Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (8)
- Computer and Systems Architecture (4)
- Computer Sciences (3)
- Digital Communications and Networking (3)
- Other Computer Engineering (3)
-
- Physical Sciences and Mathematics (3)
- Computational Engineering (2)
- Information Security (2)
- Agricultural Education (1)
- Agriculture (1)
- Data Storage Systems (1)
- Digital Circuits (1)
- Gender and Sexuality (1)
- Graphics and Human Computer Interfaces (1)
- Hardware Systems (1)
- Life Sciences (1)
- Social and Behavioral Sciences (1)
- Sociology (1)
- Keyword
-
- Agriculture (1)
- Array Processor (1)
- Artificial Intelligence (1)
- BIKE (1)
- CRYSTALS-Kyber (1)
-
- ChatGPT (1)
- Cloud Deployment (1)
- Computer (1)
- Computer Science (1)
- Computer architecture (1)
- Computing (1)
- Critical Infrastructure (1)
- Cybersecurity (1)
- Data storage (1)
- Development (1)
- Differential privacy (1)
- FPGA (1)
- Gender (1)
- Hardware-in-the-Loop Technology (1)
- IEEE 33 Bus System (1)
- Industrial Control Systems (1)
- Kyber (1)
- Large Language Models (1)
- Memristor (1)
- ModbusTCP (1)
- ModbusTCP Replay Attack (1)
- Networking (1)
- Operational Technology Network (1)
- Portable code (1)
- Post moore (1)
Articles 1 - 9 of 9
Full-Text Articles in Engineering
Cybersecurity In Critical Infrastructure Systems: Emulated Protection Relay, Mitchell Bylak
Cybersecurity In Critical Infrastructure Systems: Emulated Protection Relay, Mitchell Bylak
Computer Science and Computer Engineering Undergraduate Honors Theses
Cyber-attacks on Critical Systems Infrastructure have been steadily increasing across the world as the capabilities of and reliance on technology have grown throughout the 21st century, and despite the influx of new cybersecurity practices and technologies, the industry faces challenges in its cooperation between the government that regulates law practices and the private sector that owns and operates critical infrastructure and security, which has directly led to an absence of eas- ily accessible information and learning resources on cybersecurity for use in public environments and educational settings. This honors research thesis addresses these challenges by submitting the development of an …
Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France
Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France
Computer Science and Computer Engineering Undergraduate Honors Theses
The field of computing as we know it today exists because of the contributions of numerous female mathematicians, computer scientists, and programmers. While working with hardware was viewed as “a man’s job” during the mid-20th century, computing and programming was viewed as a noble and high-paying field for women to occupy. However, as time has progressed, the U.S. has seen a decrease in the number of women pursuing computer science. The idea that computing is a masculine discipline is common in the U.S. today for reasons such as male-centered marketing of electronics and gadgets, an inaccurate representation of what it …
Svar: A Virtual Machine For Portable Code On Reconfigurable Accelerators, Nathaniel Fredricks
Svar: A Virtual Machine For Portable Code On Reconfigurable Accelerators, Nathaniel Fredricks
Computer Science and Computer Engineering Undergraduate Honors Theses
The SPAR-2 array processor was designed as an overlay architecture for implementation on Xilinx Field Programmable Gate Arrays (FPGAs). As an overlay, the SPAR-2 array processor can be configured to take advantage of the specific resources available on different FPGAs. However once configured, the SPAR-2 requires programmer’s to have knowledge of the low level architecture, and write platform-specific code. In this thesis SVAR, a hardware/software co-designed virtual machine, is proposed that runs on the SPAR-2. SVAR allows programmers to write portable, platform-independent code once and have it interpreted for any specific configuration. Results are presented that verify the virtual machine …
Smart-Insect Monitoring System Integration And Interaction Via Ai Cloud Deployment And Gpt, Ahmed Moustafa
Smart-Insect Monitoring System Integration And Interaction Via Ai Cloud Deployment And Gpt, Ahmed Moustafa
Computer Science and Computer Engineering Undergraduate Honors Theses
The Insect Detection Server was developed to explore the deployment and integration of an Artificial Intelligence model for Computer Vision in the context of insect detection. The model was developed to accurately identify insects from images taken by camera systems installed on farms. The goal is to integrate the model into an easily accessible, cloud-based application that allows farmers to analyze automatically uploaded images containing groups of insects found on their farms. The application returns the bounding boxes and the detected classes of insects whenever an image is captured on-site, enabling farmers to take appropriate actions to address the issue …
Digital Simulations Of Memristors Towards Integration With Reconfigurable Computing, Ivris Raymond
Digital Simulations Of Memristors Towards Integration With Reconfigurable Computing, Ivris Raymond
Computer Science and Computer Engineering Undergraduate Honors Theses
The end of Moore’s Law has been predicted for decades. Demand for increased parallel computational performance has been increased by improvements in machine learning. This past decade has demonstrated the ever-increasing creativity and effort necessary to extract scaling improvements in CMOS fabrication processes. However, CMOS scaling is nearing its fundamental physical limits. A viable path for increasing performance is to break the von Neumann bottleneck. In-memory computing using emerging memory technologies (e.g. ReRam, STT, MRAM) offers a potential path beyond the end of Moore’s Law. However, there is currently very little support from industry tools for designers wishing to incorporate …
Reverse Engineering Post-Quantum Cryptography Schemes To Find Rowhammer Exploits, Sam Lefforge
Reverse Engineering Post-Quantum Cryptography Schemes To Find Rowhammer Exploits, Sam Lefforge
Computer Science and Computer Engineering Undergraduate Honors Theses
Post-quantum cryptography is a necessary countermeasure to protect against attacks from quantum computer. However, the post-quantum cryptography schemes are potentially vulnerable to side channel attacks. One such method of attacking involves creating bit-flips in victim memory through a process called Rowhammer. These attacks can vary in nature, but can involve rowhammering bits to raise the encryption scheme's decryption failure rate, or modifying the scheme's random seed. With a high enough decryption failure rate, it becomes feasible to generate sufficient information about the secret key to perform a key recovery attack. This thesis proposed two attacks on proposed post-quantum cryptography algorithms, …
Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim
Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim
Computer Science and Computer Engineering Undergraduate Honors Theses
In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …
Fuel Prediction: Determining The Desirable Stops For The Cheapest Road Trips, Maxx Smith
Fuel Prediction: Determining The Desirable Stops For The Cheapest Road Trips, Maxx Smith
Computer Science and Computer Engineering Undergraduate Honors Theses
Current technology has given rise to many advanced route-planning applications that are available for use by the general public. Gone are the days of preparing for road trips by looking at a paper map for hours on end trying to determine the correct exits or calculate the distance to be traveled. However, with the use of modern technology, there is a certain aspect of forward-thinking that is now lost with planning a road trip. One of the biggest constraints that often gets left on the backburner is deciding when and where to stop to refuel the car. This report is …
Critical Infrastructure Workforce Development Pods For Teaching Cybersecurity Using Netlab+, Gideon Sutterfield
Critical Infrastructure Workforce Development Pods For Teaching Cybersecurity Using Netlab+, Gideon Sutterfield
Computer Science and Computer Engineering Undergraduate Honors Theses
As digital automation for Industrial Control Systems has grown, so has its
vulnerability to cyberattacks. The world of industry has responded effectively to this, but the world of academia is still lagging as its emphasis is still almost entirely on information technology. Considering this, we created a workforce development pod that serves as a hands-on learning module for teaching students key cybersecurity ideas surrounding operational technology using the NETLAB+ platform. A pod serves as the virtual environment where the learning exercise takes place. This project’s implementation involved the creation of a segmented network within the pod where a student starts …