Open Access. Powered by Scholars. Published by Universities.®

Computational Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computational Engineering

A Machine Learning Approach To Network Intrusion Detection System Using K Nearest Neighbor And Random Forest, Ilemona S. Atawodi Apr 2019

A Machine Learning Approach To Network Intrusion Detection System Using K Nearest Neighbor And Random Forest, Ilemona S. Atawodi

Master's Theses

The evolving area of cybersecurity presents a dynamic battlefield for cyber criminals and security experts. Intrusions have now become a major concern in the cyberspace. Different methods are employed in tackling these threats, but there has been a need now more than ever to updating the traditional methods from rudimentary approaches such as manually updated blacklists and whitelists. Another method involves manually creating rules, this is usually one of the most common methods to date.

A lot of similar research that involves incorporating machine learning and artificial intelligence into both host and network-based intrusion systems recently. Doing this originally presented ...


A Computational Analysis Of The Gradient Concentration Profile Of Deet And The Mosquito Behavioral Response, Brandon Carver Dec 2018

A Computational Analysis Of The Gradient Concentration Profile Of Deet And The Mosquito Behavioral Response, Brandon Carver

Master's Theses

DEET is a common active ingredient in most spatial repellents. DEET is also a volatile organic compound. DEET prevents mosquitoes from detecting and coming into contact with an human individual. Gas sensing technologies such as metal oxide semiconductor sensors can detect VOCs. The World Health Organization provides the majority of efficacy testing methods. This research adapts methods from the WHO and use of MOS sensors to further understand how and why DEET affects mosquitos. A custom developed system is used to measure DEET dissipation and observe mosquito behavioral response to the DEET. DEET dissipations and mosquito behavior is measured within ...


Face Recognition With Multi-Stage Matching Algorithms, Xianming Chen Dec 2015

Face Recognition With Multi-Stage Matching Algorithms, Xianming Chen

Dissertations

For every face recognition method, the primary goal is to achieve higher recognition accuracy and spend less computational costs. However, as the gallery size increases, especially when one probe image corresponds to only one training image, face recognition becomes more and more challenging. First, a larger gallery size requires more computational costs and memory usage. Meanwhile, that the large gallery sizes degrade the recognition accuracy becomes an even more significant problem to be solved.

A coarse parallel algorithm that equally divides training images and probe images into multiple processors is proposed to deal with the large computational costs and huge ...


On The Selection Of A Good Shape Parameter For Rbf Approximation And Its Application For Solving Pdes, Lei-Hsin Kuo Aug 2015

On The Selection Of A Good Shape Parameter For Rbf Approximation And Its Application For Solving Pdes, Lei-Hsin Kuo

Dissertations

Meshless methods utilizing Radial Basis Functions~(RBFs) are a numerical method that require no mesh connections within the computational domain. They are useful for solving numerous real-world engineering problems. Over the past decades, after the 1970s, several RBFs have been developed and successfully applied to recover unknown functions and to solve Partial Differential Equations (PDEs).
However, some RBFs, such as Multiquadratic (MQ), Gaussian (GA), and Matern functions, contain a free variable, the shape parameter, c. Because c exerts a strong influence on the accuracy of numerical solutions, much effort has been devoted to developing methods for determining shape parameters which ...


Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad May 2015

Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad

Dissertations

Abstract

Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical ...


Reducing Ambiguities In Customer Requirements Through Historical Rule-Based Knowledge In A Small Organization, Silvia Brum Preston May 2014

Reducing Ambiguities In Customer Requirements Through Historical Rule-Based Knowledge In A Small Organization, Silvia Brum Preston

Dissertations

During the elicitation process the requirements for a software application are obtained from the customer. Customers often do not know how to clearly express the requirements of the application to be built, causing requirements to be ambiguous. Many studies have been found to cover different characteristics of the requirements elicitation process including methods for reducing ambiguities in requirements. The methods and findings of these studies were found to be too general when it comes to the specific domain of the requirements and knowledge about the requirements. In addition, some studies did not take into consideration the level of expertise of ...