The Metaverse: A Virtual World In The Palm Of Your Hand,
2022
Faculty of Engineering, Beirut Arab University
The Metaverse: A Virtual World In The Palm Of Your Hand, Ziad Doughan, Hadi Al Mubasher, Mustafa El Bizri, Ali Haidar
BAU Journal - Science and Technology
This paper explores the actual and future impact of the Metaverse as a virtual space. Thus, it focuses the probe on the technical challenges that face this everlasting emerging technology. Today, the Metaverse presents a digital environment to build collective architecture and historical heritage in a virtual space. In this digital world, the modeling and design methodology is based on individual archetypes that can puzzle new elements. Currently, traditional methods require change and adaptation in both the education and work market, especially due to the remote-work integration in the last few years. For example, many components are required to build …
Design And Prototyping Of A Low-Cost High Frequency Antenna For Vicinity Coupling Devices,
2022
Department of Computer Engineering, Faculty of Electrical and Computer Engineering, Kwame Nkrumah University of Science and Technology, Kumasi 00233, Ghana
Design And Prototyping Of A Low-Cost High Frequency Antenna For Vicinity Coupling Devices, Benjamin Kommey, Ernest Ofosu Addo, Elvis Tamakloe
Makara Journal of Technology
This paper describes the development of a high frequency (HF) antenna for high output power vicinity coupling devices (VCDs) operating at 13.56 MHz. Key design parameters, such as RF power level, antenna size, and communication protocol, and their link to the antenna features and requirements, have been discussed. For efficient reader interrogation, detection, and recovery of transponder responses, a tuning circuit necessary to adjust the antenna power matching and resonance characteristics was designed and prototyped. The antenna was fed to an industry standard reader and evaluated for read range performance with vicinity cards. The designed antenna on the reader achieved …
Damage Stability Study Of A 500 Dw Ro-Ro Ferry Vessel,
2022
Departement of Industrial Technology, Vocational School, Universitas Diponegoro, Semarang 50275, Indonesia
Damage Stability Study Of A 500 Dw Ro-Ro Ferry Vessel, Zulfaidah Ariany, Budhi Santoso, Sarwoko Sarwoko, Nauval Abdurrahman Prasetyo
Makara Journal of Technology
The development of the crossing transportation industry is currently increasing in the island areas. The use of Ro-Ro type ferry boats is extremely efficient in moving people, goods, and vehicles. The current research focuses on the damage stability of the 500 DWT Ro-Ro ferry, which aims to meet the needs of the Ro-Ro ferry in the archipelago area. The previously existing initial design of a barge hull with a main size Lpp = 40.15 m, B = 12 m, H = 3.2 m, and T = 2.15 m was used to analyze the damage stability condition further. First, the drawings …
Designing A Loving Robot: A Social Construction Analysis Of A Sex Robot Creator’S Vision,
2022
Temple University
Designing A Loving Robot: A Social Construction Analysis Of A Sex Robot Creator’S Vision, Annette Masterson
Human-Machine Communication
In 2018, one of the world’s first sex robots was released by CEO Matt McMullen and his company, RealDoll. With artificial intelligence capabilities, the Harmony model is meant to support and converse with users. Using a social construction of technology theory lens, this study develops the theory’s fourth level of analysis, emphasizing mass media’s construction abilities. A critical discourse analysis of 38 publicity interviews found a tendency to emphasize the companionship of sex robots while envisioning a future where integration is normalized, and a sentient robot is possible. As the creator, McMullen’s vision could determine the future of robotic design, …
The Evolution Of Gendered Software: Products, Scientific Reasoning, Criticism, And Tools,
2022
University of Tuebingen
The Evolution Of Gendered Software: Products, Scientific Reasoning, Criticism, And Tools, Victoria A. E. Kratel
Human-Machine Communication
Over the past 7 decades, gendered software has become globally established. In this theoretical distribution, I outline the evolution of gendered software. The journey of gendered software started with the raw idea fueled by Alan Turing’s imitation game in the 1950s. And only shortly thereafter, in the 1960s and 1970s, the first gendered software products like Joseph Weizenbaum’s ELIZA were developed. Thus, academia took its time to not only explore technological aspects, but to further investigate the matter of gender in the 1990s CASA-paradigm (Nass et al., 1994) and Media Equation (Reeves & Nass, 1996). As these theories reasoned the …
Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa,
2022
University of Udine, Italy
Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico De Luca
Human-Machine Communication
Mainly, the scholarly debate on Alexa has focused on sexist/anti-woman gender representations in the everyday life of many families, on a cluster of themes such as privacy, insecurity, and trust, and on the world of education and health. This paper takes another stance and explores via online survey methodology how university student respondents in two countries (the United States, n = 333; and Italy, n = 322) perceive Alexa’s image and gender, what they expect from this voice-based assistant, and how they would like Alexa to be. Results of a free association exercise showed that Alexa’s image was scarcely embodied …
Gender And Human-Machine Communication: Where Are We?,
2022
University of Udine
Gender And Human-Machine Communication: Where Are We?, Leopoldina Fortunati, Autumn P. Edwards
Human-Machine Communication
In this introduction to the fifth volume of the journal Human-Machine Communication, we present and discuss the five articles focusing on gender and human-machine communication. In this essay, we will analyze the theme of gender, including how this notion has historically and politically been set up, and for what reasons. We will start by considering gender in in-person communication, then we will progress to consider what happens to gender when it is mediated by the most important ICTs that preceded HMC: the telephone, mobile phone, and computer-mediated communication (CMC). We outline the historical framework necessary to analyze the last section …
Machine Learning Approach To Investigate Ev Battery Characteristics,
2022
University of Windsor
Machine Learning Approach To Investigate Ev Battery Characteristics, Shayan Falahatdoost
Major Papers
The main factor influencing an electric vehicle’s range is its battery. Battery electric vehicles experience driving range reduction in low temperatures. This range reduction results from the heating demand for the cabin and recuperation limits by the braking system. Due to the lack of an internal combustion engine-style heat source, electric vehicles' heating system demands a significant amount of energy. This energy is supplied by the battery and results in driving range reduction. Moreover, Due to the battery's low temperature in cold weather, the charging process through recuperation is limited. This limitation of recuperation is caused by the low reaction …
Hybrid Life Cycles In Software Development,
2022
Grand Valley State University
Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn
Culminating Experience Projects
This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …
Modeling The Impact Of The Covid-19 Pandemic On Speeding At Rural Roadway Facilities In Maine Using Short-Term Speed And Traffic Count Data.,
2022
The University of Maine
Modeling The Impact Of The Covid-19 Pandemic On Speeding At Rural Roadway Facilities In Maine Using Short-Term Speed And Traffic Count Data., Amirhossein Shahlaeegilan
Electronic Theses and Dissertations
The COVID-19 pandemic caused a significant change in traffic operations and safety. For instance, various U.S. states reported an increase in the rate of fatal and severe injury crashes over this duration. In April and May 2020, the comprehensive stay-at-home orders were issued across the country, including in Maine. These orders resulted in drastic reductions in traffic volume,switching working policies of noticeable number of corporations and educational administrations like universities to the remote working, closure of many organizations during the lockdown period, and people avoidance to public places to suppress the possible exposure to the virus were among the most …
Behavioral Biometrics-Based Continuous User Authentication,
2022
The University of Western Ontario
Behavioral Biometrics-Based Continuous User Authentication, Sanket Vilas Salunke
Electronic Thesis and Dissertation Repository
The field of cybersecurity is exploring new ways to defend against cyber-attacks, including a technique called continuous user authentication. This method uses keystroke (typing) data to continuously match the user's typing pattern with patterns previously recorded using artificial intelligence (AI) to identify the user. While this approach has the potential to improve security, it also has some challenges, including the time it takes to register a user, the performance of machine learning algorithms on real-world data, and latency within the system. In this study, the researchers proposed solutions to these issues by using transfer learning to reduce user registration time, …
A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks,
2022
Kennesaw State University
A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li
Master of Science in Software Engineering Theses
Traditional data collection, storage, and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Addressing the challenges of conventional database techniques and improving the overall aspects of EHR application, blockchain technology is being evaluated to find a possible solution. Blockchain refers to an emerging distributed technology and incorruptible database of records or digital events which execute, validate, and maintain by a ledger technology to provide an immutable architecture and prevent records manipulation …
Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft,
2022
Embry-Riddle Aeronautical University
Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price
Student Works
The Urban Air Mobility campaign has set a goal to efficiently transport passengers and cargo in urban areas of operation with autonomous aircraft. This concept of operations will require aircraft to utilize technology that currently does not have clear regulatory requirements. This report contains a comprehensive analysis and creation of a certification basis for a fully autonomous uncrewed passenger carrying rotorcraft for use in Urban Air Mobility certified under Title 14 Code of Federal Regulations Part 27. Part 27 was first analyzed to determine the applicability of current regulations. The fully electric propulsion system and fully autonomous flight control system …
Development Of Directed Randomization For Discussing A Minimal Security Architecture,
2022
Department of Chemical Engineering and Materials Science, Wayne State University, Detroit, MI
Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson
Chemical Engineering and Materials Science Faculty Research Publications
Strategies for mitigating the impacts of cyberattacks on control systems using a control-oriented perspective have become of greater interest in recent years. Our group has contributed to this trend by developing several methods for detecting cyberattacks on process sensors, actuators, or both sensors and actuators simultaneously using an advanced optimization-based control strategy known as Lyapunov-based economic model predictive control (LEMPC). However, each technique comes with benefits and limitations, both with respect to one another and with respect to traditional information technology and computer science-type approaches to cybersecurity. An important question to ask, therefore, is what the goal should be of …
Applying Hls To Fpga Data Preprocessing In The Advanced Particle-Astrophysics Telescope,
2022
Washington University in St. Louis
Applying Hls To Fpga Data Preprocessing In The Advanced Particle-Astrophysics Telescope, Meagan Konst
McKelvey School of Engineering Theses & Dissertations
The Advanced Particle-astrophysics Telescope (APT) and its preliminary iteration the Antarctic Demonstrator for APT (ADAPT) are highly collaborative projects that seek to capture gamma-ray emissions. Along with dark matter and ultra-heavy cosmic ray nuclei measurements, APT will provide sub-degree localization and polarization measurements for gamma-ray transients. This will allow for devices on Earth to point to the direction from which the gamma-ray transients originated in order to collect additional data. The data collection process is as follows. A scintillation occurs and is detected by the wavelength-shifting fibers. This signal is then read by an ASIC and stored in an ADC …
Design, Development And Evaluation Of The Ruggedized Edge Computing Node (Recon),
2022
Mississippi State University
Design, Development And Evaluation Of The Ruggedized Edge Computing Node (Recon), Sahil Girin Patel
Theses and Dissertations
The increased quality and quantity of sensors provide an ever-increasing capability to collect large quantities of high-quality data in the field. Research devoted to translating that data is progressing rapidly; however, translating field data into usable information can require high performance computing capabilities. While high performance computing (HPC) resources are available in centralized facilities, bandwidth, latency, security and other limitations inherent to edge location in field sensor applications may prevent HPC resources from being used in a timely fashion necessary for potential United States Army Corps of Engineers (USACE) field applications. To address these limitations, the design requirements for RECON …
Guaranteed Conformance Of Neurosymbolic Models To Natural Constraints,
2022
University of Pennsylvania
Guaranteed Conformance Of Neurosymbolic Models To Natural Constraints, Kaustubh Sridhar, Souradeep Dutta, James Weimer, Insup Lee
Departmental Papers (CIS)
Deep neural networks have emerged as the workhorse for a large section of robotics and control applications, especially as models for dynamical systems. Such data-driven models are in turn used for designing and verifying autonomous systems. This is particularly useful in modeling medical systems where data can be leveraged to individualize treatment. In safety-critical applications, it is important that the data-driven model is conformant to established knowledge from the natural sciences. Such knowledge is often available or can often be distilled into a (possibly black-box) model M. For instance, the unicycle model for an F1 racing car. In this light, …
Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey,
2022
Mississippi State University
Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton, John F. Hutton
Theses and Dissertations
All engineering careers require some level of programming proficiency. However, beginning programming classes are challenging for many students. Difficulties have been well-documented and contribute to high drop-out rates which prevent students from pursuing engineering. While many approaches have been tried to improve the performance of students and reduce the dropout rate, continued work is needed. This research seeks to re-examine what items are critical for programming education and how those might inform what is taught in introductory programming classes (CS1). Following trends coming from accreditation and academic boards on the importance of professional skills, we desire to rank knowledge and …
Assessment Of Simulated And Real-World Autonomy Performance With Small-Scale Unmanned Ground Vehicles,
2022
Mississippi State University
Assessment Of Simulated And Real-World Autonomy Performance With Small-Scale Unmanned Ground Vehicles, William Peyton Johnson
Theses and Dissertations
Off-road autonomy is a challenging topic that requires robust systems to both understand and navigate complex environments. While on-road autonomy has seen a major expansion in recent years in the consumer space, off-road systems are mostly relegated to niche applications. However, these applications can provide safety and navigation to dangerous areas that are the most suited for autonomy tasks. Traversability analysis is at the core of many of the algorithms employed in these topics. In this thesis, a Clearpath Robotics Jackal vehicle is equipped with a 3D Ouster laser scanner to define and traverse off-road environments. The Mississippi State University …
Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments,
2022
Kennesaw State University
Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer
Symposium of Student Scholars
When navigating in unknown and unstructured environments, Unmanned Arial Vehicles (UAVs) can struggle when attempting to preform Simultaneous Localization and Mapping (SLAM) operations. Particularly challenging circumstance arise when an UAV may need to land or otherwise navigate through treacherous environments. As the primary UAV may be too large and unwieldly to safely investigate in these types of situations, this research effort proposes the use of actively guided CanSats for assisting in localization and mapping of unstructured environments. A complex UAV could carry multiple of these SLAM capable CanSats, and when additional mapping and localization capabilities where required, the CanSat would …