Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Artificial Intelligence and Robotics

Conference

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 21 of 21

Full-Text Articles in Computer Engineering

Integrating Ai Into Uavs, Huong Quach Dec 2023

Integrating Ai Into Uavs, Huong Quach

Cybersecurity Undergraduate Research Showcase

This research project explores the application of Deep Learning (DL) techniques, specifically Convolutional Neural Networks (CNNs), to develop a smoke detection algorithm for deployment on mobile platforms, such as drones and self-driving vehicles. The project focuses on enhancing the decision-making capabilities of these platforms in emergency response situations. The methodology involves three phases: algorithm development, algorithm implementation, and testing and optimization. The developed CNN model, based on ResNet50 architecture, is trained on a dataset of fire, smoke, and neutral images obtained from the web. The algorithm is implemented on the Jetson Nano platform to provide responsive support for first responders. …


Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins Nov 2023

Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins

Cybersecurity Undergraduate Research Showcase

This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.


Large Language Model Use Cases For Instruction, Plus A Primer On Prompt Engineering, Roy Haggerty, Justin Cochran Nov 2023

Large Language Model Use Cases For Instruction, Plus A Primer On Prompt Engineering, Roy Haggerty, Justin Cochran

LSU Health New Orleans Symposium Series on Artificial Intelligence

AMA Credit Designation Statement: The Louisiana State University School of Medicine, New Orleans designates this live activity for a maximum of 1.0 AMA PRA Category 1 Credit™. Physicians should claim only the credit commensurate with the extent of their participation in the activity.

NCPD Credit Designation Statement: Nursing participants may earn 1.0 NCPD contact hours. Each nursing participant must be present for the entire session for which NCPD contact hours are requested and must complete an evaluation of the session to receive credit.


A Social Profile-Based E-Learning Model, Xola Ntlangula Sep 2023

A Social Profile-Based E-Learning Model, Xola Ntlangula

African Conference on Information Systems and Technology

Many High Education Institutions (HEIs) have migrated to blended or complete online learning to cater for less interruption with learning. As such, there is a growing demand for personalized e-learning to accommodate the diversity of students' needs. Personalization can be achieved using recommendation systems powered by artificial intelligence. Although using student data to personalize learning is not a new concept, collecting and identifying appropriate data is necessary to determine the best recommendations for students. By reviewing the existing data collection capabilities of the e-learning platforms deployed by public universities in South Africa, we were able to establish the readiness of …


Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis Apr 2023

Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis

Modeling, Simulation and Visualization Student Capstone Conference

Maritime autonomy, specifically the use of autonomous and semi-autonomous maritime vessels, is a key enabling technology supporting a set of diverse and critical research areas, including coastal and environmental resilience, assessment of waterway health, ecosystem/asset monitoring and maritime port security. Critical to the safe, efficient and reliable operation of an autonomous maritime vessel is its ability to perceive on-the-fly the external environment through onboard sensors. In this paper, buoy detection for LiDAR images is explored by using several tools and techniques: machine learning methods, Unity Game Engine (herein referred to as Unity) simulation, and traditional image processing. The Unity Game …


Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund Apr 2023

Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund

Modeling, Simulation and Visualization Student Capstone Conference

The sudden arrival of many migrants can present new challenges for host communities and create negative attitudes that reflect that tension. In the case of Colombia, with the influx of over 2.5 million Venezuelan migrants, such tensions arose. Our research objective is to investigate how those sentiments arise in social media. We focused on monitoring derogatory terms for Venezuelans, specifically veneco and veneca. Using a dataset of 5.7 million tweets from Colombian users between 2015 and 2021, we determined the proportion of tweets containing those terms. We observed a high prevalence of xenophobic and defamatory language correlated with the …


Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan Apr 2023

Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan

Cybersecurity Undergraduate Research Showcase

Cybercrime and attack methods have been steadily increasing since the 2019 pandemic. In the years following 2019, the number of victims and attacks per hour rapidly increased as businesses and organizations transitioned to digital environments for business continuity amidst lockdowns. In most scenarios cybercriminals continued to use conventional attack methods and known vulnerabilities that would cause minimal damage to an organization with a robust cyber security posture. However, zero-day exploits have skyrocketed across all industries with an increasingly growing technological landscape encompassing internet of things (IoT), cloud hosting, and more advanced mobile technologies. Reports by Mandiant Threat Intelligence (2022) concluded …


Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng Apr 2023

Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng

Cybersecurity Undergraduate Research Showcase

Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.

MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …


Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden Jan 2023

Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden

National Training Aircraft Symposium (NTAS)

An increased availability of data and computing power has allowed organizations to apply machine learning techniques to various fleet monitoring activities. Additionally, our ability to acquire aircraft data has increased due to the miniaturization of small form factor computing machines. Aircraft data collection processes contain many data features in the form of multivariate time-series (continuous, discrete, categorical, etc.) which can be used to train machine learning models. Yet, three major challenges still face many flight organizations 1) integration and automation of data collection frameworks, 2) data cleanup and preparation, and 3) embedded machine learning framework. Data cleanup and preparation has …


Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer Dec 2022

Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer

Symposium of Student Scholars

When navigating in unknown and unstructured environments, Unmanned Arial Vehicles (UAVs) can struggle when attempting to preform Simultaneous Localization and Mapping (SLAM) operations. Particularly challenging circumstance arise when an UAV may need to land or otherwise navigate through treacherous environments. As the primary UAV may be too large and unwieldly to safely investigate in these types of situations, this research effort proposes the use of actively guided CanSats for assisting in localization and mapping of unstructured environments. A complex UAV could carry multiple of these SLAM capable CanSats, and when additional mapping and localization capabilities where required, the CanSat would …


Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore Apr 2022

Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore

Symposium of Student Scholars

Climate change is happening, and many countries are already facing devastating consequences. Populations worldwide are adapting to the season's unpredictability they relay to lands for agriculture. Our first research was to develop an IoT Clusters Platform for Data Collection, analysis, and visualization. The platform comprises hardware parts with Raspberry Pi and Arduino's clusters connected to multiple sensors. The clusters transmit data collected in real-time to microservices-based servers where the data can be accessed and processed. Our objectives in developing this platform were to create an efficient data collection system, relatively cheap to implement and easy to deploy in any part …


Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection, Rachel Meyer Apr 2022

Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection, Rachel Meyer

Scholar Week 2016 - present

Asteroid detection is a common field in astronomy for planetary defense which requires observations from survey telescopes to detect and classify different objects. The amount of data collected each night is increasing as better designed telescopes are created each year. This amount is quickly becoming unmanageable and many researchers are looking for ways to better process this data. The dominant solution is to implement computer algorithms to automatically detect these sources and to use Machine Learning in order to create a more efficient and accurate classifier. In the past there has been a focus on larger asteroids that create streaks …


Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao Dec 2021

Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao

Posters-at-the-Capitol

Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …


Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen Nov 2021

Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen

Cybersecurity Undergraduate Research Showcase

An existing StudentLife Study mobile dataset was evaluated and organized to be applied to different machine learning methods. Different variables like user activity, exercise, sleep, study space, social, and stress levels are optimized to train a model that could predict user stress level. The different machine learning methods would test if both patient data privacy and training efficiency can be ensured.


Autonomous Watercraft Simulation And Programming, Nicholas J. Savino Apr 2019

Autonomous Watercraft Simulation And Programming, Nicholas J. Savino

Student Scholar Showcase

Automation of various modes of transportation is thought to make travel more safe and efficient. Over the past several decades, advances to semi-autonomous and autonomous vehicles have led to advanced autopilot systems on planes and boats, and an increasing popularity of self-driving cars. We predicted the motion of an autonomous vehicle using simulations in Python. The simulation models the motion of a small scale watercraft, which can then be built and programmed using an Arduino Microcontroller. We examined different control methods for a simulated rescue craft to reach a target. We also examined the effects of different factors, such as …


Investigating Dataset Distinctiveness, Andrew Ulmer, Kent W. Gauen, Yung-Hsiang Lu, Zohar R. Kapach, Daniel P. Merrick Aug 2018

Investigating Dataset Distinctiveness, Andrew Ulmer, Kent W. Gauen, Yung-Hsiang Lu, Zohar R. Kapach, Daniel P. Merrick

The Summer Undergraduate Research Fellowship (SURF) Symposium

Just as a human might struggle to interpret another human’s handwriting, a computer vision program might fail when asked to perform one task in two different domains. To be more specific, visualize a self-driving car as a human driver who had only ever driven on clear, sunny days, during daylight hours. This driver – the self-driving car – would inevitably face a significant challenge when asked to drive when it is violently raining or foggy during the night, putting the safety of its passengers in danger. An extensive understanding of the data we use to teach computer vision models – …


Deep Neural Network Architectures For Modulation Classification Using Principal Component Analysis, Sharan Ramjee, Shengtai Ju, Diyu Yang, Aly El Gamal Aug 2018

Deep Neural Network Architectures For Modulation Classification Using Principal Component Analysis, Sharan Ramjee, Shengtai Ju, Diyu Yang, Aly El Gamal

The Summer Undergraduate Research Fellowship (SURF) Symposium

In this work, we investigate the application of Principal Component Analysis to the task of wireless signal modulation recognition using deep neural network architectures. Sampling signals at the Nyquist rate, which is often very high, requires a large amount of energy and space to collect and store the samples. Moreover, the time taken to train neural networks for the task of modulation classification is large due to the large number of samples. These problems can be drastically reduced using Principal Component Analysis, which is a technique that allows us to reduce the dimensionality or number of features of the samples …


Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou May 2017

Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou

Annual ADFSL Conference on Digital Forensics, Security and Law

In recent times, DNS tunneling techniques have been used for malicious purposes, however network security mechanisms struggle to detect them. Network forensic analysis has been proven effective, but is slow and effort intensive as Network Forensics Analysis Tools struggle to deal with undocumented or new network tunneling techniques. In this paper, we present a machine learning approach, based on feature subsets of network traffic evidence, to aid forensic analysis through automating the inference of protocols carried within DNS tunneling techniques. We explore four network protocols, namely, HTTP, HTTPS, FTP, and POP3. Three features are extracted from the DNS tunneled traffic: …


Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo May 2015

Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo

MODVIS Workshop

Computer vision research rarely makes use of symmetry in stereo reconstruction despite its established importance in perceptual psychology. Such stereo reconstructions produce visually satisfying figures with precisely located points and lines, even when input images have low or moderate resolution. However, because few invariants exist, there are no known general approaches to solving symmetry correspondence on real images. The problem is significantly easier when combined with the binocular correspondence problem, because each correspondence problem provides strong non-overlapping constraints on the solution space. We demonstrate a system that leverages these constraints to produce accurate stereo models from pairs of binocular images …


Improved Microrobotic Control Through Image Processing And Automated Hardware Interfacing, Archit R. Aggarwal, Wuming Jing, David J. Cappelleri Aug 2014

Improved Microrobotic Control Through Image Processing And Automated Hardware Interfacing, Archit R. Aggarwal, Wuming Jing, David J. Cappelleri

The Summer Undergraduate Research Fellowship (SURF) Symposium

Untethered submilliliter-sized robots (microrobots) are showing potential use in different industrial, manufacturing and medical applications. A particular type of these microrobots, magnetic robots, have shown improved performance in power and control capabilities compared to the other thermal and electrostatic based robots. However, the magnetic robot designs have not been assessed in a robust manner to understand the degree of control in different environments and their application feasibility. This research project seeks to develop a custom control software interface to provide a holistic tool for researchers to evaluate the microrobotic performance through advance control features. The software deliverable involved two main …


Artificial Intelligence – I: A Preliminary Framework For Human-Agent Communication In Electronic Negotiations, Moez Ur Rehman, Nosheen Riaz Jul 2011

Artificial Intelligence – I: A Preliminary Framework For Human-Agent Communication In Electronic Negotiations, Moez Ur Rehman, Nosheen Riaz

International Conference on Information and Communication Technologies

Electronic negotiations are business negotiations conducted via electronic means using information and communications technologies (ICT). Two dominant types of electronic negotiation systems are automated negotiation systems for software agents and negotiation support systems (NSSs) for humans. However, the integration of two types for human-agent negotiations is an important task. In this paper, an extended communication model for human-agent business negotiations is presented. For this purpose, the underlying communication models of automated negotiations and NSSs are analyzed. The extended communication model is based on a common negotiation ontology which captures the negotiation agenda and paves the way for such hybrid communication, …