Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1384

Full-Text Articles in Other Computer Engineering

Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu May 2024

Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu

Master's Theses

The rapid advancement in Deep Learning (DL), especially in Reinforcement Learning (RL) and Imitation Learning (IL), has positioned it as a promising approach for a multitude of autonomous robotic systems. However, the current methodologies are predominantly constrained to singular setups, necessitating substantial data and extensive training periods. Moreover, these methods have exhibited suboptimal performance in tasks requiring long-horizontal maneuvers, such as Radio Frequency Identification (RFID) inventory, where a robot requires thousands of steps to complete.

In this thesis, we address the aforementioned challenges by presenting the Cross-modal Reasoning Model (CMRM), a novel zero-shot Imitation Learning policy, to tackle long-horizontal robotic …


Brain Computer Interface-Based Drone Control Using Gyroscopic Data From Head Movements, Ikaia Cacha Melton May 2024

Brain Computer Interface-Based Drone Control Using Gyroscopic Data From Head Movements, Ikaia Cacha Melton

Honors College Theses

This research explores the potential of using gyroscopic data from a person’s head movement to control a DJI Tello quadcopter via a Brain-Computer Interface (BCI). In this study, over 100 gyroscopic recordings capturing the X, Y and Z columns (formally known as GyroX, GyroY, GyroZ) between 4 volunteers with the Emotiv Epoc X headset were collected. The Emotiv Epoc X data captured (left, right, still, and forward) head movements of each participant associated with the DJI Tello quadcopter navigation. The data underwent thorough processing and analysis, revealing distinctive patterns in charts using Microsoft Excel. A Python condition algorithm was then …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Automated Brain Tumor Classifier With Deep Learning, Venkata Sai Krishna Chaitanya Kandula May 2024

Automated Brain Tumor Classifier With Deep Learning, Venkata Sai Krishna Chaitanya Kandula

Electronic Theses, Projects, and Dissertations

Brain Tumors are abnormal growth of cells within the brain that can be categorized as benign (non-cancerous) or malignant (cancerous). Accurate and timely classification of brain tumors is crucial for effective treatment planning and patient care. Medical imaging techniques like Magnetic Resonance Imaging (MRI) provide detailed visualizations of brain structures, aiding in diagnosis and tumor classification[8].

In this project, we propose a brain tumor classifier applying deep learning methodologies to automatically classify brain tumor images without any manual intervention. The classifier uses deep learning architectures to extract and classify brain MRI images. Specifically, a Convolutional Neural Network (CNN) …


Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Honors Theses

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Poster Presentations

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Diegetic Sonification For Low Vision Gamers, Jhané Dawes May 2024

Diegetic Sonification For Low Vision Gamers, Jhané Dawes

Master's Theses

There are not many games designed for all players that provide accommodations for low vision users. This means that low vision users may not get to engage with the gaming community in the same way as their sighted peers. In this thesis, I explore how diegetic sonification can be used as a tool to support these low vision gamers in the typical gaming environment. I asked low vision players to engage with a prototype game level with two diegetic sonification techniques applied, without the use of their corrective lenses. I found that participants had more enjoyment and experienced less difficulty …


Building Software At Scale: Understanding Productivity As A Product Of Software Engineering Intrinsic Factors, Gauthier Ingende Wa Boway Apr 2024

Building Software At Scale: Understanding Productivity As A Product Of Software Engineering Intrinsic Factors, Gauthier Ingende Wa Boway

Master's Theses

During our education at KSU, we have learned about various factors that affect productivity such as schedule, budget, and risks, but those are often controlled outside of what we could learn as software engineering principles, patterns, or practices. On top of that, other off-work factors such as health conditions, emotional distress, or political climate, just to name a few, could drastically affect the productivity of a software engineering team. We see a demarcation between those factors that affect productivity in software engineering but are not inherent to the discipline itself, which we call resistance factors, and the factors that are …


Breast Cancer Classification With Machine Learning, Rahanuma Tarannum Apr 2024

Breast Cancer Classification With Machine Learning, Rahanuma Tarannum

ATU Research Symposium

Breast cancer is one of the foremost causes of death amongst women worldwide. Breast tumours are characteristically classified as either benign (non-cancerous) or malignant (cancerous). Benign tumours do not spread external side of the breast and are not fatal, whereas malignant tumours can metastasize and be incurable if untreated. Rapidly and accurate diagnosis of malignant tumours is significant for efficient treatment and advanced outcomes. In 2022, breast cancer claimed 670 000 lives worldwide. Women without any particular risk factors other than age and sex account for half of all cases of breast cancer. In 157 out of 185 nations, breast …


Pyroscan: Wildfire Behavior Prediction System, Derek H. Thompson, Parker A. Padgett, Timothy C. Johnson Apr 2024

Pyroscan: Wildfire Behavior Prediction System, Derek H. Thompson, Parker A. Padgett, Timothy C. Johnson

ATU Research Symposium

During a wildfire, it is of the utmost importance to be updated about all information of the wildfire. Wind speed, wind direction and dry grass often works as fuel for the fire allowing it to spread in multiple directions. These different factors are often issues for any firefighting organization that is trying to help fight the fire. An uncontrolled wildfire is often a threat to wildlife, property, and worse, human and animal lives. In our paper, we propose an artificial intelligence (AI) powered fire tracking and prediction application utilizing Unmanned Aerial Vehicles (UAV) to inform fire fighters regarding the probability …


League Of Learning: Deep Learning For Soccer Action Video Classification, Musfikur Rahaman Apr 2024

League Of Learning: Deep Learning For Soccer Action Video Classification, Musfikur Rahaman

ATU Research Symposium

The field of sports video analysis using deep learning is rapidly advancing. Proper classification and analysis of sports videos are essential to manage the growing sports media content. It offers numerous benefits for the media, advertising, analytics, and education sectors. Soccer, also known as football, worldwide, is among the most popular sports. This research study used a deep learning-based approach for soccer action detection. Deep learning has become a popular machine learning technique, especially for image and video classification. We have used the SoccerAct dataset, which consists of ten soccer actions like corner, foul, freekick, goal kick, long pass, on …


Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson Apr 2024

Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson

Cybersecurity Undergraduate Research Showcase

This paper explores the potential integration of predictive analytics AI into the United States Coast Guard's (USCG) Search and Rescue Optimal Planning System (SAROPS) for deep sea and nearshore search and rescue (SAR) operations. It begins by elucidating the concept of predictive analytics AI and its relevance in military applications, particularly in enhancing SAR procedures. The current state of SAROPS and its challenges, including complexity and accuracy issues, are outlined. By integrating predictive analytics AI into SAROPS, the paper argues for streamlined operations, reduced training burdens, and improved accuracy in locating drowning personnel. Drawing on insights from military AI applications …


Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization Apr 2024

Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization

Human-Machine Communication

This is the complete volume of HMC Volume 7. Special Issue on Mediatization


Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner Apr 2024

Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner

Honors College Theses

Modern advancements in machine learning are transforming the technological landscape, including information architecture within user experience design. With the unparalleled amount of user data generated on online media platforms and applications, an adjustment in the design process to incorporate machine learning for categorizing the influx of semantic data while maintaining a user-centric structure is essential. Machine learning tools, such as the classification and recommendation system, need to be incorporated into the design for user experience and marketing success. There is a current gap between incorporating the backend modeling algorithms and the frontend information architecture system design together. The aim of …


First-Year Engineering Students And Genai: Experience, Attitudes, Trust, And Ethics., Elisabeth Thomas, Cenetria Crockett, Campbell Rightmyer Bego Apr 2024

First-Year Engineering Students And Genai: Experience, Attitudes, Trust, And Ethics., Elisabeth Thomas, Cenetria Crockett, Campbell Rightmyer Bego

Undergraduate Research Events

Generative AI (GenAI) has the potential to benefit student learning by offering personalized feedback, idea generation, research, and analysis support, writing aid, and administrative support (Chan and Hu, 2023; Zhang, 2023). However, if used inappropriately, the same tools can lead to false/biased content creation and reduced ethical awareness leading to possible academic dishonesty and privacy issues (Schwartz, 2016; Wu, 2023). At this early stage, ethical standards and professorial guidance are unavailable, so it is important to understand what students are thinking about the recent technologies (Shen et al., 2013). Spring 2023 survey results revealed that some students used ChatGPT, a …


Cyber Attacks Against Industrial Control Systems, Adam Kardorff Apr 2024

Cyber Attacks Against Industrial Control Systems, Adam Kardorff

LSU Master's Theses

Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …


Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony Mar 2024

Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony

Journal of Engineering Research

Aging significantly affects human health and the overall economy, yet understanding of the underlying molecular mechanisms remains limited. Among all human genes, almost three hundred and five have been linked to human aging. While certain subsets of these genes or specific aging-related genes have been extensively studied. There has been a lack of comprehensive examination encompassing the entire set of aging-related genes. Here, the main objective is to overcome understanding based on an innovative approach that combines the capabilities of deep learning. Particularly using One-Dimensional Deep AutoEncoder (1D-DAE). Followed by the K-means clustering technique as a means of unsupervised learning. …


Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu Mar 2024

Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu

Masters Theses

In the realm of pharmaceuticals, particularly during the challenging times of the COVID-19 pandemic, the supply chain for drugs has faced significant strains. The increased demand for vaccines and therapeutics has revealed critical weaknesses in the current drug supply chain management systems. If not addressed, these challenges could lead to severe societal impacts, including the rise of counterfeit medications and diminishing trust in government authorities.

The study identified that more than the current strategies, such as the Drug Supply Chain Security Act (DSCSA) in the U.S., which focuses on unique authentication and traceability codes for prescription drugs, is needed to …


Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan Mar 2024

Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan

Research Symposium

Background: The system's performance may be impacted by the high-dimensional feature dataset, attributed to redundant, non-informative, or irrelevant features, commonly referred to as noise. To mitigate inefficiency and suboptimal performance, our goal is to identify the optimal and minimal set of features capable of representing the entire dataset. Consequently, the Feature Selector (Fs) serves as an operator, transforming an m-dimensional feature set into an n-dimensional feature set. This process aims to generate a filtered dataset with reduced dimensions, enhancing the algorithm's efficiency.

Methods: This paper introduces an innovative feature selection approach utilizing a genetic algorithm with an ensemble crossover operation …


Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee Mar 2024

Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee

ELAIA

A recent development in the realm of computer technology is the deepfake. Deepfakes, which train a computer model to digitally superimpose one person’s face onto another body in a separate video, has its uses for good and for ill, with the unfortunate tendency to the latter. The vast majority of deepfakes are used for pornography, most commonly depicting female celebrities as the subjects. At the less notable level, it is also often used for revenge pornography. These aspects of deepfake technology are rarely discussed in mainstream media, which tends to focus on the less harmful uses, such as those for …


Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao Mar 2024

Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao

Master's Theses

Understanding the temporal evolution of cells poses a significant challenge in developmental biology. This study embarks on a comparative analysis of various machine-learning techniques to classify cell colony images across different timestamps, thereby aiming to capture dynamic transitions of cellular states. By performing Transfer Learning with state-of-the-art classification networks, we achieve high accuracy in categorizing single-timestamp images. Furthermore, this research introduces the integration of temporal models, notably LSTM (Long Short Term Memory Network), R-Transformer (Recurrent Neural Network enhanced Transformer) and ViViT (Video Vision Transformer), to undertake this classification task to verify the effectiveness of incorporating temporal features into the classification …


Text Summarization, Varun Gottam, Anusha Vunnam, Purna Sarovar Puvvada Feb 2024

Text Summarization, Varun Gottam, Anusha Vunnam, Purna Sarovar Puvvada

Symposium of Student Scholars

The current era is known as the information era. Every day, millions of gigabytes of data are being transferred from one point to another. As the creation of data became easy, it became hard to keep track of the important points and the gist of data especially in areas such as research and news. To solve this conundrum, text summarization is introduced. This is a process of summarizing text from across different documents or large datasets such that it can be read and understood easily by both humans and machines.


Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino Feb 2024

Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino

Center for Cybersecurity

In brief:

  • Humanitarian agencies responding to conflict face massive challenges in distributing aid. Cyberattacks add to that burden.
  • This short overview, tailored for non-technical leaders, demystifies the process and equips clouds security experts to proactively champion cloud security at non-profits, and non-governmental organizations.

Proactive Cybersecurity is a Humanitarian Imperative | CSA (cloudsecurityalliance.org)


Multi-Perspective Analysis For Derivative Financial Product Prediction With Stacked Recurrent Neural Networks, Natural Language Processing And Large Language Model, Ethan Lo Feb 2024

Multi-Perspective Analysis For Derivative Financial Product Prediction With Stacked Recurrent Neural Networks, Natural Language Processing And Large Language Model, Ethan Lo

Dissertations, Theses, and Capstone Projects

This study developed a multi-perspective, AI-powered model for predicting E-Mini S&P 500 Index Futures prices, tackling the challenging market dynamics of these derivative financial instruments. Leveraging FinBERT for analysis of Wall Street Journal data alongside technical indicators, trader positioning, and economic factors, my stacked recurrent neural network built with LSTMs and GRUs achieves significantly improved accuracy compared to single sub-models. Furthermore, ChatGPT generation of human-readable analysis reports demonstrates the feasibility of using large language models in financial analysis. This research pioneers the use of stacked RNNs and LLMs for multi-perspective financial analysis, offering a novel blueprint for automated prediction and …


The Role Of Artificial Intelligence In Determining The Criminal Fingerprint, Saeed Al Matrooshi Jan 2024

The Role Of Artificial Intelligence In Determining The Criminal Fingerprint, Saeed Al Matrooshi

Journal of Police and Legal Sciences

The research aimed to identify the motives and justifications for the use of artificial intelligence in predicting crimes, to explain the challenges of artificial intelligence algorithms, the risks of bias and their ethical rules, and to highlight the role of artificial intelligence in identifying the criminal fingerprint during the detection of crimes. The research relied on the analytical approach, for the purpose of identifying the motives and justifications for the use of intelligence. Artificial intelligence in crime detection, explaining the challenges of artificial intelligence algorithms, their risks of bias, and ethical rules, and exploring how artificial intelligence technology can hopefully …