Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Engineering

Object Recognition And Voice Assistant With Augmented Reality, Juan Estrella Dec 2020

Object Recognition And Voice Assistant With Augmented Reality, Juan Estrella

Publications and Research

Our research project aims to provide a visually impaired person with a superimposed map that will guide the individual to the desired destination through a voice controlled virtual assistant application that integrates Augmented Reality (AR) with Artificial Intelligence (AI) Computer Vision and Natural Language Processing (subfields of AI) will be combined to identify the spatial environment and then create a graphic enhancement that provides the most direct route to the specific destination These technologies will be incorporated into the Microsoft Hololens which will be controlled by the user.


Proportional Voting Based Semi-Unsupervised Machine Learning Intrusion Detection System, Yang G. Kim, Ohbong Kwon, John Yoon Dec 2020

Proportional Voting Based Semi-Unsupervised Machine Learning Intrusion Detection System, Yang G. Kim, Ohbong Kwon, John Yoon

Publications and Research

Feature selection of NSL-KDD data set is usually done by finding co-relationships among features, irrespective of target prediction. We aim to determine the relationship between features and target goals to facilitate different target detection goals regardless of the correlated feature selection. The unbalanced data structure in NSL-KDD data can be relaxed by Proportional Representation (PR). However, adopting PR would deny the notion of winner-take-all by attracting a majority of the vote and also provide a fairly proportional share for any grouping of like-minded data. Furthermore, minorities and majorities would get a fair share of power and representation in data structure …


Sharing And Organizing Research Products As R Packages, Matti Vuorre, Matthew J. C. Crump Sep 2020

Sharing And Organizing Research Products As R Packages, Matti Vuorre, Matthew J. C. Crump

Publications and Research

A consensus on the importance of open data and reproducible code is emerging. How should data and code be shared to maximize the key desiderata of reproducibility, permanence, and accessibility? Research assets should be stored persistently in formats that are not software restrictive, and documented so that others can reproduce and extend the required computations. The sharing method should be easy to adopt by already busy researchers. We suggest the R package standard as a solution for creating, curating, and communicating research assets. The R package standard, with extensions discussed herein, provides a format for assets and metadata that satisfies …


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


Cooperative Target Tracking In Balanced Circular And Elliptical Formations, Lili Ma, Naira Hovakimyan Aug 2020

Cooperative Target Tracking In Balanced Circular And Elliptical Formations, Lili Ma, Naira Hovakimyan

Publications and Research

This paper extends our earlier results on cooperative target tracking in cyclic pursuit using a group of mobile robots by further prescribing the formation radius and achieving an elliptical formation pattern. Prescribing the formation radius of a balanced circular formation is achieved by adjusting a parameter in the existing control input to each robot. The new elliptical formation pattern is obtained via a transformation matrix. Both single-integrator and double-integrator robot models are considered. The effectiveness of the proposed schemes is demonstrated by simulation examples.


Artificial Intelligence And Game Theory Controlled Autonomous Uav Swarms, Janusz Kusyk, M. Umit Uyar, Kelvin Ma, Eltan Samoylov, Ricardo Valdez, Joseph Plishka, Sagor E. Hoque, Giorgio Bertoli, Jefrey Boksiner Jul 2020

Artificial Intelligence And Game Theory Controlled Autonomous Uav Swarms, Janusz Kusyk, M. Umit Uyar, Kelvin Ma, Eltan Samoylov, Ricardo Valdez, Joseph Plishka, Sagor E. Hoque, Giorgio Bertoli, Jefrey Boksiner

Publications and Research

Autonomous unmanned aerial vehicles (UAVs) operating as a swarm can be deployed in austere environments, where cyber electromagnetic activities often require speedy and dynamic adjustments to swarm operations. Use of central controllers, UAV synchronization mechanisms or pre-planned set of actions to control a swarm in such deployments would hinder its ability to deliver expected services. We introduce artificial intelligence and game theory based flight control algorithms to be run by each autonomous UAV to determine its actions in near real-time, while relying only on local spatial, temporal and electromagnetic (EM) information. Each UAV using our flight control algorithms positions itself …


Two Techniques For Automated Logging Statement Evolution, Allan R. Spektor Jul 2020

Two Techniques For Automated Logging Statement Evolution, Allan R. Spektor

Theses and Dissertations

This thesis presents and explores two techniques for automated logging statement evolution. The first technique reinvigorates logging statement levels to reduce information overload using degree of interest obtained via software repository mining. The second technique converts legacy method calls to deferred execution to achieve performance gains, eliminating unnecessary evaluation overhead.


Cyber Security Techniques- What Is The Internet?, Amy J. Ramson Apr 2020

Cyber Security Techniques- What Is The Internet?, Amy J. Ramson

Open Educational Resources

The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.


Adaptive Effort Classifiers: A System Design For Partitioned Edge/Cloud Inference, Divya Sankar Jan 2020

Adaptive Effort Classifiers: A System Design For Partitioned Edge/Cloud Inference, Divya Sankar

Dissertations and Theses

The massive growth in availability of real-world data from connected devices and the overwhelming success of Deep Neural Networks (DNNs) in many ArtificialIntelligence (AI) tasks have enabled AI-based applications and services to become commonplace across the spectrum of computing devices from edge/Internet-of-Things (IoT) devices to data centers and the cloud. However, DNNs incur high computational cost (compute operations, memory footprint and bandwidth),which far outstrip the capabilities of modern computing platforms. Therefore improving the computational efficiency of DNNs wide-spread commercial deployment and success.In this thesis, we address the computational efficiency challenge in the context ofAI inference applications executing on edge/cloud systems, …


V-Slam And Sensor Fusion For Ground Robots, Ejup Hoxha Jan 2020

V-Slam And Sensor Fusion For Ground Robots, Ejup Hoxha

Dissertations and Theses

In underground, underwater and indoor environments, a robot has to rely solely on its on-board sensors to sense and understand its surroundings. This is the main reason why SLAM gained the popularity it has today. In recent years, we have seen excellent improvement on accuracy of localization using cameras and combinations of different sensors, especially camera-IMU (VIO) fusion. Incorporating more sensors leads to improvement of accuracy,but also robustness of SLAM. However, while testing SLAM in our ground robots, we have seen a decrease in performance quality when using the same algorithms on flying vehicles.We have an additional sensor for ground …


Technological Challenges And Innovations In Cybersecurity And Networking Technology Program, Syed R. Zaidi, Ajaz Sana, Aparicio Carranza Jan 2020

Technological Challenges And Innovations In Cybersecurity And Networking Technology Program, Syed R. Zaidi, Ajaz Sana, Aparicio Carranza

Publications and Research

This era is posing a unique challenge to the Cybersecurity and related Engineering Technology areas, stimulated by the multifaceted technological boom expressed in accelerated globalization, digital transformation, the cloud, mobile access apps, and the Internet of Things (IoT)—where more and more devices are connected to the Internet every day. As the use of new Internet-based technologies increase; so does the risk of theft and misuse of sensitive information. This demands the awareness of cyber-criminality and the need for cyber hygiene in corporations, small businesses, and the government. As the need for experienced cybersecurity specialists has skyrocketed in recent years and …