Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 8075

Full-Text Articles in Computer Engineering

Simulating And Training Autonomous Rover Navigation In Unity Engine Using Local Sensor Data, Christopher Pace May 2024

Simulating And Training Autonomous Rover Navigation In Unity Engine Using Local Sensor Data, Christopher Pace

Senior Honors Theses

Autonomous navigation is essential to remotely operating mobile vehicles on Mars, as communication takes up to 20 minutes to travel between the Earth and Mars. Several autonomous navigation methods have been implemented in Mars rovers and other mobile robots, such as odometry or simultaneous localization and mapping (SLAM) until the past few years when deep reinforcement learning (DRL) emerged as a viable alternative. In this thesis, a simulation model for end-to-end DRL Mars rover autonomous navigation training was created using Unity Engine, using local inputs such as GNSS, LiDAR, and gyro. This model was then trained in navigation in a …


Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre Apr 2024

Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre

Whittier Scholars Program

The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.


2024 (Spring) Ensi Informer Magazine, Morehead State University. Engineering Sciences Department Apr 2024

2024 (Spring) Ensi Informer Magazine, Morehead State University. Engineering Sciences Department

ENSI Informer Magazine Archive

The ENSI Informer Magazine published in the spring of 2024.


First-Year Engineering Students And Genai: Experience, Attitudes, Trust, And Ethics., Elisabeth Thomas, Cenetria Crockett, Campbell Rightmyer Bego Apr 2024

First-Year Engineering Students And Genai: Experience, Attitudes, Trust, And Ethics., Elisabeth Thomas, Cenetria Crockett, Campbell Rightmyer Bego

Undergraduate Research Events

Generative AI (GenAI) has the potential to benefit student learning by offering personalized feedback, idea generation, research, and analysis support, writing aid, and administrative support (Chan and Hu, 2023; Zhang, 2023). However, if used inappropriately, the same tools can lead to false/biased content creation and reduced ethical awareness leading to possible academic dishonesty and privacy issues (Schwartz, 2016; Wu, 2023). At this early stage, ethical standards and professorial guidance are unavailable, so it is important to understand what students are thinking about the recent technologies (Shen et al., 2013). Spring 2023 survey results revealed that some students used ChatGPT, a …


Reducing Bias In Cyberbullying Detection With Advanced Llms And Transformer Models, Dahana Moz Ruiz, Annaliese Watson, Anjana Manikandan, Zachary Gordon Apr 2024

Reducing Bias In Cyberbullying Detection With Advanced Llms And Transformer Models, Dahana Moz Ruiz, Annaliese Watson, Anjana Manikandan, Zachary Gordon

Center for Cybersecurity

This paper delved into a comprehensive exploration of the inherent biases present in Large Language Models (LLMs) and various Transformer models, with a focus on their role in identifying and addressing instances of cyberbullying. The objective was to refine and enhance the accuracy and fairness of these models by mitigating the biases deeply ingrained in their structures. This was crucial because language models could inadvertently perpetuate and amplify existing biases present in the data they were trained on.


Comparing Anova And Powershap Feature Selection Methods Via Shapley Additive Explanations Of Models Of Mental Workload Built With The Theta And Alpha Eeg Band Ratios, Bujar Raufi, Luca Longo Mar 2024

Comparing Anova And Powershap Feature Selection Methods Via Shapley Additive Explanations Of Models Of Mental Workload Built With The Theta And Alpha Eeg Band Ratios, Bujar Raufi, Luca Longo

Articles

Background: Creating models to differentiate self-reported mental workload perceptions is challenging and requires machine learning to identify features from EEG signals. EEG band ratios quantify human activity, but limited research on mental workload assessment exists. This study evaluates the use of theta-to-alpha and alpha-to-theta EEG band ratio features to distinguish human self-reported perceptions of mental workload. Methods: In this study, EEG data from 48 participants were analyzed while engaged in resting and task-intensive activities. Multiple mental workload indices were developed using different EEG channel clusters and band ratios. ANOVA’s F-score and PowerSHAP were used to extract the statistical features. At …


Uncovering The Critical Drivers Of Blockchain Sustainability In Higher Education Using A Deep Learning-Based Hybrid Sem-Ann Approach, Mohammed Alshamsi, Mostafa Al-Emran, Tugrul Daim, Mohammed A. Al-Sharafi, Gulin Idil Sonmezturk Bolatan, Khaled Shaalan Mar 2024

Uncovering The Critical Drivers Of Blockchain Sustainability In Higher Education Using A Deep Learning-Based Hybrid Sem-Ann Approach, Mohammed Alshamsi, Mostafa Al-Emran, Tugrul Daim, Mohammed A. Al-Sharafi, Gulin Idil Sonmezturk Bolatan, Khaled Shaalan

Engineering and Technology Management Faculty Publications and Presentations

The increasing popularity of Blockchain technology has led to its adoption in various sectors, including higher education. However, the sustainability of Blockchain in higher education is yet to be fully understood. Therefore, this research examines the determinants affecting Blockchain sustainability by developing a theoretical model that integrates the protection motivation theory (PMT) and expectation confirmation model (ECM). Based on 374 valid responses collected from university students, the proposed model is evaluated through a deep learning-based hybrid structural equation modeling (SEM) and artificial neural network (ANN) approach. The PLS-SEM results confirmed most of the hypotheses in the proposed model. The sensitivity …


Detecting Substance Use Disorder Using Social Media Data And Dark Web: Time And Knowledge Aware Study, Usha Lokala, Orchid Chetia Phukan, Triyasha Ghosh Dastidar, Francois Lamy, Raminta Daniulaityte, Amit Sheth Feb 2024

Detecting Substance Use Disorder Using Social Media Data And Dark Web: Time And Knowledge Aware Study, Usha Lokala, Orchid Chetia Phukan, Triyasha Ghosh Dastidar, Francois Lamy, Raminta Daniulaityte, Amit Sheth

Faculty Publications

Opioid and substance misuse is rampant in the United States today, with the phenomenon known as the "opioid crisis". The relationship between substance use and mental health has been extensively studied, with one possible relationship being: substance misuse causes poor mental health. However, the lack of evidence on the relationship has resulted in opioids being largely inaccessible through legal means. This study analyzes the substance use posts on social media with opioids being sold through crypto market listings. We use the Drug Abuse Ontology, state-of-the-art deep learning, and knowledge-aware BERT-based models to generate sentiment and emotion for the social media …


Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino Feb 2024

Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino

Center for Cybersecurity

In brief:

  • Humanitarian agencies responding to conflict face massive challenges in distributing aid. Cyberattacks add to that burden.
  • This short overview, tailored for non-technical leaders, demystifies the process and equips clouds security experts to proactively champion cloud security at non-profits, and non-governmental organizations.

Proactive Cybersecurity is a Humanitarian Imperative | CSA (cloudsecurityalliance.org)


Emoji Use In Social Media Posts: Relationships With Personality Traits And Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, Eric Chan-Tin Feb 2024

Emoji Use In Social Media Posts: Relationships With Personality Traits And Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

Prior research has demonstrated relationships between personality traits of social media users and the language used in their posts. Few studies have examined whether there are relationships between personality traits of users and how they use emojis in their social media posts. Emojis are digital pictographs used to express ideas and emotions. There are thousands of emojis, which depict faces with expressions, objects, animals, and activities. We conducted a study with two samples (n = 76 and n = 245) in which we examined how emoji use on X (formerly Twitter) related to users’ personality traits and language use …


Ai And 6g Into The Metaverse: Fundamentals, Challenges And Future Research Trends, Muhammad Zawish, Fayaz Ali Dharejo, Sunder Ali Khowaja, Saleem Raza, Steven Davy, Kapal Dev, Paolo Bellavista Jan 2024

Ai And 6g Into The Metaverse: Fundamentals, Challenges And Future Research Trends, Muhammad Zawish, Fayaz Ali Dharejo, Sunder Ali Khowaja, Saleem Raza, Steven Davy, Kapal Dev, Paolo Bellavista

Articles

Since Facebook was renamed Meta, a lot of attention, debate, and exploration have intensified about what the Metaverse is, how it works, and the possible ways to exploit it. It is anticipated that Metaverse will be a continuum of rapidly emerging technologies, usecases, capabilities, and experiences that will make it up for the next evolution of the Internet. Several researchers have already surveyed the literature on artificial intelligence (AI) and wireless communications in realizing the Metaverse. However, due to the rapid emergence and continuous evolution of technologies, there is a need for a comprehensive and in-depth survey of the role …


Alice In Cyberspace 2024, Stanley Mierzwa Jan 2024

Alice In Cyberspace 2024, Stanley Mierzwa

Center for Cybersecurity

‘Alice in Cyberspace’ Conference Nurtures Women’s Interest, Representation in Cybersecurity


Immersive Framework For Designing Trajectories Using Augmented Reality, Joseph Anderson, Leo Materne, Karis Cooks, Michelle Aros, Jaia Huggins, Jesika Geliga-Torres, Kamden Kuykendall, David Canales, Barbara Chaparro Jan 2024

Immersive Framework For Designing Trajectories Using Augmented Reality, Joseph Anderson, Leo Materne, Karis Cooks, Michelle Aros, Jaia Huggins, Jesika Geliga-Torres, Kamden Kuykendall, David Canales, Barbara Chaparro

Publications

The intuitive interaction capabilities of augmented reality make it ideal for solving complex 3D problems that require complex spatial representations, which is key for astrodynamics and space mission planning. By implementing common and complex orbital mechanics algorithms in augmented reality, a hands-on method for designing orbit solutions and spacecraft missions is created. This effort explores the aforementioned implementation with the Microsoft Hololens 2 as well as its applications in industry and academia. Furthermore, a human-centered design process and study are utilized to ensure the tool is user-friendly while maintaining accuracy and applicability to higher-fidelity problems.


Multimodal Fusion For Audio-Image And Video Action Recognition, Muhammad B. Shaikh, Douglas Chai, Syed M. S. Islam, Naveed Akhtar Jan 2024

Multimodal Fusion For Audio-Image And Video Action Recognition, Muhammad B. Shaikh, Douglas Chai, Syed M. S. Islam, Naveed Akhtar

Research outputs 2022 to 2026

Multimodal Human Action Recognition (MHAR) is an important research topic in computer vision and event recognition fields. In this work, we address the problem of MHAR by developing a novel audio-image and video fusion-based deep learning framework that we call Multimodal Audio-Image and Video Action Recognizer (MAiVAR). We extract temporal information using image representations of audio signals and spatial information from video modality with the help of Convolutional Neutral Networks (CNN)-based feature extractors and fuse these features to recognize respective action classes. We apply a high-level weights assignment algorithm for improving audio-visual interaction and convergence. This proposed fusion-based framework utilizes …


Tutorial: Knowledge-Infused Artificial Intelligence For Mental Healthcare, Kaushik Roy Jan 2024

Tutorial: Knowledge-Infused Artificial Intelligence For Mental Healthcare, Kaushik Roy

Publications

Artificial Intelligence (AI) systems for mental healthcare (MHCare) have been ever-growing after realizing the importance of early interventions for patients with chronic mental health (MH) conditions. Social media (SocMedia) emerged as the go-to platform for supporting patients seeking MHCare. The creation of peer-support groups without social stigma has resulted in patients transitioning from clinical settings to SocMedia supported interactions for quick help. Researchers started exploring SocMedia content in search of cues that showcase correlation or causation between different MH conditions to design better interventional strategies. User-level Classification-based AI systems were designed to leverage diverse SocMedia data from various MH conditions, …


K-Perm: Personalized Response Generation Using Dynamic Knowledge Retrieval And Persona-Adaptive Queries, Kanak Raj, Kaushik Roy, Vamshi Bonagiri, Priyanshul Govil, Krishnaprasad Thirunarayan, Raxit Goswami, Manas Gaur Jan 2024

K-Perm: Personalized Response Generation Using Dynamic Knowledge Retrieval And Persona-Adaptive Queries, Kanak Raj, Kaushik Roy, Vamshi Bonagiri, Priyanshul Govil, Krishnaprasad Thirunarayan, Raxit Goswami, Manas Gaur

Publications

Personalizing conversational agents can enhance the quality of conversations and increase user engagement. However, they often lack external knowledge to tend to a user’s persona appropriately. This is particularly crucial for practical applications like mental health support, nutrition planning, culturally sensitive conversations, or reducing toxic behavior in conversational agents. To enhance the relevance and comprehensiveness of personalized responses, we propose using a two-step approach that involves (1) selectively integrating user personas and (2) contextualizing the response with supplementing information from a background knowledge source. We develop K-PERM (Knowledge-guided PErsonalization with Reward Modulation), a dynamic conversational agent that combines these elements. …


Exploring Alternative Approaches To Language Modeling For Learning From Data And Knowledge, Yuxin Zi, Kaushik Roy, Vignesh Narayanan, Amit Sheth Jan 2024

Exploring Alternative Approaches To Language Modeling For Learning From Data And Knowledge, Yuxin Zi, Kaushik Roy, Vignesh Narayanan, Amit Sheth

Publications

Despite their wide applications to language understanding tasks, large language models (LLMs) still face challenges such as hallucinations - the occasional fabrication of information, and alignment issues - the lack of associations with human-curated world models (e.g., intuitive physics or common-sense knowledge). Additionally, the black-box nature of LLMs makes it highly challenging to train them meaningfully in order to achieve a desired behavior. Specifically, the attempt to adjust LLMs’ concept embedding spaces can be highly intractable, which involves analyzing the implicit impact on LLMs’ numerous parameters and the resulting inductive biases. This paper proposes a novel architecture that wraps powerful …


Causal Event Graph-Guided Language-Based Spatiotemporal Question Answering, Kaushik Roy, Alessandro Oltramari, Yuxin Zi, Chathurangi Shyalika, Vignesh Narayanan, Amit Sheth Jan 2024

Causal Event Graph-Guided Language-Based Spatiotemporal Question Answering, Kaushik Roy, Alessandro Oltramari, Yuxin Zi, Chathurangi Shyalika, Vignesh Narayanan, Amit Sheth

Publications

Large Language Models have excelled at encoding and leveraging language patterns in large text-based corpora for various tasks, including spatiotemporal event-based question answering (QA). However, due to encoding a text-based projection of the world, they have also been shown to lack a fullbodied understanding of such events, e.g., a sense of intuitive physics, and cause-and-effect relationships among events. In this work, we propose using causal event graphs (CEGs) to enhance language understanding of spatiotemporal events in language models, using a novel approach that also provides proofs for the model’s capture of the CEGs. A CEG consists of events denoted by …


Anonymous Attribute-Based Broadcast Encryption With Hidden Multiple Access Structures, Tran Viet Xuan Phuong Jan 2024

Anonymous Attribute-Based Broadcast Encryption With Hidden Multiple Access Structures, Tran Viet Xuan Phuong

School of Cybersecurity Faculty Publications

Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the correct participant but also respects the security of the identity user. In addition, when delivered, all the information must be protected for the party who employs the broadcasting service. Currently, Attribute-Based Broadcast Encryption (ABBE) is useful to apply for the broadcasting service. (ABBE) is a combination of Attribute-Based Encryption (ABE) and Broadcast Encryption (BE), which allows a broadcaster (or encrypter) to broadcast an encrypted message, including a predefined user set and specified access policy to …


Methods That Support The Validation Of Agent-Based Models: An Overview And Discussion, Andrew Collins, Matthew Koehler, Christopher Lynch Jan 2024

Methods That Support The Validation Of Agent-Based Models: An Overview And Discussion, Andrew Collins, Matthew Koehler, Christopher Lynch

Engineering Management & Systems Engineering Faculty Publications

Validation is the process of determining if a model adequately represents the system under study for the model’s intended purpose. Validation is a critical component in building the credibility of a simulation model with its end-users. Effectively conducting validation can be a daunting task for both novice and experienced simulation developers. Further compounding the difficult task of conducting validation is that there is no universally accepted approach for assessing a simulation. These challenges are particularly relevant to the paradigm of Agent-Based Modeling and Simulation (ABMS) because of the complexity found in these models’ mechanisms and in the real-world situations they …


Detection Of Tooth Position By Yolov4 And Various Dental Problems Based On Cnn With Bitewing Radiograph, Kuo Chen Li, Yi-Cheng Mao, Mu-Feng Lin, Yi-Qian Li, Chiung-An Chen, Tsung-Yi Chen, Patricia Angela R. Abu Jan 2024

Detection Of Tooth Position By Yolov4 And Various Dental Problems Based On Cnn With Bitewing Radiograph, Kuo Chen Li, Yi-Cheng Mao, Mu-Feng Lin, Yi-Qian Li, Chiung-An Chen, Tsung-Yi Chen, Patricia Angela R. Abu

Department of Information Systems & Computer Science Faculty Publications

Periodontitis is a high prevalence dental disease caused by bacterial infection of the bone that surrounds the tooth. Early detection and precision treatment can prevent more severe symptoms such as tooth loss. Traditionally, periodontal disease is identified and labeled manually by dental professionals. The task requires expertise and extensive experience, and it is highly repetitive and time-consuming. The aim of this study is to explore the application of AI in the field of dental medicine. With the inherent learning capabilities, AI exhibits remarkable proficiency in processing extensive datasets and effectively managing repetitive tasks. This is particularly advantageous in professions demanding …


Matthew Gaber: Peekaboo, Matthew Gaber, Mohiuddin Ahmed, Helge Janicke Jan 2024

Matthew Gaber: Peekaboo, Matthew Gaber, Mohiuddin Ahmed, Helge Janicke

Research Datasets

Cyber-attacks continue to evolve, increasing in frequency and sophistication where Artificial Intelligence (AI) is becoming essential in detecting modern malware. However, the accuracy of AI in malware detection is dependent on the quality of the features it is trained with. Static and dynamic analysis of malware is limited by the widespread use of obfuscation and anti-analysis techniques employed by malware authors, where if an analysis environment is detected the malware will hide its malicious behavior. However, Dynamic Binary Instrumentation (DBI) allows deep and precise control of the malware sample, thereby facilitating the extraction of authentic features from sophisticated and evasive …


A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami Jan 2024

A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami

VMASC Publications

Named Data Network (NDN) is proposed for the Internet as an information-centric architecture. Content storing in the router’s cache plays a significant role in NDN. When a router’s cache becomes full, a cache replacement policy determines which content should be discarded for the new content storage. This paper proposes a new cache replacement policy called Discard of Fast Retrievable Content (DFRC). In DFRC, the retrieval time of the content is evaluated using the FIB table information, and the content with less retrieval time receives more discard priority. An impact weight is also used to involve both the grade of retrieval …


Ontolog Summit 2024 Talk Report: Healthcare Assistance Challenges-Driven Neurosymbolic Ai, Kaushik Roy Jan 2024

Ontolog Summit 2024 Talk Report: Healthcare Assistance Challenges-Driven Neurosymbolic Ai, Kaushik Roy

Publications

Although Artificial Intelligence technology has proven effective in providing healthcare assistance by analyzing health data, it still falls short in supporting decision-making. This deficiency largely stems from the predominance of opaque neural networks, particularly in mental health care AI applications, which raise concerns about their unpredictable and unverifiable nature. This skepticism hinders the transition from information support to decision support. This presentation will explore neurosymbolic approaches that combine neural networks with symbolic control and verification mechanisms. These approaches aim to unlock AI’s full potential by enhancing information analysis and decision-making support for healthcare assistance1.


Exponential Fusion Of Interpolated Frames Network (Efif-Net): Advancing Multi-Frame Image Super-Resolution With Convolutional Neural Networks, Hamed Elwarfalli, Dylan Flaute, Russell C. Hardie Jan 2024

Exponential Fusion Of Interpolated Frames Network (Efif-Net): Advancing Multi-Frame Image Super-Resolution With Convolutional Neural Networks, Hamed Elwarfalli, Dylan Flaute, Russell C. Hardie

Electrical and Computer Engineering Faculty Publications

Convolutional neural networks (CNNs) have become instrumental in advancing multi-frame image super-resolution (SR), a technique that merges multiple low-resolution images of the same scene into a high-resolution image. In this paper, a novel deep learning multi-frame SR algorithm is introduced. The proposed CNN model, named Exponential Fusion of Interpolated Frames Network (EFIF-Net), seamlessly integrates fusion and restoration within an end-to-end network. Key features of the new EFIF-Net include a custom exponentially weighted fusion (EWF) layer for image fusion and a modification of the Residual Channel Attention Network for restoration to deblur the fused image. Input frames are registered with subpixel …


Intelligent Millimeter-Wave System For Human Activity Monitoring For Telemedicine, Abdullah K. Alhazmi, Mubarak A. Alanazi, Awwad H. Alshehry, Saleh M. Alshahry, Jennifer Jaszek, Cameron Djukic, Anna Brown, Kurt Jackson, Vamsy P. Chodavarapu Jan 2024

Intelligent Millimeter-Wave System For Human Activity Monitoring For Telemedicine, Abdullah K. Alhazmi, Mubarak A. Alanazi, Awwad H. Alshehry, Saleh M. Alshahry, Jennifer Jaszek, Cameron Djukic, Anna Brown, Kurt Jackson, Vamsy P. Chodavarapu

Electrical and Computer Engineering Faculty Publications

Telemedicine has the potential to improve access and delivery of healthcare to diverse and aging populations. Recent advances in technology allow for remote monitoring of physiological measures such as heart rate, oxygen saturation, blood glucose, and blood pressure. However, the ability to accurately detect falls and monitor physical activity remotely without invading privacy or remembering to wear a costly device remains an ongoing concern. Our proposed system utilizes a millimeter-wave (mmwave) radar sensor (IWR6843ISK-ODS) connected to an NVIDIA Jetson Nano board for continuous monitoring of human activity. We developed a PointNet neural network for real-time human activity monitoring that can …


Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances Dec 2023

Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances

AFIT Patents

A method for cyber security monitor includes monitoring a network interface that is input-only configured to surreptitiously and covertly receive bit-level, physical layer communication between networked control and sensor field devices. During a training mode, a baseline distinct native attribute (DNA) fingerprint is generated for each networked field device. During a protection mode, a current DNA fingerprint is generated for each networked field device. The current DNA fingerprint is compared to the baseline DNA fingerprint for each networked field device. In response to detect at least one of RAA and PAA based on a change in the current DNA fingerprint …


Development Of A Machine Learning System For Irrigation Decision Support With Disparate Data Streams, Eric Wilkening Dec 2023

Development Of A Machine Learning System For Irrigation Decision Support With Disparate Data Streams, Eric Wilkening

Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research

In recent years, advancements in irrigation technologies have led to increased efficiency in irrigation applications, encompassing the adoption of practices that utilize data-driven irrigation scheduling and leveraging variable rate irrigation (VRI). These technological improvements have the potential to reduce water withdrawals and diversions from both groundwater and surface water sources. However, it is vital to recognize that improved application efficiency does not necessarily equate to increased water availability for future or downstream use. This is particularly crucial in the context of consumptive water use, which refers to water consumed and not returned to the local or sub-regional watershed, representing a …


Ethical Implications Of Ai-Based Algorithms In Recruiting Processes: A Study Of Civil Rights Violations Under Title Vii And The Americans With Disabilities Act, Vanessa Rodriguez Dec 2023

Ethical Implications Of Ai-Based Algorithms In Recruiting Processes: A Study Of Civil Rights Violations Under Title Vii And The Americans With Disabilities Act, Vanessa Rodriguez

Cyber Operations and Resilience Program Graduate Projects

This research paper analyzes the ethical implications of utilizing artificial intelligence, specifically AI-based algorithms in business selection and recruiting processes, with a focus on potential violations under Title VII of the Civil Rights Act of 1964 and Title 1 of the Americans with Disabilities Act (ADA). Amazon’s attempt at launching AI recruiting tools is examined. This paper will assess the fairness of AI recruiting practices, considering data collection, potential biases, and accuracy concerns in its implementation process. Additionally, the paper will provide an overview of federal civil rights statutes enforced by the U.S. Equal Employment Opportunity Commission (EEOC) and recent …


Are We Day-Dreaming Our Way To The Future?, John O'Connor Dec 2023

Are We Day-Dreaming Our Way To The Future?, John O'Connor

Presentations

This paper explores the transformative impact of technology on society, drawing on Marshall McLuhan’s insights. It scrutinizes the consequences of profit-driven technological progress, particularly in VR, brain-computer interfaces, and AI hallucinations. Critiquing the dominance of industry leaders in AI safety discussions, the paper advocates a balanced, inclusive approach.

Philosophical perspectives on AI and VR prompt questions about their impact on human experience. The paper proposes an educational shift to cultivate human attributes alongside technological skills. Examining AI hallucinations and gaming glitches, it raises concerns about the potential blurring of reality and virtuality.

Connecting technological advancements with environmental challenges, the paper …