Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Old Dominion University (65)
- Singapore Management University (15)
- University of Nebraska - Lincoln (10)
- Selected Works (9)
- University of Arkansas, Fayetteville (8)
-
- Florida International University (7)
- SelectedWorks (7)
- Air Force Institute of Technology (6)
- Western University (6)
- California Polytechnic State University, San Luis Obispo (5)
- Embry-Riddle Aeronautical University (5)
- California State University, San Bernardino (4)
- Loyola University Chicago (4)
- Portland State University (4)
- University of Nevada, Las Vegas (4)
- Georgia Southern University (3)
- Purdue University (3)
- University of New Mexico (3)
- City University of New York (CUNY) (2)
- Michigan Technological University (2)
- Southern Methodist University (2)
- Technological University Dublin (2)
- University of Denver (2)
- University of Kentucky (2)
- University of Louisville (2)
- University of New Orleans (2)
- Western Kentucky University (2)
- Belmont University (1)
- Brigham Young University (1)
- Dartmouth College (1)
- Keyword
-
- Algorithms (10)
- Image processing (9)
- Computer algorithms (8)
- Wireless communication systems (8)
- Sensor networks (7)
-
- Security (6)
- Robotics (5)
- Algorithm (4)
- Computer networks (4)
- Data flow computing (4)
- FPGA (4)
- Neural networks (4)
- Small Spacecraft (4)
- Wireless sensor networks (4)
- Adaptive algorithms (3)
- Articles (3)
- Artificial Intelligence & Robotic Control (3)
- Automatic speech recognition (3)
- Cloud Computing (3)
- Computer programs (3)
- Coverage control problems (3)
- Cryptography (3)
- CubeSat (3)
- Digital techniques (3)
- Dynamic vehicle routing problems (3)
- Encryption (3)
- Field programmable gate arrays (3)
- Genetic algorithms (3)
- Graph (3)
- Heterogeneous computing (3)
- Publication Year
- Publication
-
- Electrical & Computer Engineering Theses & Dissertations (46)
- Research Collection School Of Computing and Information Systems (15)
- Computer Science Theses & Dissertations (7)
- FIU Electronic Theses and Dissertations (7)
- Theses and Dissertations (7)
-
- Electronic Theses and Dissertations (6)
- Electronic Thesis and Dissertation Repository (6)
- Jeremy Straub (6)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (5)
- Computer Science Faculty Publications (4)
- Computer Science and Computer Engineering Undergraduate Honors Theses (4)
- Computer Science: Faculty Publications and Other Works (4)
- Computer Science Faculty Publications and Presentations (3)
- George J. Pappas (3)
- Graduate Theses and Dissertations (3)
- Journal of International Technology and Information Management (3)
- Mark L. Chang (3)
- Publications (3)
- CSE Technical Reports (2)
- Computer Engineering (2)
- Conference papers (2)
- Dissertations, Master's Theses and Master's Reports (2)
- Doctoral Dissertations and Master's Theses (2)
- Electrical & Computer Engineering Faculty Publications (2)
- Electrical & Computer Engineering Faculty Research (2)
- Faculty Publications (2)
- Master's Theses (2)
- Masters Theses & Specialist Projects (2)
- Modeling, Simulation and Visualization Student Capstone Conference (2)
- Ronald Greenberg (2)
- Publication Type
- File Type
Articles 1 - 30 of 206
Full-Text Articles in Computer Engineering
Planetary Exploration Via Fully Automatic Topological Structure Extraction Using Adaptive Resonance, Jonathan Kissi
Planetary Exploration Via Fully Automatic Topological Structure Extraction Using Adaptive Resonance, Jonathan Kissi
Electronic Thesis and Dissertation Repository
Renewed interest in Solar System exploration, along with ongoing improvements in computing, robotics and instrumentation technologies, have reinforced the case for remote science acquisition systems development in space exploration. Testing systems and procedures that allow for autonomously collected science has been the focus of analogue field deployments and mission planning for some time, with such systems becoming more relevant as missions increase in complexity and ambition. The introduction of lidar and laser scanning-type instruments into the geological and planetary sciences has proven popular, and, just as with the established image and photogrammetric methods, has found widespread use in several research …
Star-Based Reachability Analysis Of Binary Neural Networks On Continuous Input, Mykhailo Ivashchenko
Star-Based Reachability Analysis Of Binary Neural Networks On Continuous Input, Mykhailo Ivashchenko
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Deep Neural Networks (DNNs) have become a popular instrument for solving various real-world problems. DNNs’ sophisticated structure allows them to learn complex representations and features. However, architecture specifics and floating-point number usage result in increased computational operations complexity. For this reason, a more lightweight type of neural networks is widely used when it comes to edge devices, such as microcomputers or microcontrollers – Binary Neural Networks (BNNs). Like other DNNs, BNNs are vulnerable to adversarial attacks; even a small perturbation to the input set may lead to an errant output. Unfortunately, only a few approaches have been proposed for verifying …
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Poster Presentations
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Integrating Ai Into Uavs, Huong Quach
Integrating Ai Into Uavs, Huong Quach
Cybersecurity Undergraduate Research Showcase
This research project explores the application of Deep Learning (DL) techniques, specifically Convolutional Neural Networks (CNNs), to develop a smoke detection algorithm for deployment on mobile platforms, such as drones and self-driving vehicles. The project focuses on enhancing the decision-making capabilities of these platforms in emergency response situations. The methodology involves three phases: algorithm development, algorithm implementation, and testing and optimization. The developed CNN model, based on ResNet50 architecture, is trained on a dataset of fire, smoke, and neutral images obtained from the web. The algorithm is implemented on the Jetson Nano platform to provide responsive support for first responders. …
Electronic Note-String Detector, Gavin Garcia-Rossi, Tommy Smail
Electronic Note-String Detector, Gavin Garcia-Rossi, Tommy Smail
Electrical Engineering
As the virtual space has become a dominant part of everyone’s day-to-day lives, many normal face-to-face interactions and services have not yet been facilitated by adapting technology. One of these prevailing areas is music lessons. Over Zoom meetings, or other virtual platforms, it is tremendously challenging to teach students. These challenges include recognizing student mistakes audibly and visually, and being able to give confident feedback on the incorrect notes played by learning musicians. Without having to delve into improving the complex systems that would be required to improve audio, video, and connection quality of these connections, we have another solution …
Hypothyroid Disease Analysis By Using Machine Learning, Sanjana Seelam
Hypothyroid Disease Analysis By Using Machine Learning, Sanjana Seelam
Electronic Theses, Projects, and Dissertations
Thyroid illness frequently manifests as hypothyroidism. It is evident that people with hypothyroidism are primarily female. Because the majority of people are unaware of the illness, it is quickly becoming more serious. It is crucial to catch it early on so that medical professionals can treat it more effectively and prevent it from getting worse. Machine learning illness prediction is a challenging task. Disease prediction is aided greatly by machine learning. Once more, unique feature selection strategies have made the process of disease assumption and prediction easier. To properly monitor and cure this illness, accurate detection is essential. In order …
Closing The Gap: Leveraging Aes-Ni To Balance Adversarial Advantage And Honest User Performance In Argon2i, Nicholas Harrell, Nathaniel Krakauer
Closing The Gap: Leveraging Aes-Ni To Balance Adversarial Advantage And Honest User Performance In Argon2i, Nicholas Harrell, Nathaniel Krakauer
CERIAS Technical Reports
The challenge of providing data privacy and integrity while maintaining efficient performance for honest users is a persistent concern in cryptography. Attackers exploit advances in parallel hardware and custom circuit hardware to gain an advantage over regular users. One such method is the use of Application-Specific Integrated Circuits (ASICs) to optimize key derivation function (KDF) algorithms, giving adversaries a significant advantage in password guessing and recovery attacks. Other examples include using graphical processing units (GPUs) and field programmable gate arrays (FPGAs). We propose a focused approach to close the gap between adversarial advantage and honest user performance by leveraging the …
Enabling Third Layer Bitcoin Applications Using Lightning Network, Ahmet Kurt
Enabling Third Layer Bitcoin Applications Using Lightning Network, Ahmet Kurt
FIU Electronic Theses and Dissertations
When Bitcoin was introduced in 2009, it created a big sensation in the world as it was first of its kind. Since then, a lot of different cryptocurrencies were proposed. Today, cryptocurrencies can be used to pay for goods and services similar to using cash or credit cards. However, none of them could replace or supersede Bitcoin in usage or market capitalization. Current market conditions still imply that it will stay the same way. However, Bitcoin suffers from very low transaction per second (TPS) which limits its usability on large scale. There have been numerous proposals to increase its scalability …
U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa
U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa
Modeling, Simulation and Visualization Student Capstone Conference
Satellite image analysis of natural disasters is critical for effective emergency response, relief planning, and disaster prevention. Semantic segmentation is believed to be on of the best techniques to capture pixelwise information in computer vision. In this work we will be using a U-Net architecture to do a three class semantic segmentation for the Xview2 dataset to capture the level of damage caused by different natural disaster which is beyond the visual scope of human eyes.
An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen
An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen
Modeling, Simulation and Visualization Student Capstone Conference
This work presents an algorithm for finding data dependencies in a discrete-event simulation system, from the event graph of the system. The algorithm can be used within a parallel discrete-event simulation. Also presented is an experimental system and event graph, which is used for testing the algorithm. Results indicate that the algorithm can provide information about which vertices in the experimental event graph can affect other vertices, and the minimum amount of time in which this interference can occur.
Investigating The Use Of Recurrent Neural Networks In Modeling Guitar Distortion Effects, Caleb Koch, Scott Hawley, Andrew Fyfe
Investigating The Use Of Recurrent Neural Networks In Modeling Guitar Distortion Effects, Caleb Koch, Scott Hawley, Andrew Fyfe
Belmont University Research Symposium (BURS)
Guitar players have been modifying their guitar tone with audio effects ever since the mid-20th century. Traditionally, these effects have been achieved by passing a guitar signal through a series of electronic circuits which modify the signal to produce the desired audio effect. With advances in computer technology, audio “plugins” have been created to produce audio effects digitally through programming algorithms. More recently, machine learning researchers have been exploring the use of neural networks to replicate and produce audio effects initially created by analog and digital effects units. Recurrent Neural Networks have proven to be exceptional at modeling audio effects …
Nftdisk: Visual Detection Of Wash Trading In Nft Markets, Xiaolin Wen, Yong Wang, Xuanwu Yue, Feida Zhu, Min Zhu
Nftdisk: Visual Detection Of Wash Trading In Nft Markets, Xiaolin Wen, Yong Wang, Xuanwu Yue, Feida Zhu, Min Zhu
Research Collection School Of Computing and Information Systems
With the growing popularity of Non-Fungible Tokens (NFT), a new type of digital assets, various fraudulent activities have appeared in NFT markets. Among them, wash trading has become one of the most common frauds in NFT markets, which attempts to mislead investors by creating fake trading volumes. Due to the sophisticated patterns of wash trading, only a subset of them can be detected by automatic algorithms, and manual inspection is usually required. We propose NFTDisk, a novel visualization for investors to identify wash trading activities in NFT markets, where two linked visualization modules are presented: a radial visualization module with …
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
SMU Data Science Review
Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes
Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes
UNF Graduate Theses and Dissertations
Research on Flying Ad-Hoc Networks (FANETs) has increased due to the availability of Unmanned Aerial Vehicles (UAVs) and the electronic components that control and connect them. Many applications, such as 3D mapping, construction inspection, or emergency response operations could benefit from an application and adaptation of swarm intelligence-based deployments of multiple UAVs. Such groups of cooperating UAVs, through the use of local rules, could be seen as network nodes establishing an ad-hoc network for communication purposes.
One FANET application is to provide communication coverage over an area where communication infrastructure is unavailable. A crucial part of a FANET implementation is …
Comparative Analysis Of Fullstack Development Technologies: Frontend, Backend And Database, Qozeem Odeniran
Comparative Analysis Of Fullstack Development Technologies: Frontend, Backend And Database, Qozeem Odeniran
Electronic Theses and Dissertations
Accessing websites with various devices has brought changes in the field of application development. The choice of cross-platform, reusable frameworks is very crucial in this era. This thesis embarks in the evaluation of front-end, back-end, and database technologies to address the status quo. Study-a explores front-end development, focusing on angular.js and react.js. Using these frameworks, comparative web applications were created and evaluated locally. Important insights were obtained through benchmark tests, lighthouse metrics, and architectural evaluations. React.js proves to be a performance leader in spite of the possible influence of a virtual machine, opening the door for additional research. Study b …
A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong
A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong
Computer Science Faculty Publications
Bilingual lexicon induction (BLI) is the task of inducing word translations with a learned mapping function that aligns monolingual word embedding spaces in two different languages. However, most previous methods treat word embeddings as isolated entities and fail to jointly consider both the intra-space and inter-space topological relations between words. This limitation makes it challenging to align words from embedding spaces with distinct topological structures, especially when the assumption of isomorphism may not hold. To this end, we propose a novel approach called the Structure-Aware Generative Adversarial Network (SA-GAN) model to explicitly capture multiple topological structure information to achieve accurate …
A Quality Metric For K-Means Clustering Based On Centroid Locations, Manoj Thulasidas
A Quality Metric For K-Means Clustering Based On Centroid Locations, Manoj Thulasidas
Research Collection School Of Computing and Information Systems
K-Means clustering algorithm does not offer a clear methodology to determine the appropriate number of clusters; it does not have a built-in mechanism for K selection. In this paper, we present a new metric for clustering quality and describe its use for K selection. The proposed metric, based on the locations of the centroids, as well as the desired properties of the clusters, is developed in two stages. In the initial stage, we take into account the full covariance matrix of the clustering variables, thereby making it mathematically similar to a reduced chi2. We then extend it to account for …
Parallel Algorithms For Scalable Graph Mining: Applications On Big Data And Machine Learning, Naw Safrin Sattar
Parallel Algorithms For Scalable Graph Mining: Applications On Big Data And Machine Learning, Naw Safrin Sattar
University of New Orleans Theses and Dissertations
Parallel computing plays a crucial role in processing large-scale graph data. Complex network analysis is an exciting area of research for many applications in different scientific domains e.g., sociology, biology, online media, recommendation systems and many more. Graph mining is an area of interest with diverse problems from different domains of our daily life. Due to the advancement of data and computing technologies, graph data is growing at an enormous rate, for example, the number of links in social networks is growing every millisecond. Machine/Deep learning plays a significant role for technological accomplishments to work with big data in modern …
Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague
Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague
Computer Science and Computer Engineering Undergraduate Honors Theses
The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor's Algorithm. NIST proposed a standardization effort in creating a new class of asymmetric cryptography named Post-Quantum Cryptography (PQC). These new algorithms will be resistant against both classical computers and sufficiently powerful quantum computers. Although the new algorithms seem mathematically secure, they can possibly be broken by a class of attacks known as side-channels attacks (SCA). Side-channel attacks involve exploiting the hardware that the algorithm runs on to figure out secret values that could break the security of the system. …
Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., Shruthi Ramakrishnan
Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., Shruthi Ramakrishnan
Graduate Theses and Dissertations
Critical infrastructures (CI) play a vital role in majority of the fields and sectors worldwide. It contributes a lot towards the economy of nations and towards the wellbeing of the society. They are highly coupled, interconnected and their interdependencies make them more complex systems. Thus, when a damage occurs in a CI system, its complex interdependencies make it get subjected to cascading effects which propagates faster from one infrastructure to another resulting in wide service degradations which in turn causes economic and societal effects. The propagation of cascading effects of disruptive events could be handled efficiently if the assessment and …
A Novel Data Lineage Model For Critical Infrastructure And A Solution To A Special Case Of The Temporal Graph Reachability Problem, Ian Moncur
Graduate Theses and Dissertations
Rapid and accurate damage assessment is crucial to minimize downtime in critical infrastructure. Dependency on modern technology requires fast and consistent techniques to prevent damage from spreading while also minimizing the impact of damage on system users. One technique to assist in assessment is data lineage, which involves tracing a history of dependencies for data items. The goal of this thesis is to present one novel model and an algorithm that uses data lineage with the goal of being fast and accurate. In function this model operates as a directed graph, with the vertices being data items and edges representing …
Unconventional Computation Including Quantum Computation, Bruce J. Maclennan
Unconventional Computation Including Quantum Computation, Bruce J. Maclennan
Faculty Publications and Other Works -- EECS
Unconventional computation (or non-standard computation) refers to the use of non-traditional technologies and computing paradigms. As we approach the limits of Moore’s Law, progress in computation will depend on going beyond binary electronics and on exploring new paradigms and technologies for information processing and control. This book surveys some topics relevant to unconventional computation, including the definition of unconventional computations, the physics of computation, quantum computation, DNA and molecular computation, and analog computation. This book is the content of a course taught at UTK.
Practical Considerations And Applications For Autonomous Robot Swarms, Rory Alan Hector
Practical Considerations And Applications For Autonomous Robot Swarms, Rory Alan Hector
LSU Doctoral Dissertations
In recent years, the study of autonomous entities such as unmanned vehicles has begun to revolutionize both military and civilian devices. One important research focus of autonomous entities has been coordination problems for autonomous robot swarms. Traditionally, robot models are used for algorithms that account for the minimum specifications needed to operate the swarm. However, these theoretical models also gloss over important practical details. Some of these details, such as time, have been considered before (as epochs of execution). In this dissertation, we examine these details in the context of several problems and introduce new performance measures to capture practical …
Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu
Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu
Electrical & Computer Engineering Faculty Publications
Energy detection (ED) represents a low complexity approach used by secondary users (SU) to sense spectrum occupancy by primary users (PU) in cognitive radio (CR) systems. In this paper, we present a new algorithm that senses the spectrum occupancy by performing ED in K consecutive sensing time slots starting from the current slot and continuing by alternating before and after the current slot. We consider a PU traffic model specified in terms of an average duty cycle value, and derive analytical expressions for the false alarm probability (FAP) and correct detection probability (CDP) for any value of K . Our …
Ggnb: Graph-Based Gaussian Naive Bayes Intrusion Detection System For Can Bus, Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry
Ggnb: Graph-Based Gaussian Naive Bayes Intrusion Detection System For Can Bus, Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry
Computer Science Faculty Research
The national highway traffic safety administration (NHTSA) identified cybersecurity of the automobile systems are more critical than the security of other information systems. Researchers already demonstrated remote attacks on critical vehicular electronic control units (ECUs) using controller area network (CAN). Besides, existing intrusion detection systems (IDSs) often propose to tackle a specific type of attack, which may leave a system vulnerable to numerous other types of attacks. A generalizable IDS that can identify a wide range of attacks within the shortest possible time has more practical value than attack-specific IDSs, which is not a trivial task to accomplish. In this …
Multilateration Index., Chip Lynch
Multilateration Index., Chip Lynch
Electronic Theses and Dissertations
We present an alternative method for pre-processing and storing point data, particularly for Geospatial points, by storing multilateration distances to fixed points rather than coordinates such as Latitude and Longitude. We explore the use of this data to improve query performance for some distance related queries such as nearest neighbor and query-within-radius (i.e. “find all points in a set P within distance d of query point q”). Further, we discuss the problem of “Network Adequacy” common to medical and communications businesses, to analyze questions such as “are at least 90% of patients living within 50 miles of a covered emergency …
Promoting Diversity In Academic Research Communities Through Multivariate Expert Recommendation, Omar Salman
Promoting Diversity In Academic Research Communities Through Multivariate Expert Recommendation, Omar Salman
Graduate Theses and Dissertations
Expert recommendation is the process of identifying individuals who have the appropriate knowledge and skills to achieve a specific task. It has been widely used in the educational environment mainly in the hiring process, paper-reviewer assignment, and assembling conference program committees. In this research, we highlight the problem of diversity and fair representation of underrepresented groups in expertise recommendation, factors that current expertise recommendation systems rarely consider. We introduce a novel way to model experts in academia by considering demographic attributes in addition to skills. We use the h-index score to quantify skills for a researcher and we identify five …
Object Manipulation With Modular Planar Tensegrity Robots, Maxine Perroni-Scharf
Object Manipulation With Modular Planar Tensegrity Robots, Maxine Perroni-Scharf
Dartmouth College Undergraduate Theses
This thesis explores the creation of a novel two-dimensional tensegrity-based mod- ular system. When individual planar modules are linked together, they form a larger tensegrity robot that can be used to achieve non-prehensile manipulation. The first half of this dissertation focuses on the study of preexisting types of tensegrity mod- ules and proposes different possible structures and arrangements of modules. The second half describes the construction and actuation of a modular 2D robot com- posed of planar three-bar tensegrity structures. We conclude that tensegrity modules are suitably adapted to object manipulation and propose a future extension of the modular 2D …