Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 23583

Full-Text Articles in Computer Engineering

Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization Apr 2024

Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization

Human-Machine Communication

This is the complete volume of HMC Volume 7. Special Issue on Mediatization


Artificial Sociality, Simone Natale, Iliana Depounti Apr 2024

Artificial Sociality, Simone Natale, Iliana Depounti

Human-Machine Communication

This article proposes the notion of Artificial Sociality to describe communicative AI technologies that create the impression of social behavior. Existing tools that activate Artificial Sociality include, among others, Large Language Models (LLMs) such as ChatGPT, voice assistants, virtual influencers, socialbots and companion chatbots such as Replika. The article highlights three key issues that are likely to shape present and future debates about these technologies, as well as design practices and regulation efforts: the modelling of human sociality that foregrounds it, the problem of deception and the issue of control from the part of the users. Ethical, social and cultural …


Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen Apr 2024

Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen

Human-Machine Communication

As research fields, mediatization and Human-Machine Communication (HMC) have distinct historical trajectories. While mediatization research is concerned with the fundamental interrelation between the transformation of media and communications and cultural and societal changes, the much younger field of HMC delves into human meaning-making in interactions with machines. However, the recent wave of “deep mediatization,” characterized by an increasing emphasis on general communicative automation and the rise of communicative AI, highlights a shared interest in technology’s role within human interaction. This introductory article examines the trajectories of both fields, demonstrating how mediatization research “zooms out” from overarching questions of societal and …


2024 (Spring) Ensi Informer Magazine, Morehead State University. Engineering Sciences Department Apr 2024

2024 (Spring) Ensi Informer Magazine, Morehead State University. Engineering Sciences Department

ENSI Informer Magazine Archive

The ENSI Informer Magazine published in the spring of 2024.


Implementation Of Path Planning Methods To Detect And Avoid Gps Signal Degradation In Urban Environments, Ayush Raminedi Apr 2024

Implementation Of Path Planning Methods To Detect And Avoid Gps Signal Degradation In Urban Environments, Ayush Raminedi

Doctoral Dissertations and Master's Theses

In the modern world, various missions are being carried out under the assistance of autonomous flight vehicles due to their ability to operate in a wide range of flight conditions. Regardless, these autonomous vehicles are prone to GPS signal loss in urban environments due to obstructions that cause scintillation, multi-path, and shadowing. These effects that decrease the GPS functionality can deteriorate the accuracy of GPS positioning causing losses in signal tracking leading to a decrease in navigation performance. These effects are modeled into the simulation environment and are used as part of the path planning algorithm to provide better navigation …


Reducing Bias In Cyberbullying Detection With Advanced Llms And Transformer Models, Dahana Moz Ruiz, Annaliese Watson, Anjana Manikandan, Zachary Gordon Apr 2024

Reducing Bias In Cyberbullying Detection With Advanced Llms And Transformer Models, Dahana Moz Ruiz, Annaliese Watson, Anjana Manikandan, Zachary Gordon

Center for Cybersecurity

This paper delved into a comprehensive exploration of the inherent biases present in Large Language Models (LLMs) and various Transformer models, with a focus on their role in identifying and addressing instances of cyberbullying. The objective was to refine and enhance the accuracy and fairness of these models by mitigating the biases deeply ingrained in their structures. This was crucial because language models could inadvertently perpetuate and amplify existing biases present in the data they were trained on.


Cyber Attacks Against Industrial Control Systems, Adam Kardorff Apr 2024

Cyber Attacks Against Industrial Control Systems, Adam Kardorff

LSU Master's Theses

Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …


Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner Apr 2024

Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner

Honors College Theses

Modern advancements in machine learning are transforming the technological landscape, including information architecture within user experience design. With the unparalleled amount of user data generated on online media platforms and applications, an adjustment in the design process to incorporate machine learning for categorizing the influx of semantic data while maintaining a user-centric structure is essential. Machine learning tools, such as the classification and recommendation system, need to be incorporated into the design for user experience and marketing success. There is a current gap between incorporating the backend modeling algorithms and the frontend information architecture system design together. The aim of …


In-Depth Examination Of Gas Consumption In E-Will Smart Contract: A Case Study, Manal Mansour, May Salama, Hala Helmi, Mona F.M Mursi Mar 2024

In-Depth Examination Of Gas Consumption In E-Will Smart Contract: A Case Study, Manal Mansour, May Salama, Hala Helmi, Mona F.M Mursi

Journal of Engineering Research

In recent years, blockchain technology, coupled with smart contracts, has played a pivotal role in the development of distributed applications. Numerous case studies have emerged, showcasing the remarkable potential of this technology across various applications. Despite its widespread adoption in the industry, there exists a significant gap between the practical implementation of blockchain and the analytical and academic studies dedicated to understanding its nuances.

This paper aims to bridge this divide by presenting an empirical case study focused on the e-will contract, with a specific emphasis on gas-related challenges. By closely examining the e-will contract case study, we seek to …


A Soft Two-Layers Voting Model For Fake News Detection, Hnin Ei Wynne, Khaing Thanda Swe Mar 2024

A Soft Two-Layers Voting Model For Fake News Detection, Hnin Ei Wynne, Khaing Thanda Swe

Journal of Engineering Research

The proliferation of fake news has become a complex and challenge problem in recent year, and presenting various unsolved issues within the research domain. Among these challenges, a critical concern is the development of effective models capable of accurately distinguish between fake and real news. While numerous techniques have been proposed for fake news detection, achieving optimal accuracy remains elusive. This paper introduces a novel fake news detection approach employing a two-layered weighted voting classifier. In contrast to conventional methods that assign equal weights to all classifiers, our proposed approach utilizes a selective weighting approach to solve the current issue. …


Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony Mar 2024

Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony

Journal of Engineering Research

Aging significantly affects human health and the overall economy, yet understanding of the underlying molecular mechanisms remains limited. Among all human genes, almost three hundred and five have been linked to human aging. While certain subsets of these genes or specific aging-related genes have been extensively studied. There has been a lack of comprehensive examination encompassing the entire set of aging-related genes. Here, the main objective is to overcome understanding based on an innovative approach that combines the capabilities of deep learning. Particularly using One-Dimensional Deep AutoEncoder (1D-DAE). Followed by the K-means clustering technique as a means of unsupervised learning. …


Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao Mar 2024

Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao

Masters Theses

Embedded systems based on lightweight microprocessors are becoming more prevalent in various applications. However, the security of them remains a significant challenge due to the limited resources and exposure to external threats. Especially, some of these devices store sensitive data and control critical devices, making them high-value targets for attackers. Software security is particularly important because attackers can easily access these devices on the internet and obtain control of them by injecting malware.

Return address (RA) hijacking is a common software attack technique used to compromise control flow integrity (CFI) by manipulating memory, such as return-to-libc attacks. Several methods have …


Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu Mar 2024

Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu

Masters Theses

In the realm of pharmaceuticals, particularly during the challenging times of the COVID-19 pandemic, the supply chain for drugs has faced significant strains. The increased demand for vaccines and therapeutics has revealed critical weaknesses in the current drug supply chain management systems. If not addressed, these challenges could lead to severe societal impacts, including the rise of counterfeit medications and diminishing trust in government authorities.

The study identified that more than the current strategies, such as the Drug Supply Chain Security Act (DSCSA) in the U.S., which focuses on unique authentication and traceability codes for prescription drugs, is needed to …


Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim Mar 2024

Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim

Masters Theses

Due to significant investment, research, and development efforts over the past decade, deep neural networks (DNNs) have achieved notable advancements in classification and regression domains. As a result, DNNs are considered valuable intellectual property for artificial intelligence providers. Prior work has demonstrated highly effective model extraction attacks which steal a DNN, dismantling the provider’s business model and paving the way for unethical or malicious activities, such as misuse of personal data, safety risks in critical systems, or spreading misinformation. This thesis explores the feasibility of model extraction attacks on mobile devices using aggregated runtime profiles as a side-channel to leak …


An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou Mar 2024

An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou

Doctoral Dissertations

With the proliferation of video content from surveillance cameras, social media, and live streaming services, the need for efficient video analytics has grown immensely. In recent years, machine learning based computer vision algorithms have shown great success in various video analytic tasks. Specifically, neural network models have dominated in visual tasks such as image and video classification, object recognition, object detection, and object tracking. However, compared with classic computer vision algorithms, machine learning based methods are usually much more compute-intensive. Powerful servers are required by many state-of-the-art machine learning models. With the development of cloud computing infrastructures, people are able …


Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan Mar 2024

Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan

Research Symposium

Background: The system's performance may be impacted by the high-dimensional feature dataset, attributed to redundant, non-informative, or irrelevant features, commonly referred to as noise. To mitigate inefficiency and suboptimal performance, our goal is to identify the optimal and minimal set of features capable of representing the entire dataset. Consequently, the Feature Selector (Fs) serves as an operator, transforming an m-dimensional feature set into an n-dimensional feature set. This process aims to generate a filtered dataset with reduced dimensions, enhancing the algorithm's efficiency.

Methods: This paper introduces an innovative feature selection approach utilizing a genetic algorithm with an ensemble crossover operation …


Comparing Anova And Powershap Feature Selection Methods Via Shapley Additive Explanations Of Models Of Mental Workload Built With The Theta And Alpha Eeg Band Ratios, Bujar Raufi, Luca Longo Mar 2024

Comparing Anova And Powershap Feature Selection Methods Via Shapley Additive Explanations Of Models Of Mental Workload Built With The Theta And Alpha Eeg Band Ratios, Bujar Raufi, Luca Longo

Articles

Background: Creating models to differentiate self-reported mental workload perceptions is challenging and requires machine learning to identify features from EEG signals. EEG band ratios quantify human activity, but limited research on mental workload assessment exists. This study evaluates the use of theta-to-alpha and alpha-to-theta EEG band ratio features to distinguish human self-reported perceptions of mental workload. Methods: In this study, EEG data from 48 participants were analyzed while engaged in resting and task-intensive activities. Multiple mental workload indices were developed using different EEG channel clusters and band ratios. ANOVA’s F-score and PowerSHAP were used to extract the statistical features. At …


Intelligent Protection Scheme Using Combined Stockwell-Transform And Deep Learning-Based Fault Diagnosis For The Active Distribution System, Latha Maheswari Kandasamy, Kanakaraj Jaganathan Mar 2024

Intelligent Protection Scheme Using Combined Stockwell-Transform And Deep Learning-Based Fault Diagnosis For The Active Distribution System, Latha Maheswari Kandasamy, Kanakaraj Jaganathan

Turkish Journal of Electrical Engineering and Computer Sciences

This study aims to perform fast fault diagnosis and intelligent protection in an active distribution network (ADN) with high renewable energy penetration. Several time-domain simulations are carried out in EMTP-RV to extract time-synchronized current and voltage data. The Stockwell transform (ST) was used in MATLAB/SIMULINK to preprocess these input datasets to train the adaptive fault diagnosis deep convolutional neural network (AFDDCNN) for fault location identification, fault type identification, and fault phase-detection for different penetration levels. Based on the AFDDCNN output, the intelligent protection scheme (IDOCPS) generates the signal for isolating a faulty section of the ADN. An intelligent fault diagnosis …


Consensus-Based Virtual Leader Tracking Algorithm For Flight Formation Control Of Swarm Uavs, Berat Yıldız, Akif Durdu, Ahmet Kayabaşi Mar 2024

Consensus-Based Virtual Leader Tracking Algorithm For Flight Formation Control Of Swarm Uavs, Berat Yıldız, Akif Durdu, Ahmet Kayabaşi

Turkish Journal of Electrical Engineering and Computer Sciences

Technological developments in industrial areas also impact unmanned aerial vehicles (UAVs). Recent improvements in both software and hardware have significantly increased the use of many UAVs in social and military fields. In particular, the widespread use of these vehicles in social areas such as entertainment, shipping, transportation, and delivery and military areas such as surveillance, tracking, and offensive measures has accelerated the research on swarm systems. This study examined the previous investigations on swarm UAVs and aimed to create a more efficient algorithm. The effectiveness of the proposed algorithm was compared with other leader-based applications. A swarm consisting of 5 …


Lower Data Attacks On Advanced Encryption Standard, Orhun Kara Mar 2024

Lower Data Attacks On Advanced Encryption Standard, Orhun Kara

Turkish Journal of Electrical Engineering and Computer Sciences

The Advanced Encryption Standard (AES) is one of the most commonly used and analyzed encryption algorithms. In this work, we present new combinations of some prominent attacks on AES, achieving new records in data requirements among attacks, utilizing only 2 4 and 2 16 chosen plaintexts (CP) for 6-round and 7-round AES 192/256, respectively. One of our attacks is a combination of a meet-in-the-middle (MiTM) attack with a square attack mounted on 6-round AES-192/256 while another attack combines an MiTM attack and an integral attack, utilizing key space partitioning technique, on 7-round AES-192/256. Moreover, we illustrate that impossible differential (ID) …


Cascade Controller Design Via Controller Synthesis For Load Frequency Control Of Electrical Power Systems, Yavuz Güler, Mustafa Nalbantoğlu, Ibrahim Kaya Mar 2024

Cascade Controller Design Via Controller Synthesis For Load Frequency Control Of Electrical Power Systems, Yavuz Güler, Mustafa Nalbantoğlu, Ibrahim Kaya

Turkish Journal of Electrical Engineering and Computer Sciences

The regulation of tie-line electricity flow and frequency of electrical power systems (EPS) is crucial for ensuring their robustness to parameter changes and efficient management of disturbances. To this end, a novel cascade control design approach utilizing a serial Proportional-Integral-Derivative controller with a filter (PIDF) is proposed in this paper. The parameters of the controllers are derived analytically, and it is employed in both loops of the cascade control system to regulate the Load Frequency Control (LFC) of EPS. The implementation of PIDF controllers in both loops is utilized in the cascade control scheme for various power systems featuring different …


Advanced Hyperthermia Treatment: Optimizing Microwave Energy Focus For Breast Cancer Therapy, Burak Acar, Tuba Yilmaz Abdolsaheb, Ali Yapar Mar 2024

Advanced Hyperthermia Treatment: Optimizing Microwave Energy Focus For Breast Cancer Therapy, Burak Acar, Tuba Yilmaz Abdolsaheb, Ali Yapar

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a fast antenna phase optimization scheme to enable microwave power focusing for breast cancer hyperthermia. The power focusing is achieved through the maximization of the deposited electric field on the target malignant tumor tissue. To do so, a malignant breast tumor, the surrounding breast medium, and the skin of the breast are modeled as a cylindrical structure composed of eccentric cylinders, and electric field distribution is computed analytically in terms of cylindrical harmonics. This approach minimized the computational cost and simplified the breast medium model. To ensure applicability across various breast types, the dielectric properties (DPs) of …


Atomic Comagnetometer Gyroscopes For Inertial Navigation Systems: A Review, Murat Salim Karabinaoglu, Bekir Çakir, Mustafa Engin Başoğlu Mar 2024

Atomic Comagnetometer Gyroscopes For Inertial Navigation Systems: A Review, Murat Salim Karabinaoglu, Bekir Çakir, Mustafa Engin Başoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

In recent years, developments in quantum sensing, laser, and atomic sensor technologies have also enabled advancement in the field of quantum navigation. Atomic-based gyroscopes have emerged as one of the most critical atomic sensors in this respect. In this review, a brief technology statement of spin exchange relaxation free (SERF) and nuclear magnetic resonance (NMR) type atomic comagnetometer gyroscope (CG) is presented. Related studies in the literature have been gathered, and the fundamental compositions of CGs with technical basics are presented. A comparison of SERF and NMR CGs is provided. A basic simulation of SERF CG was carried out because …


Uncovering And Mitigating Spurious Features In Domain Generalization, Saeed Karimi, Hamdi̇ Di̇bekli̇oğlu Mar 2024

Uncovering And Mitigating Spurious Features In Domain Generalization, Saeed Karimi, Hamdi̇ Di̇bekli̇oğlu

Turkish Journal of Electrical Engineering and Computer Sciences

Domain generalization (DG) techniques strive to attain the ability to generalize to an unfamiliar target domain solely based on training data originating from the source domains. Despite the increasing attention given to learning from multiple training domains through the application of various forms of invariance across those domains, the enhancements observed in comparison to ERM are nearly insignificant under specified evaluation rules. In this paper, we demonstrate that the disentanglement of spurious and invariant features is a challenging task in conventional training since ERM simply minimizes the loss and does not exploit invariance among domains. To address this issue, we …


Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer Mar 2024

Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer

ELAIA

Asteroid detection is a common field in astronomy for planetary defense, requiring observations from survey telescopes to detect and classify different objects. The amount of data collected each night is continually increasing as new and better-designed telescopes begin collecting information each year. This amount of data is quickly becoming unmanageable, and researchers are looking for ways to better process this data. The most feasible current solution is to implement computer algorithms to automatically detect these sources and then use machine learning to create a more efficient and accurate method of classification. Implementation of such methods has previously focused on larger …


Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee Mar 2024

Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee

ELAIA

A recent development in the realm of computer technology is the deepfake. Deepfakes, which train a computer model to digitally superimpose one person’s face onto another body in a separate video, has its uses for good and for ill, with the unfortunate tendency to the latter. The vast majority of deepfakes are used for pornography, most commonly depicting female celebrities as the subjects. At the less notable level, it is also often used for revenge pornography. These aspects of deepfake technology are rarely discussed in mainstream media, which tends to focus on the less harmful uses, such as those for …


Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb Mar 2024

Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

Countries' water security is inextricably related to their economic position. Jordan is one of the world's five poorest countries regarding water resources. Climate change and water scarcity are threatening Jordan's economic growth and food security.

The objectives of the study are to use a statistical artificial intelligence model, which is called the Autoregressive Integrated Moving Average model to predict water productivity in Jordan and the world for the year 2021-2026, based on a real dataset from World Development Indicators from the World Bank. The study also aims to predict the total per capita share of fresh water based on the …


Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem Mar 2024

Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …


Requirements For Employing Artificial Intelligence Applications In Higher Education And Its Challenges, Nuha Musa Otoom Mar 2024

Requirements For Employing Artificial Intelligence Applications In Higher Education And Its Challenges, Nuha Musa Otoom

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

The study aimed to determine the requirements for applications of artificial intelligence in the field of higher education, and its challenges. The descriptive survey method (content analysis) was used, where the researcher collected information and documents about artificial intelligence and the requirements for employing its applications and challenges, by referring to many reliable sources and references that contributed to Reaching the results that the research seeks to achieve, The results showed that there are a set of requirements for employing artificial intelligence applications in higher education, the most prominent of which is spreading a culture that supports artificial intelligence in …


Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao Mar 2024

Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao

Master's Theses

Understanding the temporal evolution of cells poses a significant challenge in developmental biology. This study embarks on a comparative analysis of various machine-learning techniques to classify cell colony images across different timestamps, thereby aiming to capture dynamic transitions of cellular states. By performing Transfer Learning with state-of-the-art classification networks, we achieve high accuracy in categorizing single-timestamp images. Furthermore, this research introduces the integration of temporal models, notably LSTM (Long Short Term Memory Network), R-Transformer (Recurrent Neural Network enhanced Transformer) and ViViT (Video Vision Transformer), to undertake this classification task to verify the effectiveness of incorporating temporal features into the classification …