Open Access. Powered by Scholars. Published by Universities.®

Other Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 105

Full-Text Articles in Other Engineering

A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector Apr 2024

A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector

Cybersecurity Undergraduate Research Showcase

CRASHOVERRIDE is a modular malware tailor-made for electric grid Industrial Control System (ICS) equipment and was deployed by a group named ELECTRUM in a Ukrainian substation. The malware would launch a protocol exploit to flip breakers and would then wipe the system of ICS files. Finally, it would execute a Denial Of Service (DOS) attack on protective relays. In effect, months of damage and thousands out of power. However, due to oversights the malware only caused a brief power outage. Though the implications of the malware are cause for researching and implementing countermeasures against others to come. The CISA recommends …


Immersive Japanese Language Learning Web Application Using Spaced Repetition, Active Recall, And An Artificial Intelligent Conversational Chat Agent Both In Voice And In Text, Marc Butler Apr 2024

Immersive Japanese Language Learning Web Application Using Spaced Repetition, Active Recall, And An Artificial Intelligent Conversational Chat Agent Both In Voice And In Text, Marc Butler

MS in Computer Science Project Reports

In the last two decades various human language learning applications, spaced repetition software, online dictionaries, and artificial intelligent chat agents have been developed. However, there is no solution to cohesively combine these technologies into a comprehensive language learning application including skills such as speaking, typing, listening, and reading. Our contribution is to provide an immersive language learning web application to the end user which combines spaced repetition, a study technique used to review information at systematic intervals, and active recall, the process of purposely retrieving information from memory during a review session, with an artificial intelligent conversational chat agent both …


Towards Algorithmic Justice: Human Centered Approaches To Artificial Intelligence Design To Support Fairness And Mitigate Bias In The Financial Services Sector, Jihyun Kim Jan 2024

Towards Algorithmic Justice: Human Centered Approaches To Artificial Intelligence Design To Support Fairness And Mitigate Bias In The Financial Services Sector, Jihyun Kim

CMC Senior Theses

Artificial Intelligence (AI) has positively transformed the Financial services sector but also introduced AI biases against protected groups, amplifying existing prejudices against marginalized communities. The financial decisions made by biased algorithms could cause life-changing ramifications in applications such as lending and credit scoring. Human Centered AI (HCAI) is an emerging concept where AI systems seek to augment, not replace human abilities while preserving human control to ensure transparency, equity and privacy. The evolving field of HCAI shares a common ground with and can be enhanced by the Human Centered Design principles in that they both put humans, the user, at …


All Hands On Deck: Choosing Virtual End Effector Representations To Improve Near Field Object Manipulation Interactions In Extended Reality, Roshan Venkatakrishnan Aug 2023

All Hands On Deck: Choosing Virtual End Effector Representations To Improve Near Field Object Manipulation Interactions In Extended Reality, Roshan Venkatakrishnan

All Dissertations

Extended reality, or "XR", is the adopted umbrella term that is heavily gaining traction to collectively describe Virtual reality (VR), Augmented reality (AR), and Mixed reality (MR) technologies. Together, these technologies extend the reality that we experience either by creating a fully immersive experience like in VR or by blending in the virtual and "real" worlds like in AR and MR.

The sustained success of XR in the workplace largely hinges on its ability to facilitate efficient user interactions. Similar to interacting with objects in the real world, users in XR typically interact with virtual integrants like objects, menus, windows, …


Identifying Key Activity Indicators In Rats' Neuronal Data Using Lasso Regularized Logistic Regression, Avery Woods May 2023

Identifying Key Activity Indicators In Rats' Neuronal Data Using Lasso Regularized Logistic Regression, Avery Woods

Honors Theses

This thesis aims to identify timestamps of rats’ neuronal activity that best determine behavior using a machine learning model. Neuronal data is a complex and high-dimensional dataset, and identifying the most informative features is crucial for understanding the underlying neuronal processes. The Lasso regularization technique is employed to select the most relevant features of the data to the model’s prediction. The results of this study provide insights into the key activity indicators that are associated with specific behaviors or cognitive processes in rats, as well as the effect that stress can have on neuronal activity and behavior. Ultimately, it was …


Defining Safe Training Datasets For Machine Learning Models Using Ontologies, Lynn C. Vonder Haar Apr 2023

Defining Safe Training Datasets For Machine Learning Models Using Ontologies, Lynn C. Vonder Haar

Doctoral Dissertations and Master's Theses

Machine Learning (ML) models have been gaining popularity in recent years in a wide variety of domains, including safety-critical domains. While ML models have shown high accuracy in their predictions, they are still considered black boxes, meaning that developers and users do not know how the models make their decisions. While this is simply a nuisance in some domains, in safetycritical domains, this makes ML models difficult to trust. To fully utilize ML models in safetycritical domains, there needs to be a method to improve trust in their safety and accuracy without human experts checking each decision. This research proposes …


Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer Dec 2022

Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer

Symposium of Student Scholars

When navigating in unknown and unstructured environments, Unmanned Arial Vehicles (UAVs) can struggle when attempting to preform Simultaneous Localization and Mapping (SLAM) operations. Particularly challenging circumstance arise when an UAV may need to land or otherwise navigate through treacherous environments. As the primary UAV may be too large and unwieldly to safely investigate in these types of situations, this research effort proposes the use of actively guided CanSats for assisting in localization and mapping of unstructured environments. A complex UAV could carry multiple of these SLAM capable CanSats, and when additional mapping and localization capabilities where required, the CanSat would …


Warehouse And Logistics: Smart Picking With Vuzix Smart Glasses, Elise Hemink Apr 2022

Warehouse And Logistics: Smart Picking With Vuzix Smart Glasses, Elise Hemink

Frameless

Vuzix is an industry leader in augmented reality (AR) technology. We provide innovative products to an array of industries, a few being defense, security, enterprise, and consumers. Our AR technology provides a perfect balance of engagement in the digital and real worlds thanks to their innovative optics, AI apps and 5G capability.


Performance Improvements In Inner Product Encryption, Serena Riback Apr 2022

Performance Improvements In Inner Product Encryption, Serena Riback

Honors Scholar Theses

Consider a database that contains thousands of entries of the iris biometric. Each entry identifies an individual, so it is especially important that it remains secure. However, searching for entries among an encrypted database proves to be a security problem - how should one search encrypted data without leaking any information to a potential attacker? The proximity searchable encryption scheme, as discussed in the work by Cachet et al., uses the notions of inner product encryption developed by Kim et al.. In this paper, we will focus on the efficiency of these schemes. Specifically, how the symmetry of the bilinear …


A Deep Learning-Based Approach To Extraction Of Filler Morphology In Sem Images With The Application Of Automated Quality Inspection, Md. Fashiar Rahman, Tzu-Liang Bill Tseng, Jianguo Wu, Yuxin Wen, Yirong Lin Mar 2022

A Deep Learning-Based Approach To Extraction Of Filler Morphology In Sem Images With The Application Of Automated Quality Inspection, Md. Fashiar Rahman, Tzu-Liang Bill Tseng, Jianguo Wu, Yuxin Wen, Yirong Lin

Engineering Faculty Articles and Research

Automatic extraction of filler morphology (size, orientation, and spatial distribution) in Scanning Electron Microscopic (SEM) images is essential in many applications such as automatic quality inspection in composite manufacturing. Extraction of filler morphology greatly depends on accurate segmentation of fillers (fibers and particles), which is a challenging task due to the overlap of fibers and particles and their obscure presence in SEM images. Convolution Neural Networks (CNNs) have been shown to be very effective at object recognition in digital images. This paper proposes an automatic filler detection system in SEM images, utilizing a Mask Region-based CNN architecture. The proposed system …


Representation Learning For Chemical Activity Predictions, Mohamed S. Ayed Feb 2022

Representation Learning For Chemical Activity Predictions, Mohamed S. Ayed

Dissertations, Theses, and Capstone Projects

Computational prediction of a phenotypic response upon the chemical perturbation on a biological system plays an important role in drug discovery and many other applications. Chemical fingerprints derived from chemical structures are a widely used feature to build machine learning models. However, the fingerprints ignore the biological context, thus, they suffer from several problems such as the activity cliff and curse of dimensionality. Fundamentally, the chemical modulation of biological activities is a multi-scale process. It is the genome-wide chemical-target interactions that modulate chemical phenotypic responses. Thus, the genome-scale chemical-target interaction profile will more directly correlate with in vitro and in …


Jointly-Learnt Networks For Future Action Anticipation Via Self-Knowledge Distillation And Cycle Consistency, Md Moniruzzaman, Zhaozheng Yin, Zhihai He, Ming-Chuan Leu, Ruwen Qin Jan 2022

Jointly-Learnt Networks For Future Action Anticipation Via Self-Knowledge Distillation And Cycle Consistency, Md Moniruzzaman, Zhaozheng Yin, Zhihai He, Ming-Chuan Leu, Ruwen Qin

Mechanical and Aerospace Engineering Faculty Research & Creative Works

Future action anticipation aims to infer future actions from the observation of a small set of past video frames. In this paper, we propose a novel Jointly learnt Action Anticipation Network (J-AAN) via Self-Knowledge Distillation (Self-KD) and cycle consistency for future action anticipation. In contrast to the current state-of-the-art methods which anticipate the future actions either directly or recursively, our proposed J-AAN anticipates the future actions jointly in both direct and recursive ways. However, when dealing with future action anticipation, one important challenge to address is the future's uncertainty since multiple action sequences may come from or be followed by …


There From The Beginning: The Women Of Los Alamos National Laboratory Supporting National And International Nuclear Security, Olga Martin, Laura Mcclellan, Octavio Ramos, Heather Quinn Jan 2022

There From The Beginning: The Women Of Los Alamos National Laboratory Supporting National And International Nuclear Security, Olga Martin, Laura Mcclellan, Octavio Ramos, Heather Quinn

International Journal of Nuclear Security

From the beginning of the Manhattan Project in the early 1940s, the women of what would become Los Alamos National Laboratory (LANL) worked in technical positions alongside their male counterparts, played a key role as computers, and worked in administrative jobs as secretaries, phone operators, bookkeepers, and on behalf of the U.S. Army in the Women’s Army Corps.

Throughout the history of the Laboratory, women experts at LANL helped establish and lead important national and international security programs, with careers in science, technology, engineering, and mathematics. Over time, the women of Los Alamos have come together under various Employee Resource …


Convolutional Neural Networks For Deflate Data Encoding Classification Of High Entropy File Fragments, Nehal Ameen May 2021

Convolutional Neural Networks For Deflate Data Encoding Classification Of High Entropy File Fragments, Nehal Ameen

University of New Orleans Theses and Dissertations

Data reconstruction is significantly improved in terms of speed and accuracy by reliable data encoding fragment classification. To date, work on this problem has been successful with file structures of low entropy that contain sparse data, such as large tables or logs. Classifying compressed, encrypted, and random data that exhibit high entropy is an inherently difficult problem that requires more advanced classification approaches. We explore the ability of convolutional neural networks and word embeddings to classify deflate data encoding of high entropy file fragments after establishing ground truth using controlled datasets. Our model is designed to either successfully classify file …


Characterizing Students’ Engineering Design Strategies Using Energy3d, Jasmine Singh, Viranga Perera, Alejandra Magana, Brittany Newell Apr 2021

Characterizing Students’ Engineering Design Strategies Using Energy3d, Jasmine Singh, Viranga Perera, Alejandra Magana, Brittany Newell

Discovery Undergraduate Interdisciplinary Research Internship

The goals of this study are to characterize design actions that students performed when solving a design challenge, and to create a machine learning model to help future students make better engineering design choices. We analyze data from an introductory engineering course where students used Energy3D, an open source computer-aided design software, to design a zero-energy home (i.e. a home that consumes no net energy over a period of a year). Student design actions within the software were recorded into text files. Using a sample of over 300 students, we first identify patterns in the data to assess how students …


Development Of Reduced Order Models Using Reservoir Simulation And Physics Informed Machine Learning Techniques, Mark V. Behl Jr Nov 2020

Development Of Reduced Order Models Using Reservoir Simulation And Physics Informed Machine Learning Techniques, Mark V. Behl Jr

LSU Master's Theses

Reservoir simulation is the industry standard for prediction and characterization of processes in the subsurface. However, simulation is computationally expensive and time consuming. This study explores reduced order models (ROMs) as an appropriate alternative. ROMs that use neural networks effectively capture nonlinear dependencies, and only require available operational data as inputs. Neural networks are a black box and difficult to interpret, however. Physics informed neural networks (PINNs) provide a potential solution to these shortcomings, but have not yet been applied extensively in petroleum engineering.

A mature black-oil simulation model from Volve public data release was used to generate training data …


Big-Data Talent Analytics In The Public Sector: A Promotion And Firing Model Of Employees At Federal Agencies, Rabih Neouchi Oct 2019

Big-Data Talent Analytics In The Public Sector: A Promotion And Firing Model Of Employees At Federal Agencies, Rabih Neouchi

Operations Research and Engineering Management Theses and Dissertations

Talent analytics is a relatively new area of focus to researchers working in analytics and data science. Talent Analytics has the potential to help companies make many informed critical decisions around talent acquisition, promotion and retention. This work investigates data science to predict “shiny star” employees in the U.S. public sector, defined as top-notch performers over the years of a given time span. Its scope falls within talent analytics, also called people analytics, a relatively new research area.

We clean a data set made available by the U.S. Office of Personnel Management (OPM) and present two models to predict the …


Predicting The Hardness Of Turf Surfaces From A Soil Moisture Sensor Using Iot Technologies, Ann Marie Mckeon Sep 2019

Predicting The Hardness Of Turf Surfaces From A Soil Moisture Sensor Using Iot Technologies, Ann Marie Mckeon

Other

In horseracing, “the going” is a term to describe the racetrack ground conditions. In Ireland presently, a groundskeeper or course clerk walks the racecourse poking it with a blackthorn stick, assesses conditions, and declares the going – it is a subjective measurement.

This thesis will propose using remote low-cost soil moisture sensors to gather high frequency data about the soil water content in the ground and to enable informed decisions to be made. This will remove the subjective element from the ground hardness, and look at the data in an objective way.

The soil moisture sensor will systematically collect high …


Design Of Artificial Swarms Using Network Motifs: A Simulation Study, Khoinguyen Trinh May 2019

Design Of Artificial Swarms Using Network Motifs: A Simulation Study, Khoinguyen Trinh

Mechanical Engineering Undergraduate Honors Theses

The objective of this research is to develop a new approach in engineering complex swarm systems with desired characteristics based on the theory of network motifs – subgraphs that repeat themselves (patterns) among various networks. System engineering has traditionally followed a top-down methodology which creates a framework for the system and adds additional features to meet specific design requirements. Meanwhile, complex swarm systems, such as ant colonies and bird flocks, are formed via a bottom-up manner where the system-level structure directly emerges from the interactions and behaviors among individuals. The behaviors of these individuals cannot be directly controlled, which makes …


Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski Dec 2018

Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


Multidimensional Feature Engineering For Post-Translational Modification Prediction Problems, Norman Mapes Jr. Nov 2018

Multidimensional Feature Engineering For Post-Translational Modification Prediction Problems, Norman Mapes Jr.

Doctoral Dissertations

Protein sequence data has been produced at an astounding speed. This creates an opportunity to characterize these proteins for the treatment of illness. A crucial characterization of proteins is their post translational modifications (PTM). There are 20 amino acids coded by DNA after coding (translation) nearly every protein is modified at an amino acid level. We focus on three specific PTMs. First is the bonding formed between two cysteine amino acids, thus introducing a loop to the straight chain of a protein. Second, we predict which cysteines can generally be modified (oxidized). Finally, we predict which lysine amino acids are …


Fundamentals Of Neutrosophic Logic And Sets And Their Role In Artificial Intelligence (Fundamentos De La Lógica Y Los Conjuntos Neutrosóficos Y Su Papel En La Inteligencia Artificial ), Florentin Smarandache, Maykel Leyva-Vazquez Jan 2018

Fundamentals Of Neutrosophic Logic And Sets And Their Role In Artificial Intelligence (Fundamentos De La Lógica Y Los Conjuntos Neutrosóficos Y Su Papel En La Inteligencia Artificial ), Florentin Smarandache, Maykel Leyva-Vazquez

Branch Mathematics and Statistics Faculty and Staff Publications

Neutrosophy is a new branch of philosophy which studies the origin, nature and scope of neutralities. This has formed the basis for a series of mathematical theories that generalize the classical and fuzzy theories such as the neutrosophic sets and the neutrosophic logic. In the paper, the fundamental concepts related to neutrosophy and its antecedents are presented. Additionally, fundamental concepts of artificial intelligence will be defined and how neutrosophy has come to strengthen this discipline.


Travel To Extraterrestrial Bodies Over Time: Some Exploratory Analyses Of Mission Data, Venkat Kodali, Rohith Kumar Reddy Duggirala, Richard S. Segall, Hyacinthe Aboudja, Daniel Berleant Jan 2018

Travel To Extraterrestrial Bodies Over Time: Some Exploratory Analyses Of Mission Data, Venkat Kodali, Rohith Kumar Reddy Duggirala, Richard S. Segall, Hyacinthe Aboudja, Daniel Berleant

Journal of the Arkansas Academy of Science

This paper discusses data pertaining to space missions to astronomical bodies beyond earth. The analyses provide summarizing facts and graphs obtained by mining data about (1) missions launched by all countries that go to the moon and planets, and (2) Earth satellites obtained from a Union of Concerned Scientists (UCS) dataset and lists of publically available satellite data.


Full Simulation For The Qweak Experiment At 1.16 And 0.877 Gev And Their Impact On Extracting The Pv Asymmetry In The N→Δ A Transition, Hend Abdullah Nuhait Jul 2017

Full Simulation For The Qweak Experiment At 1.16 And 0.877 Gev And Their Impact On Extracting The Pv Asymmetry In The N→Δ A Transition, Hend Abdullah Nuhait

Doctoral Dissertations

The Qweak project is seeking to find new physics beyond the Standard Model. It is aimed to measure the weak charge of the proton, which has never been measured, at 4% precision at low momentum transfer. The experiment is performed by scattering electrons from protons and exploiting parity violation in the weak interaction at low four-momentum transfer.

In this experiment, two measurements were considered: which are elastic and inelastic. The elastic is to measure the proton's weak charge. In addition, the inelastic asymmetry measurement, which will extract the low energy constant dΔ. That measurement works in the neutral current …


C.V. - Wojciech Budzianowski, Wojciech M. Budzianowski Jan 2017

C.V. - Wojciech Budzianowski, Wojciech M. Budzianowski

Wojciech Budzianowski

-


Renewable Energy And Sustainable Development (Resd) Group, Wojciech M. Budzianowski Jan 2017

Renewable Energy And Sustainable Development (Resd) Group, Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


Procesy Cieplne I Aparaty (Lab), Wojciech M. Budzianowski Jan 2016

Procesy Cieplne I Aparaty (Lab), Wojciech M. Budzianowski

Wojciech Budzianowski

-


Inżynieria Chemiczna Lab., Wojciech M. Budzianowski Jan 2016

Inżynieria Chemiczna Lab., Wojciech M. Budzianowski

Wojciech Budzianowski

-


Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes Jun 2015

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

- From in-car video recording to body-worn video recording

- Exploring available technologies: how do they work, pros and cons

- Storing direct evidence in secure storage: factors to consider

- Citizens “shooting” back with POV tech – what are their rights?

- Crowdsourced sousveillance- harnessing public data for forensic profiling

- Police force policies and practices on the application of new media


Design, Programming, And User-Experience, Kaila G. Manca May 2015

Design, Programming, And User-Experience, Kaila G. Manca

Honors Scholar Theses

This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.

I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.

The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …