Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 40

Full-Text Articles in Computer Engineering

Text Summarization, Varun Gottam, Anusha Vunnam, Purna Sarovar Puvvada Feb 2024

Text Summarization, Varun Gottam, Anusha Vunnam, Purna Sarovar Puvvada

Symposium of Student Scholars

The current era is known as the information era. Every day, millions of gigabytes of data are being transferred from one point to another. As the creation of data became easy, it became hard to keep track of the important points and the gist of data especially in areas such as research and news. To solve this conundrum, text summarization is introduced. This is a process of summarizing text from across different documents or large datasets such that it can be read and understood easily by both humans and machines.


Blockchain And Ethereum Vulnerabilities, Daniel Chen Nov 2023

Blockchain And Ethereum Vulnerabilities, Daniel Chen

Symposium of Student Scholars

Blockchain and Ethereum (ETH) technology stands poised to revolutionize the digital world, offering unprecedented decentralization, transparency, and immutability of data across various industries; however, new technologies raise new security concerns. By overcoming key vulnerabilities in ETH, it allows a multitude of groundbreaking technologies such as Web3, Decentralized Finance (DeFi), Decentralized Apps (dApps), Non-Fungible Tokens (NFTs), and cryptocurrency wallets to become commonplace. This revolutionary crypto-dependent future of the internet relies on finding solutions to security vulnerabilities. We aim to pinpoint key security flaws and develop robust smart contract solutions within the Ethereum blockchain to enable the widespread adoption of Blockchain technology.


Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan Nov 2023

Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan

Symposium of Student Scholars

"KWAD" or "KSU all-Weather Autonomous Drone" project was sponsored by Ultool, LLC to the KSU Research and Service Foundation to create a lightweight drone capable of capturing HD video during all-weather operations. The conditions of all-weather operation include rainfall of one inch per hour and wind speeds of up to twenty miles per hour. In addition, a global minimum structural safety factor of two is required to ensure the system's integrity in extreme weather conditions. Potential mission profiles include autonomous aerial delivery, topological mapping in high moisture areas, security surveillance, search and rescue operations, emergency transportation of medical supplies, and …


A Social Profile-Based E-Learning Model, Xola Ntlangula Sep 2023

A Social Profile-Based E-Learning Model, Xola Ntlangula

African Conference on Information Systems and Technology

Many High Education Institutions (HEIs) have migrated to blended or complete online learning to cater for less interruption with learning. As such, there is a growing demand for personalized e-learning to accommodate the diversity of students' needs. Personalization can be achieved using recommendation systems powered by artificial intelligence. Although using student data to personalize learning is not a new concept, collecting and identifying appropriate data is necessary to determine the best recommendations for students. By reviewing the existing data collection capabilities of the e-learning platforms deployed by public universities in South Africa, we were able to establish the readiness of …


Experiences Of African Women In Stem Careers: A Systematic Literature Review., Kaluwa Siwale, Gwamaka Mwalemba, Ulrike Rivett Sep 2023

Experiences Of African Women In Stem Careers: A Systematic Literature Review., Kaluwa Siwale, Gwamaka Mwalemba, Ulrike Rivett

African Conference on Information Systems and Technology

The discourse on women's underrepresentation in science, technology, engineering, and mathematics (STEM) mainly centres on the global north, leaving a gap in understanding the perspectives of African women in STEM. To address this, a systematic literature review was conducted to explore African women's experiences in STEM careers and education. After applying inclusion and criteria, 18 published articles were analysed. 8 key issues emerge: work environment, education system, work-life balance, gender-based stereotypes, racial bias, sexual harassment, inadequate support/mentorship, and self-imposed limits. These themes intertwine, with some aspects influencing others. Grasping the complexities and interactions of these factors provides insights into challenges …


E-Wild Life Alert: Tackling The Human-Wildlife Conflict Problem, Eliel Kundai Zhuwankinyu, Sibonile Moyo, Catherine Chivasa, Smart Ncube Sep 2023

E-Wild Life Alert: Tackling The Human-Wildlife Conflict Problem, Eliel Kundai Zhuwankinyu, Sibonile Moyo, Catherine Chivasa, Smart Ncube

African Conference on Information Systems and Technology

Depletion of resources meant for both human and animal survival leads to competition for these. Human-wildlife conflict (HWC) occurs when these two parties compete for resources such as space, water, and food. If not properly managed, HWC can lead to loss of livelihoods and even loss of life. This paper discusses the design and development of an E-Wildlife Alert application that uses machine learning to detect dangerous animals. Using the Design Science Research method, a convolutional neural network is trained to build an artifact that detects five dangerous animals from an African context. The artifact is mounted on a robot …


A Customized Artificial Intelligence Based Career Choice Recommender System For A Rural University, Nosipho Carol Mavuso, Nobert Jere, Darelle Vangreunen Sep 2023

A Customized Artificial Intelligence Based Career Choice Recommender System For A Rural University, Nosipho Carol Mavuso, Nobert Jere, Darelle Vangreunen

African Conference on Information Systems and Technology

Rapid technological developments have enabled users to be supported and guided in decision-making. An example of this is the ability of tertiary students to use technology to explore different career options and make informed decisions about their future. Notwithstanding the increasing use of technology in general, the technology for career guidance and personalized career recommendations in South Africa is still limited. There are some limiting factors such as the ever-looming challenge of limited access to technology, language barriers and cultural differences that are prevalent in rural areas. With this premise, this study collected quantitative data from students at an Eastern …


Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild Apr 2023

Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild

Symposium of Student Scholars

The research project aims to find ways to detect malicious packets inside encrypted network traffic. In addition to this goal maintaining user privacy is a priority. As encryption has become less expensive to implement more and more network traffic is encrypted. Currently, 90% of all network traffic is encrypted, and this trend is expected to increase. The creators of malware areemploying various methods to ensure delivery of their malware, including encryption. One proposed method to combat this suggests implementing machine learning with various algorithms to analyze packet attributes to determine if they contain malware, without actually knowing what's inside …


Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas Apr 2023

Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas

Symposium of Student Scholars

Ransomware is classified as one of the main types of malware and involves the design of exploitations of new vulnerabilities through a host. That allows for the intrusion of systems and encrypting of any information assets and data in order to demand a sum of payment normally through untraceable cryptocurrencies such as Monero for the decryption key. This rapid security threat has put governments and private enterprises on high alert and despite evolving technologies and more sophisticated encryption algorithms critical assets are being held for ransom and the results are detrimental, including the recent Colonial Pipeline ransomware attack in 2021 …


A Study Of Iot-Optimized Low Power Asset Tracking With Cloud-Enabled Lorawan, Fatima Salman Apr 2023

A Study Of Iot-Optimized Low Power Asset Tracking With Cloud-Enabled Lorawan, Fatima Salman

Symposium of Student Scholars

The world of technology is expanding very quickly today, including technologies like cloud-based asset monitoring, but this makes it difficult to keep up with this technology's development and many other things. It is possible to monitor and manage your assets remotely with a cloud-based system thanks to its many features. The lifecycle of any commodity, including inventory, machinery, vehicles, and real estate, can be tracked using this kind of cloud-based system. Wide-area networks can be used to send data with the aid of low-power wide-area network (LPWAN) technologies like LoRa, SigFox, and NB-IoT. This project will examine traditional, cloud-based, LPWAN-based …


Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer Dec 2022

Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer

Symposium of Student Scholars

When navigating in unknown and unstructured environments, Unmanned Arial Vehicles (UAVs) can struggle when attempting to preform Simultaneous Localization and Mapping (SLAM) operations. Particularly challenging circumstance arise when an UAV may need to land or otherwise navigate through treacherous environments. As the primary UAV may be too large and unwieldly to safely investigate in these types of situations, this research effort proposes the use of actively guided CanSats for assisting in localization and mapping of unstructured environments. A complex UAV could carry multiple of these SLAM capable CanSats, and when additional mapping and localization capabilities where required, the CanSat would …


Unmanned Aerial System Design For Civil Engineering Operations – A Vip Study, Ezra Robles, Harrison Vicknair, Derek Price, Logan Westra, George Pitcock, Joshua Diamond, Bhuvan Saraswat, Jeremiah Prayor, Fon Saliki Dec 2022

Unmanned Aerial System Design For Civil Engineering Operations – A Vip Study, Ezra Robles, Harrison Vicknair, Derek Price, Logan Westra, George Pitcock, Joshua Diamond, Bhuvan Saraswat, Jeremiah Prayor, Fon Saliki

Symposium of Student Scholars

Unmanned Aerial System Design for Civil Engineering Operations – A Case Study

The objective of the project is to design and build a modular Unmanned Aerial System (UAS) that meets the specifications set forth by United Consulting – a local civil engineering company. These specifications are achieved through three unique missions. In each mission, data is collected using different methods. These missions include land surveying, bridge structure inspection and manhole probing. The key requirements of the drone are to maintain a minimum flight time of 30 minutes and the ability to receive and transmit telemetry, photographic and video data from …


Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss Nov 2022

Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss

KSU Proceedings on Cybersecurity Education, Research and Practice

Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …


Searching For Oa Scholarly Content, Olga Koz Oct 2022

Searching For Oa Scholarly Content, Olga Koz

All Things Open

Academic search engines have become the number one resource to find scholarly resources. In contrast, search engines of academic databases, like Web of Science and Scopus, harvest research which is locked behind paywalls. Google Scholar and other academic search engines assist in finding open access content as well as the content of commercial databases. Dr. Olga Koz, Senior Research Support Librarian, will present academic search engines that enhance expert research on various academic subject matters.


Using Design Science Research To Create A Virtual Environment For Nursing Students, Benjamin Botha, Lizette De Wet Aug 2022

Using Design Science Research To Create A Virtual Environment For Nursing Students, Benjamin Botha, Lizette De Wet

African Conference on Information Systems and Technology

This paper aims to provide insight into the design science research approach followed during a transdisciplinary research study between computer scientists and professional nurses. The researchers used a design science research approach to create a virtual environment where nursing students could practice managing a patient with a foreign object in the right lung. The virtual environment underwent multiple changes as it progressed through the different cycles of design science research. Within these cycles, namely the relevance, design, and rigor cycle, various iterations of each of the cycles took place. Presented in this paper the design science approach followed will be …


Development Of A Compliant Gripper Driven By 3 Dof Soft Robot, Derek M. Price Ii, Ricardo Ramirez, Pt Angel Tran Apr 2022

Development Of A Compliant Gripper Driven By 3 Dof Soft Robot, Derek M. Price Ii, Ricardo Ramirez, Pt Angel Tran

Symposium of Student Scholars

Industrial robots are moving toward automation, which makes it increasingly necessary to replace the functions traditionally performed by humans with robotics. Pick and place operation is a prime example of such automation. Robots that pick up and place objects mimic the human action of picking an object up and placing it in a targeted location. It has led to the development of robotic end-effectors that have a human-like feel. Grippers can be articulated in various ways depending on their application area and well-defined desired tasks. As compliant and soft links deflect more under the same load than their rigid body …


Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore Apr 2022

Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore

Symposium of Student Scholars

Climate change is happening, and many countries are already facing devastating consequences. Populations worldwide are adapting to the season's unpredictability they relay to lands for agriculture. Our first research was to develop an IoT Clusters Platform for Data Collection, analysis, and visualization. The platform comprises hardware parts with Raspberry Pi and Arduino's clusters connected to multiple sensors. The clusters transmit data collected in real-time to microservices-based servers where the data can be accessed and processed. Our objectives in developing this platform were to create an efficient data collection system, relatively cheap to implement and easy to deploy in any part …


Analysis Of The Internal Delays Of Various Wireless Technologies For Autonomous Vehicle Applications, Luanne Seaman Apr 2022

Analysis Of The Internal Delays Of Various Wireless Technologies For Autonomous Vehicle Applications, Luanne Seaman

Symposium of Student Scholars

Analysis of the Internal Delays of Various Wireless Technologies for Autonomous Vehicle Applications

Poster Presentation Undergraduate Student: Luanne Seaman

Research Mentor: Dr. Billy Kihei

Autonomous vehicles use VANETs (vehicular ad-hoc networks) to communicate with the world around them. Despite the simple premise, VANETs rely on a variety of wireless technologies depending on range, internal delay, urgency of information, and other factors. Therefore, VANET algorithms will need to weigh these elements accordingly. Through this research, I hope to contribute reliable measurements of internal delay to reduce the algorithms’ complexity. To calculate internal delay, I connected two Arduinos to a STM32 Nucleo …


Ehr Data Management: Hyperledger Fabric-Based Health Data Storing And Sharing, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero Nov 2021

Ehr Data Management: Hyperledger Fabric-Based Health Data Storing And Sharing, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero

Symposium of Student Scholars

Despite the type of industry, data sharing has always been a concern across the globe within the conventional database model; particularly in the healthcare industry, where the lack of data interoperability in existing applications creates not only security and transparency issues in EHR but also cost-related concerns that impact the quality of patient care. Without adopting novel and emerging technologies that allow patients to store and share EHR data within a tamper-evident, immutable, and secure data storing and sharing network, this current problem could not be resolved. Emerging Hyperledger Fabric-based Blockchain technology can be an ideal solution to address these …


Joint Latency-Energy Optimization Scheme For Offloading In Mobile Edge Computing Environment Based In Deep Reinforcement Learning, Jui Mhatre Nov 2021

Joint Latency-Energy Optimization Scheme For Offloading In Mobile Edge Computing Environment Based In Deep Reinforcement Learning, Jui Mhatre

Symposium of Student Scholars

With the increasing number of mobile devices (MD), IoT devices, and computation-intensive tasks deployed on these devices, there is a need to increase the efficiency and speed of the deliverable. Due to inadequate resources, it is infeasible to compute all the tasks locally. Similarly, due to time constraints, it is not possible to compute the entire task at a remote site. Edge computing (EC) and cloud computing (CC) play the role of providing the resources to these devices on the fly. But a major drawback is increased delay and energy consumption due to transmission and offloading of computation tasks to …


Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne Oct 2021

Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …


Rollover V2x Soft Antenna For Vehicular Safety, Jiwoo Park, Devansh Singh Aug 2021

Rollover V2x Soft Antenna For Vehicular Safety, Jiwoo Park, Devansh Singh

Symposium of Student Scholars

Vehicle-2-Everything (V2X) technology can make roads safer by allowing vehicles to communicate with each other. The goal of V2X is to reduce accidents where there is not a line-of-sight of the other vehicle, such as at intersections, in harsh driving conditions, and around curves. Considering that the antenna for V2X will be mounted on the roof, how then should a turned over vehicle communicate reliably with other vehicles if another antenna doesn't also exist on the bottom of the vehicle? We explore using soft-robotics for deploying a spare antenna from under the vehicle. Experiments show that when the antenna is …


Cooperative Localization Between Robots Using Vision And Path Planning Algorithm, Charles Koduru Aug 2021

Cooperative Localization Between Robots Using Vision And Path Planning Algorithm, Charles Koduru

Symposium of Student Scholars

The aim of this article is to provide an obstacle avoidance solution for navigating a robot from one point to another. The robots that are being considered are the NAOHumanoid robot and the wheeled robot Rosbot 2.0. This article's main purpose is to understand how robots work together to minimize positioning errors. The image processing robot (NAO) will be able to instruct the wheeled bot (Rosbot) to navigate around obstacles more accurately by incorporating Inverse Perspective Mapping methods (IPM) and the A-Star Algorithm. This approach demonstrates the ability to improve robot collaboration in order to diagnose various collisions and develop …


Securing Global Positioning Systems In A Blockchain Using Vehicle-To-Everything Communications, Malik Purefoy Aug 2021

Securing Global Positioning Systems In A Blockchain Using Vehicle-To-Everything Communications, Malik Purefoy

Symposium of Student Scholars

Intelligent transportation systems (ITS) are being deployed globally to support vehicular safety innovation using wireless communication. The ITS paradigm of vehicle-to-everything communication (V2X) enables vehicles equipped with an on-board unit (OBU) to communicate with a roadside unit (RSU) infrastructure to provide safe intersection movements between similarly equipped vehicles, pedestrians, and animal life. However, the current paradigm relies heavily on the availability of a Global Positioning System (GPS) for ensuring road user safety. In a doomsday scenario where GPS becomes unavailable, collision avoidance services provided through V2X may be rendered unavailable. The proposed solution is to develop a secure and reliable …


Design And Test Of Novel Vehicle-To-Everything Packet For Sensor Arrays In Under Roadway Deployment, Marquis Brown Aug 2021

Design And Test Of Novel Vehicle-To-Everything Packet For Sensor Arrays In Under Roadway Deployment, Marquis Brown

Symposium of Student Scholars

Title: Design and Test of Novel Vehicle-to-Everything Packet for Sensor Arrays in Under Roadway Deployment

Poster Presentation Undergraduate Student(s): Hakeem Wilson, Marquis Brown Research Mentor(s): Dr. Billy Kihei

Vehicle-to-Everything (V2X) communications is a burgeoning technology that will enable safer, greener, and more productive usage of roadways. In the V2X paradigm, all equipped vehicles and infrastructure can communicate with each other in real-time. By utilizing V2X communications as an Internet-of-Things gateway, a sensor array installed under roadways, allows real-time monitoring of road conditions which increases overall road safety and road maintenance cost. In our research, we have utilized the WAVE Short …


Detecting Primitive Jamming Attacks Using Machine Learning In Vehicle-To-Everything Networks​, Hakeem Wilson Aug 2021

Detecting Primitive Jamming Attacks Using Machine Learning In Vehicle-To-Everything Networks​, Hakeem Wilson

Symposium of Student Scholars

Vehicle-to-Everything communications (V2X) is gaining additional ground as an upcoming ad hoc safety network. In V2X, basic safety messages are used for exchanging critical information between vehicles at a set broadcast rate. However, jamming attacks on the safety spectrum could deny V2X radios the ability to save lives on the roadway. This preliminary work analyzes two types of primitive jamming attacks performed on target V2X devices. Lab results reveal that V2X networks are easily susceptible to jamming attacks, due to all V2X standards lacking a requirement to detect/mitigate jamming. To avert this threat and promote safety of life on the …


Long Distance Li-Fi, Adeyemi Fagbemi Aug 2021

Long Distance Li-Fi, Adeyemi Fagbemi

Symposium of Student Scholars

Wi-Fi has been in existence since 1998 providing an increase in the amount of data transmitted and generated by machines. With the growing market demand for network bandwidth, it will make it nearly impossible for typical radio frequency (RF) technologies like Wi-Fi to supply the resources needed for the data transmission. As a complementary solution, Li-Fi was introduced in 2011 as a method of data transfer through the use light of light sources. Li-Fi employs the use of visible light spectrum which has 1000 more times the bandwidth of typical RF spectrums. This study investigates the distance to which this …


Design And Implementation Of A Microservices Web-Based Architecture For Code Deployment And Testing, Soin Abdoul Kassif Traore May 2021

Design And Implementation Of A Microservices Web-Based Architecture For Code Deployment And Testing, Soin Abdoul Kassif Traore

Symposium of Student Scholars

Design and Implementation of a Microservices Web-based Architecture for CodeDeployment and Testing

Many tech stars like Netflix, Amazon, PayPal, eBay, and Twitter are evolving from monolithic to a microservice architecture due to the benefits for Agile and DevOps teams. Microservices architecture can be applied to multiple industries, like IoT, using containerization. Virtual containers give an ideal environment for developing and testing of IoT technologies. Since the IoT industry has an exponential growth, it is the responsibility of universities to teach IoT with hands-on labs to minimize the gap between what the students learn and what is on-demand in the job …


An Investigation On Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset And Its Effectiveness, Md Jobair Hossain Faruk May 2021

An Investigation On Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset And Its Effectiveness, Md Jobair Hossain Faruk

Symposium of Student Scholars

Neurotechnology describes as one of the focal points of today’s research around the domain of Brain-Computer Interfaces (BCI). The primary attempts of BCI research are to decoding human speech from brain signals and controlling neuro-psychological patterns that would benefit people suffering from neurological disorders. In this study, we illustrate the progress of BCI research and present scores of unveiled contemporary approaches. First, we explore a decoding natural speech approach that is designed to decode human speech directly from the human brain onto a digital screen introduced by Facebook Reality Laband University of California San Francisco. Then, we study a recently …


Framework For Collecting Data From Iot Device, Md Saiful Islam May 2021

Framework For Collecting Data From Iot Device, Md Saiful Islam

Symposium of Student Scholars

The Internet of Things (IoT) is the most significant and blooming technology in the 21st century. IoT has rapidly developed by covering hundreds of applications in the civil, health, military, and agriculture areas. IoT is based on the collection of sensor data through an embedded system, and this embedded system uploads the data on the internet. Devices and sensor technologies connected over a network can monitor and measure data in real-time. The main challenge is to collect data from IoT devices, transmit them to store in the Cloud, and later retrieve them at any time for visualization and data analysis. …