Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Investigation Of Software Defined Radio And Deep Learning For Ground Penetrating Radar, Yan Zhang Jan 2024

Investigation Of Software Defined Radio And Deep Learning For Ground Penetrating Radar, Yan Zhang

Graduate College Dissertations and Theses

Ground Penetrating Radar (GPR) is a non-invasive geophysical method that uses radar pulses to image the subsurface. This technology is widely used to detect and map subsurface structures, utilities, and features without the need for physical excavation. Traditional GPR systems, which rely on fixed radio frequency electronics like Application-Specific Integrated Circuits (ASICs), have significant limitations in their flexibility and adaptability. Adjusting operational parameters such as waveform, frequency, and modulation schemes is challenging, which is crucial for tailoring performance to specific tasks or conditions. The considerable size and weight of these systems restrict their applicability in harsh or confined spaces where …


A Study Of Machine Learning Techniques In Cryptography For Cybersecurity, Ankita Saha, Chanda Pathak, Sourav Saha Jan 2024

A Study Of Machine Learning Techniques In Cryptography For Cybersecurity, Ankita Saha, Chanda Pathak, Sourav Saha

American Journal of Electronics & Communication (AJEC)

The importance of cybersecurity is on the rise as we have become more technologically dependent on the internet than ever before. Cybersecurity implies the process of protecting and recovering computer systems, networks, devices, and programs from any cyber attack. Cyber attacks are an increasingly sophisticated and evolving danger to our sensitive data, as attackers employ new methods to circumvent traditional security controls. Cryptanalysis is mainly used to crack cryptographic security systems and gain access to the contents of the encrypted messages, even if the key is unknown. It focuses on deciphering the encrypted data as it works with ciphertext, ciphers, …


Breaking Down Break-It-Fix-It: An Automated Software Repair Replication, Jason M. Pittman, Kira Concotta, Rebecca Saul Jan 2024

Breaking Down Break-It-Fix-It: An Automated Software Repair Replication, Jason M. Pittman, Kira Concotta, Rebecca Saul

American Journal of Electronics & Communication (AJEC)

Software quality is strongly correlated with the quantity and severity of bugs. While there are a variety of tools, techniques, and practices to aid production of robust and resilient code, low quality software is draining trillions of dollars from organizations annually. Meanwhile, debugging and fixing coding errors consumes upwards of half of developer labor. To say this situation is untenable is an understatement. Fortunately, automated software repair offers a possible solution. The literature around automated code fixing has been expanding with a variety of implementations ranging from genetic programming, code translation, and various machine learning algorithms. All report positive results, …