Schaeffler F-250 Bev Conversion: Power Electronics,
2022
The University of Akron
Schaeffler F-250 Bev Conversion: Power Electronics, Leslie Sawyer
Williams Honors College, Honors Research Projects
This report shows the work that was done on the power electronics system in the industry sponsored Schaeffler demonstration truck project. The goal of the project was to convert a combustion Ford F250 into a battery electric vehicle, while using as much Schaeffler technology as possible. After the vehicle is converted it will be used as a demonstration vehicle to show potential investors. While this project is still in progress, the work that was done during this time was substantial to the development of this project. Progress that has been made on the power electronics system includes developments in selecting …
Vehicle Maintenance Tracking Program,
2022
The University of Akron
Vehicle Maintenance Tracking Program, Jared Tomlinson
Williams Honors College, Honors Research Projects
In order to help consumers and businesses keep track of vehicle maintenance, I will create a program paired with a database that can track vehicle maintenance needs and when they should be performed. The program will be capable of tracking entire fleets of vehicles and based on the vehicle’s mileage, will notify users of what maintenance should be performed. Users will be able to add, remove, and edit vehicles in the system as needed and each vehicle will be paired with a maintenance schedule based on its needs. As maintenance is performed, it can be tracked on the schedule, which …
Magic: The Gathering Card Virtualizer,
2022
The University of Akron
Magic: The Gathering Card Virtualizer, Vincent Garbonick, Jacen C. Conlan, Jaret A. Varn
Williams Honors College, Honors Research Projects
Any well-versed Magic: The Gathering (MTG) player or collector knows how difficult it can be to keep track of all cards in their collection. Some spend hours searching for that one specific card, and others are constantly scouring the internet for how much their collection costs. However, this issue does not only affect casual fans. Resale companies spend hours a day determining the costs of cards, and tournament judges painstakingly check players’ decks to ensure they are not cheating. To assist with these struggles, the design team proposed to create the MTG Card Virtualizer. This device scans MTG playing cards …
Penetration Testing In A Small Business Network,
2022
The University of Akron
Penetration Testing In A Small Business Network, Lee Kandle
Williams Honors College, Honors Research Projects
Penetration testing on a business network consisting of three routers, one switch, and one computer. Access Control Lists (ACLs) on the routers act as the firewall(s) for the network. 10 of the twelve ACLs do not deny any form of traffic to reflect the lax security standards common in small networks. Router 1 acts as the primary router of the Attacker/Pen Tester. Router 2 represents the edge router for the business and Router 3 is the inner router closest to end-user devices. Switch 1 is connected to Router 3 with one computer connected to the switch acting as an end-user. …
Lapnitor: A Web Service That Protects Your Laptop From Theft.,
2022
The University of Akron
Lapnitor: A Web Service That Protects Your Laptop From Theft., Michael Ameteku
Williams Honors College, Honors Research Projects
Laptop theft is an issue worldwide. According to an article from 2018, Security Boulevard stated that a laptop is stolen every 53 seconds. Using a laptop's camera, we can monitor the surroundings of the laptop and reduce a laptop's probability of being stolen. According to the University of Pittsburgh, a laptop has a 1-in- 10 chance of being stolen and nearly half of these thefts occur in offices or classrooms. These thefts mostly occur when a laptop owner leaves their device unattended for a certain period of time to maybe go visit the restroom or attend to a call when …
Exploring 3d Data Reuse And Repurposing Through Procedural Modeling,
2022
University of Glasgow
Exploring 3d Data Reuse And Repurposing Through Procedural Modeling, Rachel Opitz, Heather Richards-Rissetto, Karin Dalziel, Jessica Dussault, Greg Tunink
Anthropology Faculty Publications
Most contemporary 3D data used in archaeological research and heritage management have been created through ‘reality capture,’ the recording of the physical features of extant archaeological objects, structures, and landscapes using technologies such as laser scanning and photogrammetry (Garstki 2020, ch.2; Magnani et al. 2020). A smaller quantity of data are generated by Computer Aided Design (CAD) and Building Information Modeling (BIM) projects, and even fewer data are generated through procedural modeling, the rapid prototyping of multi-component threedimensional (3D) models from a set of rules (Figure 8.1.). It is unsurprising therefore that in archaeology and heritage, efforts around digital 3D …
Will Products Liability Litigation Help Protect Iot Users From Cyber-Physical Attacks?,
2022
Drake University
Will Products Liability Litigation Help Protect Iot Users From Cyber-Physical Attacks?, J Royce Fichtner, Troy J. Strader
Journal of International Technology and Information Management
While there is an identifiable trend towards protecting consumers from data breaches and data misuses related to IoT devices through new legislation, new regulations, government enforcement actions, and private lawsuits, there has been little progress towards creating similar legally enforceable standards of care for “cyber-physical device security.” This article explores this underdeveloped area of academic inquiry into cyber-physical device security within the context of product liability litigation in the United States. The two questions addressed in this article are: (1) Have there been any successful products liability court decisions in the United States that have held IoT manufacturers liable for …
Jitim Front Cover Vol 31 1 2022,
2022
California State University, San Bernardino
Jitim Front Cover Vol 31 1 2022
Journal of International Technology and Information Management
Table of Content JITIM Vol 31. issue 1, 2022
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth,
2022
Penn State Dickinson Law
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Eager Scheduling Of Dependent Instructions,
2022
Michigan Technological University
Eager Scheduling Of Dependent Instructions, Kurush Kasad
Dissertations, Master's Theses and Master's Reports
Modern superscalar processors are able to potentially issue and execute multiple instructions per cycle. Several techniques over the years have focused on increasing the Instruction Level Parallelism (ILP) that a processor can exploit. However, there are many limitations of ILP that hinder performance, chief of them being the chain of dependencies between instructions that stops instructions from being executed in parallel.
We propose a new micro-architecture design which extends the superscalar pipeline with a data-flow pipeline where the dataflow part identifies immediately dependent instructions and executes them early. The dataflow pipeline is able to identify redundant instructions, track changes in …
Agile Research - Getting Beyond The Buzzword,
2022
Old Dominion University
Agile Research - Getting Beyond The Buzzword, Trupti Narayan Rane
Engineering Management & Systems Engineering Faculty Publications
"Oh yeah, we're an Agile shop, we gave up Waterfall years ago." - product owners, managers, or could be anyone else. You will seldom have a conversation with a product or software development team member without the agile buzzword thrown at you at the drop of a hat. It would not be an oversell to say that Agile software development has been adopted at a large scale across several big and small organizations. Clearly, Agile is an ideology that is working, which made me explore more on its applicability in research. As someone who has been in the Information Technology …
Incentive Analysis Of Blockchain Technology,
2022
West Virginia University
Incentive Analysis Of Blockchain Technology, Rahul Reddy Annareddy
Graduate Theses, Dissertations, and Problem Reports
Blockchain technology was invented in the Bitcoin whitepaper released in 2008. Since then, several decentralized cryptocurrencies and applications have become mainstream. There has been an immense amount of engineering effort put into developing blockchain networks. Relatively few projects backed by blockchain technology have succeeded and maintained a large community of developers, users, and customers, while many popular projects with billions of dollars in funding and market capitalizations have turned out to be complete scams.
This thesis discusses the technological innovations introduced in the Bitcoin whitepaper and the following work of the last fifteen years that has enabled blockchain technology. A …
Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks,
2022
University of Kentucky
Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi
Theses and Dissertations--Computer Science
Computer networks are becoming more complex and challenging to operate, manage, and protect. As a result, Network policies that define how network operators should manage the network are becoming more complex and nuanced. Unfortunately, network policies are often an undervalued part of network design, leaving network operators to guess at the intent of policies that are written and fill in the gaps where policies don’t exist. Organizations typically designate Policy Committees to write down the network policies in the policy documents using high-level natural languages. The policy documents describe both the acceptable and unacceptable uses of the network. Network operators …
Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study,
2021
Northern Kentucky University
Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay
Posters-at-the-Capitol
The last couple of years have seen a strong movement supporting the need of having intelligent consumer products align with specific design guidelines for trustworthy artificial intelligence (AI). This global movement has led to multiple institutional recommendations for ethically aligned trustworthy design of the AI driven technologies, like consumer robots and autonomous vehicles. There has been prior research towards finding security and privacy related vulnerabilities within various types of social robots. However, none of these previous works has studied the implications of these vulnerabilities in terms of the robot design aligning with trustworthy AI. In an attempt to address this …
Development Of A Model For Control Of A Flexible Production Sewage System,
2021
Сумгаитский Государственный Университет
Development Of A Model For Control Of A Flexible Production Sewage System, Shalala Jafarova
Scientific-technical journal
This article discusses the development of a production module management model for one area of the technological process. New modeling methods are used for this purpose. Mathematical modeling and research is one of the key issues in the early stages of designing automated and automated systems operating in uncertain or fuzzy environments. Efficient modeling devices are used to solve these problems, taking into account the specific features of the process. The article builds the management model of the production module and obtains the results.
The Application Of Design Thinking On Evaluating A User Self-Service Data Analytics/Science Platform,
2021
Harrisburg University of Science and Technology
The Application Of Design Thinking On Evaluating A User Self-Service Data Analytics/Science Platform, Aheeka Pattnaik
Dissertations and Theses
This thesis is aimed at utilising design thinking and the first half of the double diamond framework to i) set-up a research and select the appropriate participants, ii) gather requirements and define user personas from those eligible participants, and then iii) define the framework for evaluating a user self-service data analytics/science platform. Derived from the author’s own experiences, both as a Business Analyst (BA) and Citizen Data Scientist, with no-, low-, and code-based data analytics and science platforms are being implemented for enabling user self-service analytics – for users who are completely new to the space of data analysis and …
Iot Greenhouse Monitoring System,
2021
Western Michigan University
Iot Greenhouse Monitoring System, Raj Basnet
Honors Theses
Our project is a greenhouse monitoring system. The customer states that they need a complete monitoring system for their greenhouse. There are a lot of items within the greenhouse that need to be watered at the right time and kept at a certain temperature. The customer is not always around to check the status of these items due to their busy lifestyle. They would like a system to monitor all these items so they can check it on their smartphone no matter how far away they are from the greenhouse. The customer wants this to be a low-cost and energyefficient …
Digitization Of Academic Libraries Through Cloud Environment,
2021
Hindustan Institute of Technology and Science (Hindustan University)
Digitization Of Academic Libraries Through Cloud Environment, Sivankalai S, Virumandi A, Sivasekaran K, Jeyanthi R, M Sharmila
Library Philosophy and Practice (e-journal)
Libraries may soon be able to establish and manage their own data centres. This paradigm would allow libraries to control the apps and data stores that include sensitive and private information about their users' personal and financial information. The provisioning and management of infrastructure for a Web-based digital library present several complicated difficulties for library administrators. In this article, we address the challenges that digital libraries confront, and the efforts being made to solve those challenges. Infrastructure virtualization and cloud Environment are incredibly enticing options, but they are being challenged by the expansion of the indexed document collection, the addition …
Automated Report Based System To Encourage A Greener Commute To Campus,
2021
University of Arkansas, Fayetteville
Automated Report Based System To Encourage A Greener Commute To Campus, Ronald Velasquez
Computer Science and Computer Engineering Undergraduate Honors Theses
This project consists of the design and implementation of a tool to encourage greener commutes to the University of Arkansas. Trends in commuting of the last few years show a decline in not so environment-friendly commute modes. Nevertheless, ensuring that this trend continues is vital to assure a significant impact. The created tool is an automated report system. The report displays information about different commute options. A Google form allows users to submit report requests, and a web app allows the sustainability office to process them in batches. This system was built in the Apps Script platform. It implements several …
Profile-Guided Data Management For Heterogeneous Memory Systems,
2021
University of Tennessee, Knoxville
Profile-Guided Data Management For Heterogeneous Memory Systems, Matthew B. Olson
Doctoral Dissertations
Market forces and technological constraints have led to a gap between CPU and memory performance that has widened for decades. While processor scaling has plateaued in recent years, this gap persists and is not expected to diminish for the foreseeable future. This discrepancy presents a host of challenges for scaling application performance, which have only been exacerbated in recent years, as increasing demands for fast and effective data analytics are driving memory energy, bandwidth, and capacity requirements to new heights.
To address these trends, hardware architects have introduced a plethora of memory technologies. For example, most modern memory systems include …