Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (2)
- Electrical and Electronics (2)
- Business (1)
- Computer Sciences (1)
- Databases and Information Systems (1)
-
- Digital Communications and Networking (1)
- Electro-Mechanical Systems (1)
- Hardware Systems (1)
- Mechanical Engineering (1)
- Other Computer Engineering (1)
- Other Computer Sciences (1)
- Other Mechanical Engineering (1)
- Physical Sciences and Mathematics (1)
- Risk Analysis (1)
- Robotics (1)
- Software Engineering (1)
- Technology and Innovation (1)
- Theory and Algorithms (1)
- Keyword
-
- AI technology (1)
- Artificial Intelligence (1)
- Automation (1)
- Autonomous Control (1)
- Bottling (1)
-
- CelebA (1)
- Computer Science Algorithm Web Application Fitness (1)
- Dataset (1)
- Deep learning (1)
- Deepfakes (1)
- Discriminator (1)
- Fake images (1)
- GAN (1)
- Gantry (1)
- Generative Adversarial Networks (1)
- Generator (1)
- Human Computer Interaction (1)
- Kaseya VSA Attack (1)
- Machine learning (1)
- NDE (1)
- Neural Networks (1)
- Packaging (1)
- Python (1)
- Ransomware (1)
- Revil (1)
- Signal Acquisition (1)
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
Autonomous Control And Signal Acquisition System, Rion Cadell Krampe
Autonomous Control And Signal Acquisition System, Rion Cadell Krampe
Honors College Theses
Our goal is to continue a previous teams project to build a NDE autonomous control and signal acquisition system that is more precise, more customizable with both code and mechanical parts, and cheaper than a similar system bought by the school. This goal has two stages to it. First, to repair the system from considerable damage it received during transportation. Secondly, to continue designing and developing the system to make considerable progress towards the goal of a fully functional NDE system. Along with making progress we must consider the team after us and create an easy stepping off point for …
Deepfakes Generated By Generative Adversarial Networks, Olympia A. Paul
Deepfakes Generated By Generative Adversarial Networks, Olympia A. Paul
Honors College Theses
Deep learning is a type of Artificial Intelligence (AI) that mimics the workings of the human brain in processing data such as speech recognition, visual object recognition, object detection, language translation, and making decisions. A Generative adversarial network (GAN) is a special type of deep learning, designed by Goodfellow et al. (2014), which is what we call convolution neural networks (CNN). How a GAN works is that when given a training set, they can generate new data with the same information as the training set, and this is often what we refer to as deep fakes. CNN takes an input …
Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager
Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager
Honors College Theses
With cybersecurity constantly in the media outlets with breaches, cybercrime, and cyberwarfare, it has become a significant concern for all. One of the most recent breaches in the summer of 2021 was the Colonial Pipeline breach, which has proven the country's reliance on these industrial control systems and networking. The systems were taken for ransom by a new type of ransomware written in a different programming language. Although the Colonial Pipeline breach was quickly addressed, the impact of the gas shortage and the response time were alarming at triaging the breach. However, this attack showed the public how dangerous ransomware …
Automated Bottling Station - Packaging System, Lauren Nicole Zinzilieta
Automated Bottling Station - Packaging System, Lauren Nicole Zinzilieta
Honors College Theses
This report focuses on the packaging system used at the end of the FESTO bottling station that is located in EP 2355. The system will be made up of an x-y 300 mm x 300 mm gantry system, an Arduino, two micro-stepping stepper drivers, and two 152.4 mm (6 in) single acting cylinders with a 3D printed bracket attached to both. The gantry system will be located at the end of the conveyor belt and will be programmed to pick up three bottles at a time and then will move a specified number of steps in both the x and …
A Deep Analysis And Algorithmic Approach To Solving Complex Fitness Issues In Collegiate Student Athletes, Holly N. Puckett
A Deep Analysis And Algorithmic Approach To Solving Complex Fitness Issues In Collegiate Student Athletes, Holly N. Puckett
Honors College Theses
Sports are not simply an entertainment source. For many, it creates a sense of community, support, and trust among both fans and athletes alike. In order to continue the sense of community sports provides, athletes must be properly cared for in order to perform at the highest level possible. Thus, their fitness and health must be monitored continuously. In a professional sense, one can expect individualized attention to athletes daily due to an abundance of funding and resources. However, when looking at college communities and student athletes within them, the number of athletes per athletic trainer increases due to both …