Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

2023

Discipline
Institution
Keyword
Publication
File Type

Articles 1 - 30 of 52

Full-Text Articles in Computer Engineering

Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson Dec 2023

Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson

Cybersecurity Undergraduate Research Showcase

For this research project I used a Raspberry Pi device and conducted online research to investigate potential security vulnerabilities along with mitigation strategies. I configured the Raspberry Pi by using the proper peripherals such as an HDMI cord, a microUSB adapter that provided 5V and at least 700mA of current, a TV monitor, PiSwitch, SD Card, keyboard, and mouse. I installed the Rasbian operating system (OS). The process to install the Rasbian took about 10 minutes to boot starting at 21:08 on 10/27/2023 and ending at 21:18. 1,513 megabytes (MB) was written to the SD card running at (2.5 MB/sec). …


Integrating Ai Into Uavs, Huong Quach Dec 2023

Integrating Ai Into Uavs, Huong Quach

Cybersecurity Undergraduate Research Showcase

This research project explores the application of Deep Learning (DL) techniques, specifically Convolutional Neural Networks (CNNs), to develop a smoke detection algorithm for deployment on mobile platforms, such as drones and self-driving vehicles. The project focuses on enhancing the decision-making capabilities of these platforms in emergency response situations. The methodology involves three phases: algorithm development, algorithm implementation, and testing and optimization. The developed CNN model, based on ResNet50 architecture, is trained on a dataset of fire, smoke, and neutral images obtained from the web. The algorithm is implemented on the Jetson Nano platform to provide responsive support for first responders. …


Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins Nov 2023

Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins

Cybersecurity Undergraduate Research Showcase

This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.


Blockchain And Ethereum Vulnerabilities, Daniel Chen Nov 2023

Blockchain And Ethereum Vulnerabilities, Daniel Chen

Symposium of Student Scholars

Blockchain and Ethereum (ETH) technology stands poised to revolutionize the digital world, offering unprecedented decentralization, transparency, and immutability of data across various industries; however, new technologies raise new security concerns. By overcoming key vulnerabilities in ETH, it allows a multitude of groundbreaking technologies such as Web3, Decentralized Finance (DeFi), Decentralized Apps (dApps), Non-Fungible Tokens (NFTs), and cryptocurrency wallets to become commonplace. This revolutionary crypto-dependent future of the internet relies on finding solutions to security vulnerabilities. We aim to pinpoint key security flaws and develop robust smart contract solutions within the Ethereum blockchain to enable the widespread adoption of Blockchain technology.


Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan Nov 2023

Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan

Symposium of Student Scholars

"KWAD" or "KSU all-Weather Autonomous Drone" project was sponsored by Ultool, LLC to the KSU Research and Service Foundation to create a lightweight drone capable of capturing HD video during all-weather operations. The conditions of all-weather operation include rainfall of one inch per hour and wind speeds of up to twenty miles per hour. In addition, a global minimum structural safety factor of two is required to ensure the system's integrity in extreme weather conditions. Potential mission profiles include autonomous aerial delivery, topological mapping in high moisture areas, security surveillance, search and rescue operations, emergency transportation of medical supplies, and …


Large Language Model Use Cases For Instruction, Plus A Primer On Prompt Engineering, Roy Haggerty, Justin Cochran Nov 2023

Large Language Model Use Cases For Instruction, Plus A Primer On Prompt Engineering, Roy Haggerty, Justin Cochran

LSU Health New Orleans Symposium Series on Artificial Intelligence

AMA Credit Designation Statement: The Louisiana State University School of Medicine, New Orleans designates this live activity for a maximum of 1.0 AMA PRA Category 1 Credit™. Physicians should claim only the credit commensurate with the extent of their participation in the activity.

NCPD Credit Designation Statement: Nursing participants may earn 1.0 NCPD contact hours. Each nursing participant must be present for the entire session for which NCPD contact hours are requested and must complete an evaluation of the session to receive credit.


The Intersection Of Ai And Employment, Sachit Kamat Oct 2023

The Intersection Of Ai And Employment, Sachit Kamat

River Cities Industrial and Organizational Psychology Conference

Artificial Intelligence (AI) is rapidly transforming every industry. This session will focus on the practical applications of AI within employment hiring and succession strategies, enabling organizations to automate processes, improve efficiency, and uncover data-driven insights for enhanced decision making. We will discuss advancements using AI in the recruitment process, including the use of machine learning algorithms to screen resumes and identify successful candidates. The talk will highlight the regulatory environment and the intersection of the IO and AI fields within this rapidly evolving landscape. Additionally, the presentation will explore where AI is being used to improve organizational retention and performance. …


Data For Ai In Network Systems Workshop Report, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich Oct 2023

Data For Ai In Network Systems Workshop Report, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich

Workshop on Data for AI in Network Systems

No abstract provided.


Workshop On Data For Ai In Network Systems - Event Summary, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich Oct 2023

Workshop On Data For Ai In Network Systems - Event Summary, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich

Workshop on Data for AI in Network Systems

No abstract provided.


Studazon, Gage Stevens, Michelle Thoi, Umangkumar Patel, Gavin Minney Oct 2023

Studazon, Gage Stevens, Michelle Thoi, Umangkumar Patel, Gavin Minney

Harrisburg University Research Symposium: Highlighting Research, Innovation, & Creativity

Studazon is a book listing for students to list textbooks they no longer need. Studazon acts as an advertising site to help connect students who have textbooks with students who need those textbooks.


Towards Carbon-Aware Spatial Computing: Challenges And Opportunities, Bharat Jayaprakash, Matthew Eagon, Mingzhou Yang, William F. Northrop, Shashi Shekhar Oct 2023

Towards Carbon-Aware Spatial Computing: Challenges And Opportunities, Bharat Jayaprakash, Matthew Eagon, Mingzhou Yang, William F. Northrop, Shashi Shekhar

I-GUIDE Forum

Carbon-aware spatial computing (CASC) is focused on reducing the carbon footprint of spatial computing itself and leveraging spatial computing techniques to minimize carbon emissions in other domains. The significance of CASC lies in its potential to mitigate anthropogenic climate change by offering numerous societal applications, such as carbon-aware supply chain development and carbon-aware site selection. CASC is challenging because of the spatiotemporal variability and the high dimensionality of carbon emissions data, involving spatial coordinates and timestamps. Related work, known as carbon-aware computing, mostly focuses on job scheduling of cloud computing, and there is a lack of surveys and review papers …


Streamlined Hpc Environments With Cvmfs And Cybergis-Compute, Alexander C. Michels, Mit Kotak, Anand Padmanabhan, Shaowen Wang Oct 2023

Streamlined Hpc Environments With Cvmfs And Cybergis-Compute, Alexander C. Michels, Mit Kotak, Anand Padmanabhan, Shaowen Wang

I-GUIDE Forum

High-Performance Computing (HPC) resources provide the potential for complex, large-scale modeling and analysis, fueling scientific progress over the last few decades, but these advances are not equally distributed across disciplines. Those in computational disciplines are often trained to have the necessary technical skills to utilize HPC (e.g. familiarity with the terminal), but many disciplines face technical hurdles when trying to apply HPC resources to their work. This unequal familiarity with HPC is increasingly a problem as cross-discipline teams work to tackle critical interdisciplinary issues like climate change and sustainability. CyberGIS-Compute is middle-ware designed to democratize to HPC services with the …


A Social Profile-Based E-Learning Model, Xola Ntlangula Sep 2023

A Social Profile-Based E-Learning Model, Xola Ntlangula

African Conference on Information Systems and Technology

Many High Education Institutions (HEIs) have migrated to blended or complete online learning to cater for less interruption with learning. As such, there is a growing demand for personalized e-learning to accommodate the diversity of students' needs. Personalization can be achieved using recommendation systems powered by artificial intelligence. Although using student data to personalize learning is not a new concept, collecting and identifying appropriate data is necessary to determine the best recommendations for students. By reviewing the existing data collection capabilities of the e-learning platforms deployed by public universities in South Africa, we were able to establish the readiness of …


Experiences Of African Women In Stem Careers: A Systematic Literature Review., Kaluwa Siwale, Gwamaka Mwalemba, Ulrike Rivett Sep 2023

Experiences Of African Women In Stem Careers: A Systematic Literature Review., Kaluwa Siwale, Gwamaka Mwalemba, Ulrike Rivett

African Conference on Information Systems and Technology

The discourse on women's underrepresentation in science, technology, engineering, and mathematics (STEM) mainly centres on the global north, leaving a gap in understanding the perspectives of African women in STEM. To address this, a systematic literature review was conducted to explore African women's experiences in STEM careers and education. After applying inclusion and criteria, 18 published articles were analysed. 8 key issues emerge: work environment, education system, work-life balance, gender-based stereotypes, racial bias, sexual harassment, inadequate support/mentorship, and self-imposed limits. These themes intertwine, with some aspects influencing others. Grasping the complexities and interactions of these factors provides insights into challenges …


E-Wild Life Alert: Tackling The Human-Wildlife Conflict Problem, Eliel Kundai Zhuwankinyu, Sibonile Moyo, Catherine Chivasa, Smart Ncube Sep 2023

E-Wild Life Alert: Tackling The Human-Wildlife Conflict Problem, Eliel Kundai Zhuwankinyu, Sibonile Moyo, Catherine Chivasa, Smart Ncube

African Conference on Information Systems and Technology

Depletion of resources meant for both human and animal survival leads to competition for these. Human-wildlife conflict (HWC) occurs when these two parties compete for resources such as space, water, and food. If not properly managed, HWC can lead to loss of livelihoods and even loss of life. This paper discusses the design and development of an E-Wildlife Alert application that uses machine learning to detect dangerous animals. Using the Design Science Research method, a convolutional neural network is trained to build an artifact that detects five dangerous animals from an African context. The artifact is mounted on a robot …


A Customized Artificial Intelligence Based Career Choice Recommender System For A Rural University, Nosipho Carol Mavuso, Nobert Jere, Darelle Vangreunen Sep 2023

A Customized Artificial Intelligence Based Career Choice Recommender System For A Rural University, Nosipho Carol Mavuso, Nobert Jere, Darelle Vangreunen

African Conference on Information Systems and Technology

Rapid technological developments have enabled users to be supported and guided in decision-making. An example of this is the ability of tertiary students to use technology to explore different career options and make informed decisions about their future. Notwithstanding the increasing use of technology in general, the technology for career guidance and personalized career recommendations in South Africa is still limited. There are some limiting factors such as the ever-looming challenge of limited access to technology, language barriers and cultural differences that are prevalent in rural areas. With this premise, this study collected quantitative data from students at an Eastern …


Using An Embedded System For A Quality Cup Of Coffee, Evan Powers, Joshua Stermer, Tsion Yohannes May 2023

Using An Embedded System For A Quality Cup Of Coffee, Evan Powers, Joshua Stermer, Tsion Yohannes

2023 Symposium

Many coffee lovers spend up to $5 on a cup of coffee everyday. To save money one could make them at home, but a quality machine with PIDs start at $1000. Using an embedded system one could spend less than $50 and a few hours implement PIDs into an existing $400 machine that will last a lifetime. microcontroller. Learning C language combined with hardware implementation applied to cheap and simple everyday objects can improve everyday quality of life and save money.

This is challenging because we have to incorporate the additional circuitry into a pre established circuit with limited space, …


Robot Learning To Pour Solid Objects Accurately, Juan Wilches, Yu Sun May 2023

Robot Learning To Pour Solid Objects Accurately, Juan Wilches, Yu Sun

36th Florida Conference on Recent Advances in Robotics

Pouring is an efficient way to transfer objects from
one container to another. This abstract summarizes a method
to accurately pour solid objects, such as ice cubes. It leverages
visual and proprioceptive feedback together with contextual
information to control the forward and backward rotation of the
pouring container. These feedback signals are fed to a recurrent
neural network that produces the control signal. The proposed
approach can achieve a human-like pouring accuracy in both a
simulation and a real setup.


Multi-Object Grasping -- Stochastic Grasping From A Pile, Tianze Chen, Adheesh Shenoy, Yu Sun May 2023

Multi-Object Grasping -- Stochastic Grasping From A Pile, Tianze Chen, Adheesh Shenoy, Yu Sun

36th Florida Conference on Recent Advances in Robotics

Grasping multiple objects at once from a pile is common for humans. It makes us efficient in pick and transfer tasks. It is essential for a robot to gain multi-object grasping capability (MOG). This paper defines the multi-object grasping problem and introduces several novel multi-object grasping techniques. These techniques include probability-based pre-grasp potential calculation, a stochastic flexing/extending routine, obtaining end-grasp types, and estimating the number of objects in a grasp. It also proposes a new stochastic grasping strategy for grasping a desired number of objects.


Live Audiovisual Remote Assistance System (Laras) For Person With Visual Impairments, Zachary Frey, Nghia Vo, Varaha Maithreya, Tais Mota, Urvish Trivedi, Redwan Alqasemi, Rajiv Dubey May 2023

Live Audiovisual Remote Assistance System (Laras) For Person With Visual Impairments, Zachary Frey, Nghia Vo, Varaha Maithreya, Tais Mota, Urvish Trivedi, Redwan Alqasemi, Rajiv Dubey

36th Florida Conference on Recent Advances in Robotics

According to "The World Report on Vision" by World Health Organization (WHO) [1], there are more than 2.2 billion people who have near or distant vision Impairments, out of which 36 million people are classified as entirely blind. This report also emphasizes the importance of social and communal support in enabling individuals with vision impairments to integrate into society and reach their full potential. While performing daily activities and navigating the environment, people with visual impairments (PVIs) often require direct or synchronous assistance [2]. Consequently, there is a growing need for automated solutions to assist in this regard. However, existing …


Assistive Robotic Platform For Non‐Urgent Household Tasks: A New Design, Amanda Serger, Normandy Tanguilan, Hakki Erhan Sevil May 2023

Assistive Robotic Platform For Non‐Urgent Household Tasks: A New Design, Amanda Serger, Normandy Tanguilan, Hakki Erhan Sevil

36th Florida Conference on Recent Advances in Robotics

Humans overcome minor household inconveniences daily without fully recognizing how challenging these tasks could be for individuals such as elderly people or people with disabilities. Those people often times struggle to complete tasks, for instance opening a door or reaching for an item, leading them to rely on caregivers for help. During the COVID-19 pandemic, this caregiver support becomes an unsafe and unreliable solution that can result in a greater risk, thus the need for another solution arises: robotic technology. Recent developments in the robotics field have paved the way for this research, aiming to design a home assistance robot …


Reinforcement Learning And Place Cell Replay In Spatial Navigation, Chance Hamilton, Pablo Scleidorovich Phd, Alfredo Weitzenfeld Phd May 2023

Reinforcement Learning And Place Cell Replay In Spatial Navigation, Chance Hamilton, Pablo Scleidorovich Phd, Alfredo Weitzenfeld Phd

36th Florida Conference on Recent Advances in Robotics

In the last decade, studies have demonstrated that hippocampal place cells influence rats’ navigational learning ability. Moreover, researchers have observed that place cell sequences associated with routes leading to a reward are reactivated during rest periods. This phenomenon is known as Hippocampal Replay, which is thought to aid navigational learning and memory consolidation. These findings in neuroscience have inspired new robot navigation models that emulate the learning process of mammals. This study presents a novel model that encodes path information using place cell connections formed during online navigation. Our model employs these connections to generate sequences of
state-action pairs to …


Biologically Inspired Multi-Robot System Based On Wolf Hunting Behavior, Zachary Hinnen, Chance Hamilton, Alfredo Weitzenfeld May 2023

Biologically Inspired Multi-Robot System Based On Wolf Hunting Behavior, Zachary Hinnen, Chance Hamilton, Alfredo Weitzenfeld

36th Florida Conference on Recent Advances in Robotics

Studies involving the group predator behavior of wolves have inspired multiple robotic architectures to mimic these biological behaviors in their designs and research. In this work, we aim to use robotic systems to mimic wolf packs' single and group behavior. This work aims to extend the original research by Weitzenfeld et al [7] and evaluate under a new multi-robot robot system architecture. The multiple robot architecture includes a 'Prey' pursued by a wolf pack consisting of an 'Alpha' and 'Beta' robotic group. The Alpha Wolf' will be the group leader, searching and tracking the 'Prey.' At the same time, the …


Programming By Demonstration Using Learning Based Approach: A Mini Review, Atul Acharya, Rajiv Dubey, Redwan Alqasemi May 2023

Programming By Demonstration Using Learning Based Approach: A Mini Review, Atul Acharya, Rajiv Dubey, Redwan Alqasemi

36th Florida Conference on Recent Advances in Robotics

Wheelchair-mounted robotic arms are used in rehabilitation robotics to help physically impaired people perform ADL (Activity of daily living) tasks. However, the dexterity of manipulation tasks makes the teleoperation of the robotic arm challenging for the user, as it is difficult to control all degrees of freedom with a handheld joystick or a screen touch device. PbD (Programming by demonstration) allows the user to demonstrate the desired behavior and enables the system to learn from the demonstrations and adapt to a new environment. This learned model can perform a new set of actions in a new environment. Learning from a …


College Of Business Prospective Students Application, Caden Bewley, Joseph Morton, Brayden Reddin, Marvin Martinez, Ashlyn Ward Apr 2023

College Of Business Prospective Students Application, Caden Bewley, Joseph Morton, Brayden Reddin, Marvin Martinez, Ashlyn Ward

ATU Research Symposium

The College of Business wanted a webpage that makes applying to one of their majors more user-friendly. Currently, incoming freshmen tend to choose the wrong major as the application process can be confusing. They needed to reduce the redundancy of inputting information, so they asked for the application on their webpage to auto-fill on Arkansas Tech University's application webpage.


Graduate Faculty Directory, Christopher Andrews, Cody Mckenney, Drake Traylor, Joseph Freeman Apr 2023

Graduate Faculty Directory, Christopher Andrews, Cody Mckenney, Drake Traylor, Joseph Freeman

ATU Research Symposium

The Graduate College would like to update the current faculty search page to filter search results by Department and Research in addition to Name. With the current system, a person who wanted to find an unknown professor based upon a department or an interest in research topic would be unable to search because the only option is to type the professor's name. We have created a website linked to a database containing graduate faculty that is able to search by name, filter by department, and search through the professors' listed research topics. This website will be much more useful and …


Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild Apr 2023

Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild

Symposium of Student Scholars

The research project aims to find ways to detect malicious packets inside encrypted network traffic. In addition to this goal maintaining user privacy is a priority. As encryption has become less expensive to implement more and more network traffic is encrypted. Currently, 90% of all network traffic is encrypted, and this trend is expected to increase. The creators of malware areemploying various methods to ensure delivery of their malware, including encryption. One proposed method to combat this suggests implementing machine learning with various algorithms to analyze packet attributes to determine if they contain malware, without actually knowing what's inside …


Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas Apr 2023

Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas

Symposium of Student Scholars

Ransomware is classified as one of the main types of malware and involves the design of exploitations of new vulnerabilities through a host. That allows for the intrusion of systems and encrypting of any information assets and data in order to demand a sum of payment normally through untraceable cryptocurrencies such as Monero for the decryption key. This rapid security threat has put governments and private enterprises on high alert and despite evolving technologies and more sophisticated encryption algorithms critical assets are being held for ransom and the results are detrimental, including the recent Colonial Pipeline ransomware attack in 2021 …


A Study Of Iot-Optimized Low Power Asset Tracking With Cloud-Enabled Lorawan, Fatima Salman Apr 2023

A Study Of Iot-Optimized Low Power Asset Tracking With Cloud-Enabled Lorawan, Fatima Salman

Symposium of Student Scholars

The world of technology is expanding very quickly today, including technologies like cloud-based asset monitoring, but this makes it difficult to keep up with this technology's development and many other things. It is possible to monitor and manage your assets remotely with a cloud-based system thanks to its many features. The lifecycle of any commodity, including inventory, machinery, vehicles, and real estate, can be tracked using this kind of cloud-based system. Wide-area networks can be used to send data with the aid of low-power wide-area network (LPWAN) technologies like LoRa, SigFox, and NB-IoT. This project will examine traditional, cloud-based, LPWAN-based …


Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers Apr 2023

Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers

Cybersecurity Undergraduate Research Showcase

This research paper answers the question, “What is Ransomware, and How to prevent it?”. This paper will discuss what ransomware is, its history about ransomware, how ransomware attacks Windows systems, how to prevent ransomware, how to handle ransomware once it is already on the network, ideas for training professionals to avoid ransomware, and how anti-virus helps defend against ransomware. Many different articles, case studies, and professional blogs will be used to complete the research on this topic.