Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (6)
- California Polytechnic State University, San Luis Obispo (3)
- The University of Akron (2)
- Wayne State University (2)
- Clemson University (1)
-
- Cleveland State University (1)
- Tashkent State Technical University (1)
- Union College (1)
- University of Arkansas, Fayetteville (1)
- University of Kentucky (1)
- University of Louisville (1)
- University of Massachusetts Amherst (1)
- University of Nebraska - Lincoln (1)
- University of Nevada, Las Vegas (1)
- Virginia Commonwealth University (1)
- West Virginia University (1)
- Keyword
-
- COLLECTOR (2)
- Classification (2)
- Computer systems (2)
- Control theory (mathematics) (2)
- ELECTRICAL WITH SOLAR ENERGY (2)
-
- Electronic data processing -- distributed processing (2)
- Errors (2)
- Fault-tolerant computing (2)
- Machine Learning (2)
- Machine theory (2)
- Robotics (2)
- SMART GRID (2)
- AGV (1)
- Access (1)
- Adaptive compression (1)
- Algorithms--Data processing (1)
- Artificial Intelligence (AI) (1)
- Attacker Model Ontology (1)
- Attacker Modeling (1)
- Automation (1)
- Autonomous vehicle models (1)
- Autonomous vehicles (1)
- Benefits of AI (1)
- Bias in AI Systems (1)
- Boat (1)
- CAmkES (1)
- CIRCUIT BREAKER REALY OPERATION (1)
- CNC (1)
- CV (1)
- Cloud (1)
- Publication Year
- Publication
-
- Radhey Shyam Meena (4)
- Computer Engineering (2)
- Williams Honors College, Honors Research Projects (2)
- All Theses (1)
- Chemical Engineering and Materials Science Faculty Research Publications (1)
-
- Chemical Technology, Control and Management (1)
- Doctoral Dissertations (1)
- Electrical & Computer Engineering Faculty Research (1)
- Electrical and Computer Engineering Faculty Publications (1)
- Electronic Theses and Dissertations (1)
- Graduate Theses and Dissertations (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- Honors Theses (1)
- Library Philosophy and Practice (e-journal) (1)
- Mechanical Engineering (1)
- Rahul Mangharam (1)
- Research Opportunities for Engineering Undergraduates (ROEU) Program 2018-19 (1)
- Theses and Dissertations (1)
- Theses and Dissertations--Computer Science (1)
- Wenbing Zhao (1)
- Publication Type
Articles 1 - 25 of 25
Full-Text Articles in Controls and Control Theory
Application Of Quantum Algorithms In The Synthesis Of Dynamic Objects, Noilakhon Yakubova
Application Of Quantum Algorithms In The Synthesis Of Dynamic Objects, Noilakhon Yakubova
Chemical Technology, Control and Management
Around the world, the food industry is focusing on achieving energy and resource efficiency. One of the main challenges in the field of process automation is the creation of effective control systems using intelligent technologies to improve the quality of processes and achieve the production of high-quality products with less energy and resources. Therefore, it is necessary to work with a large amount of data. Particular attention is paid to the development of computational algorithms for automated high-speed computational analysis systems for processing this data at high speed. Therefore, the article discusses the use of quantum computing methods in controlling …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson
Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson
Chemical Engineering and Materials Science Faculty Research Publications
Strategies for mitigating the impacts of cyberattacks on control systems using a control-oriented perspective have become of greater interest in recent years. Our group has contributed to this trend by developing several methods for detecting cyberattacks on process sensors, actuators, or both sensors and actuators simultaneously using an advanced optimization-based control strategy known as Lyapunov-based economic model predictive control (LEMPC). However, each technique comes with benefits and limitations, both with respect to one another and with respect to traditional information technology and computer science-type approaches to cybersecurity. An important question to ask, therefore, is what the goal should be of …
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Computer Engineering
This project examines the development of a smart boat which could serve as a possible marine research apparatus. The smart boat consists of a miniature vessel containing a low-cost microcontroller to live stream a camera feed, GPS telemetry, and compass data through its own WiFi access point. The smart boat also has the potential for autonomous navigation. My project captivated the interest of several members of California Polytechnic State University, San Luis Obispo’s (Cal Poly SLO) Marine Science Department faculty, who proposed a variety of fascinating and valuable smart boat applications.
Improving Intelligent Transportation Safety And Reliability Through Lowering Costs, Integrating Machine Learning, And Studying Model Sensitivity, Cavender Holt
All Theses
As intelligent transportation becomes increasingly prevalent in the domain of transportation, it is essential to understand the safety, reliability, and performance of these systems. We investigate two primary areas in the problem domain. The first area concerns increasing the feasibility and reducing the cost of deploying pedestrian detection systems to intersections in order to increase safety. By allowing pedestrian detection to be placed in intersections, the data can be better utilized to create systems to prevent accidents from occurring. By employing a dynamic compression scheme for pedestrian detection, we show the reduction of network bandwidth improved by 2.12× over the …
Live Access Control Policy Error Detection Through Hardware, Bryce Mendenhall
Live Access Control Policy Error Detection Through Hardware, Bryce Mendenhall
Graduate Theses and Dissertations
Access Control (AC) is a widely used security measure designed to protect resources and infrastructure in an information system. The integrity of the AC policy is crucial to the protection of the system. Errors within an AC policy may cause many vulnerabilities such as information leaks, information loss, and malicious activities. Thus, such errors must be detected and promptly fixed. However, current AC error detection models do not allow for real-time error detection, nor do they provide the source of errors. This thesis presents a live error detection model called LogicDetect which utilizes emulated Boolean digital logic circuits to provide …
Magic: The Gathering Card Virtualizer, Vincent Garbonick, Jacen C. Conlan, Jaret A. Varn
Magic: The Gathering Card Virtualizer, Vincent Garbonick, Jacen C. Conlan, Jaret A. Varn
Williams Honors College, Honors Research Projects
Any well-versed Magic: The Gathering (MTG) player or collector knows how difficult it can be to keep track of all cards in their collection. Some spend hours searching for that one specific card, and others are constantly scouring the internet for how much their collection costs. However, this issue does not only affect casual fans. Resale companies spend hours a day determining the costs of cards, and tournament judges painstakingly check players’ decks to ensure they are not cheating. To assist with these struggles, the design team proposed to create the MTG Card Virtualizer. This device scans MTG playing cards …
Performance Of Sensor Fusion For Vehicular Applications, Nikola Janevski
Performance Of Sensor Fusion For Vehicular Applications, Nikola Janevski
Graduate Theses, Dissertations, and Problem Reports
Sensor fusion is a key system in Advanced Driver Assistance Systems, ADAS. The perfor-
mance of the sensor fusion depends on many factors such as the sensors used, the kinematic
model used in the Extended Kalman Filter, EKF, the motion of the vehicles, the type of
road, the density of vehicles, and the gating methods. The interactions between parameters
and the extent to which individual parameters contribute to the overall accuracy of a sensor
fusion system can be difficult to assess.
In this study, a full-factorial experimental evaluation of a sensor fusion system based
on a real vehicle was performed. …
Light Loaded Automated Guided Vehicle, Marcus Radtka, Nazar Paramashchuk, Lawrence Shevock
Light Loaded Automated Guided Vehicle, Marcus Radtka, Nazar Paramashchuk, Lawrence Shevock
Williams Honors College, Honors Research Projects
The objective of the locomotion system was to design and implement the mechanical, electrical, and software related functions to ensure the LLAGV had the capability of maneuvering its surroundings. The LLAGV’s motors were represented in an open loop transfer function to utilize RPM feedback and a compensator when needed. The modeled compensator helped control the LLAGV’s speed and acceleration, enabling further control of the LLAGV. The internal circuitry has the means to properly distributed power to all components and allowed the user to control the LLAGV to their desire. The application software within the LLAGV locomotion system (LLAGV-LS) had consideration …
A General Framework For Characterizing And Evaluating Attacker Models For Cps Security Assessment, Christopher S. Deloglos, Christopher Deloglos
A General Framework For Characterizing And Evaluating Attacker Models For Cps Security Assessment, Christopher S. Deloglos, Christopher Deloglos
Theses and Dissertations
Characterizing the attacker’s perspective is essential to assessing the security posture and resilience of cyber-physical systems. The attacker’s perspective is most often achieved by cyber-security experts (e.g., red teams) who critically challenge and analyze the system from an adversarial stance. Unfortunately, the knowledge and experience of cyber-security experts can be inconsistent leading to situations where there are gaps in the security assessment of a given system. Structured security review processes (such as TAM, Mission Aware, STPA-SEC, and STPA-SafeSec) attempt to standardize the review processes to impart consistency across an organization or application domain. However, with most security review processes, the …
Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui
Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui
Electronic Theses and Dissertations
This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be …
Edge Heterogeneous Hardware Evaluation Based On Real Connected And Autonomous Vehicles (Cavs) Workloads, Mustafa Ahmad
Edge Heterogeneous Hardware Evaluation Based On Real Connected And Autonomous Vehicles (Cavs) Workloads, Mustafa Ahmad
Research Opportunities for Engineering Undergraduates (ROEU) Program 2018-19
There has recently been a wide expansion of hardware to assist in autonomous driving tasks. On this project, we focus on using some state-of-the-art deep learning workloads in connected autonomous vehicle (CAV) scenarios,such as object detection and object tracking to evaluate the heterogeneous hardware.
Development Of A Fully Instrumented, Resonant Tensegrity Strut, Kentaro Barhydt
Development Of A Fully Instrumented, Resonant Tensegrity Strut, Kentaro Barhydt
Honors Theses
A tensegrity is a structure composed of a series of rigid members connected in static equilibrium by tensile elements. A vibrating tensegrity robot is an underactuated system in which a set of its struts are vibrated at certain frequency combinations to achieve various locomotive gaits. Evolutionary robotics research lead by Professor John Rieffel focuses on exploiting the complex dynamics of tensegrity structures to control locomotion in vibrating tensegrity robots by finding desired gaits using genetic algorithms. A current hypothesis of interest is that the optimal locomotive gaits of a vibrating tensegrity exist at its resonant frequencies.
In order to observe …
Adaft: A Resource-Efficient Framework For Adaptive Fault-Tolerance In Cyber-Physical Systems, Ye Xu
Adaft: A Resource-Efficient Framework For Adaptive Fault-Tolerance In Cyber-Physical Systems, Ye Xu
Doctoral Dissertations
Cyber-physical systems frequently have to use massive redundancy to meet application requirements for high reliability. While such redundancy is required, it can be activated adaptively, based on the current state of the controlled plant. Most of the time the physical plant is in a state that allows for a lower level of fault-tolerance. Avoiding the continuous deployment of massive fault-tolerance will greatly reduce the workload of CPSs. In this dissertation, we demonstrate a software simulation framework (AdaFT) that can automatically generate the sub-spaces within which our adaptive fault-tolerance can be applied. We also show the theoretical benefits of AdaFT, and …
Contributions To Edge Computing, Vernon K. Bumgardner
Contributions To Edge Computing, Vernon K. Bumgardner
Theses and Dissertations--Computer Science
Efforts related to Internet of Things (IoT), Cyber-Physical Systems (CPS), Machine to Machine (M2M) technologies, Industrial Internet, and Smart Cities aim to improve society through the coordination of distributed devices and analysis of resulting data. By the year 2020 there will be an estimated 50 billion network connected devices globally and 43 trillion gigabytes of electronic data. Current practices of moving data directly from end-devices to remote and potentially distant cloud computing services will not be sufficient to manage future device and data growth.
Edge Computing is the migration of computational functionality to sources of data generation. The importance of …
Forest Sign Maker, Victor Espinosa Iii, Kevin Ly, Lisa Yip
Forest Sign Maker, Victor Espinosa Iii, Kevin Ly, Lisa Yip
Mechanical Engineering
Executive Summary:
The Inyo National Forest is arguably one of the most beautiful locations in California, containing natural masterpieces such as Mount Whitney and the Ancient Bristlecone Pine Forest. Despite its magnificence, the Inyo National Forest can be a treacherous region. The Friends of the Inyo take pride in being able to facilitate the viewing experience for all outdoorsmen by maintaining the mountain trails, which includes providing adequate trail signage.
Unfortunately, there is a fundamental issue with the recent state of trail signage in the Inyo National Forest: the rate at which signs are being vandalized or naturally destroyed is …
Design And Implementation Of A Byzantine Fault Tolerance Framework For Non-Deterministic Applications, H. Zhang, Wenbing Zhao, Louise E. Moser, P. Michael Melliar-Smith
Design And Implementation Of A Byzantine Fault Tolerance Framework For Non-Deterministic Applications, H. Zhang, Wenbing Zhao, Louise E. Moser, P. Michael Melliar-Smith
Wenbing Zhao
State-machine-based replication is an effective way to increase the availability and dependability of mission-critical applications. However, all practical applications contain some degree of non-determinism. Consequently, ensuring strong replica consistency in the presence of application non-determinism has been one of the biggest challenges in building dependable distributed systems. In this Study, the authors propose a classification of common types of application non-determinism with respect to the requirement of achieving Byzantine fault tolerance (BFT), and present the design and implementation of a BFT framework that controls these types of non-determinism in a systematic manner.
Wireless Transmission Network : A Imagine, Radhey Shyam Meena Engineer, Neeraj Kumar Garg Asst.Prof
Wireless Transmission Network : A Imagine, Radhey Shyam Meena Engineer, Neeraj Kumar Garg Asst.Prof
Radhey Shyam Meena
World cannot be imagined without electrical power. Generally the power is transmitted through transmission networks. This paper describes an original idea to eradicate the hazardous usage of electrical wires which involve lot of confusion in particularly organizing them. Imagine a future in which wireless power transfer is feasible: cell phones, household robots, mp3 players, laptop computers and other portable electronic devices capable of charging themselves without ever being plugged in freeing us from that final ubiquitous power wire. This paper includes the techniques of transmitting power without using wires with an efficiency of about 95% with non-radioactivemethods. In this paper …
Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er., Deepa Sharma
Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er., Deepa Sharma
Radhey Shyam Meena
Grid-connected solar PV dramatically changes the load profile of an electric utility customer. The expected widespread adoption of solar generation by customers on the distribution system poses significant challenges to system operators both in transient and steady state operation, from issues including voltage swings, sudden weather-induced changes in generation, and legacy protective devices designed with one-way power flow in mind
Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er.
Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er.
Radhey Shyam Meena
As solar photovoltaic power generation becomes more commonplace, the inherent intermittency of the solar resource poses one of the great challenges to those who would design and implement the next generation smart grid. Specifically, grid-tied solar power generation is a distributed resource whose output can change extremely rapidly, resulting in many issues for the distribution system operator with a large quantity of installed photovoltaic devices. Battery energy storage systems are increasingly being used to help integrate solar power into the grid. These systems are capable of absorbing and delivering both real and reactive power with sub-second response times. With these …
Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam
Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam
Rahul Mangharam
Embedded wireless networks have largely focused on open-loop sensing and monitoring. To address actuation in closed-loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications require programming abstractions and runtime systems where the tasks are assigned to the sensors, actuators and controllers as a single component rather than statically mapping a set of tasks to a specific physical node at design time. To this end, we introduce the Embedded Virtual Machine (EVM), …
Switch Yard Operation In Thermal Power Plant(Katpp Jhalawar Rajasthan), Radhey Shyam Meena Er.
Switch Yard Operation In Thermal Power Plant(Katpp Jhalawar Rajasthan), Radhey Shyam Meena Er.
Radhey Shyam Meena
Switchyard Provides the facilities for switching ,protection & Control of electric power. To handle high Voltage power with proper Safety measures. To isolate the noises coming from the grid with true 50Hz power SWITCH YARD IS IMPORTANT PART IN THERMAL PLANT. IN KALISINDH THERMAL 400KV AND 220KV SWITCH YARD LOCATED.
Frg Turbojet, Tyler Vitti
Frg Turbojet, Tyler Vitti
Computer Engineering
Members of the Cal Poly SLO campus club FRG work together with students of several different disciplines to build a functional turbojet engine. Engineering approaches include design, fabrication, testing, and computer sensing, control, and integration. The goal of the project is to produce a running turbojet engine monitored and controlled by embedded hardware and specialized PC software. This project is to be used by later groups for further research and development.
Design And Implementation Of A Byzantine Fault Tolerance Framework For Non-Deterministic Applications, H. Zhang, Wenbing Zhao, Louise E. Moser, P. Michael Melliar-Smith
Design And Implementation Of A Byzantine Fault Tolerance Framework For Non-Deterministic Applications, H. Zhang, Wenbing Zhao, Louise E. Moser, P. Michael Melliar-Smith
Electrical and Computer Engineering Faculty Publications
State-machine-based replication is an effective way to increase the availability and dependability of mission-critical applications. However, all practical applications contain some degree of non-determinism. Consequently, ensuring strong replica consistency in the presence of application non-determinism has been one of the biggest challenges in building dependable distributed systems. In this Study, the authors propose a classification of common types of application non-determinism with respect to the requirement of achieving Byzantine fault tolerance (BFT), and present the design and implementation of a BFT framework that controls these types of non-determinism in a systematic manner.
Scheduling Architectures For Diffserv Networks With Input Queuing Switches, Mei Yang, Henry Selvaraj, Enyue Lu, Jianping Wang, S. Q. Zheng, Yingtao Jiang
Scheduling Architectures For Diffserv Networks With Input Queuing Switches, Mei Yang, Henry Selvaraj, Enyue Lu, Jianping Wang, S. Q. Zheng, Yingtao Jiang
Electrical & Computer Engineering Faculty Research
ue to its simplicity and scalability, the differentiated services (DiffServ) model is expected to be widely deployed across wired and wireless networks. Though supporting DiffServ scheduling algorithms for output-queuing (OQ) switches have been widely studied, there are few DiffServ scheduling algorithms for input-queuing (IQ) switches in the literaure. In this paper, we propose two algorithms for scheduling DiffServ DiffServ networks with IQ switches: the dynamic DiffServ scheduling (DDS) algorithm and the hierarchical DiffServ scheduling (HDS) algorithm. The basic idea of DDS and HDS is to schedule EF and AF traffic According to Their minimum service rates with the reserved bandwidth …