You searched for +publisher:"Vanderbilt University" +contributor:("Gautam Biswas")
.
Showing records 1 – 30 of
79 total matches.
◁ [1] [2] [3] ▶

Vanderbilt University
1.
Bailey, Mark Willis.
Unmanned Aerial Vehicle Path Planning and Image Processing for Orthoimagery and Digital Surface Model Generation.
Degree: MS, Computer Science, 2012, Vanderbilt University
URL: http://hdl.handle.net/1803/14929
► Due to their relatively cheap costs and ability to fly at low altitudes above ground, micro unmanned aerial vehicles are ideal platforms for performing photogrammetric…
(more)
▼ Due to their relatively cheap costs and ability to fly at low altitudes above ground, micro unmanned aerial vehicles are ideal platforms for performing photogrammetric missions above archaeological sites. Advances in image matching and 3D point-cloud generation from 2D images have allowed easier generation of digital surface models and orthophotographs from images captured by an unmanned aerial vehicle equipped with a high-resolution camera. These digital surface models and orthophotographs are much higher resolution and generated in a timelier manner than those from traditional methods, such as satellites, kites, balloons and total stations. However, current unmanned aerial vehicle systems require a high level of technical knowledge or pilot ability to perform photogrammetric tasks. This thesis seeks to make the entire process of generating digital surface models and orthophotographs simpler, from capturing the images to processing them, by presenting a new path planning algorithm that optimizes over various parameters. Simulations showed that choosing a path, which minimizes the number of flight lines across the site being photographed, by accounting for geometric properties of the site, performs the best, even in the presence of wind. Furthermore, various parameters were explored using Agisoft’s Photoscan to generate digital surface models and orthophotographs from images captured by an unmanned aerial vehicle flown manually over an archaeological site in Peru. Those experiments with Photoscan revealed several, subjective image quality conditions for guaranteeing better image matching and confirmed that a back-and-forth path produces the best matching and quality of digital surface models and orthophotographs.
Advisors/Committee Members: Julie A. Adams (committee member), Gautam Biswas (committee member).
Subjects/Keywords: UAV; Archaeological Photogrammetry; DSM; Orthoimagery
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Bailey, M. W. (2012). Unmanned Aerial Vehicle Path Planning and Image Processing for Orthoimagery and Digital Surface Model Generation. (Thesis). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/14929
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Bailey, Mark Willis. “Unmanned Aerial Vehicle Path Planning and Image Processing for Orthoimagery and Digital Surface Model Generation.” 2012. Thesis, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/14929.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Bailey, Mark Willis. “Unmanned Aerial Vehicle Path Planning and Image Processing for Orthoimagery and Digital Surface Model Generation.” 2012. Web. 15 Apr 2021.
Vancouver:
Bailey MW. Unmanned Aerial Vehicle Path Planning and Image Processing for Orthoimagery and Digital Surface Model Generation. [Internet] [Thesis]. Vanderbilt University; 2012. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/14929.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Bailey MW. Unmanned Aerial Vehicle Path Planning and Image Processing for Orthoimagery and Digital Surface Model Generation. [Thesis]. Vanderbilt University; 2012. Available from: http://hdl.handle.net/1803/14929
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Vanderbilt University
2.
Fennessy, Grant.
Autonomous Vehicle End-to-End Reinforcement Learning Model and the Effects of Image Segmentation on Model Quality.
Degree: MS, Computer Science, 2019, Vanderbilt University
URL: http://hdl.handle.net/1803/10748
► Autonomous driving has the potential not only to transform people's lives, but also save them. Fully understanding state of the art autonomous driving architectures, however,…
(more)
▼ Autonomous driving has the potential not only to transform people's lives, but also save them. Fully understanding state of the art autonomous driving architectures, however, requires a wide breadth of knowledge on available sensors, perception, image segmentation, localization, path planning, neural networks, convolution, and more. This thesis proposes a simple end-to-end architecture that has promising behavioral results. Two novel techniques are also introduced: a new exploration algorithm that seeks to produce more robust training behaviors over simple linear decay models, and a new data splitting technique that splits a layer into multiple semantically meaningful layers in an attempt to improve feature recognition by a convolutional neural network. A series of end-to-end models are trained with access to either a ground truth semantic segmentation perceptor or an image camera perceptor with a semantic segmentation predictor model. Models are evaluated and results are compared to see which approach is superior. The perceptor configuration on the trained models is switched and evaluation is run again to see how the it reacts to a change in perceptor quality. This thesis hypothesizes that models should be trained on ground truth semantic segmentation data, even if the trained model will ultimately be evaluated with a semantic segmenter model, as the model quality should prove superior and training time can be reduced substantially.
Advisors/Committee Members: Xenofon Koutsoukos (committee member), Gautam Biswas (committee member).
Subjects/Keywords: simulation; deeplab; probabilistic exploration; depth splitting; autonomous driving; reinforcement learning; image segmentation
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Fennessy, G. (2019). Autonomous Vehicle End-to-End Reinforcement Learning Model and the Effects of Image Segmentation on Model Quality. (Thesis). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/10748
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Fennessy, Grant. “Autonomous Vehicle End-to-End Reinforcement Learning Model and the Effects of Image Segmentation on Model Quality.” 2019. Thesis, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/10748.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Fennessy, Grant. “Autonomous Vehicle End-to-End Reinforcement Learning Model and the Effects of Image Segmentation on Model Quality.” 2019. Web. 15 Apr 2021.
Vancouver:
Fennessy G. Autonomous Vehicle End-to-End Reinforcement Learning Model and the Effects of Image Segmentation on Model Quality. [Internet] [Thesis]. Vanderbilt University; 2019. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/10748.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Fennessy G. Autonomous Vehicle End-to-End Reinforcement Learning Model and the Effects of Image Segmentation on Model Quality. [Thesis]. Vanderbilt University; 2019. Available from: http://hdl.handle.net/1803/10748
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Vanderbilt University
3.
Szarka, Tamas.
Structural, Behavioral and Functional Modeling of Cyber-Physical Systems.
Degree: MS, Computer Science, 2011, Vanderbilt University
URL: http://hdl.handle.net/1803/12522
► Building preliminary mathematical models to simulate system behavior is an essential part of designing dependable cyber-physical systems (CPS). This thesis presents the implementation of a…
(more)
▼ Building preliminary mathematical models to simulate system behavior is an essential part of designing dependable cyber-physical systems (CPS). This thesis presents the implementation of a visual modeling environment that supports compositional component-based modeling and simulation of cyber-physical systems. For this purpose, we have designed a domain specific modeling language (DSML), then implemented two model interpreters, and a MatlabŸ block- and function- library to support the model building and simulation tasks.
The modeling language employs the hybrid bond graph formalism to facilitate building cross-domain physical system models, and an extended version of the Grafcet model of computation to formally represent and analyze the discrete behavior evolution of the hybrid system. Domain models complying with the DSML capture the Functional, Behavioral and Structural aspects of the system, by explicitly modeling the interaction of the physical processes and the controlling computational units. The associated model interpreter automates the generation of hybrid simulation models. Grafcet models also incorporate logical constraints to express functional requirements for the system in the form of Hoare triples.
Finally, the thesis also presents a case study, which describes the approach to model building and simulation of the Reverse Osmosis subsystem of the NASA Advanced Life Support System. The original test results from the testbed at NASA Johnson Space Center confirm the correctness of our model and simulation results.
Advisors/Committee Members: Gautam Biswas (committee member), Gabor Karsai (committee member).
Subjects/Keywords: HBG; DSML; modeling; GME; FBS; CPS; bond graph
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Szarka, T. (2011). Structural, Behavioral and Functional Modeling of Cyber-Physical Systems. (Thesis). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/12522
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Szarka, Tamas. “Structural, Behavioral and Functional Modeling of Cyber-Physical Systems.” 2011. Thesis, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/12522.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Szarka, Tamas. “Structural, Behavioral and Functional Modeling of Cyber-Physical Systems.” 2011. Web. 15 Apr 2021.
Vancouver:
Szarka T. Structural, Behavioral and Functional Modeling of Cyber-Physical Systems. [Internet] [Thesis]. Vanderbilt University; 2011. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/12522.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Szarka T. Structural, Behavioral and Functional Modeling of Cyber-Physical Systems. [Thesis]. Vanderbilt University; 2011. Available from: http://hdl.handle.net/1803/12522
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Vanderbilt University
4.
Werth, Aaron William.
Towards distinguishing between cyber-attacks and faults in cyber-physical systems.
Degree: MS, Electrical Engineering, 2014, Vanderbilt University
URL: http://hdl.handle.net/1803/11333
► Cyber-physical systems (CPS) can be affected by different events or circumstances. These circumstances include the following: (1) faults, which are accidental in nature and may…
(more)
▼ Cyber-physical systems (CPS) can be affected by different events or circumstances. These circumstances include the following: (1) faults, which are accidental in nature and may involve degradation of equipment and (2) cyber-attacks, which were created by a malicious and conscious entity. Both of these can have similar effects on the CPS as well as different effects. The goal of this work is to be able to understand the differences between the two in their symptoms for the physical system and network. It is desired to be able to distinguish one from the other so that a diagnosis can be made. The reason that this is desired is to allow an appropriate response.
In this thesis, a set of experiments are conducted. Specifically, a model of a networked control system (NCS) is used and is subject to normal operating conditions, faults, and attacks. Simulations with these circumstances involve special network simulation tools: Omnet++ and INET. A simple network with several routers was created. Two nodes of the network have applications that implement the behavior of the plant and the controller. The network facilitates communication between these two nodes.
The results of this set of simulations are studied so that insight can be gained from the various scenarios. Also experiments are performed with a well-known machine learning algorithm-a naïve Bayes classifier-to gauge how well a distinction can be made between faults and attacks. Questions of how the problem is generalized and why it is important to consider are also addressed and discussed.
Advisors/Committee Members: Gautam Biswas (committee member), Gabor Karsai, PhD (Committee Chair).
Subjects/Keywords: Security of SCADA Systems; Fault Diagnosis; Network Security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Werth, A. W. (2014). Towards distinguishing between cyber-attacks and faults in cyber-physical systems. (Thesis). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/11333
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Werth, Aaron William. “Towards distinguishing between cyber-attacks and faults in cyber-physical systems.” 2014. Thesis, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/11333.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Werth, Aaron William. “Towards distinguishing between cyber-attacks and faults in cyber-physical systems.” 2014. Web. 15 Apr 2021.
Vancouver:
Werth AW. Towards distinguishing between cyber-attacks and faults in cyber-physical systems. [Internet] [Thesis]. Vanderbilt University; 2014. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/11333.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Werth AW. Towards distinguishing between cyber-attacks and faults in cyber-physical systems. [Thesis]. Vanderbilt University; 2014. Available from: http://hdl.handle.net/1803/11333
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Vanderbilt University
5.
Okorn, Brian Edward.
Smuggling Tunnel Mapping using Slide Image Registration.
Degree: MS, Computer Science, 2011, Vanderbilt University
URL: http://hdl.handle.net/1803/11597
► There exist a large number of unmapped tunnels across the US-Mexican border used primarily for smuggling, which the US Government desires to map using robots.…
(more)
▼ There exist a large number of unmapped tunnels across the US-Mexican border used primarily for smuggling, which the US Government desires to map using robots. This thesis presents two novel approaches to generate 3D maps of these tunnels. The both algorithms use a frame invariant point descriptor called the Slide Image that was originally developed for underwater SONAR ring localization. The presented algorithms adapt the Slide Images to larger more complex laser scans. Using the Slide Images generated for each 3D laser scan, the first algorithm determines the coordinate transforms needed to fuse the scans. The second algorithm uses the transform generated by the first algorithm as an initial mapping, which the algorithm fine tunes using an Iterative Closest Point approach. This fusion algorithm is able to provide the fine-tuned accuracy of the Iterative Closest Point technique, while retaining the Slide Image’s insensitivity to local minima. Both algorithms are evaluated using a real smuggling tunnel as well as an office environment. The results are compared with the results generated via the existing Iterative Closest Point algorithm. The first algorithm outperformed the Iterative Closest Point algorithm in the smuggling tunnel environment, but encountered difficulty mapping the intersections in the office environment. The Fusion algorithm clearly outperformed both the Slide Image algorithm and the Iterative Closest Point algorithm in both environments because it avoided the local minima the Iterative Closest Point algorithm selected while retaining the fine grain accuracy not possible with the Slide Image algorithm.
Advisors/Committee Members: Gautam Biswas (committee member), Julie A. Adams (Committee Chair).
Subjects/Keywords: smuggling tunnel; SLAM; ICP; slide image; tunnel mapping; 3D mapping; scan registration
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Okorn, B. E. (2011). Smuggling Tunnel Mapping using Slide Image Registration. (Thesis). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/11597
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Okorn, Brian Edward. “Smuggling Tunnel Mapping using Slide Image Registration.” 2011. Thesis, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/11597.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Okorn, Brian Edward. “Smuggling Tunnel Mapping using Slide Image Registration.” 2011. Web. 15 Apr 2021.
Vancouver:
Okorn BE. Smuggling Tunnel Mapping using Slide Image Registration. [Internet] [Thesis]. Vanderbilt University; 2011. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/11597.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Okorn BE. Smuggling Tunnel Mapping using Slide Image Registration. [Thesis]. Vanderbilt University; 2011. Available from: http://hdl.handle.net/1803/11597
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Vanderbilt University
6.
Podgursky, Benjamin T.
Practical k-Anonymity on large datasets.
Degree: MS, Computer Science, 2011, Vanderbilt University
URL: http://hdl.handle.net/1803/11993
► The implicit contract between an individual and a website is that a viewer will remain anonymous unless they choose to identify themselves. On the other…
(more)
▼ The implicit contract between an individual and a website is that a viewer will remain anonymous unless they choose to identify themselves. On the other hand, there are many advantages to allowing websites to tailor content to viewers based on hints about the person's likely interests and habits. However, as people spend increasing amounts of time engaged networked and online, the line between a person's online presence and their offline identity has blurred. Ideally the goals of providing personalized internet content and the implicit contract of net-anonymity can be reconciled. This thesis studies what research from the field of privacy preserving data publishing can be used to use offline data anonymously for web personalization.
The anonymity models of k-Anonymity and (k,1)-Anonymity, or k-Unlinkability, turn out to be promising models to study for this problem, and this work studies how to anonymize insight data using these models. Rapleaf is a company that helps websites personalize their content, with the goal of anonymizing content while still keeping the data specific enough to be insightful. Rapleaf's personalization dataset is used as a case study for investigating the challenges associated with anonymizing one of these datasets.
It is hoped that through the findings reported here web data can be anonymized while remaining useful, and that organizations will be encouraged to view anonymity and insight as goals that can be equitably balanced, rather than being mutually exclusive.
Advisors/Committee Members: Douglas Fisher (committee member), Gautam Biswas (Committee Chair).
Subjects/Keywords: clustering; anonymity; privacy
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Podgursky, B. T. (2011). Practical k-Anonymity on large datasets. (Thesis). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/11993
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Podgursky, Benjamin T. “Practical k-Anonymity on large datasets.” 2011. Thesis, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/11993.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Podgursky, Benjamin T. “Practical k-Anonymity on large datasets.” 2011. Web. 15 Apr 2021.
Vancouver:
Podgursky BT. Practical k-Anonymity on large datasets. [Internet] [Thesis]. Vanderbilt University; 2011. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/11993.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Podgursky BT. Practical k-Anonymity on large datasets. [Thesis]. Vanderbilt University; 2011. Available from: http://hdl.handle.net/1803/11993
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Vanderbilt University
7.
Weng, Jiannian.
Dynamic Bayesian Network Based Fault Diagnosis on Nonlinear Dynamic Systems.
Degree: MS, Computer Science, 2013, Vanderbilt University
URL: http://hdl.handle.net/1803/11905
► Fault diagnosis approaches for nonlinear real-world systems play a very important role in maintaining dependable, robust operations of safety-critical systems like aircraft, automobiles, power plants…
(more)
▼ Fault diagnosis approaches for nonlinear real-world systems play a very important role in maintaining dependable, robust operations of safety-critical systems like aircraft, automobiles, power plants and planetary rovers. They require online tracking functions to monitor system behavior and ensure system operations remain within specified safety limits. It is important that such methods are robust to uncertainties, such as modeling errors, disturbance and measurement noise. In this thesis, we employ a temporal Bayesian technique called Dynamic Bayesian Networks (DBNs) to model nonlinear dynamic systems for uncertain probabilistic reasoning in diagnosis application domains. Within the DBN framework, we develop the modeling scheme, model construction process, and the use of the models to build diagnostic models for online diagnosis. This thesis also performs a preliminary comparison of two particle filter algorithms: generic particle filters (GPF) and auxiliary particle filter (APF). These are commonly used for tracking and estimating the true system behavior. Our approach to diagnosis includes a DBN model based diagnosis framework combining qualitative TRANSCEND scheme and quantitative methods for refining the fault isolation, and using parameter estimation techniques to provide more precise estimates of fault hypotheses. As a proof of concept, we apply this DBN based diagnosis scheme to the Reverse Osmosis (RO) subsystem of the Advanced Water Recovery System (AWRS). Performance of the two particle filter algorithms are compared based on a number of fault scenarios and different levels of noise as well. The results show our DBN-based scheme is effective for fault isolation and identification of complex nonlinear systems.
Advisors/Committee Members: Prof. Sandeep Neema (committee member), Prof. Gautam Biswas (committee member).
Subjects/Keywords: Particle Filter; Fault Diagnosis; Dynamic Bayesian Network; Nonlinear
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Weng, J. (2013). Dynamic Bayesian Network Based Fault Diagnosis on Nonlinear Dynamic Systems. (Thesis). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/11905
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Weng, Jiannian. “Dynamic Bayesian Network Based Fault Diagnosis on Nonlinear Dynamic Systems.” 2013. Thesis, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/11905.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Weng, Jiannian. “Dynamic Bayesian Network Based Fault Diagnosis on Nonlinear Dynamic Systems.” 2013. Web. 15 Apr 2021.
Vancouver:
Weng J. Dynamic Bayesian Network Based Fault Diagnosis on Nonlinear Dynamic Systems. [Internet] [Thesis]. Vanderbilt University; 2013. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/11905.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Weng J. Dynamic Bayesian Network Based Fault Diagnosis on Nonlinear Dynamic Systems. [Thesis]. Vanderbilt University; 2013. Available from: http://hdl.handle.net/1803/11905
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Vanderbilt University
8.
Dickes, Amanda Catherine.
Computational Modeling in the Elementary Science Classroom.
Degree: PhD, Learning, Teaching and Diversity, 2017, Vanderbilt University
URL: http://hdl.handle.net/1803/10406
► In recent years, leading educational scholars have argued for computational thinking to be an essential focus of K12 curriculum. Although now incorporated as an essential…
(more)
▼ In recent years, leading educational scholars have argued for computational thinking to be an essential focus of K12 curriculum. Although now incorporated as an essential concept for STEM education, research has shown that curricular integration of computational thinking and modeling is a complex and challenging endeavor which involves the introduction and adoption of new literacies to both teachers and students, alongside disciplinary ideas and practices that students already find challenging to understand. This three-paper dissertation addresses the challenge of merging computational thinking and modeling with elementary science curricula along three dimensions – material, cognitive and social - by investigating how students and the classroom teacher make use of forms of activity that integrate agent-based computational modeling with other forms of scientific modeling to support the co-development of scientific and computational literacy in the elementary classroom. The first paper examines the close-interplay between the material and cognitive dimensions by investigating the forms of reasoning fourth graders utilized to develop more expert-like explanations of predator-prey relationships and population change due to natural selection after interacting with an agent-based model. The second paper elaborates on the interplay between the material and cognitive dimensions as well as extends the work conducted in the first paper by investigating how computational modeling is enhanced through its integration with other material forms, specifically with scientific modeling. The role of the teacher in re-shaping the structure of activity, and how those re-shapings influenced the knowledge that developed during activity was an additional component of this work. The third paper takes a more integrative stance and investigates the interplay between social, material and cognitive dimensions of emerging computational and scientific literacies through the development of sociomathematical norms across several months of activity. This paper advances an argument that the teacher’s emphasis on mathematizing and measurement as key forms of learning activities helped to meaningfully establish computation as the “language” of science in the elementary classroom. As a set, this work contributes to our understanding of how computational thinking and programming can transform elementary science education. Together, these papers illustrate how integration of computation as a language of science in the elementary classroom involves careful consideration of the complex interplay between materials, both computational and non-computational, cognition and classroom culture and highlights the complex social dimensions that allow (or do not allow) various computational competencies to thrive in a classroom setting.
Advisors/Committee Members: Pratim Sengupta (committee member), Leona Schauble (committee member), Gautam Biswas (committee member), Richard Lehrer (Committee Chair).
Subjects/Keywords: Computational Literacy; Modeling; Elementary Science; Researcher-Teacher Partnerships
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dickes, A. C. (2017). Computational Modeling in the Elementary Science Classroom. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/10406
Chicago Manual of Style (16th Edition):
Dickes, Amanda Catherine. “Computational Modeling in the Elementary Science Classroom.” 2017. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/10406.
MLA Handbook (7th Edition):
Dickes, Amanda Catherine. “Computational Modeling in the Elementary Science Classroom.” 2017. Web. 15 Apr 2021.
Vancouver:
Dickes AC. Computational Modeling in the Elementary Science Classroom. [Internet] [Doctoral dissertation]. Vanderbilt University; 2017. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/10406.
Council of Science Editors:
Dickes AC. Computational Modeling in the Elementary Science Classroom. [Doctoral Dissertation]. Vanderbilt University; 2017. Available from: http://hdl.handle.net/1803/10406

Vanderbilt University
9.
Herberg, Jonathan.
Representing Social Agents, Actions, and Knowledge States at Separate Levels of Explicitness.
Degree: PhD, Psychology, 2011, Vanderbilt University
URL: http://hdl.handle.net/1803/12113
► This dissertation first sketches a framework integrating various processes that have been proposed to account for the human capacity for action perception and analysis. The…
(more)
▼ This dissertation first sketches a framework integrating various processes that have been proposed to account for the human capacity for action perception and analysis. The framework is then applied to interpreting two sets of experiments. In the first set I investigate how automatic simulation processes function in predicting reaches from perceiving gazes. In the second set I test the costs versus benefits to one's learning from the deliberate reasoning about a social agent's knowledge states, and the consequent social highlighting behaviors one engages in, when demonstrating an action. Taken together, these studies suggest roles as well as limitations for automatic simulation and deliberate inferential reasoning in action perception and understanding.
Advisors/Committee Members: John Rieser (committee member), Gautam Biswas (committee member), Daniel Levin (committee member), Megan Saylor (Committee Chair).
Subjects/Keywords: Action Analysis; Theory-of-Mind; Simulation; Social Cognition
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Herberg, J. (2011). Representing Social Agents, Actions, and Knowledge States at Separate Levels of Explicitness. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/12113
Chicago Manual of Style (16th Edition):
Herberg, Jonathan. “Representing Social Agents, Actions, and Knowledge States at Separate Levels of Explicitness.” 2011. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/12113.
MLA Handbook (7th Edition):
Herberg, Jonathan. “Representing Social Agents, Actions, and Knowledge States at Separate Levels of Explicitness.” 2011. Web. 15 Apr 2021.
Vancouver:
Herberg J. Representing Social Agents, Actions, and Knowledge States at Separate Levels of Explicitness. [Internet] [Doctoral dissertation]. Vanderbilt University; 2011. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/12113.
Council of Science Editors:
Herberg J. Representing Social Agents, Actions, and Knowledge States at Separate Levels of Explicitness. [Doctoral Dissertation]. Vanderbilt University; 2011. Available from: http://hdl.handle.net/1803/12113

Vanderbilt University
10.
Ghafouri, Amin.
Resilient Anomaly Detection in Cyber-Physical Systems.
Degree: PhD, Computer Science, 2018, Vanderbilt University
URL: http://hdl.handle.net/1803/10575
► Cyber-physical systems (CPS), such as autonomous automobile systems and process control systems, are mechanisms that deeply intertwine physical and software components. A resilient CPS is…
(more)
▼ Cyber-physical systems (CPS), such as autonomous automobile systems and process control systems, are mechanisms that deeply intertwine physical and software components. A resilient CPS is one that maintains an accepted level of operational normalcy in response to system faults and threats of unexpected and malicious nature. The focus of this dissertation is on improving resilience of CPS through design and evaluation of resilient anomaly detectors, which guarantee satisfactory performance even in the presence of worst-case faults and attacks. The contributions of the thesis address challenges in the design of resilient anomaly detectors by taking into consideration features of the physical system and the control and monitoring algorithms.
Detection thresholds of resilient anomaly detectors need to be configured properly to ensure detection performance while minimizing false alarms. Using a game-theoretic approach, our work formulates the problem of computing optimal detection thresholds which minimize both the number of false alarms and the probability of missing attacks. An efficient algorithm based on dynamic programming for solving the game and finding optimal detection thresholds is developed and analyzed. The approach is evaluated using a case study of contamination attacks in water networks.
To increase resilience against detection errors, a framework for application-aware anomaly detection is presented. The main objective is to configure an anomaly detector so that the performance loss of the application in the presence of detection errors is minimized. An efficient algorithm for finding the application-aware detector is proposed and analyzed. The results are evaluated using a case study of real-time control of traffic signals.
To improve resilience against malicious attackers, the problem of adversarial regression in CPS is investigated, where an adversary capable of perturbing the values of sensors attempts to drive a CPS to an unsafe state while remaining undetected. The problem is solved considering linear regression- and neural network regression-based detectors. Then, a resilient detector is presented that mitigates the impact of stealthy attacks through configuration of thresholds. The proposed approach is numerically evaluated using a case study of a process control system.
Advisors/Committee Members: Yevgeniy Vorobeychik (committee member), Gautam Biswas (committee member), Abhishek Dubey (committee member), Gabor Karsai (committee member), Xenofon Koutsoukos (Committee Chair).
Subjects/Keywords: anomaly detection; cyber-physical systems; resilient systems; game theory; regression-based detectors; machine learning
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Ghafouri, A. (2018). Resilient Anomaly Detection in Cyber-Physical Systems. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/10575
Chicago Manual of Style (16th Edition):
Ghafouri, Amin. “Resilient Anomaly Detection in Cyber-Physical Systems.” 2018. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/10575.
MLA Handbook (7th Edition):
Ghafouri, Amin. “Resilient Anomaly Detection in Cyber-Physical Systems.” 2018. Web. 15 Apr 2021.
Vancouver:
Ghafouri A. Resilient Anomaly Detection in Cyber-Physical Systems. [Internet] [Doctoral dissertation]. Vanderbilt University; 2018. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/10575.
Council of Science Editors:
Ghafouri A. Resilient Anomaly Detection in Cyber-Physical Systems. [Doctoral Dissertation]. Vanderbilt University; 2018. Available from: http://hdl.handle.net/1803/10575

Vanderbilt University
11.
Zhang, Wen.
Learning from Access Log to Mitigate Insider Threats.
Degree: PhD, Computer Science, 2016, Vanderbilt University
URL: http://hdl.handle.net/1803/10799
► As the quantity of data collected, stored, and processed in information systems has grown, so too have insider threats. This type of threat is realized…
(more)
▼ As the quantity of data collected, stored, and processed in information systems has grown, so too have insider threats. This type of threat is realized when authorized individuals misuse their privileges to violate privacy or security policies. Over the past several decades, various technologies have been introduced to mitigate the insider threat, which can be roughly partitioned into two categories: 1) prospective and 2) retrospective. Prospective technologies are designed to specify and manage a user’s rights, such that misuse can be detected and prevented before it transpires. Conversely, retrospective technologies permit users to invoke privileges aim, but investigate the legitimacy of such actions after the fact.
Despite the existence of such strategies, administrators need to answer several critical questions to put them into practice. First, given a specific circumstance, which type of strategy (i.e., prospective vs. retrospective) should be adopted? Second, given the type of strategy, which is the best approach to support it in an operational manner? Existing approaches addressing them neglect that the data captured by information systems may be able to inform the decision making. As such, the overarching goal of this dissertation is to investigate how best to answer these questions using data-driven approaches.
This dissertation makes three technical contributions. The first contribution is in the introduction of a novel approach to quantify tradeoffs for prospective and retrospective strategies, under which each strategy is translated into a classification model, whereby the misclassification costs for each model are compared to facilitate decision support. This dissertation then introduces several data-driven approaches to realize the strategies. The second contribution is for prospective strategies, with a specific focus on role-based access control (RBAC). This dissertation introduces an approach to evolve an existing RBAC based on evidence in an access log, which relies on a strategy to promote roles from candidates. The third contribution is for retrospective strategies, whereby this dissertation introduces an auditing framework that can leverage workflow information to facilitate misuse detection. These methods are empirically validated in three months of access log (million accesses) derived from a real-world information system.
Advisors/Committee Members: Carl Gunter (committee member), Jules White (committee member), Yuan Xue (committee member), Gautam Biswas (committee member), Bradley Malin (Committee Chair).
Subjects/Keywords: privacy; data mining; audit; access control
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Zhang, W. (2016). Learning from Access Log to Mitigate Insider Threats. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/10799
Chicago Manual of Style (16th Edition):
Zhang, Wen. “Learning from Access Log to Mitigate Insider Threats.” 2016. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/10799.
MLA Handbook (7th Edition):
Zhang, Wen. “Learning from Access Log to Mitigate Insider Threats.” 2016. Web. 15 Apr 2021.
Vancouver:
Zhang W. Learning from Access Log to Mitigate Insider Threats. [Internet] [Doctoral dissertation]. Vanderbilt University; 2016. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/10799.
Council of Science Editors:
Zhang W. Learning from Access Log to Mitigate Insider Threats. [Doctoral Dissertation]. Vanderbilt University; 2016. Available from: http://hdl.handle.net/1803/10799

Vanderbilt University
12.
Broll, Brian Daniel.
Collaborative Educational Environment Design for Accessible Distributed Computing.
Degree: PhD, Computer Science, 2018, Vanderbilt University
URL: http://hdl.handle.net/1803/11655
► The pervasiveness of distributed applications in everyday life has made distributed computing concepts become part of basic computer literacy. The dissertation presents the design of…
(more)
▼ The pervasiveness of distributed applications in everyday life has made distributed computing concepts become part of basic computer literacy. The dissertation presents the design of an educational environment for introducing distributed programming to secondary education. Three high-level abstractions are presented that enable young learners to build non-trivial distributed applications without obscuring the underlying distributed computing concepts. To expand the scope beyond web browser-based execution, capabilities for remote execution in alternative environments such as robotics platforms are also presented. Furthermore, collaborative editing can promote learning and productivity by allowing students to work in small teams but is unavailable in existing lively, blocks-based programming environments. A model of collaborative editing supporting visual programming environments is discussed. Version control support is beneficial for managing the complexity of applications but are often complex and difficult to use. A novel accessible version control for use in settings with minimal direct instruction is presented. Finally, empirical support is provided through three case studies using an implementation of the proposed educational environment design called NetsBlox.
Advisors/Committee Members: Aniruddha Gokhale (committee member), Jules White (committee member), Corey Brady (committee member), Gautam Biswas (committee member), Akos Ledeczi (Committee Chair).
Subjects/Keywords: visual programming; computer science education; distributed programming
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Broll, B. D. (2018). Collaborative Educational Environment Design for Accessible Distributed Computing. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/11655
Chicago Manual of Style (16th Edition):
Broll, Brian Daniel. “Collaborative Educational Environment Design for Accessible Distributed Computing.” 2018. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/11655.
MLA Handbook (7th Edition):
Broll, Brian Daniel. “Collaborative Educational Environment Design for Accessible Distributed Computing.” 2018. Web. 15 Apr 2021.
Vancouver:
Broll BD. Collaborative Educational Environment Design for Accessible Distributed Computing. [Internet] [Doctoral dissertation]. Vanderbilt University; 2018. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/11655.
Council of Science Editors:
Broll BD. Collaborative Educational Environment Design for Accessible Distributed Computing. [Doctoral Dissertation]. Vanderbilt University; 2018. Available from: http://hdl.handle.net/1803/11655

Vanderbilt University
13.
Dukeman, Anton Leo.
Hybrid Mission Planning with Coalition Formation.
Degree: PhD, Computer Science, 2017, Vanderbilt University
URL: http://hdl.handle.net/1803/11548
► Robotic systems have proven effective in many domains. Some robotic domains, such as mass casualty response, require close coupling between the humans and robots that…
(more)
▼ Robotic systems have proven effective in many domains. Some robotic domains, such as mass casualty response, require close coupling between the humans and robots that are able to adapt to the environment and tasks. The coalition formation problem allocates coalitions to each task, but does not produce executable plans. The planning problem creates executable plans, but problem difficulty scales with the number of agents and tasks in the problem. A hybrid solution to solve both problems will produce executable plans for the assigned tasks, while satisfying computational resource constraints. Four solution tools are presented and evaluated using four test domains, including a novel domain simulating the immediate response to a tornado by local government agencies. Each domain and problem was implemented in a new problem description language combining planning and coalition formation.
Planning alone is an existing tool to produce high quality plans by considering all possible interactions between tasks and agents simultaneously. However, planning alone requires large amounts of time and memory, both of which are constrained in real world applications. The coalition formation then planning tool factors the problem to reduce the required computational resources, but coalition formation cannot be relied upon to produce executable coalitions in all cases. The relaxed plan coalition augmentation tool addresses nonexecutable coalitions by selecting the agent(s) required to produce an executable coalition. The final tool, task fusion, addresses reduced solution quality by selecting tasks and coalitions for which planning together will increase solution quality. The relaxed plan coalition augmentation tool solved at least as many problems as planning alone and averaged much less computational resource usage. The task fusion tool solved more problems than planning alone, but plan quality and computational resource usage was mixed when compared to relaxed plan coalition augmentation.
Advisors/Committee Members: Mark Ellingham (committee member), Maithilee Kunda (committee member), Eugene Vorobeychik (committee member), Julie A. Adams (Committee Chair), Gautam Biswas (Committee Chair).
Subjects/Keywords: coalition formation; multi-agent planning; robotics; planning; multi-agent systems
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dukeman, A. L. (2017). Hybrid Mission Planning with Coalition Formation. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/11548
Chicago Manual of Style (16th Edition):
Dukeman, Anton Leo. “Hybrid Mission Planning with Coalition Formation.” 2017. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/11548.
MLA Handbook (7th Edition):
Dukeman, Anton Leo. “Hybrid Mission Planning with Coalition Formation.” 2017. Web. 15 Apr 2021.
Vancouver:
Dukeman AL. Hybrid Mission Planning with Coalition Formation. [Internet] [Doctoral dissertation]. Vanderbilt University; 2017. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/11548.
Council of Science Editors:
Dukeman AL. Hybrid Mission Planning with Coalition Formation. [Doctoral Dissertation]. Vanderbilt University; 2017. Available from: http://hdl.handle.net/1803/11548

Vanderbilt University
14.
Morse, Douglas Lawrence.
Spatial Concepts and Reference Frames.
Degree: PhD, Psychology, 2016, Vanderbilt University
URL: http://hdl.handle.net/1803/14062
► Research in linguistics and psychology suggests that spatial concepts contain information specifying the reference frame parameters needed to configure a reference frame for applying the…
(more)
▼ Research in linguistics and psychology suggests that spatial concepts contain information specifying the reference frame parameters needed to configure a reference frame for applying the concept correctly. This implies that reference frame reconfiguration is driven by spatial concepts. Borrowing from methods in explicit symbolic cuing and task switching, four experiments contrasted this concept-driven hypothesis with a property-driven hypothesis which posits reference frame parameters are only reconfigured when their corresponding properties in the environment have changed. The selective influence of reference frame property repetitions and alternations on reconfiguration was assessed by measuring repetition benefits and advance reconfiguration. The pattern of results better supported the concept-driven account, but only for the conditions where the spatial concept changed. A hybrid account is proposed that might more fully account for reference frame reconfiguration.
Advisors/Committee Members: Daniel T. Levin, Ph.D. (committee member), Gautam Biswas, Ph.D. (committee member), Gordon D. Logan, Ph.D. (Committee Chair), Joseph S. Lappin, Ph.D. (Committee Chair).
Subjects/Keywords: spatial reference frames task set reconfiguration symbolic cuing time course functions conceptual li
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Morse, D. L. (2016). Spatial Concepts and Reference Frames. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/14062
Chicago Manual of Style (16th Edition):
Morse, Douglas Lawrence. “Spatial Concepts and Reference Frames.” 2016. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/14062.
MLA Handbook (7th Edition):
Morse, Douglas Lawrence. “Spatial Concepts and Reference Frames.” 2016. Web. 15 Apr 2021.
Vancouver:
Morse DL. Spatial Concepts and Reference Frames. [Internet] [Doctoral dissertation]. Vanderbilt University; 2016. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/14062.
Council of Science Editors:
Morse DL. Spatial Concepts and Reference Frames. [Doctoral Dissertation]. Vanderbilt University; 2016. Available from: http://hdl.handle.net/1803/14062

Vanderbilt University
15.
Bartram, Gregory Walsh.
System Health Diagnosis and Prognosis Using Dynamic Bayesian Networks.
Degree: PhD, Civil Engineering, 2013, Vanderbilt University
URL: http://hdl.handle.net/1803/13757
► This dissertation develops a methodology that provides information to make optimal decisions with respect to the mission and maintenance of a system. A great amount…
(more)
▼ This dissertation develops a methodology that provides information to make optimal decisions with respect to the mission and maintenance of a system. A great amount of information is needed about a system to make such decisions, including its current condition and predictions of its future state. The problem is broken into four subproblems. In the first, a dynamic Bayesian network based system modeling approach is developed for use when the available information is heterogeneous, i.e. available in various formats from various sources (e.g., laboratory data, operational data, expert opinion, mathematical models, and reliability data). The resulting system model accounts for uncertainty and is amenable to the system health management tasks of diagnosis, prognosis, and decision-making. In the second subproblem, a diagnosis approach for systems is developed for systems in the presence of heterogeneous information. The approach accounts for and quantifies uncertainty in the probability of damage, isolation, and quantification. Next, a prognosis is considered when the available information is heterogeneous. The prognosis methodology accounts for uncertainty in diagnosis and is subjected to validation. Finally, a methodology for decision-making problem is developed for problems where the available information is heterogeneous and when assigning multiple systems to multiple missions. The methodology accounts for uncertainty in diagnosis and prognosis. The system modeling, diagnosis, prognosis, and decision-making problems are illustrated using a hydraulic actuator with multiple possible faults, while the diagnosis problem is demonstrated using a cantilever beam with possible damage at the support or a mid-span crack. The proposed methodology is general and can be applied to many different systems.
Advisors/Committee Members: Prof. Prodyot K. Basu (committee member), Prof. Gautam Biswas (committee member), Prof. Mark P. McDonald (committee member), Prof. Sankaran Mahadevan (Committee Chair).
Subjects/Keywords: dynamic bayesian network; diagnosis; prognosis; decision making; particle filtering
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Bartram, G. W. (2013). System Health Diagnosis and Prognosis Using Dynamic Bayesian Networks. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/13757
Chicago Manual of Style (16th Edition):
Bartram, Gregory Walsh. “System Health Diagnosis and Prognosis Using Dynamic Bayesian Networks.” 2013. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/13757.
MLA Handbook (7th Edition):
Bartram, Gregory Walsh. “System Health Diagnosis and Prognosis Using Dynamic Bayesian Networks.” 2013. Web. 15 Apr 2021.
Vancouver:
Bartram GW. System Health Diagnosis and Prognosis Using Dynamic Bayesian Networks. [Internet] [Doctoral dissertation]. Vanderbilt University; 2013. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/13757.
Council of Science Editors:
Bartram GW. System Health Diagnosis and Prognosis Using Dynamic Bayesian Networks. [Doctoral Dissertation]. Vanderbilt University; 2013. Available from: http://hdl.handle.net/1803/13757

Vanderbilt University
16.
Shekhar, Shashank.
Algorithms and Techniques for Dynamic Resource Management across Cloud-Edge Resource Spectrum.
Degree: PhD, Computer Science, 2018, Vanderbilt University
URL: http://hdl.handle.net/1803/12533
► An increasing number of Internet of Things (IoT) and other latency-sensitive applications are cloud-hosted. However, limitations in performance assurances from the cloud, and the longer…
(more)
▼ An increasing number of Internet of Things (IoT) and other
latency-sensitive applications are cloud-hosted. However, limitations
in performance assurances from the cloud, and the longer and often
unpredictable end-to-end network latencies between the end user and
the cloud can be detrimental to the response time requirements of the
applications, specifically those that have stringent Quality of
Service (QoS) requirements. Although fog/edge resources, such as
cloudlets, may alleviate some of the latency concerns, there is a
general lack of mechanisms that can dynamically manage resources
across the cloud-edge spectrum. The problem becomes even more
challenging when performance interference on multi-tenant fog servers
along with workload variations, and user mobility are considered. To
address these concerns, this dissertation presents the design and
implementation of the Dynamic Data Driven Cloud and Edge Systems
(D3CES) framework. It defines approaches to utilize the performance
metrics collected from adaptively instrumenting the cloud and edge
resources to learn and enhance performance interference-aware models
of the distributed resource pool. In turn, the framework optimizes
resource provision in a way that satisfies service level objectives
(SLOs) while minimizing cost to the service providers. This
dissertation evaluates the approach on a variety of real world
scenarios.
Advisors/Committee Members: Gautam Biswas (committee member), Douglas C. Schmidt (committee member), Janos Sztipanovits (committee member), Xenofon Koutsoukos (committee member), Aniruddha S. Gokhale (Committee Chair).
Subjects/Keywords: Cloud computing; Optimization; Performance interference; Resource management; Edge computing; Fog computing
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Shekhar, S. (2018). Algorithms and Techniques for Dynamic Resource Management across Cloud-Edge Resource Spectrum. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/12533
Chicago Manual of Style (16th Edition):
Shekhar, Shashank. “Algorithms and Techniques for Dynamic Resource Management across Cloud-Edge Resource Spectrum.” 2018. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/12533.
MLA Handbook (7th Edition):
Shekhar, Shashank. “Algorithms and Techniques for Dynamic Resource Management across Cloud-Edge Resource Spectrum.” 2018. Web. 15 Apr 2021.
Vancouver:
Shekhar S. Algorithms and Techniques for Dynamic Resource Management across Cloud-Edge Resource Spectrum. [Internet] [Doctoral dissertation]. Vanderbilt University; 2018. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/12533.
Council of Science Editors:
Shekhar S. Algorithms and Techniques for Dynamic Resource Management across Cloud-Edge Resource Spectrum. [Doctoral Dissertation]. Vanderbilt University; 2018. Available from: http://hdl.handle.net/1803/12533

Vanderbilt University
17.
Cao, Yanchuan.
Minimizing service disruption in peer-to-peer streaming.
Degree: PhD, Computer Science, 2011, Vanderbilt University
URL: http://hdl.handle.net/1803/10619
► A unique challenge in P2P network is that the peer dynamics (departure or failure) cause unavoidable disruption to the downstream peers. While many works have…
(more)
▼ A unique challenge in P2P network is that the peer dynamics (departure or failure) cause unavoidable disruption to the downstream peers. While many works have been dedicated to consider fault resilience in peer selection, little understanding is achieved regarding the solvability and solution complexity of this problem from the optimization perspective. For peer-to-peer (P2P) streaming system in particular, in order to improve its streaming quality and stability, a P2P system should select peers with abundant bandwidth resource and prospect longevity as the parents of other peers. In this dissertation, we proposed an optimization framework to maximize resilient throughput, and an evaluation metric to minimize service disruption.
Advisors/Committee Members: Yuan Xue (committee member), William Robinson (committee member), Aniruddha Gokhale (committee member), Gautam Biswas (committee member), Yi Cui (Committee Chair).
Subjects/Keywords: peer-to-peer streaming; linear optimization; generalized flow
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Cao, Y. (2011). Minimizing service disruption in peer-to-peer streaming. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/10619
Chicago Manual of Style (16th Edition):
Cao, Yanchuan. “Minimizing service disruption in peer-to-peer streaming.” 2011. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/10619.
MLA Handbook (7th Edition):
Cao, Yanchuan. “Minimizing service disruption in peer-to-peer streaming.” 2011. Web. 15 Apr 2021.
Vancouver:
Cao Y. Minimizing service disruption in peer-to-peer streaming. [Internet] [Doctoral dissertation]. Vanderbilt University; 2011. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/10619.
Council of Science Editors:
Cao Y. Minimizing service disruption in peer-to-peer streaming. [Doctoral Dissertation]. Vanderbilt University; 2011. Available from: http://hdl.handle.net/1803/10619

Vanderbilt University
18.
Zhang, Haifeng.
Algorithmic Marketing with Data-Driven Simulations.
Degree: PhD, Computer Science, 2017, Vanderbilt University
URL: http://hdl.handle.net/1803/12643
► Marketing researchers and practitioners care about why and how products or services are adopted by consumers. The influential theory of innovation diffusion has been established…
(more)
▼ Marketing researchers and practitioners care about why and how products or services are adopted by consumers. The influential theory of innovation diffusion has been established for decades, but modeling and simulating the diffusion process remains notoriously challenging. Lately, agent-based models (ABMs) have dominated traditional aggregate diffusion models, due to the remarkable advantage to capture individual heterogeneity and social and spatial interactions. Our critical review of the empirically-grounded ABMs of innovation diffusion, however, reveals that few such ABMs are calibrated properly, validated rigorously, and developed explicitly for prediction. This clearly limits their use in supporting decision-making in practice. The thesis contributes a rigorous data-driven agent-based modeling (DDABM) approach that relies on state-of-the-art machine learning techniques to effectively calibrate and validate agent behavior models on massive and rich individual adoption data. The models are integrated into multi-agent simulations to precisely forecast roof-top solar adoption and efficiently explore subsidizing strategies in San Diego county, USA. Historically, ABMs were used to answer “what-if” questions and draw insights on the efficacy of different policies, however, few could provide executable and quantitative decisions. Mathematical optimization has been widely used to provide numerical solutions in many domains, but little effort has been made to couple it with ABMs. By solving marketing optimization problems in several important settings, such as, dynamic seeding of emerging technologies, route planning for door-to-door targeted marketing, and budget optimization in multi-channel marketing, the thesis also strongly demonstrates how efficient algorithms can aid the design of effective marketing policies facilitated by data-driven simulations, like ABMs, providing optimal or near-optimal actionable plans for marketers. The presented research characterized by computational modeling techniques and algorithmic methods could lead to our ultimate goal of intelligent machine-automated marketing.
Advisors/Committee Members: Gautam Biswas (committee member), Doug Fisher (committee member), Bradley Malin (committee member), William Rand (committee member), Yevgeniy Vorobeychik (Committee Chair).
Subjects/Keywords: Innovation Diffusion; Agent-based Modeling; Algorithm Design; Marketing
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Zhang, H. (2017). Algorithmic Marketing with Data-Driven Simulations. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/12643
Chicago Manual of Style (16th Edition):
Zhang, Haifeng. “Algorithmic Marketing with Data-Driven Simulations.” 2017. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/12643.
MLA Handbook (7th Edition):
Zhang, Haifeng. “Algorithmic Marketing with Data-Driven Simulations.” 2017. Web. 15 Apr 2021.
Vancouver:
Zhang H. Algorithmic Marketing with Data-Driven Simulations. [Internet] [Doctoral dissertation]. Vanderbilt University; 2017. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/12643.
Council of Science Editors:
Zhang H. Algorithmic Marketing with Data-Driven Simulations. [Doctoral Dissertation]. Vanderbilt University; 2017. Available from: http://hdl.handle.net/1803/12643

Vanderbilt University
19.
Li, Xiaowei.
Detection and prevention of logic attacks against web applications through black-box analysis.
Degree: PhD, Computer Science, 2013, Vanderbilt University
URL: http://hdl.handle.net/1803/12428
► The three-tier web architecture is becoming the de-facto solution for delivering information and business services over the Internet. The center of this architecture is a…
(more)
▼ The three-tier web architecture is becoming the de-facto solution for delivering information and business services over the Internet. The center of this architecture is a web application, which implements the business logic, accesses the information stored at the back-end database and interacts with the users through the front-end web server. As web applications get increasingly complex to support sophisticated business functionalities, an emerging class of vulnerabilities, which are referred to as logic vulnerabilities (a.k.a, logic flaws), have attracted increasing attention in recent years. The attacks that target on these vulnerabilities, which are referred to as logic attacks or state violation attacks, have posed serious security threats. To date, very few works have been devoted to the study of the logic vulnerabilities and effective measures to mitigate logic attacks are yet to be developed. Most existing works only target on one specific type of logic vulnerability, and are limited by the availability of application source code and the applicability to specific development languages and platforms. The major challenges come from the fact that application logic flaws and attacks are specific to the functionality of a particular web application and its implementation usually comes without an explicit logic specification.
In this dissertation, we aim to address logic attacks against web applications in an automated, general and black-box way (i.e., without requiring the application source code). We present several techniques for automatically deriving the application logic specification by observing and extracting patterns from the interactions between the application and users, as well as the database. Then, we leverage the inferred logic specification for both runtime detection of logic attacks (i.e., defensive approach) and discovery of logic vulnerabilities within web applications (i.e., preventive approach). The defensive approach can be utilized to protect potentially vulnerable web applications that cannot be taken offline for vulnerability analysis, while the preventive approach can help the developers to identify and fix logic flaws within the application implementations so that they are immune to logic attacks. We implemented two prototype systems – BLOCK and SENTINAL, based on our defensive techniques and three prototypes systems – LogicScope, EXPELLER, BATMAN, based on our preventive techniques. These prototype systems have different features and focuses. We evaluate them over a set of real world open-source web applications. The experiment results demonstrate the effectiveness of our techniques and prototype systems.
Advisors/Committee Members: Janos Sztipanovits (committee member), Bradley Malin (committee member), Douglas C. Schmidt (committee member), Gautam Biswas (committee member), Yuan Xue (Committee Chair).
Subjects/Keywords: Access Control; Database Access; Black-box Analysis; Logic Attack; Web Application Security; Logic Vulnerability
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Li, X. (2013). Detection and prevention of logic attacks against web applications through black-box analysis. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/12428
Chicago Manual of Style (16th Edition):
Li, Xiaowei. “Detection and prevention of logic attacks against web applications through black-box analysis.” 2013. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/12428.
MLA Handbook (7th Edition):
Li, Xiaowei. “Detection and prevention of logic attacks against web applications through black-box analysis.” 2013. Web. 15 Apr 2021.
Vancouver:
Li X. Detection and prevention of logic attacks against web applications through black-box analysis. [Internet] [Doctoral dissertation]. Vanderbilt University; 2013. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/12428.
Council of Science Editors:
Li X. Detection and prevention of logic attacks against web applications through black-box analysis. [Doctoral Dissertation]. Vanderbilt University; 2013. Available from: http://hdl.handle.net/1803/12428

Vanderbilt University
20.
Kumar, Pranav Srinivas.
Integrated Timing Analysis and Verification of Component-based Distributed Real-time Systems.
Degree: PhD, Computer Science, 2016, Vanderbilt University
URL: http://hdl.handle.net/1803/14213
► Distributed real-time embedded systems that address safety and mission-critical system requirements are applied in a variety of heterogeneous domains today e.g. avionics, automotive systems, locomotives,…
(more)
▼ Distributed real-time embedded systems that address safety and mission-critical system requirements are applied in a variety of heterogeneous domains today e.g. avionics, automotive systems, locomotives, and industrial control systems. The volume and complexity of such software grows everyday depending on an assortment of factors, including challenging system requirements e.g. resilience to hardware and software faults, remote deployment and repair. To mitigate the software complexity in such systems, model-driven component-based software engineering and development has become an accepted practice. Integrating appropriate modeling and analysis techniques into the design of such systems helps ensure predictable, dependable and safe operation upon deployment. The research presented in this dissertation has lead to the development of a methodology to model and analyze the temporal behavior of such distributed component-based applications in order to verify system-level timing properties such as worst-case response times, lack of deadline violations etc. Our approach relies on formalizing the structure and behavior of component-based applications using Colored Petri Nets (CPN) i.e. modeling the component assembly, operation scheduling, thread execution etc. and analyzing the temporal behavior of the overall system using simulation, state space analysis and model checking techniques. To bridge the gap between the system model and the analysis model, we have developed a modeling language to describe the business logic of component operations. Using the overall system model and the per-operation business logic models, a CPN timing analysis model is fully generated for analysis. The generality of the modeling principles used show the applicability of this method to a wide range of similar systems. We have also developed methods to structurally reduce our CPN and improve the scalability and performance of analysis to work for medium-to-large scale systems. Lastly, the results obtained from CPN analysis have been validated by executing experimental component assemblies on a cyber-physical systems testbed, a 32 Beaglebone Black cluster. Results show that the worst-case response times of component operations calculated by the CPN analysis are close, conservative estimates of the real-world execution.
Advisors/Committee Members: Xenofon Koutsoukos (committee member), Akos Ledeczi (committee member), Gautam Biswas (committee member), Bharat Bhuva (committee member), Gabor Karsai (Committee Chair).
Subjects/Keywords: component-based; verification; timing analysis; embedded systems; real-time; distributed
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Kumar, P. S. (2016). Integrated Timing Analysis and Verification of Component-based Distributed Real-time Systems. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/14213
Chicago Manual of Style (16th Edition):
Kumar, Pranav Srinivas. “Integrated Timing Analysis and Verification of Component-based Distributed Real-time Systems.” 2016. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/14213.
MLA Handbook (7th Edition):
Kumar, Pranav Srinivas. “Integrated Timing Analysis and Verification of Component-based Distributed Real-time Systems.” 2016. Web. 15 Apr 2021.
Vancouver:
Kumar PS. Integrated Timing Analysis and Verification of Component-based Distributed Real-time Systems. [Internet] [Doctoral dissertation]. Vanderbilt University; 2016. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/14213.
Council of Science Editors:
Kumar PS. Integrated Timing Analysis and Verification of Component-based Distributed Real-time Systems. [Doctoral Dissertation]. Vanderbilt University; 2016. Available from: http://hdl.handle.net/1803/14213

Vanderbilt University
21.
Patil, Prithviraj Pradiprao.
Algorithms and techniques for transitioning to software defined networks.
Degree: PhD, Computer Science, 2016, Vanderbilt University
URL: http://hdl.handle.net/1803/12952
► Software Defined Networking (SDN) has seen growing deployment in the large wired data center networks due to its advantages like better network manageability and higher-level…
(more)
▼ Software Defined Networking (SDN) has seen growing deployment in the large wired data center networks due to its advantages like better network manageability and higher-level abstractions. At the core of SDN is the separation and centralization of the control plane from the forwarding elements in the network as opposed to the distributed control plane of current networks. However various issues need to be addressed for an efficient transition to SDN from existing legacy networks. In this thesis, we address following three important challenges in this regard. (1) The task of deploying the distributed controllers
continues to be performed in a manual and static way. To address this problem, we present
a novel approach called InitSDN to bootstrapping the distributed software defined network
architecture and deploying the distributed controllers. (2) Data center networks (DCNs)
rely heavily on the use of group communications for various tasks such as management utilities, collaborative applications, distributed databases, etc. SDN provides new opportunities for re-engineering multicast protocols that can address current limitations with IP multicast. To that end we present a novel approach to using SDN-based multicast (SDMC) for flexible, network load-aware, and switch memory-efficient group communication in
DCNs. (3) SDN has been slow to be used in the wireless scenario like wireless mesh net-
works (WSN) compared to wired data center networks. This is due to the fact that SDN
(and its underlying OpenFlow protocol) was designed initially to run in the wired network
where SDN controller has wired access to all the switches in the network. To address this
challenge, we propose a pure opneflow based approach for adapting SDN in wireless mesh
netowrks by extending current OpenFlow protocol for routing in the wireless network.
Advisors/Committee Members: Akram Hakiri (committee member), Parameshwaran Krishnan (committee member), Gautam Biswas (committee member), Shivakumar Sastry (committee member), Aniruddha Gokhale (Committee Chair).
Subjects/Keywords: Data center Networks; Multicast; SDN; Software Defined Networks; Wireless Mesh Network; Openflow
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Patil, P. P. (2016). Algorithms and techniques for transitioning to software defined networks. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/12952
Chicago Manual of Style (16th Edition):
Patil, Prithviraj Pradiprao. “Algorithms and techniques for transitioning to software defined networks.” 2016. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/12952.
MLA Handbook (7th Edition):
Patil, Prithviraj Pradiprao. “Algorithms and techniques for transitioning to software defined networks.” 2016. Web. 15 Apr 2021.
Vancouver:
Patil PP. Algorithms and techniques for transitioning to software defined networks. [Internet] [Doctoral dissertation]. Vanderbilt University; 2016. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/12952.
Council of Science Editors:
Patil PP. Algorithms and techniques for transitioning to software defined networks. [Doctoral Dissertation]. Vanderbilt University; 2016. Available from: http://hdl.handle.net/1803/12952

Vanderbilt University
22.
Carl, Joshua David.
High Performance Numerical Simulations To Support System Level Design.
Degree: PhD, Electrical Engineering, 2016, Vanderbilt University
URL: http://hdl.handle.net/1803/15338
► Cyber-physical systems (CPS) represent a class of complex engineered systems where functionality and behavior emerge through the interaction between the computational and physical domains. Simulation…
(more)
▼ Cyber-physical systems (CPS) represent a class of complex engineered systems where functionality and behavior emerge through the interaction between the computational and physical domains. Simulation provides design engineers with quick and accurate feedback on the behaviors generated by their designs, and, therefore, their correctness. Most modern engineering design workstations use multi-core CPUs that can typically support 8 to 12 parallel computational threads. Furthermore, the CPU is designed to share data across all the computational threads, making a multi-core processor a flexible parallel processing system. These multi-core CPUs also have a multi-layer cache that must be carefully considered when designing parallel software to avoid cache conflicts between the different threads. Unfortunately, most modern simulation environments execute system simulations on a single thread, which does not take full advantage of the processing power available on a modern CPU and for large, complex, CPSs these simulations can take a very long time to complete.
This thesis investigates methods to partition and simulate differential equation-based models of cyber-physical systems using multiple threads on a modern multi-core CPU. We describe model partitioning methods using fixed step and variable step numerical integration methods. Our methods consider the multi-layer cache structure of modern multi-core CPUs to avoid simulation performance degradation due to cache conflicts. We study the effectiveness of each parallel simulation algorithm by calculating the relative speedup compared to a serial simulation applied to a series of large electric circuit models (up to 1000 state variables). We also applied our parallel simulation algorithms to NASA’s Water Recovery System as a case study. Our parallel simulation algorithms produced a maximum speedup of 2.5 to 5.2 times the serial simulation, for models without algebraic loops, and a maximum speedup of 3.3 for models with algebraic loops. We also develop a series of guidelines for maximizing performance when developing parallel simulation software intended for use on multi-core CPUs.
Advisors/Committee Members: Sandeep Neema (committee member), Gabor Karsai (committee member), Xenofon D. Koutsoukos (committee member), Tom Withrow (committee member), Gautam Biswas (Committee Chair).
Subjects/Keywords: multi-core CPU; modeling; simulation; numerical integration; parallel processing
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Carl, J. D. (2016). High Performance Numerical Simulations To Support System Level Design. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/15338
Chicago Manual of Style (16th Edition):
Carl, Joshua David. “High Performance Numerical Simulations To Support System Level Design.” 2016. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/15338.
MLA Handbook (7th Edition):
Carl, Joshua David. “High Performance Numerical Simulations To Support System Level Design.” 2016. Web. 15 Apr 2021.
Vancouver:
Carl JD. High Performance Numerical Simulations To Support System Level Design. [Internet] [Doctoral dissertation]. Vanderbilt University; 2016. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/15338.
Council of Science Editors:
Carl JD. High Performance Numerical Simulations To Support System Level Design. [Doctoral Dissertation]. Vanderbilt University; 2016. Available from: http://hdl.handle.net/1803/15338

Vanderbilt University
23.
Mathe, Janos Laszlo.
The Precise Construction of Patient Protocols: Modeling, Simulation and Analysis of Computer Interpretable Guidelines.
Degree: PhD, Computer Science, 2012, Vanderbilt University
URL: http://hdl.handle.net/1803/14620
► Standardizing the care of patients with complex problems in hospital settings is a difficult challenge for physicians, nurses and other medical professionals. Diverse conditions further…
(more)
▼ Standardizing the care of patients with complex problems in hospital settings is a difficult challenge for physicians, nurses and other medical professionals. Diverse conditions further complicate patient management. While in acute care settings such as intensive care units, the inherent problems of stabilizing and improving vital patient parameters is further complicated by the division of responsibilities among different individuals and teams, in outpatient settings the management of chronic diseases introduces additional complications related to the long-term treatment of patients. The use of evidence-based guidelines for managing complex clinical problems has become the standard of practice. Computerized support for implementing such guidelines has tremendous potential; however, addressing this problem requires a carefully coordinated use of various techniques from the field of computer science, as guidelines developed by the medical community are not directly interpretable by computers.
In this thesis, first, we present a survey of literature and a study on the open questions from the field of clinical decision support focusing on the use of model-based techniques for specifying and implementing evidence-based guidelines. Following the survey, we describe a model-based architecture for enabling the construction, management, verification and execution of such guidelines. The presented architecture is model-based in the sense that it relies upon the formal modeling of medical guidelines, including the specification of input parameters such as signs and symptoms, output parameters such as medical actions, and other guideline-related constraints such as rules, regulations and policies. The behavioral semantics of these models is provided by the application of custom-built formal behavioral templates defined with the help of Matlab Simulink/Stateflow and model composition. The benefits of our approach are illustrated with the modeling, execution and formal analysis of a clinically relevant example, a sepsis management guideline.
Advisors/Committee Members: Gautam Biswas (committee member), Xenofon D. Koutsoukos (committee member), Bradley A. Malin (committee member), Douglas C. Schmidt (committee member), Gabor Karsai (Committee Chair).
Subjects/Keywords: Executable medical guidelines; Model-based development; Patient workflow management system; Design languages; Domain-specific architectures; Medical information systems; Modeling; Ontology
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Mathe, J. L. (2012). The Precise Construction of Patient Protocols: Modeling, Simulation and Analysis of Computer Interpretable Guidelines. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/14620
Chicago Manual of Style (16th Edition):
Mathe, Janos Laszlo. “The Precise Construction of Patient Protocols: Modeling, Simulation and Analysis of Computer Interpretable Guidelines.” 2012. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/14620.
MLA Handbook (7th Edition):
Mathe, Janos Laszlo. “The Precise Construction of Patient Protocols: Modeling, Simulation and Analysis of Computer Interpretable Guidelines.” 2012. Web. 15 Apr 2021.
Vancouver:
Mathe JL. The Precise Construction of Patient Protocols: Modeling, Simulation and Analysis of Computer Interpretable Guidelines. [Internet] [Doctoral dissertation]. Vanderbilt University; 2012. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/14620.
Council of Science Editors:
Mathe JL. The Precise Construction of Patient Protocols: Modeling, Simulation and Analysis of Computer Interpretable Guidelines. [Doctoral Dissertation]. Vanderbilt University; 2012. Available from: http://hdl.handle.net/1803/14620

Vanderbilt University
24.
Service, Travis Coe.
Coalition Structure Generation in Characteristic Function Games.
Degree: PhD, Computer Science, 2012, Vanderbilt University
URL: http://hdl.handle.net/1803/11420
► Cooperation among self-interested agents offers the potential to realize goals unachievable by any agent alone. However, determining the optimal manner in which agents should cooperate…
(more)
▼ Cooperation among self-interested agents offers the potential to realize goals unachievable by any agent alone. However, determining the optimal manner in which agents should cooperate is a computationally difficult problem. Two questions naturally arise: ``Which groups of agents should cooperate in order to maximize their earnings?' and ``How should the resulting earnings be split between the agents?'
This dissertation presents a number of approximation algorithms for coalition structure generation when agents are group rational. The presented algorithms improve upon the existing state-of-the-art in coalition structure generation by guaranteeing solutions along with constant factor lower bounds on the quality of the solutions in less than the time required to solve the problem exactly. This dissertation is also the first to present approximation algorithms for coalition structure generation tailored to monotonic domains. The complexity of the coalition structure generation problem is also studied in games where the number of agent types is small.
Optimally coordinating multiple agents becomes even more challenging when the agents are self-interested. Self-interested agents are not guaranteed to converge to social welfare maximizing states, as such states are not necessarily stable. This dissertation studies the stability-optimality relationship and demonstrates that both optimal and suboptimal coalition structures can be the most stable. The stability-optimality relationship restricted to certain natural classes of coalitional games is also studied.
Advisors/Committee Members: Gautam Biswas (committee member), Jerry Spinrad (committee member), Paul Edelman (committee member), Vincent Conitzer (committee member), Julie A. Adams (Committee Chair).
Subjects/Keywords: coalition structure generation; multi-agent; coalition formation
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Service, T. C. (2012). Coalition Structure Generation in Characteristic Function Games. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/11420
Chicago Manual of Style (16th Edition):
Service, Travis Coe. “Coalition Structure Generation in Characteristic Function Games.” 2012. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/11420.
MLA Handbook (7th Edition):
Service, Travis Coe. “Coalition Structure Generation in Characteristic Function Games.” 2012. Web. 15 Apr 2021.
Vancouver:
Service TC. Coalition Structure Generation in Characteristic Function Games. [Internet] [Doctoral dissertation]. Vanderbilt University; 2012. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/11420.
Council of Science Editors:
Service TC. Coalition Structure Generation in Characteristic Function Games. [Doctoral Dissertation]. Vanderbilt University; 2012. Available from: http://hdl.handle.net/1803/11420

Vanderbilt University
25.
Sankararaman, Shankar.
Uncertainty Quantification and Integration in Engineering Systems.
Degree: PhD, Civil Engineering, 2012, Vanderbilt University
URL: http://hdl.handle.net/1803/10567
► A comprehensive framework for the treatment of uncertainty is essential to facilitate decision-making in engineering systems at every stage of the life cycle, such as…
(more)
▼ A comprehensive framework for the treatment of uncertainty is essential to facilitate decision-making in engineering systems at every stage of the life cycle, such as design, manufacturing/construction, operations, system health assessment and risk management. This dissertation advances the state of the art in uncertainty quantification methods by systematically accounting for the various sources of uncertainty (natural variability, data uncertainty, and model uncertainty) in order to compute the overall uncertainty in the system-level prediction. First, a likelihood-based methodology is developed in order to represent epistemic uncertainty (due to sparse/imprecise data) using probability distributions, thereby facilitating combined treatment of aleatory and epistemic uncertainty. Second, computational methods are developed to systematically include the various sources of uncertainty in model verification, validation and calibration activities. Third, a Bayesian network-based methodology is developed for integrating the results of various uncertainty quantification activities in hierarchical system models. Different types of hierarchical system models, including multi-physics and multi-level models, are considered. Fourth, the Bayesian methodology is used to guide decision-making with respect to test resource allocation for uncertainty quantification. Finally, a methodology for inverse sensitivity analysis is developed in order to analyze the effect of various sources of uncertainty on the variance of posterior estimation and thereby aid in design of experiments and dimension reduction. The proposed methods are applied to civil, mechanical, and aerospace structures.
Advisors/Committee Members: Mark P McDonald (committee member), Gautam Biswas (committee member), Bruce Cooil (committee member), Prodyot K Basu (committee member), Sankaran Mahadevan (Committee Chair).
Subjects/Keywords: model uncertainty; data uncertainty; verification and validation; model calibration; Bayesian networks; inverse problems; sensitivity analysis
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Sankararaman, S. (2012). Uncertainty Quantification and Integration in Engineering Systems. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/10567
Chicago Manual of Style (16th Edition):
Sankararaman, Shankar. “Uncertainty Quantification and Integration in Engineering Systems.” 2012. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/10567.
MLA Handbook (7th Edition):
Sankararaman, Shankar. “Uncertainty Quantification and Integration in Engineering Systems.” 2012. Web. 15 Apr 2021.
Vancouver:
Sankararaman S. Uncertainty Quantification and Integration in Engineering Systems. [Internet] [Doctoral dissertation]. Vanderbilt University; 2012. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/10567.
Council of Science Editors:
Sankararaman S. Uncertainty Quantification and Integration in Engineering Systems. [Doctoral Dissertation]. Vanderbilt University; 2012. Available from: http://hdl.handle.net/1803/10567

Vanderbilt University
26.
Mack, Daniel Leif Campana.
Anomaly Detection from Complex Temporal Sequences in Large Data.
Degree: PhD, Computer Science, 2013, Vanderbilt University
URL: http://hdl.handle.net/1803/12087
► As systems become more complex and the amount of operational data collected from these systems increases proportionally, new challenges arise about how this data can…
(more)
▼ As systems become more complex and the amount of operational data collected from these systems increases proportionally, new challenges arise about how this data can be used to better understand system operations, and detect unsafe behavior. For large systems made up of a number of interacting subsystems, detecting anomalous behavior while avoiding false alarms becomes an important problem. Anomaly detection in such systems must navigate large amounts of data that include a large number of operational runs under a variety of operating conditions, sensors, and long sequences of time series data that cover different aspects of system operation. From a safety viewpoint, we wish to use this data to improve the effectiveness of existing fault detection schemes. Of equal importance, is the development of methods that can detect previously unknown and undetected anomalies from the vast amounts of available operational data.
In this thesis, we have developed two approaches for anomaly detection in complex systems. The first approach uses supervised learning methods to improve the detection efficiency and accuracy of known anomalies in available diagnostic reasoners. The second approach uses unsupervised learning methods applied to the large amounts of data to identify previously undiscovered anomalies in system operations. Once anomalous instances are identified, we find the most discriminatory features, which then provide targeted information to help characterize the nature of the newly found anomalies for further study.
The methodologies developed in this thesis have been successfully applied to two big data domains. In the first domain, aircraft flight operations data is used for targeted improvement of known anomalies to improve diagnostic accuracy of a vehicle reasoner. This data is also used for identifying previously undetected or unknown anomalies during the takeoff phase of aircraft flight, which are then evaluated in terms of their potential impact on aviation safety. In the second domain, data recorded from pitches thrown in Major League Baseball games is used with our exploratory approach to identify anomalous games for individual pitchers, and then characterize these games in terms of the specific pitch types that differed from the nominal set thrown by these pitchers.
Advisors/Committee Members: Gabor Karsai (committee member), Xenofon Koutsoukos (committee member), Julie A. Adams (committee member), Doug Fisher (committee member), Gautam Biswas (Committee Chair).
Subjects/Keywords: baseball; aviation safety; complexity measures; anomaly detection
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Mack, D. L. C. (2013). Anomaly Detection from Complex Temporal Sequences in Large Data. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/12087
Chicago Manual of Style (16th Edition):
Mack, Daniel Leif Campana. “Anomaly Detection from Complex Temporal Sequences in Large Data.” 2013. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/12087.
MLA Handbook (7th Edition):
Mack, Daniel Leif Campana. “Anomaly Detection from Complex Temporal Sequences in Large Data.” 2013. Web. 15 Apr 2021.
Vancouver:
Mack DLC. Anomaly Detection from Complex Temporal Sequences in Large Data. [Internet] [Doctoral dissertation]. Vanderbilt University; 2013. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/12087.
Council of Science Editors:
Mack DLC. Anomaly Detection from Complex Temporal Sequences in Large Data. [Doctoral Dissertation]. Vanderbilt University; 2013. Available from: http://hdl.handle.net/1803/12087

Vanderbilt University
27.
Neema, Himanshu.
Large-Scale Integration of Heterogeneous Simulations.
Degree: PhD, Computer Science, 2018, Vanderbilt University
URL: http://hdl.handle.net/1803/10444
► Systems-of-Systems (SoS) are composed of several interacting and interdependent systems that necessitate the integration of complex, heterogeneous models that represent the ensemble from different points…
(more)
▼ Systems-of-Systems (SoS) are composed of several interacting and interdependent systems that necessitate the integration of complex, heterogeneous models that represent the ensemble from different points of view, such as organizational workflows, cyber infrastructure, and various engineering or physical domains. These models are complex and require different dynamic simulators to compute their behavior over time. Thus, evaluation of SoS as-a-whole necessitates integration of these heterogeneous simulators. This is highly challenging because it requires integrating both the heterogeneous system models with different semantics and concepts from different system domains (physical, computational, or human), and the heterogeneous system simulators that use different time-stepping and event handling methods. Further, real-world SoS simulation and experimentation requires a comprehensive framework for integration modeling, efficient model and system composition, parametric experiments, run-time deployment, simulation control, scenario-based experimentation, and system analysis.
This dissertation presents a model-based integration approach for integrating large-scale heterogeneous simulations. The approach is illustrated by developing a generic simulation integration and experimentation framework called the Command and Control Wind Tunnel (C2WT). It allows modeling systems with their interdependencies as well as connecting and relating the corresponding heterogeneous simulators in a logically and temporally coherent manner. Its generalizable methods and tools enable rapid synthesis of industry standards based integrated simulations. For real-world integrated simulation experiments, several novel techniques are presented such as mapping methods for integrating legacy components that cannot directly interface with SoS-level data models, a generic cyber communication network simulation component that can be reused for different SoSs, a reusable cyber-attack library for evaluating SoS’ security and resilience against cyber threats, and modeling and orchestration of alternative what-if scenarios for SoS evaluations. Further, for efficient simulation of complex dynamical models that exhibit different rate dynamics in different parts, a partitioning method is developed to split them into different sampling rate groups. In addition, a novel approach is presented for ontology based model composition. In-depth case studies are also provided to demonstrate the effectiveness of the overall integration approach.
Advisors/Committee Members: Janos Sztipanovits (committee member), Gautam Biswas (committee member), Jules White (committee member), Bharat Bhuva (committee member), Gabor Karsai (Committee Chair).
Subjects/Keywords: Modeling; Simulation; Model-Based Simulation Integration; Courses-of-Action; Distributed Simulations; High-Level Architecture; Cyber-Attack Library; FMU Co-Simulation; Ontology Based Model Composition; Functional Mockup Interface; Partitioning Dynamical Models; Scenario-Based Experimentation; Mapping Methods for Legacy Simulation Integration; Generic Network Simulation; Cyber-Attacks; Multi-Physics Simulation; Ontological Mapping Rules; COA; Ontological System Models; FMI
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Neema, H. (2018). Large-Scale Integration of Heterogeneous Simulations. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/10444
Chicago Manual of Style (16th Edition):
Neema, Himanshu. “Large-Scale Integration of Heterogeneous Simulations.” 2018. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/10444.
MLA Handbook (7th Edition):
Neema, Himanshu. “Large-Scale Integration of Heterogeneous Simulations.” 2018. Web. 15 Apr 2021.
Vancouver:
Neema H. Large-Scale Integration of Heterogeneous Simulations. [Internet] [Doctoral dissertation]. Vanderbilt University; 2018. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/10444.
Council of Science Editors:
Neema H. Large-Scale Integration of Heterogeneous Simulations. [Doctoral Dissertation]. Vanderbilt University; 2018. Available from: http://hdl.handle.net/1803/10444

Vanderbilt University
28.
Dai, Siyuan.
Compositional Modeling and Design of Cyber-Physical Systems Using Port-Hamiltonian Systems.
Degree: PhD, Electrical Engineering, 2016, Vanderbilt University
URL: http://hdl.handle.net/1803/13816
► Cyber-physical systems are complex engineering systems that integrate computational, communication, and control components with physical components in many applications such as automotive systems, aeronautical systems,…
(more)
▼ Cyber-physical systems are complex engineering systems that integrate computational, communication, and control components with physical components in many applications such as automotive systems, aeronautical systems, industrial process control systems, electrical power grids, and environmental monitoring systems. As the cyber components increase in both number and complexity, technical challenges arise for their integration with the physical domain. As the field of cyber-physical systems continues to grow and evolve, problems emerge from the interaction of heterogeneous domains, hybrid dynamics, and nonlinearities which significantly hamper the system integration. Consequently, rigorous engineering methods are needed for the integration of cyber and physical components in order to achieve predictable, correct behavior.
This dissertation presents a model-based design framework based on port-Hamiltonian systems and passivity in order to address the challenges mentioned above. The contributions are threefold: (1) A domain-specific modeling language, (2) a compositional model-based control design method, and (2) a formal safety analysis method for multi-modal port Hamiltonian systems. The Port-Hamiltonian Systems Modeling Language uses the structure of port-Hamiltonian systems to model cyber-physical systems with nonlinearities, hybrid dynamics, and heterogeneous domains in a component-based way. The compositional model-based control design method uses passivity-based methods to ensure stability properties of the overall system in the presence of implementation uncertainties. The safety analysis method utilizes the Hamiltonian function as a barrier function to prevent system trajectories from ending in unsafe regions of the state space.
The theoretical contributions are evaluated and validated with an in-depth case study of automotive control software for an autonomous vehicle using a hardware-in-the-loop simulation platform.
Advisors/Committee Members: Janos Sztipanovits (committee member), Gabor Karsai (committee member), Gautam Biswas (committee member), Shige Wang (committee member), Xenofon Koutsoukos (Committee Chair).
Subjects/Keywords: modeling; safety; control design; cyber-physical systems; port-Hamiltonian systems
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dai, S. (2016). Compositional Modeling and Design of Cyber-Physical Systems Using Port-Hamiltonian Systems. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/13816
Chicago Manual of Style (16th Edition):
Dai, Siyuan. “Compositional Modeling and Design of Cyber-Physical Systems Using Port-Hamiltonian Systems.” 2016. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/13816.
MLA Handbook (7th Edition):
Dai, Siyuan. “Compositional Modeling and Design of Cyber-Physical Systems Using Port-Hamiltonian Systems.” 2016. Web. 15 Apr 2021.
Vancouver:
Dai S. Compositional Modeling and Design of Cyber-Physical Systems Using Port-Hamiltonian Systems. [Internet] [Doctoral dissertation]. Vanderbilt University; 2016. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/13816.
Council of Science Editors:
Dai S. Compositional Modeling and Design of Cyber-Physical Systems Using Port-Hamiltonian Systems. [Doctoral Dissertation]. Vanderbilt University; 2016. Available from: http://hdl.handle.net/1803/13816

Vanderbilt University
29.
Hasan, Saqib.
Improving Resilience in Large Scale Cyber-Physical Networks.
Degree: PhD, Electrical Engineering, 2019, Vanderbilt University
URL: http://hdl.handle.net/1803/10586
► Resilience in cyber-physical systems such as electrical power systems is of paramount importance for the socio-economic welfare of the society. Based on North American Electric…
(more)
▼ Resilience in cyber-physical systems such as electrical power systems is of paramount importance for the socio-economic welfare of the society. Based on North American Electric Reliability Council (NERC), power systems are designed to be single fault tolerant systems. However, multiple failures do occur and result in cascading failures that cause severe system blackouts. These failures can result from both physical faults and cyber-effects that can be easily triggered via cyber-attacks which have become more prevalent and feasible. Due to the large number of autonomous components, smart grids are becoming more vulnerable to such failures that increases system complexity and makes resilience a complex problem.
Several analysis models have been developed to analyze these failures however; they have their own limitations. These models focus mostly on time-independent physical failures and analyze the system from only one aspect which greatly limits the analysis. In addition, considering the large scale of the power system networks, several multiple contingencies do occur as a result of both physical failures and cyber-attacks which can be static or dynamic in nature that causes severe system damage. However, due to the computational complexity, it is very difficult to identify the critical components using an exhaustive analysis. Moreover, we also face the challenge of effectively deploying the limited defense resources to protect the critical points in the network under financial budget constraints.
Therefore, in this work we present heuristical and game-theoretical based approaches to address the above-mentioned challenges. As a first step in the process, we have developed models and tools that can include cyber failures in addition to physical failures and provide the capability to initiate faults at different time instants. Next, we designed a framework to perform multi-platform analysis using Domain-Specific Modeling Language (DSML) based approach that integrate various exogenous tools together to perform a richer analysis. Further, we created mechanisms to optimally identify higher order critical contingencies using heuristical approaches. Finally, we developed game-theoretic based approaches towards identifying the effective deployment of the limited defense resources in order to improve the overall system resilience.
Advisors/Committee Members: Abhishek Dubey (committee member), Gautam Biswas (committee member), D. Mitchell Wilkes (committee member), Richard Alan Peters (committee member), Gabor Karsai (Committee Chair).
Subjects/Keywords: Heuristical and Statistical Approaches; Optimization; Cyber-Physical Systems Security; Intelligent Resource Allocation; Cyber-Attacks; Cyber-Physical Systems
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hasan, S. (2019). Improving Resilience in Large Scale Cyber-Physical Networks. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/10586
Chicago Manual of Style (16th Edition):
Hasan, Saqib. “Improving Resilience in Large Scale Cyber-Physical Networks.” 2019. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/10586.
MLA Handbook (7th Edition):
Hasan, Saqib. “Improving Resilience in Large Scale Cyber-Physical Networks.” 2019. Web. 15 Apr 2021.
Vancouver:
Hasan S. Improving Resilience in Large Scale Cyber-Physical Networks. [Internet] [Doctoral dissertation]. Vanderbilt University; 2019. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/10586.
Council of Science Editors:
Hasan S. Improving Resilience in Large Scale Cyber-Physical Networks. [Doctoral Dissertation]. Vanderbilt University; 2019. Available from: http://hdl.handle.net/1803/10586

Vanderbilt University
30.
Dong, Yi.
Modeling Students' Learning Behaviors in Open Ended Learning Environments.
Degree: PhD, Computer Science, 2018, Vanderbilt University
URL: http://hdl.handle.net/1803/14193
► Open-Ended Learning Environments (OELEs) describe a class of environments that provide students with learning goals that are usually in the form of complex problem-solving and…
(more)
▼ Open-Ended Learning Environments (OELEs) describe a class of environments that provide students with learning goals that are usually in the form of complex problem-solving and model-building tasks. OELEs also scaffold students’ tasks with a set of tools, but provide them the freedom on how they combine and use these tools to progress towards their goals. Novice learners may have difficulties in accomplishing their tasks in OELEs, and the system can be designed to provide adaptive scaffolding to assist them in acquiring useful information, constructing problem solutions, and assessing their solution outcomes. Providing appropriate and adequate adaptive scaffolds requires a comprehensive understanding of students’ learning behaviors and accurate assessment of their learning performance. This information can be accumulated in the form of learner models as students work in the system.
This dissertation presents an approach for designing and developing accurate and refined learner modeling schemes using student data collected from different OELEs. The approach aims to address the data impoverishment problem by applying a Reinforcement Learning (RL) technique combined with Monte Carlo Tree Search (MCTS) to augment initial data set of students’ action sequences collected when students work with OELEs in classroom environments. The goal of the RL+MCTS approach is to learn more accurate models of students' learning behaviors with Hidden Markov Models (HMMs). By setting different reward functions in RL, two sets of reinforced models were generated to categorize and capture evolutions of students’ learning behaviors. These can then be used as the basis to predict students’ performance and provide adaptive scaffolds to help them develop better learning behaviors and improve their learning performance. Statistic evaluations and empirical analysis were applied to assess the reinforced models. Experiments with two OELEs (i.e., Betty’s Brain and CTSiM) showed promising results, which demonstrates that this approach to be a good starting point for apply
Advisors/Committee Members: Enxia Zhang (committee member), Douglas Fisher (committee member), Maithilee Kunda (committee member), Akos Ledeczi (committee member), Gautam Biswas (Committee Chair).
Subjects/Keywords: learner modeling; data mining; machine learning; reinforcement learning; monte carlo tree search; hidden Markov model; coherence analysis
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dong, Y. (2018). Modeling Students' Learning Behaviors in Open Ended Learning Environments. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/14193
Chicago Manual of Style (16th Edition):
Dong, Yi. “Modeling Students' Learning Behaviors in Open Ended Learning Environments.” 2018. Doctoral Dissertation, Vanderbilt University. Accessed April 15, 2021.
http://hdl.handle.net/1803/14193.
MLA Handbook (7th Edition):
Dong, Yi. “Modeling Students' Learning Behaviors in Open Ended Learning Environments.” 2018. Web. 15 Apr 2021.
Vancouver:
Dong Y. Modeling Students' Learning Behaviors in Open Ended Learning Environments. [Internet] [Doctoral dissertation]. Vanderbilt University; 2018. [cited 2021 Apr 15].
Available from: http://hdl.handle.net/1803/14193.
Council of Science Editors:
Dong Y. Modeling Students' Learning Behaviors in Open Ended Learning Environments. [Doctoral Dissertation]. Vanderbilt University; 2018. Available from: http://hdl.handle.net/1803/14193
◁ [1] [2] [3] ▶
.