Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Computer Sciences

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 439

Full-Text Articles in Engineering

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Optimization Of Memory Management Using Machine Learning, Luke Bartholomew Apr 2024

Optimization Of Memory Management Using Machine Learning, Luke Bartholomew

Campus Research Day

This paper is a proposed solution to the problem of memory safety using machine learning. Memory overload and corruption cause undesirable behaviors in a system that are addressed by memory safety implementations. This project uses machine learning models to classify different states of system memory from a dataset collected from a Raspberry Pi System. These models can then be used to classify real run time memory data and increase memory safety overall in a system.


Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni Apr 2024

Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni

ATU Research Symposium

Abstract:

Anomaly detection, the identification of rare or unusual patterns that deviate from normal behavior, is a fundamental task with wide-ranging applications across various domains. Traditional machine learning techniques often struggle to effectively capture the complex temporal dynamics present in real-world data streams. Spiking Neural Networks (SNNs), inspired by the spiking nature of biological neurons, offer a promising approach by inherently modeling temporal information through precise spike timing. In this study, we investigate the use of Spiking Neural Networks (SNNs) for detecting anomalies or unusual patterns in data. We propose an SNN model that can learn what constitutes normal …


A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector Apr 2024

A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector

Cybersecurity Undergraduate Research Showcase

CRASHOVERRIDE is a modular malware tailor-made for electric grid Industrial Control System (ICS) equipment and was deployed by a group named ELECTRUM in a Ukrainian substation. The malware would launch a protocol exploit to flip breakers and would then wipe the system of ICS files. Finally, it would execute a Denial Of Service (DOS) attack on protective relays. In effect, months of damage and thousands out of power. However, due to oversights the malware only caused a brief power outage. Though the implications of the malware are cause for researching and implementing countermeasures against others to come. The CISA recommends …


A Machine Learning Model Of Perturb-Seq Data For Use In Space Flight Gene Expression Profile Analysis, Liam F. Johnson, James Casaletto, Lauren Sanders, Sylvain Costes Mar 2024

A Machine Learning Model Of Perturb-Seq Data For Use In Space Flight Gene Expression Profile Analysis, Liam F. Johnson, James Casaletto, Lauren Sanders, Sylvain Costes

Graduate Industrial Research Symposium

The genetic perturbations caused by spaceflight on biological systems tend to have a system-wide effect which is often difficult to deconvolute it into individual signals with specific points of origin. Single cell multi-omic data can provide a profile of the perturbational effects, but does not necessarily indicate the initial point of interference within the network. The objective of this project is to take advantage of large scale and genome-wide perturbational datasets by using them to train a tuned machine learning model that is capable of predicting the effects of unseen perturbations in new data. Perturb-Seq datasets are large libraries of …


Using Natural Language Processing To Identify Mental Health Indicators In Aviation Voluntary Safety Reports, Michael Sawyer, Katherine Berry, Amelia Kinsella, R Jordan Hinson, Edward Bynum Feb 2024

Using Natural Language Processing To Identify Mental Health Indicators In Aviation Voluntary Safety Reports, Michael Sawyer, Katherine Berry, Amelia Kinsella, R Jordan Hinson, Edward Bynum

National Training Aircraft Symposium (NTAS)

Voluntary Safety Reporting Programs (VSRPs) are a critical tool in the aviation industry for monitoring safety issues observed by the frontline workforce. While VSRPs primarily focus on operational safety, report narratives often describe factors such as fatigue, workload, culture, staffing, and health, directly or indirectly impacting mental health. These reports can provide individual and organizational insights into aviation personnel's physical and psychological well-being. This poster introduces the AVIation Analytic Neural network for Safety events (AVIAN-S) model as a potential tool to extract and monitor these insights. AVIAN-S is a novel machine-learning model that leverages natural language processing (NLP) to analyze …


The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati Dec 2023

The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati

Cybersecurity Undergraduate Research Showcase

This paper explores the transformative potential of integrating Artificial Intelligence (AI) with established cybersecurity frameworks such as the Cybersecurity Maturity Model Certification (CMMC) and the National Institute of Standards and Technology (NIST) Special Publication 800-171. The thesis argues that the relationship between AI and these frameworks has the capacity to transform risk management in cybersecurity, where it could serve as a critical element in threat mitigation. In addition to addressing AI’s capabilities, this paper acknowledges the risks and limitations of these systems, highlighting the need for extensive research and monitoring when relying on AI. One must understand boundaries when integrating …


Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson Dec 2023

Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson

Cybersecurity Undergraduate Research Showcase

For this research project I used a Raspberry Pi device and conducted online research to investigate potential security vulnerabilities along with mitigation strategies. I configured the Raspberry Pi by using the proper peripherals such as an HDMI cord, a microUSB adapter that provided 5V and at least 700mA of current, a TV monitor, PiSwitch, SD Card, keyboard, and mouse. I installed the Rasbian operating system (OS). The process to install the Rasbian took about 10 minutes to boot starting at 21:08 on 10/27/2023 and ending at 21:18. 1,513 megabytes (MB) was written to the SD card running at (2.5 MB/sec). …


Integrating Ai Into Uavs, Huong Quach Dec 2023

Integrating Ai Into Uavs, Huong Quach

Cybersecurity Undergraduate Research Showcase

This research project explores the application of Deep Learning (DL) techniques, specifically Convolutional Neural Networks (CNNs), to develop a smoke detection algorithm for deployment on mobile platforms, such as drones and self-driving vehicles. The project focuses on enhancing the decision-making capabilities of these platforms in emergency response situations. The methodology involves three phases: algorithm development, algorithm implementation, and testing and optimization. The developed CNN model, based on ResNet50 architecture, is trained on a dataset of fire, smoke, and neutral images obtained from the web. The algorithm is implemented on the Jetson Nano platform to provide responsive support for first responders. …


Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins Nov 2023

Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins

Cybersecurity Undergraduate Research Showcase

This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.


Large Language Model Use Cases For Instruction, Plus A Primer On Prompt Engineering, Roy Haggerty, Justin Cochran Nov 2023

Large Language Model Use Cases For Instruction, Plus A Primer On Prompt Engineering, Roy Haggerty, Justin Cochran

LSU Health New Orleans Symposium Series on Artificial Intelligence

AMA Credit Designation Statement: The Louisiana State University School of Medicine, New Orleans designates this live activity for a maximum of 1.0 AMA PRA Category 1 Credit™. Physicians should claim only the credit commensurate with the extent of their participation in the activity.

NCPD Credit Designation Statement: Nursing participants may earn 1.0 NCPD contact hours. Each nursing participant must be present for the entire session for which NCPD contact hours are requested and must complete an evaluation of the session to receive credit.


Reducing Uncertainty In Sea-Level Rise Prediction: A Spatial-Variability-Aware Approach, Subhankar Ghosh, Shuai An, Arun Sharma, Jayant Gupta, Shashi Shekhar, Aneesh Subramanian Oct 2023

Reducing Uncertainty In Sea-Level Rise Prediction: A Spatial-Variability-Aware Approach, Subhankar Ghosh, Shuai An, Arun Sharma, Jayant Gupta, Shashi Shekhar, Aneesh Subramanian

I-GUIDE Forum

Given multi-model ensemble climate projections, the goal is to accurately and reliably predict future sea-level rise while lowering the uncertainty. This problem is important because sea-level rise affects millions of people in coastal communities and beyond due to climate change's impacts on polar ice sheets and the ocean. This problem is challenging due to spatial variability and unknowns such as possible tipping points (e.g., collapse of Greenland or West Antarctic ice-shelf), climate feedback loops (e.g., clouds, permafrost thawing), future policy decisions, and human actions. Most existing climate modeling approaches use the same set of weights globally, during either regression or …


A Social Profile-Based E-Learning Model, Xola Ntlangula Sep 2023

A Social Profile-Based E-Learning Model, Xola Ntlangula

African Conference on Information Systems and Technology

Many High Education Institutions (HEIs) have migrated to blended or complete online learning to cater for less interruption with learning. As such, there is a growing demand for personalized e-learning to accommodate the diversity of students' needs. Personalization can be achieved using recommendation systems powered by artificial intelligence. Although using student data to personalize learning is not a new concept, collecting and identifying appropriate data is necessary to determine the best recommendations for students. By reviewing the existing data collection capabilities of the e-learning platforms deployed by public universities in South Africa, we were able to establish the readiness of …


School Of Stem Poster Session, Keith Schimmel Apr 2023

School Of Stem Poster Session, Keith Schimmel

Scholar Week 2016 - present

Location: Reed 2nd floor Tech Center and lobby

This poster session will include displays of work from the School of STEM - Engineering Senior Design and Freshman Design Projects along with Undergraduate Research.

Senior Design Projects

(1) Holland - Shear-Die [Nathan Marks, Nolan Paape, Seth Beyer]

(2) Aginno - Solar-Powered Fish Pond Aeration System [Hoai Do, Bella Lopez, Kendyl Clark, Megan Schroeder]

(3) Peddinghaus - Tube Conveyor [Carson Caldwell, Alisha Wright, Michael Rollberg, Rebecca Witvoet]

(4) American Institute of Chemical Engineers (AIChE) Student Design Problem [Marissa Anderson, Brady Chambers, Cam Steele]

(5) Kankakee Elks Country Club and Golf …


Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen Apr 2023

Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen

Modeling, Simulation and Visualization Student Capstone Conference

Practical work guides for complex procedures are significant and highly affect the efficiency and accuracy of on-site users. This paper presents a technique to generate virtual work guides automatically for complex procedures. Firstly, the procedure information is extracted from the electronic manual in PDF format. And then, the extracted procedure steps are mapped to the virtual model parts in preparation for animation between adjacent steps. Next, smooth animations of the procedure are generated based on a 3D natural cubic spline curve to improve the spatial ability of the work guide. In addition, each step's annotation is automatically adjusted to improve …


Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith Apr 2023

Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith

Modeling, Simulation and Visualization Student Capstone Conference

Mathematics is an important subject that is pervasive across many disciplines. It is also a subject that has proven to be challenging to both teach and learn. Students face many challenges with learning math such as a lack of motivation and anxiety. To address these challenges, game-based learning has become a popular approach to stimulate students and create a more positive classroom environment. It can serve as an alternative or supplement to traditional teaching and can better engage students while developing a positive attitude toward learning. The use of games in a classroom can create a more exciting and engaging …


Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry Apr 2023

Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry

Modeling, Simulation and Visualization Student Capstone Conference

This work explores collecting performance metrics and leveraging the output for prediction on a memory-intensive parallel image classification algorithm - Inception v3 (or "Inception3"). Experimental results were collected by nvidia-smi on a computational node DGX-1, equipped with eight Tesla V100 Graphic Processing Units (GPUs). Time series analysis was performed on the GPU utilization data taken, for multiple runs, of Inception3’s image classification algorithm (see Figure 1). The time series model applied was Seasonal Autoregressive Integrated Moving Average Exogenous (SARIMAX).


Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis Apr 2023

Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis

Modeling, Simulation and Visualization Student Capstone Conference

Maritime autonomy, specifically the use of autonomous and semi-autonomous maritime vessels, is a key enabling technology supporting a set of diverse and critical research areas, including coastal and environmental resilience, assessment of waterway health, ecosystem/asset monitoring and maritime port security. Critical to the safe, efficient and reliable operation of an autonomous maritime vessel is its ability to perceive on-the-fly the external environment through onboard sensors. In this paper, buoy detection for LiDAR images is explored by using several tools and techniques: machine learning methods, Unity Game Engine (herein referred to as Unity) simulation, and traditional image processing. The Unity Game …


Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla Apr 2023

Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla

Modeling, Simulation and Visualization Student Capstone Conference

This study analyzes the impact of Venezuelan migrants on local frustration levels in Colombia. The study found a relationship between the influx of Venezuelan migrants and the level of frustration among locals towards migrants, infrastructure, government, and geopolitics. Additionally, we identified that frustration types have an impact on other frustrations. The study used articles from a national newspaper in Colombia from 2015 to 2020. News articles were coded during a previous study qualitatively and categorized into frustration types. The code frequencies were then used as variables in this study. We used path modeling to statistically study the relationship between dependent …


Enhancement Of Deep Learning Protein Structure Prediction, Ruoming Shen Apr 2023

Enhancement Of Deep Learning Protein Structure Prediction, Ruoming Shen

Modeling, Simulation and Visualization Student Capstone Conference

Protein modeling is a rapidly expanding field with valuable applications in the pharmaceutical industry. Accurate protein structure prediction facilitates drug design, as extensive knowledge about the atomic structure of a given protein enables scientists to target that protein in the human body. However, protein structure identification in certain types of protein images remains challenging, with medium resolution cryogenic electron microscopy (cryo-EM) protein density maps particularly difficult to analyze. Recent advancements in computational methods, namely deep learning, have improved protein modeling. To maximize its accuracy, a deep learning model requires copious amounts of up-to-date training data.

This project explores DeepSSETracer, a …


Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund Apr 2023

Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund

Modeling, Simulation and Visualization Student Capstone Conference

The sudden arrival of many migrants can present new challenges for host communities and create negative attitudes that reflect that tension. In the case of Colombia, with the influx of over 2.5 million Venezuelan migrants, such tensions arose. Our research objective is to investigate how those sentiments arise in social media. We focused on monitoring derogatory terms for Venezuelans, specifically veneco and veneca. Using a dataset of 5.7 million tweets from Colombian users between 2015 and 2021, we determined the proportion of tweets containing those terms. We observed a high prevalence of xenophobic and defamatory language correlated with the …


An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen Apr 2023

An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen

Modeling, Simulation and Visualization Student Capstone Conference

This work presents an algorithm for finding data dependencies in a discrete-event simulation system, from the event graph of the system. The algorithm can be used within a parallel discrete-event simulation. Also presented is an experimental system and event graph, which is used for testing the algorithm. Results indicate that the algorithm can provide information about which vertices in the experimental event graph can affect other vertices, and the minimum amount of time in which this interference can occur.


U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa Apr 2023

U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa

Modeling, Simulation and Visualization Student Capstone Conference

Satellite image analysis of natural disasters is critical for effective emergency response, relief planning, and disaster prevention. Semantic segmentation is believed to be on of the best techniques to capture pixelwise information in computer vision. In this work we will be using a U-Net architecture to do a three class semantic segmentation for the Xview2 dataset to capture the level of damage caused by different natural disaster which is beyond the visual scope of human eyes.


Statistical Approach To Quantifying Interceptability Of Interaction Scenarios For Testing Autonomous Surface Vessels, Benjamin E. Hargis, Yiannis E. Papelis Apr 2023

Statistical Approach To Quantifying Interceptability Of Interaction Scenarios For Testing Autonomous Surface Vessels, Benjamin E. Hargis, Yiannis E. Papelis

Modeling, Simulation and Visualization Student Capstone Conference

This paper presents a probabilistic approach to quantifying interceptability of an interaction scenario designed to test collision avoidance of autonomous navigation algorithms. Interceptability is one of many measures to determine the complexity or difficulty of an interaction scenario. This approach uses a combined probability model of capability and intent to create a predicted position probability map for the system under test. Then, intercept-ability is quantified by determining the overlap between the system under test probability map and the intruder’s capability model. The approach is general; however, a demonstration is provided using kinematic capability models and an odometry-based intent model.


Towards Nlp-Based Conceptual Modeling Frameworks, David Shuttleworth, Jose Padilla Apr 2023

Towards Nlp-Based Conceptual Modeling Frameworks, David Shuttleworth, Jose Padilla

Modeling, Simulation and Visualization Student Capstone Conference

This paper presents preliminary research using Natural Language Processing (NLP) to support the development of conceptual modeling frameworks. NLP-based frameworks are intended to lower the barrier of entry for non-modelers to develop models and to facilitate communication across disciplines considering simulations in research efforts. NLP drives conceptual modeling in two ways. Firstly, it attempts to automate the generation of conceptual models and simulation specifications, derived from non-modelers’ narratives, while standardizing the conceptual modeling process and outcome. Secondly, as the process is automated, it is simpler to replicate and be followed by modelers and non-modelers. This allows for using a common …


Enhancing Pedestrian-Autonomous Vehicle Safety In Low Visibility Scenarios: A Comprehensive Simulation Method, Zizheng Yan, Yang Liu, Hong Yang Apr 2023

Enhancing Pedestrian-Autonomous Vehicle Safety In Low Visibility Scenarios: A Comprehensive Simulation Method, Zizheng Yan, Yang Liu, Hong Yang

Modeling, Simulation and Visualization Student Capstone Conference

Self-driving cars raise safety concerns, particularly regarding pedestrian interactions. Current research lacks a systematic understanding of these interactions in diverse scenarios. Autonomous Vehicle (AV) performance can vary due to perception accuracy, algorithm reliability, and environmental dynamics. This study examines AV-pedestrian safety issues, focusing on low visibility conditions, using a co-simulation framework combining virtual reality and an autonomous driving simulator. 40 experiments were conducted, extracting surrogate safety measures (SSMs) from AV and pedestrian trajectories. The results indicate that low visibility can impair AV performance, increasing conflict risks for pedestrians. AV algorithms may require further enhancements and validations for consistent safety performance …


Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan Apr 2023

Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan

Cybersecurity Undergraduate Research Showcase

Cybercrime and attack methods have been steadily increasing since the 2019 pandemic. In the years following 2019, the number of victims and attacks per hour rapidly increased as businesses and organizations transitioned to digital environments for business continuity amidst lockdowns. In most scenarios cybercriminals continued to use conventional attack methods and known vulnerabilities that would cause minimal damage to an organization with a robust cyber security posture. However, zero-day exploits have skyrocketed across all industries with an increasingly growing technological landscape encompassing internet of things (IoT), cloud hosting, and more advanced mobile technologies. Reports by Mandiant Threat Intelligence (2022) concluded …


Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng Apr 2023

Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng

Cybersecurity Undergraduate Research Showcase

Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.

MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …


The Effects Of Demographics And Risk Factors On The Morphological Characteristics Of Human Femoropopliteal Arteries, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy Mar 2023

The Effects Of Demographics And Risk Factors On The Morphological Characteristics Of Human Femoropopliteal Arteries, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy

UNO Student Research and Creative Activity Fair

Background: Disease of the lower extremity arteries (Peripheral Arterial Disease, PAD) is associated with high morbidity and mortality. During disease development, the arteries adapt by changing their diameter, wall thickness, and residual deformations, but the effects of demographics and risk factors on this process are not clear.

Methods: Superficial femoral arteries from 736 subjects (505 male, 231 female, 12 to 99 years old, average age 51±17.8 years) and the associated demographic and risk factor variables were used to construct machine learning (ML) regression models that predicted morphological characteristics (diameter, wall thickness, and longitudinal opening angle resulting from the …


Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens Mar 2023

Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens

UNO Student Research and Creative Activity Fair

Human movement is inherently variable by nature. One of the most common analytical tools for assessing movement variability is the largest Lyapunov exponent (LyE) which quantifies the rate of trajectory divergence or convergence in an n-dimensional state space. One popular method for assessing LyE is the Wolf algorithm. Many studies have investigated how Wolf’s calculation of the LyE changes due to sampling frequency, filtering, data normalization, and stride normalization. However, a surprisingly understudied parameter needed for LyE computation is evolution time. The purpose of this study is to investigate how the LyE changes as a function of evolution time …