Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (18)
- Computer Sciences (17)
- Social and Behavioral Sciences (10)
- Artificial Intelligence and Robotics (9)
- Computer and Systems Architecture (9)
-
- Digital Communications and Networking (9)
- Robotics (9)
- Electrical and Computer Engineering (5)
- Other Computer Engineering (5)
- Data Science (4)
- Education (4)
- Hardware Systems (4)
- Information Security (4)
- Data Storage Systems (3)
- Mechanical Engineering (3)
- Sociology (3)
- Theory and Algorithms (3)
- Art and Design (2)
- Arts and Humanities (2)
- Biomedical Devices and Instrumentation (2)
- Biomedical Engineering and Bioengineering (2)
- Communication (2)
- Computational Engineering (2)
- Digital Circuits (2)
- Educational Technology (2)
- Emergency and Disaster Management (2)
- Game Design (2)
- Geography (2)
- Institution
-
- Old Dominion University (18)
- Kennesaw State University (9)
- University of South Florida (7)
- Murray State University (3)
- Arkansas Tech University (2)
-
- CCT College Dublin (2)
- Clemson University (2)
- Purdue University (2)
- Arcadia University (1)
- Eastern Washington University (1)
- Embry-Riddle Aeronautical University (1)
- Harrisburg University of Science and Technology (1)
- LSU Health Science Center (1)
- Southern Adventist University (1)
- University of Tennessee at Chattanooga (1)
- Keyword
-
- Machine learning (2)
- Virtual environment (2)
- ADL (1)
- AI (1)
- Academic integrity (1)
-
- Actor-Critic (1)
- Analytical data architecture (1)
- Android application (1)
- Assessment strategies (1)
- Assistive Robotics (1)
- Assistive Technologies (1)
- Coffee (1)
- Computer Vision (1)
- Damage assessment (1)
- Data dependencies (1)
- Deep Learning (1)
- Education (1)
- Embedded System (1)
- Espresso (1)
- Event graphs (1)
- Fleet management (1)
- Flight data (1)
- Frustration (1)
- GPU utilization (1)
- Game design (1)
- Game-based learning (1)
- Grasping; Dexterous Manipulation; In-Hand Manipulation (1)
- Higher education (1)
- Hippocampal Replay (1)
- Industrial and organizational psychology (1)
- Publication
-
- Modeling, Simulation and Visualization Student Capstone Conference (10)
- Cybersecurity Undergraduate Research Showcase (8)
- 36th Florida Conference on Recent Advances in Robotics (7)
- Symposium of Student Scholars (5)
- African Conference on Information Systems and Technology (4)
-
- Posters-at-the-Capitol (3)
- ATU Research Symposium (2)
- HECA Research Conference (2)
- I-GUIDE Forum (2)
- Workshop on Data for AI in Network Systems (2)
- 2023 Symposium (1)
- Campus Research Day (1)
- Capstone Showcase (1)
- Harrisburg University Research Symposium: Highlighting Research, Innovation, & Creativity (1)
- LSU Health New Orleans Symposium Series on Artificial Intelligence (1)
- National Training Aircraft Symposium (NTAS) (1)
- River Cities Industrial and Organizational Psychology Conference (1)
- File Type
Articles 1 - 30 of 52
Full-Text Articles in Computer Engineering
Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson
Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson
Cybersecurity Undergraduate Research Showcase
For this research project I used a Raspberry Pi device and conducted online research to investigate potential security vulnerabilities along with mitigation strategies. I configured the Raspberry Pi by using the proper peripherals such as an HDMI cord, a microUSB adapter that provided 5V and at least 700mA of current, a TV monitor, PiSwitch, SD Card, keyboard, and mouse. I installed the Rasbian operating system (OS). The process to install the Rasbian took about 10 minutes to boot starting at 21:08 on 10/27/2023 and ending at 21:18. 1,513 megabytes (MB) was written to the SD card running at (2.5 MB/sec). …
Integrating Ai Into Uavs, Huong Quach
Integrating Ai Into Uavs, Huong Quach
Cybersecurity Undergraduate Research Showcase
This research project explores the application of Deep Learning (DL) techniques, specifically Convolutional Neural Networks (CNNs), to develop a smoke detection algorithm for deployment on mobile platforms, such as drones and self-driving vehicles. The project focuses on enhancing the decision-making capabilities of these platforms in emergency response situations. The methodology involves three phases: algorithm development, algorithm implementation, and testing and optimization. The developed CNN model, based on ResNet50 architecture, is trained on a dataset of fire, smoke, and neutral images obtained from the web. The algorithm is implemented on the Jetson Nano platform to provide responsive support for first responders. …
Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins
Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins
Cybersecurity Undergraduate Research Showcase
This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.
Blockchain And Ethereum Vulnerabilities, Daniel Chen
Blockchain And Ethereum Vulnerabilities, Daniel Chen
Symposium of Student Scholars
Blockchain and Ethereum (ETH) technology stands poised to revolutionize the digital world, offering unprecedented decentralization, transparency, and immutability of data across various industries; however, new technologies raise new security concerns. By overcoming key vulnerabilities in ETH, it allows a multitude of groundbreaking technologies such as Web3, Decentralized Finance (DeFi), Decentralized Apps (dApps), Non-Fungible Tokens (NFTs), and cryptocurrency wallets to become commonplace. This revolutionary crypto-dependent future of the internet relies on finding solutions to security vulnerabilities. We aim to pinpoint key security flaws and develop robust smart contract solutions within the Ethereum blockchain to enable the widespread adoption of Blockchain technology.
Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan
Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan
Symposium of Student Scholars
"KWAD" or "KSU all-Weather Autonomous Drone" project was sponsored by Ultool, LLC to the KSU Research and Service Foundation to create a lightweight drone capable of capturing HD video during all-weather operations. The conditions of all-weather operation include rainfall of one inch per hour and wind speeds of up to twenty miles per hour. In addition, a global minimum structural safety factor of two is required to ensure the system's integrity in extreme weather conditions. Potential mission profiles include autonomous aerial delivery, topological mapping in high moisture areas, security surveillance, search and rescue operations, emergency transportation of medical supplies, and …
Large Language Model Use Cases For Instruction, Plus A Primer On Prompt Engineering, Roy Haggerty, Justin Cochran
Large Language Model Use Cases For Instruction, Plus A Primer On Prompt Engineering, Roy Haggerty, Justin Cochran
LSU Health New Orleans Symposium Series on Artificial Intelligence
AMA Credit Designation Statement: The Louisiana State University School of Medicine, New Orleans designates this live activity for a maximum of 1.0 AMA PRA Category 1 Credit™. Physicians should claim only the credit commensurate with the extent of their participation in the activity.
NCPD Credit Designation Statement: Nursing participants may earn 1.0 NCPD contact hours. Each nursing participant must be present for the entire session for which NCPD contact hours are requested and must complete an evaluation of the session to receive credit.
The Intersection Of Ai And Employment, Sachit Kamat
The Intersection Of Ai And Employment, Sachit Kamat
River Cities Industrial and Organizational Psychology Conference
Artificial Intelligence (AI) is rapidly transforming every industry. This session will focus on the practical applications of AI within employment hiring and succession strategies, enabling organizations to automate processes, improve efficiency, and uncover data-driven insights for enhanced decision making. We will discuss advancements using AI in the recruitment process, including the use of machine learning algorithms to screen resumes and identify successful candidates. The talk will highlight the regulatory environment and the intersection of the IO and AI fields within this rapidly evolving landscape. Additionally, the presentation will explore where AI is being used to improve organizational retention and performance. …
Data For Ai In Network Systems Workshop Report, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Data For Ai In Network Systems Workshop Report, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Workshop on Data for AI in Network Systems
No abstract provided.
Workshop On Data For Ai In Network Systems - Event Summary, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Workshop On Data For Ai In Network Systems - Event Summary, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Workshop on Data for AI in Network Systems
No abstract provided.
Studazon, Gage Stevens, Michelle Thoi, Umangkumar Patel, Gavin Minney
Studazon, Gage Stevens, Michelle Thoi, Umangkumar Patel, Gavin Minney
Harrisburg University Research Symposium: Highlighting Research, Innovation, & Creativity
Studazon is a book listing for students to list textbooks they no longer need. Studazon acts as an advertising site to help connect students who have textbooks with students who need those textbooks.
Towards Carbon-Aware Spatial Computing: Challenges And Opportunities, Bharat Jayaprakash, Matthew Eagon, Mingzhou Yang, William F. Northrop, Shashi Shekhar
Towards Carbon-Aware Spatial Computing: Challenges And Opportunities, Bharat Jayaprakash, Matthew Eagon, Mingzhou Yang, William F. Northrop, Shashi Shekhar
I-GUIDE Forum
Carbon-aware spatial computing (CASC) is focused on reducing the carbon footprint of spatial computing itself and leveraging spatial computing techniques to minimize carbon emissions in other domains. The significance of CASC lies in its potential to mitigate anthropogenic climate change by offering numerous societal applications, such as carbon-aware supply chain development and carbon-aware site selection. CASC is challenging because of the spatiotemporal variability and the high dimensionality of carbon emissions data, involving spatial coordinates and timestamps. Related work, known as carbon-aware computing, mostly focuses on job scheduling of cloud computing, and there is a lack of surveys and review papers …
Streamlined Hpc Environments With Cvmfs And Cybergis-Compute, Alexander C. Michels, Mit Kotak, Anand Padmanabhan, Shaowen Wang
Streamlined Hpc Environments With Cvmfs And Cybergis-Compute, Alexander C. Michels, Mit Kotak, Anand Padmanabhan, Shaowen Wang
I-GUIDE Forum
High-Performance Computing (HPC) resources provide the potential for complex, large-scale modeling and analysis, fueling scientific progress over the last few decades, but these advances are not equally distributed across disciplines. Those in computational disciplines are often trained to have the necessary technical skills to utilize HPC (e.g. familiarity with the terminal), but many disciplines face technical hurdles when trying to apply HPC resources to their work. This unequal familiarity with HPC is increasingly a problem as cross-discipline teams work to tackle critical interdisciplinary issues like climate change and sustainability. CyberGIS-Compute is middle-ware designed to democratize to HPC services with the …
A Social Profile-Based E-Learning Model, Xola Ntlangula
A Social Profile-Based E-Learning Model, Xola Ntlangula
African Conference on Information Systems and Technology
Many High Education Institutions (HEIs) have migrated to blended or complete online learning to cater for less interruption with learning. As such, there is a growing demand for personalized e-learning to accommodate the diversity of students' needs. Personalization can be achieved using recommendation systems powered by artificial intelligence. Although using student data to personalize learning is not a new concept, collecting and identifying appropriate data is necessary to determine the best recommendations for students. By reviewing the existing data collection capabilities of the e-learning platforms deployed by public universities in South Africa, we were able to establish the readiness of …
Experiences Of African Women In Stem Careers: A Systematic Literature Review., Kaluwa Siwale, Gwamaka Mwalemba, Ulrike Rivett
Experiences Of African Women In Stem Careers: A Systematic Literature Review., Kaluwa Siwale, Gwamaka Mwalemba, Ulrike Rivett
African Conference on Information Systems and Technology
The discourse on women's underrepresentation in science, technology, engineering, and mathematics (STEM) mainly centres on the global north, leaving a gap in understanding the perspectives of African women in STEM. To address this, a systematic literature review was conducted to explore African women's experiences in STEM careers and education. After applying inclusion and criteria, 18 published articles were analysed. 8 key issues emerge: work environment, education system, work-life balance, gender-based stereotypes, racial bias, sexual harassment, inadequate support/mentorship, and self-imposed limits. These themes intertwine, with some aspects influencing others. Grasping the complexities and interactions of these factors provides insights into challenges …
E-Wild Life Alert: Tackling The Human-Wildlife Conflict Problem, Eliel Kundai Zhuwankinyu, Sibonile Moyo, Catherine Chivasa, Smart Ncube
E-Wild Life Alert: Tackling The Human-Wildlife Conflict Problem, Eliel Kundai Zhuwankinyu, Sibonile Moyo, Catherine Chivasa, Smart Ncube
African Conference on Information Systems and Technology
Depletion of resources meant for both human and animal survival leads to competition for these. Human-wildlife conflict (HWC) occurs when these two parties compete for resources such as space, water, and food. If not properly managed, HWC can lead to loss of livelihoods and even loss of life. This paper discusses the design and development of an E-Wildlife Alert application that uses machine learning to detect dangerous animals. Using the Design Science Research method, a convolutional neural network is trained to build an artifact that detects five dangerous animals from an African context. The artifact is mounted on a robot …
A Customized Artificial Intelligence Based Career Choice Recommender System For A Rural University, Nosipho Carol Mavuso, Nobert Jere, Darelle Vangreunen
A Customized Artificial Intelligence Based Career Choice Recommender System For A Rural University, Nosipho Carol Mavuso, Nobert Jere, Darelle Vangreunen
African Conference on Information Systems and Technology
Rapid technological developments have enabled users to be supported and guided in decision-making. An example of this is the ability of tertiary students to use technology to explore different career options and make informed decisions about their future. Notwithstanding the increasing use of technology in general, the technology for career guidance and personalized career recommendations in South Africa is still limited. There are some limiting factors such as the ever-looming challenge of limited access to technology, language barriers and cultural differences that are prevalent in rural areas. With this premise, this study collected quantitative data from students at an Eastern …
Using An Embedded System For A Quality Cup Of Coffee, Evan Powers, Joshua Stermer, Tsion Yohannes
Using An Embedded System For A Quality Cup Of Coffee, Evan Powers, Joshua Stermer, Tsion Yohannes
2023 Symposium
Many coffee lovers spend up to $5 on a cup of coffee everyday. To save money one could make them at home, but a quality machine with PIDs start at $1000. Using an embedded system one could spend less than $50 and a few hours implement PIDs into an existing $400 machine that will last a lifetime. microcontroller. Learning C language combined with hardware implementation applied to cheap and simple everyday objects can improve everyday quality of life and save money.
This is challenging because we have to incorporate the additional circuitry into a pre established circuit with limited space, …
Robot Learning To Pour Solid Objects Accurately, Juan Wilches, Yu Sun
Robot Learning To Pour Solid Objects Accurately, Juan Wilches, Yu Sun
36th Florida Conference on Recent Advances in Robotics
Pouring is an efficient way to transfer objects from
one container to another. This abstract summarizes a method
to accurately pour solid objects, such as ice cubes. It leverages
visual and proprioceptive feedback together with contextual
information to control the forward and backward rotation of the
pouring container. These feedback signals are fed to a recurrent
neural network that produces the control signal. The proposed
approach can achieve a human-like pouring accuracy in both a
simulation and a real setup.
Multi-Object Grasping -- Stochastic Grasping From A Pile, Tianze Chen, Adheesh Shenoy, Yu Sun
Multi-Object Grasping -- Stochastic Grasping From A Pile, Tianze Chen, Adheesh Shenoy, Yu Sun
36th Florida Conference on Recent Advances in Robotics
Grasping multiple objects at once from a pile is common for humans. It makes us efficient in pick and transfer tasks. It is essential for a robot to gain multi-object grasping capability (MOG). This paper defines the multi-object grasping problem and introduces several novel multi-object grasping techniques. These techniques include probability-based pre-grasp potential calculation, a stochastic flexing/extending routine, obtaining end-grasp types, and estimating the number of objects in a grasp. It also proposes a new stochastic grasping strategy for grasping a desired number of objects.
Live Audiovisual Remote Assistance System (Laras) For Person With Visual Impairments, Zachary Frey, Nghia Vo, Varaha Maithreya, Tais Mota, Urvish Trivedi, Redwan Alqasemi, Rajiv Dubey
Live Audiovisual Remote Assistance System (Laras) For Person With Visual Impairments, Zachary Frey, Nghia Vo, Varaha Maithreya, Tais Mota, Urvish Trivedi, Redwan Alqasemi, Rajiv Dubey
36th Florida Conference on Recent Advances in Robotics
According to "The World Report on Vision" by World Health Organization (WHO) [1], there are more than 2.2 billion people who have near or distant vision Impairments, out of which 36 million people are classified as entirely blind. This report also emphasizes the importance of social and communal support in enabling individuals with vision impairments to integrate into society and reach their full potential. While performing daily activities and navigating the environment, people with visual impairments (PVIs) often require direct or synchronous assistance [2]. Consequently, there is a growing need for automated solutions to assist in this regard. However, existing …
Assistive Robotic Platform For Non‐Urgent Household Tasks: A New Design, Amanda Serger, Normandy Tanguilan, Hakki Erhan Sevil
Assistive Robotic Platform For Non‐Urgent Household Tasks: A New Design, Amanda Serger, Normandy Tanguilan, Hakki Erhan Sevil
36th Florida Conference on Recent Advances in Robotics
Humans overcome minor household inconveniences daily without fully recognizing how challenging these tasks could be for individuals such as elderly people or people with disabilities. Those people often times struggle to complete tasks, for instance opening a door or reaching for an item, leading them to rely on caregivers for help. During the COVID-19 pandemic, this caregiver support becomes an unsafe and unreliable solution that can result in a greater risk, thus the need for another solution arises: robotic technology. Recent developments in the robotics field have paved the way for this research, aiming to design a home assistance robot …
Reinforcement Learning And Place Cell Replay In Spatial Navigation, Chance Hamilton, Pablo Scleidorovich Phd, Alfredo Weitzenfeld Phd
Reinforcement Learning And Place Cell Replay In Spatial Navigation, Chance Hamilton, Pablo Scleidorovich Phd, Alfredo Weitzenfeld Phd
36th Florida Conference on Recent Advances in Robotics
In the last decade, studies have demonstrated that hippocampal place cells influence rats’ navigational learning ability. Moreover, researchers have observed that place cell sequences associated with routes leading to a reward are reactivated during rest periods. This phenomenon is known as Hippocampal Replay, which is thought to aid navigational learning and memory consolidation. These findings in neuroscience have inspired new robot navigation models that emulate the learning process of mammals. This study presents a novel model that encodes path information using place cell connections formed during online navigation. Our model employs these connections to generate sequences of
state-action pairs to …
Biologically Inspired Multi-Robot System Based On Wolf Hunting Behavior, Zachary Hinnen, Chance Hamilton, Alfredo Weitzenfeld
Biologically Inspired Multi-Robot System Based On Wolf Hunting Behavior, Zachary Hinnen, Chance Hamilton, Alfredo Weitzenfeld
36th Florida Conference on Recent Advances in Robotics
Studies involving the group predator behavior of wolves have inspired multiple robotic architectures to mimic these biological behaviors in their designs and research. In this work, we aim to use robotic systems to mimic wolf packs' single and group behavior. This work aims to extend the original research by Weitzenfeld et al [7] and evaluate under a new multi-robot robot system architecture. The multiple robot architecture includes a 'Prey' pursued by a wolf pack consisting of an 'Alpha' and 'Beta' robotic group. The Alpha Wolf' will be the group leader, searching and tracking the 'Prey.' At the same time, the …
Programming By Demonstration Using Learning Based Approach: A Mini Review, Atul Acharya, Rajiv Dubey, Redwan Alqasemi
Programming By Demonstration Using Learning Based Approach: A Mini Review, Atul Acharya, Rajiv Dubey, Redwan Alqasemi
36th Florida Conference on Recent Advances in Robotics
Wheelchair-mounted robotic arms are used in rehabilitation robotics to help physically impaired people perform ADL (Activity of daily living) tasks. However, the dexterity of manipulation tasks makes the teleoperation of the robotic arm challenging for the user, as it is difficult to control all degrees of freedom with a handheld joystick or a screen touch device. PbD (Programming by demonstration) allows the user to demonstrate the desired behavior and enables the system to learn from the demonstrations and adapt to a new environment. This learned model can perform a new set of actions in a new environment. Learning from a …
College Of Business Prospective Students Application, Caden Bewley, Joseph Morton, Brayden Reddin, Marvin Martinez, Ashlyn Ward
College Of Business Prospective Students Application, Caden Bewley, Joseph Morton, Brayden Reddin, Marvin Martinez, Ashlyn Ward
ATU Research Symposium
The College of Business wanted a webpage that makes applying to one of their majors more user-friendly. Currently, incoming freshmen tend to choose the wrong major as the application process can be confusing. They needed to reduce the redundancy of inputting information, so they asked for the application on their webpage to auto-fill on Arkansas Tech University's application webpage.
Graduate Faculty Directory, Christopher Andrews, Cody Mckenney, Drake Traylor, Joseph Freeman
Graduate Faculty Directory, Christopher Andrews, Cody Mckenney, Drake Traylor, Joseph Freeman
ATU Research Symposium
The Graduate College would like to update the current faculty search page to filter search results by Department and Research in addition to Name. With the current system, a person who wanted to find an unknown professor based upon a department or an interest in research topic would be unable to search because the only option is to type the professor's name. We have created a website linked to a database containing graduate faculty that is able to search by name, filter by department, and search through the professors' listed research topics. This website will be much more useful and …
Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild
Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild
Symposium of Student Scholars
The research project aims to find ways to detect malicious packets inside encrypted network traffic. In addition to this goal maintaining user privacy is a priority. As encryption has become less expensive to implement more and more network traffic is encrypted. Currently, 90% of all network traffic is encrypted, and this trend is expected to increase. The creators of malware areemploying various methods to ensure delivery of their malware, including encryption. One proposed method to combat this suggests implementing machine learning with various algorithms to analyze packet attributes to determine if they contain malware, without actually knowing what's inside …
Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas
Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas
Symposium of Student Scholars
Ransomware is classified as one of the main types of malware and involves the design of exploitations of new vulnerabilities through a host. That allows for the intrusion of systems and encrypting of any information assets and data in order to demand a sum of payment normally through untraceable cryptocurrencies such as Monero for the decryption key. This rapid security threat has put governments and private enterprises on high alert and despite evolving technologies and more sophisticated encryption algorithms critical assets are being held for ransom and the results are detrimental, including the recent Colonial Pipeline ransomware attack in 2021 …
A Study Of Iot-Optimized Low Power Asset Tracking With Cloud-Enabled Lorawan, Fatima Salman
A Study Of Iot-Optimized Low Power Asset Tracking With Cloud-Enabled Lorawan, Fatima Salman
Symposium of Student Scholars
The world of technology is expanding very quickly today, including technologies like cloud-based asset monitoring, but this makes it difficult to keep up with this technology's development and many other things. It is possible to monitor and manage your assets remotely with a cloud-based system thanks to its many features. The lifecycle of any commodity, including inventory, machinery, vehicles, and real estate, can be tracked using this kind of cloud-based system. Wide-area networks can be used to send data with the aid of low-power wide-area network (LPWAN) technologies like LoRa, SigFox, and NB-IoT. This project will examine traditional, cloud-based, LPWAN-based …
Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers
Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers
Cybersecurity Undergraduate Research Showcase
This research paper answers the question, “What is Ransomware, and How to prevent it?”. This paper will discuss what ransomware is, its history about ransomware, how ransomware attacks Windows systems, how to prevent ransomware, how to handle ransomware once it is already on the network, ideas for training professionals to avoid ransomware, and how anti-virus helps defend against ransomware. Many different articles, case studies, and professional blogs will be used to complete the research on this topic.