Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 61 - 90 of 1166

Full-Text Articles in Computer Engineering

Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng Apr 2023

Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng

Cybersecurity Undergraduate Research Showcase

Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.

MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …


The Rise And Risks Of Internet Of Things, Diamond E. Hicks Mar 2023

The Rise And Risks Of Internet Of Things, Diamond E. Hicks

Cybersecurity Undergraduate Research Showcase

Internet of Things (IoT) has become a necessary part of our everyday lives. IoT is the network in which many different devices communicate, connect, and share data. Though how IoT got to where it is today, the issues it faced, and how it affects our lives today is not common knowledge. Despite the fact that IoT has advanced our technology to what it is today, people do not completely understand what it does.


Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden Jan 2023

Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden

National Training Aircraft Symposium (NTAS)

An increased availability of data and computing power has allowed organizations to apply machine learning techniques to various fleet monitoring activities. Additionally, our ability to acquire aircraft data has increased due to the miniaturization of small form factor computing machines. Aircraft data collection processes contain many data features in the form of multivariate time-series (continuous, discrete, categorical, etc.) which can be used to train machine learning models. Yet, three major challenges still face many flight organizations 1) integration and automation of data collection frameworks, 2) data cleanup and preparation, and 3) embedded machine learning framework. Data cleanup and preparation has …


"Semiclassical Mastermind", Curtis Bair, Alexa S. Cunningham, Joshua Qualls Jan 2023

"Semiclassical Mastermind", Curtis Bair, Alexa S. Cunningham, Joshua Qualls

Posters-at-the-Capitol

Games are often used in the classroom to teach mathematical and physical concepts. Yet the available activities used to introduce quantum mechanics are often overwhelming even to upper-level students. Further, the "games" in question range in focus and complexity from superficial introductions to games where quantum strategies result in decidedly nonclassical advantages, making it nearly impossible for people interested in quantum mechanics to have a simple introduction to the topic. In this talk, we introduce a straightforward and newly developed "Semiclassical Mastermind" based on the original version of mastermind but replace the colored pegs with 6 possible qubits (x+, x-, …


Disaster Area Lora Mesh Communications, Joel Bulkley Jan 2023

Disaster Area Lora Mesh Communications, Joel Bulkley

Posters-at-the-Capitol

In the aftermath of the December 2021 tornado disaster that swept through Western Kentucky causing 57 fatalities, 500+ critical injuries, and millions of dollars’ worth in damages, one of the first things that became apparent was the lack of communications and underlying power infrastructure. The goal of this project is to create a highly resilient LoRa mesh communications network utilizing low power, low cost, and easy to deploy radios to enable first responders in a disaster area to communicate their location and send critical information in a situation where traditional communications infrastructure has been destroyed or is otherwise unavailable. Through …


Gesture-Based American Sign Language (Asl) Translation System, Kayleigh Moore, Stefano Pecile, Mahdi Yazdanpour Jan 2023

Gesture-Based American Sign Language (Asl) Translation System, Kayleigh Moore, Stefano Pecile, Mahdi Yazdanpour

Posters-at-the-Capitol

According to the World Health Organization (WHO), over 5% of the world's population experiences severe hearing loss. Approximately 9 million people in the U.S. are either functionally deaf or have mild-to-severe hearing loss. In this research, we designed and implemented a translation interface which turns American Sign Language (ASL) gestures captured from a pair of soft robotic gloves into text and speech instantaneously.

We used a combination of flex sensors, tactile sensors, and accelerometers to recognize hand gestures and to record hand and fingers positions, movements, and orientations. The digitized captured gestures were then sent to our proposed translation interface …


Version Control Software And Its Possible Impact On Students Academic Integrity, David Mcquaid Jan 2023

Version Control Software And Its Possible Impact On Students Academic Integrity, David Mcquaid

HECA Research Conference

Ensuring that students treat their work with integrity has become increasingly difficult in recent years. The advent of Generative AI, Essay Mills, coupled with old fashioned plagiarism and a shift to “online” learning has created a huge shift in the domain of education. Unfortunately, this has manifested as Academic misconduct in many cases and indeed, it could be speculated, that many cases of misconduct are not recognised or discovered. This presentation discusses how version control can be used as a tool to avoid plagiarism.


Revised Avenues Of Assessment In Higher Education In The Presence Of Ai Generative Contents, Muhammad Iqbal Jan 2023

Revised Avenues Of Assessment In Higher Education In The Presence Of Ai Generative Contents, Muhammad Iqbal

HECA Research Conference

This study explores the impact of Generative Artificial Intelligence (AI) tools on academic assessments, focusing on their efficacy in generating unique content across various domains. Dr. Muhammad Iqbal from CCT College Dublin emphasizes the increasing prevalence of AI generative tools and their potential influence on learning quality in academia. The study addresses concerns related to assessment standards in higher education and proposes the evaluation of AI-generated content reliability.


Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes Jan 2023

Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes

Capstone Showcase

Our program collects vehicle data using an OBD-II device called Carloop that is plugged into the vehicle's diagnostic port. The device executes our code which then communicates with the vehicle's onboard computer to collect data such as engine RPM, vehicle speed, fuel level, and other diagnostic information. This data is then sent over WiFi to Particle’s Cloud, which is a platform for managing IoT devices.

Integrations set up on Particle take care of sending data to our InfluxDB Database, which is hosted on our own cloud-based machine. InfluxDB is a high-performance time-series database that is optimized for storing and querying …


A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan Dec 2022

A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan

Cybersecurity Undergraduate Research Showcase

Since the 1980’s and creation of the World Wide Web, Internet utilization is a common and arguably, necessary, part of daily life. The internet is young and still relatively new, but as of 2016, 3.4 billion people were online, and that number has since grown [1]. This is a significant number, but as such a common part of daily life, how elements of the internet or its infrastructure work is complex. The world would very likely be thrown into dark ages if DNS or any other significant aspect of the internet's infrastructure were to succumb to an attack. The Colonial …


Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer Dec 2022

Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer

Symposium of Student Scholars

When navigating in unknown and unstructured environments, Unmanned Arial Vehicles (UAVs) can struggle when attempting to preform Simultaneous Localization and Mapping (SLAM) operations. Particularly challenging circumstance arise when an UAV may need to land or otherwise navigate through treacherous environments. As the primary UAV may be too large and unwieldly to safely investigate in these types of situations, this research effort proposes the use of actively guided CanSats for assisting in localization and mapping of unstructured environments. A complex UAV could carry multiple of these SLAM capable CanSats, and when additional mapping and localization capabilities where required, the CanSat would …


Unmanned Aerial System Design For Civil Engineering Operations – A Vip Study, Ezra Robles, Harrison Vicknair, Derek Price, Logan Westra, George Pitcock, Joshua Diamond, Bhuvan Saraswat, Jeremiah Prayor, Fon Saliki Dec 2022

Unmanned Aerial System Design For Civil Engineering Operations – A Vip Study, Ezra Robles, Harrison Vicknair, Derek Price, Logan Westra, George Pitcock, Joshua Diamond, Bhuvan Saraswat, Jeremiah Prayor, Fon Saliki

Symposium of Student Scholars

Unmanned Aerial System Design for Civil Engineering Operations – A Case Study

The objective of the project is to design and build a modular Unmanned Aerial System (UAS) that meets the specifications set forth by United Consulting – a local civil engineering company. These specifications are achieved through three unique missions. In each mission, data is collected using different methods. These missions include land surveying, bridge structure inspection and manhole probing. The key requirements of the drone are to maintain a minimum flight time of 30 minutes and the ability to receive and transmit telemetry, photographic and video data from …


Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss Nov 2022

Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss

KSU Proceedings on Cybersecurity Education, Research and Practice

Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …


Autonomous Vehicle For Asphalt Laying, Gilberto Gonzalez Nov 2022

Autonomous Vehicle For Asphalt Laying, Gilberto Gonzalez

2022 MME Undergraduate Research Symposium

Autonomous vehicles are constantly being developed and are gaining recognition from many industries to improve workplace safety and efficiency. This project intends to weaken the barrier that prevents the usage of autonomous vehicles in the workplace. To move toward this objective, this project focuses on developing a computer vision system for an autonomous utility vehicle that lays asphalt. The goal of this project is to directly address the issue of the high number of potholes in our driving roads, which create a dangerous and hazardous environment for persons that utilize motorized and non-motorized vehicles on roads. The vehicle’s computer vision …


Searching For Oa Scholarly Content, Olga Koz Oct 2022

Searching For Oa Scholarly Content, Olga Koz

All Things Open

Academic search engines have become the number one resource to find scholarly resources. In contrast, search engines of academic databases, like Web of Science and Scopus, harvest research which is locked behind paywalls. Google Scholar and other academic search engines assist in finding open access content as well as the content of commercial databases. Dr. Olga Koz, Senior Research Support Librarian, will present academic search engines that enhance expert research on various academic subject matters.


Rural Broadband Usage: Analyzing Satisfaction And Internet Speed Within The Rural Digital Divide, Angela Hollman, Tim Obermier, Jesse Andrews Oct 2022

Rural Broadband Usage: Analyzing Satisfaction And Internet Speed Within The Rural Digital Divide, Angela Hollman, Tim Obermier, Jesse Andrews

Mountain Plains Business Conference

No abstract provided.


Using Design Science Research To Create A Virtual Environment For Nursing Students, Benjamin Botha, Lizette De Wet Aug 2022

Using Design Science Research To Create A Virtual Environment For Nursing Students, Benjamin Botha, Lizette De Wet

African Conference on Information Systems and Technology

This paper aims to provide insight into the design science research approach followed during a transdisciplinary research study between computer scientists and professional nurses. The researchers used a design science research approach to create a virtual environment where nursing students could practice managing a patient with a foreign object in the right lung. The virtual environment underwent multiple changes as it progressed through the different cycles of design science research. Within these cycles, namely the relevance, design, and rigor cycle, various iterations of each of the cycles took place. Presented in this paper the design science approach followed will be …


Introduction To Pub/Sub Systems Using Opcua, Mete Isiksalan Aug 2022

Introduction To Pub/Sub Systems Using Opcua, Mete Isiksalan

Undergraduate Student Research Internships Conference

The purpose of the project was to learn and implement the fundamental basics of OPCUA system architecture using pub/sub systems. The system allows the users to create multiple different publishers and subscribers while accessing data from a local server and a primary HTTP server. The system is designed to be a multi-client and multi-server system to simulate real-life scenarios while having two different sources of generated values to send via sockets in OPCUA protocols, multiple different APIs were used for the clients on how they retrieve data as well.


Autonomous Navigator Mobile Robot Upgrade, David Sansoucy Apr 2022

Autonomous Navigator Mobile Robot Upgrade, David Sansoucy

Thinking Matters Symposium

The mobile robot platform has been developed over the course of 10 years at USM. In Spring 2020, Belle-Isle and Werner updated the previous framework by rewriting the software to use the ROS framework running on an on-board Raspberry Pi 3. They also implemented navigation using an A* motion planning algorithm and image processing. In Summer 2021, Ames incorporated Lidar and Kinect sensors onto the robot to improve its real-time navigation capabilities. He also made improvements to the power distribution systems. This project aimed to build on the ROS frameworks developed by the previous 2 teams with the main goal …


A Low-Cost, Arduino-Based Platform For Emulating Energy Harvesting In Wireless Sensor Networks, Braden A. Miller Apr 2022

A Low-Cost, Arduino-Based Platform For Emulating Energy Harvesting In Wireless Sensor Networks, Braden A. Miller

ONU Student Research Colloquium

This paper presents an Arduino-based platform for emulating energy harvesting in Wireless Sensor Networks (WSNs) as a form of hardware-in-the-loop simulation. The platform makes use of a battery monitoring circuit and code implemented on the Arduino as an alternative to using significantly more expensive fully equipped energy harvesting nodes. Using embedded code to emulate the energy harvesting process allows for various energy harvesting models and processes to be tested using the same platform. The main contributions of this paper are the experimental data and analyses demonstrating the energy use characterization of the Arduino-based platform in a three-node relay network using …


Combat Robot, Wayne Lambert, Elijah Harris, Brian Eiseman, Jordan Meyer Apr 2022

Combat Robot, Wayne Lambert, Elijah Harris, Brian Eiseman, Jordan Meyer

ONU Student Research Colloquium

The senior capstone project that was tasked to the team was the decision of choosing a challenge within a national robotics competition. The group decided to compete at the National Robotics Challenge in Marion, Ohio. The idea was to participate in the combat robot competition at this NRC event. Once this decision had been made the next steps were to get an idea of what the rules and requirements of the competition were and to try and to sketch a very rough drawing of what the ideal robot should look like. From there it was decided to start a timeline …


Introducing Normal Forms To Students: A Comparison Of Theory-First Vs. Project-First Educational Approaches, Dakota C. Cookenmaster, Jacob A. Bahn Apr 2022

Introducing Normal Forms To Students: A Comparison Of Theory-First Vs. Project-First Educational Approaches, Dakota C. Cookenmaster, Jacob A. Bahn

Campus Research Day

One of the primary challenges instructors face when educating scientists and engineers is the introduction of important theory, both to show its essential nature in research as well as its practicality. This paper analyzes two pedagogical methods for the instruction of database normal forms. The first of these methods is a theory-based approach that relies on written works and practices to introduce the concept. The second of these focuses on a project-based approach which aligns with normal form standards as students implement a database schema. This paper compares these in a small study and advises an appropriate method for educators.


Development Of A Compliant Gripper Driven By 3 Dof Soft Robot, Derek M. Price Ii, Ricardo Ramirez, Pt Angel Tran Apr 2022

Development Of A Compliant Gripper Driven By 3 Dof Soft Robot, Derek M. Price Ii, Ricardo Ramirez, Pt Angel Tran

Symposium of Student Scholars

Industrial robots are moving toward automation, which makes it increasingly necessary to replace the functions traditionally performed by humans with robotics. Pick and place operation is a prime example of such automation. Robots that pick up and place objects mimic the human action of picking an object up and placing it in a targeted location. It has led to the development of robotic end-effectors that have a human-like feel. Grippers can be articulated in various ways depending on their application area and well-defined desired tasks. As compliant and soft links deflect more under the same load than their rigid body …


Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore Apr 2022

Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore

Symposium of Student Scholars

Climate change is happening, and many countries are already facing devastating consequences. Populations worldwide are adapting to the season's unpredictability they relay to lands for agriculture. Our first research was to develop an IoT Clusters Platform for Data Collection, analysis, and visualization. The platform comprises hardware parts with Raspberry Pi and Arduino's clusters connected to multiple sensors. The clusters transmit data collected in real-time to microservices-based servers where the data can be accessed and processed. Our objectives in developing this platform were to create an efficient data collection system, relatively cheap to implement and easy to deploy in any part …


Analysis Of The Internal Delays Of Various Wireless Technologies For Autonomous Vehicle Applications, Luanne Seaman Apr 2022

Analysis Of The Internal Delays Of Various Wireless Technologies For Autonomous Vehicle Applications, Luanne Seaman

Symposium of Student Scholars

Analysis of the Internal Delays of Various Wireless Technologies for Autonomous Vehicle Applications

Poster Presentation Undergraduate Student: Luanne Seaman

Research Mentor: Dr. Billy Kihei

Autonomous vehicles use VANETs (vehicular ad-hoc networks) to communicate with the world around them. Despite the simple premise, VANETs rely on a variety of wireless technologies depending on range, internal delay, urgency of information, and other factors. Therefore, VANET algorithms will need to weigh these elements accordingly. Through this research, I hope to contribute reliable measurements of internal delay to reduce the algorithms’ complexity. To calculate internal delay, I connected two Arduinos to a STM32 Nucleo …


Rapid Development Of Advanced Virtual Labs For In-Person And Online Education, Yiyang Li, Pauline Delacruz, Yuzhong Shen Apr 2022

Rapid Development Of Advanced Virtual Labs For In-Person And Online Education, Yiyang Li, Pauline Delacruz, Yuzhong Shen

Modeling, Simulation and Visualization Student Capstone Conference

This abstract discusses methodologies and preliminary findings on rapid development of advanced virtual labs using modeling and simulation for in-person and online education, including rapid generation of virtual environment, integration of state-of-the-art industry leading software tools, advanced software design techniques that enables large scale software reuse, and innovative user interface design that facilitate the configuration and use of virtual labs by instructors and students. The latest design and development of the virtual lab for electronic circuits is presented.


Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu Apr 2022

Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu

Modeling, Simulation and Visualization Student Capstone Conference

The Data-Enabled Advanced Training Program for Cybersecurity Research and Education (DeapSECURE) was introduced in 2018 as a non-degree training consisting of six modules covering a broad range of cyberinfrastructure techniques, including high performance computing, big data, machine learning and advanced cryptography, aimed at reducing the gap between current cybersecurity curricula and requirements needed for advanced research and industrial projects. By its third year, DeapSECURE, like many other educational endeavors, experienced abrupt changes brought by the COVID-19 pandemic. The training had to be retooled to adapt to fully online delivery. Hands-on activities were reformatted to accommodate self-paced learning. In this paper, …


Putin And Putnam: Interpreting Russian Military Activity Through A Three Player, Two-Level Game, Nathan M. Colvin Apr 2022

Putin And Putnam: Interpreting Russian Military Activity Through A Three Player, Two-Level Game, Nathan M. Colvin

Modeling, Simulation and Visualization Student Capstone Conference

Is Vladimir Putin a bad strategist, perhaps irrational? Previous military activity by Russia, such as the annexation of Crimea of 2014, yielded limited international gains, at a significant economic and reputational cost. Yet as the 2022 invasion of Ukraine shows, Putin is willing to commit military power, despite the cost of sanctions and other possible retaliation. This three-player simultaneous game, originally created in June, 2021, demonstrates how domestic and international considerations of President Vladimir Putin might lead to otherwise unpredictable Russian military behavior. In this extended version of Robert Putnam’s “two-level game,” President Putin rationally uses the international venue as …


Multi-Modality Breast Mri Segmentation Using Nn-Unet For Preoperative Planning Of Robotic Surgery Navigation, Motaz Alqaoud, John Plemmons Md, Eric Feliberti Md, Facs, Krishnanand Kaipa, Siqin Dong, Gabor Fichtinger, Yimming Xiao, Michel Audette Apr 2022

Multi-Modality Breast Mri Segmentation Using Nn-Unet For Preoperative Planning Of Robotic Surgery Navigation, Motaz Alqaoud, John Plemmons Md, Eric Feliberti Md, Facs, Krishnanand Kaipa, Siqin Dong, Gabor Fichtinger, Yimming Xiao, Michel Audette

Modeling, Simulation and Visualization Student Capstone Conference

Segmentation of the chest region and breast tissues is essential for surgery planning and navigation. This paper proposes the foundation for preoperative segmentation based on two cascaded architectures of deep neural networks (DNN) based on the state-of-the-art nnU-Net. Additionally, this study introduces a polyvinyl alcohol cryogel (PVA-C) breast phantom based on the segmentation of the DNN automated approach, enabling the experiments of navigation system for robotic breast surgery. Multi-modality breast MRI datasets of T2W and STIR images were acquired from 10 patients. Segmentation evaluation utilized the Dice Similarity Coefficient (DSC), segmentation accuracy, sensitivity, and specificity. First, a single class labeling …


Real-Time External Labeling For Interactive Visualization In Virtual Environments, Shan Liu, Yuzhong Shen Apr 2022

Real-Time External Labeling For Interactive Visualization In Virtual Environments, Shan Liu, Yuzhong Shen

Modeling, Simulation and Visualization Student Capstone Conference

A real-time external labeling algorithm has been developed to explore the potential for applying annotation and visualization to virtual reality environments, which manages label placement in the projections of virtual 3D models on the view plane. The approach intends to place labels with visual constraints, such as no overlapping, intersections, and occlusions, close proximity to the model parts, by adjusting external annotations' positions concerning available space in the view plane. This algorithm is based on the projected model's contour and adapts to camera viewpoint changes within interactive frame rates. It solves the visibility problem of annotations and operates in real-time …