analysis (DEMA) Approach for Implementing a Complete Digital Thread 

Ledford, Allison (2023-08-04)
In the age of digitalization and the fourth industrial revolution, the concept of the Digital Thread and the Model-Based Enterprise has captured both the attention and resources of countless establishments. However, despite ...

Defense Against the Adversarial Arts: Applying Green Team Evaluations to Harden Machine Learning Algorithms from Adversarial Attacks 

Kalin, Joshua (2022-04-28)
Machine Learning permeates all facets of our lives today. Given these models are trusted to make important determinations in our lives like credit decisions, how susceptible are those models to attacks? Adversarial machine ...

The Development and Representation of Occupant Performance in Building Evacuation Modeling 

Muhdi, Rani (2008-05-15)
Occupant characteristics are considered important features incorporated into most evacuation models. The relative scarcity of evacuation experiments in the literature, contributes to some extent to the continuous challenge ...

The Effects of Genetic-based and Swarm Intelligence-based Feature Selection on Adversarial Author Identification 

Halladay, Steve (2022-04-25)
Within the realm of author identification, where researchers work to classify writing samples by author, researchers are using more and diverse feature sets to try to improve classification accuracy. From a computational ...

Employing Supportive Coevolution for the Automated Design and Configuration of Evolutionary Algorithm Operators and Parameters 

Kamrath, Nathaniel (2021-11-17)
Evolutionary Algorithms (EAs) can be highly complex structures requiring many operators and parameters to function. Since EA performance can be highly dependent on these parameters and operators, creating automatic methods ...

Evolutionary Computation and Machine Learning for Fake News Detection 

Smith, Marcellus (2022-05-06)  ETD File Embargoed
Misinformation or fake news has a history of being weaponized in order to deceive or mislead a target audience. Presently, the ease of generation, dissemination, and effects that are achievable by leveraging fake news makes ...

Exploring Machine Learning Methods for Author Identification on Micro-Messages 

Aykent, Sarp (2023-04-17)  ETD File Embargoed
Author Identification, also known as Authorship Attribution, is the task of identifying an author of unknown text based on the writing style captured within a dataset of writing samples. Author Identification is used in a ...

A Framework Supporting Human-AI Adversarial Authorship: The Analysis of User Frustration to Improve System Efficiency 

Packer, Sadaira (2023-08-03)  ETD File Embargoed
Writing style can be traced back to a specific author with the use of authorship attribution techniques. These techniques use machine learning algorithms to classify the authors. This document discusses research focused ...

GENERTIA: A System for Vulnerability Analysis, Design and Redesign of Immunity-Based Anomaly Detection System 

Hou, Haiyu (2006-12-15)
The principles of immunology have been applied to the design and implementation of artificial systems and algorithms for solving a broad range of mathematical and engineering problems, which results in a new computation ...

Genetic and Evolutionary Protocols for Solving Distributed Asymmetric Constraint Satisfaction Problems 

Fu, Ser-Geon (2007-08-15)
Processor speed has been growing at an exponential rate over the past 50 years. Computers are getting smaller, cheaper and faster. Over the past 30 years, with the growth of the internet, new forms of decentralized ...

Heuristic Optimization Methods for the Characterization of Dynamic Mechanical Properties of Composite Materials 

Hornig, Klaus (2007-05-15)
Generally speaking, of the fundamental dynamic mechanical properties - mass, damping, and stiffness, damping is usually the most difficult to quantify. This is perhaps particularly true for composite materials which tend ...