Hierarchical Damage Correlations For Old Photo Restoration, 2024 Singapore Management University
Hierarchical Damage Correlations For Old Photo Restoration, Weiwei Cai, Xuemiao Xu, Jiajia Xu, Huaidong Zhang, Haoxin Yang, Kun Zhang, Shengfeng He
Research Collection School Of Computing and Information Systems
Restoring old photographs can preserve cherished memories. Previous methods handled diverse damages within the same network structure, which proved impractical. In addition, these methods cannot exploit correlations among artifacts, especially in scratches versus patch-misses issues. Hence, a tailored network is particularly crucial. In light of this, we propose a unified framework consisting of two key components: ScratchNet and PatchNet. In detail, ScratchNet employs the parallel Multi-scale Partial Convolution Module to effectively repair scratches, learning from multi-scale local receptive fields. In contrast, the patch-misses necessitate the network to emphasize global information. To this end, we incorporate a transformer-based encoder and decoder …
A Nlp Approach To Automating The Generation Of Surveys For Market Research, 2024 Georgia Southern University
A Nlp Approach To Automating The Generation Of Surveys For Market Research, Anav Chug
Honors College Theses
Market Research is vital but includes activities that are often laborious and time consuming. Survey questionnaires are one possible output of the process and market researchers spend a lot of time manually developing questions for focus groups. The proposed research aims to develop a software prototype that utilizes Natural Language Processing (NLP) to automate the process of generating survey questions for market research. The software uses a pre-trained Open AI language model to generate multiple choice survey questions based on a given product prompt, send it to a targeted email list, and also provides a real-time analysis of the responses …
Surmounting Challenges In Aggregating Results From Static Analysis Tools, 2024 Montana State University
Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta
Military Cyber Affairs
Aggregation poses a significant challenge for software practitioners because it requires a comprehensive and nuanced understanding of raw data from diverse sources. Suites of static-analysis tools (SATs) are commonly used to assess organizational security but simultaneously introduce significant challenges. Challenges include unique results, scales, configuration environments for each SAT execution, and incompatible formats between SAT outputs. Here, we document our experiences addressing these issues. We highlight the problem of relying on a single vendor's SAT version and offer a solution for aggregating findings across multiple SATs, aiming to enhance software security practices and deter threats early with robust defensive operations.
Generative Machine Learning For Cyber Security, 2024 Washington State University
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Military Cyber Affairs
Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.
An Evaluation Of Heart Rate Monitoring With In-Ear Microphones Under Motion, 2024 Singapore Management University
An Evaluation Of Heart Rate Monitoring With In-Ear Microphones Under Motion, Kayla-Jade Butkow, Ting Dang, Andrea Ferlini, Dong Ma, Yang Liu, Cecilia Mascolo
Research Collection School Of Computing and Information Systems
With the soaring adoption of in-ear wearables, the research community has started investigating suitable in-ear heart rate detection systems. Heart rate is a key physiological marker of cardiovascular health and physical fitness. Continuous and reliable heart rate monitoring with wearable devices has therefore gained increasing attention in recent years. Existing heart rate detection systems in wearables mainly rely on photoplethysmography (PPG) sensors, however, these are notorious for poor performance in the presence of human motion. In this work, leveraging the occlusion effect that enhances low-frequency bone-conducted sounds in the ear canal, we investigate for the first time in-ear audio-based motion-resilient …
Exploring Decentralized Computing Using Solid And Ipfs For Social Media Applications, 2024 University of Arkansas, Fayetteville
Exploring Decentralized Computing Using Solid And Ipfs For Social Media Applications, Pranav Balasubramanian Natarajan
Computer Science and Computer Engineering Undergraduate Honors Theses
As traditional centralized social media platforms face growing concerns over data privacy, censorship, and lack of user control, there has been an increasing interest in decentralized alternatives. This thesis explores the design and implementation of a decentralized social media application by integrating two key technologies: Solid and the InterPlanetary File System (IPFS). Solid, led by Sir Tim Berners-Lee, enables users to store and manage their personal data in decentralized "Pods," giving them ownership over their digital identities. IPFS, a peer-to-peer hypermedia protocol, facilitates decentralized file storage and sharing, ensuring content availability and resilience against censorship. By leveraging these technologies, the …
The Quantitative Analysis And Visualization Of Nfl Passing Routes, 2024 University of Arkansas, Fayetteville
The Quantitative Analysis And Visualization Of Nfl Passing Routes, Sandeep Chitturi
Computer Science and Computer Engineering Undergraduate Honors Theses
The strategic planning of offensive passing plays in the NFL incorporates numerous variables, including defensive coverages, player positioning, historical data, etc. This project develops an application using an analytical framework and an interactive model to simulate and visualize an NFL offense's passing strategy under varying conditions. Using R-programming and data management, the model dynamically represents potential passing routes in response to different defensive schemes. The system architecture integrates data from historical NFL league years to generate quantified route scores through designed mathematical equations. This allows for the prediction of potential passing routes for offensive skill players in response to the …
Semantic Segmentation Of Point Cloud Sequences Using Point Transformer V3, 2024 Kennesaw State University
Semantic Segmentation Of Point Cloud Sequences Using Point Transformer V3, Marion Sisk
Master's Theses
Semantic segmentation of point clouds is a basic step for many autonomous systems including automobiles. In autonomous driving systems, LiDAR sensors are frequently used to produce point cloud sequences that allow the system to perceive the environment and navigate safely. Modern machine learning techniques for segmentation have predominately focused on single-scan segmentation, however sequence segmentation has often proven to perform better on common segmentation metrics. Using the popular Semantic KITTI dataset, we show that by providing point cloud sequences to a segmentation pipeline based on Point Transformer v3, we increase the segmentation performance between seven and fifteen percent when compared …
A System Of Communication Between Two Computers Using Novel Frequency Shift Keying Techniques, 2024 University of South Dakota
A System Of Communication Between Two Computers Using Novel Frequency Shift Keying Techniques, Jared Reyes
Honors Thesis
Frequency shift keying (FSK) is an old but powerful form of modulation that powered much of the early modems of the 1960’s, and the author felt inspired to make his own version of audio binary FSK modulation. He researched the general history and legacy of the Bell 103, a modem using FSK that defined telecommunication for the next few decades. Using research of the most common English characters of recent emails to determine which English characters should have the shortest bit length, a novel character encoding standard was created using variable bit rate. In addition, he has created a modulation …
Data Engineering: Building Software Efficiency In Medium To Large Organizations, 2024 Whittier College
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Whittier Scholars Program
The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.
A Design Science Approach To Investigating Decentralized Identity Technology, 2024 William & Mary
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Binder, 2024 Arkansas Tech University
Binder, Tyler A. Peaster, Lindsey M. Davenport, Madelyn Little, Alex Bales
ATU Research Symposium
Binder is a mobile application that aims to introduce readers to a book recommendation service that appeals to devoted and casual readers. The main goal of Binder is to enrich book selection and reading experience. This project was created in response to deficiencies in the mobile space for book suggestions, library management, and reading personalization. The tools we used to create the project include Visual Studio, .Net Maui Framework, C#, XAML, CSS, MongoDB, NoSQL, Git, GitHub, and Figma. The project’s selection of books were sourced from the Google Books repository. Binder aims to provide an intuitive interface that allows users …
Jsper (Just Stablediffusion Plus Easy Retraining), 2024 Arkansas Tech University
Jsper (Just Stablediffusion Plus Easy Retraining), Adam Rusterholz, Meghan Finn, Zach Zolliecoffer, Zach Judy
ATU Research Symposium
JSPER is an an AI art generation Web Application that is both flexible and accessible. Our goal is to enable anyone to create and use their own customized art models, regardless of technical skill level. These models can be trained on almost anything, from a person, to an animal, to a specific object, or even style. The user only has to upload a handful of images of their subject. Then, training settings get optimized at the push of a button to match the type of subject the user is training. After training, their customized model can be used to generate …
Rescape: Transforming Coral-Reefscape Images For Quantitative Analysis, 2024 Florida Institute of Technology
Rescape: Transforming Coral-Reefscape Images For Quantitative Analysis, Zachary Ferris, Eraldo Ribeiro, Tomofumi Nagata, Robert Van Woesik
Ocean Engineering and Marine Sciences Faculty Publications
Ever since the first image of a coral reef was captured in 1885, people worldwide have been accumulating images of coral reefscapes that document the historic conditions of reefs. However, these innumerable reefscape images suffer from perspective distortion, which reduces the apparent size of distant taxa, rendering the images unusable for quantitative analysis of reef conditions. Here we solve this century-long distortion problem by developing a novel computer-vision algorithm, ReScape, which removes the perspective distortion from reefscape images by transforming them into top-down views, making them usable for quantitative analysis of reef conditions. In doing so, we demonstrate the …
A Smart Resume Builder Tool Using Generative Ai, 2024 Fort Hays State University
A Smart Resume Builder Tool Using Generative Ai, Ivan A. Velo Castaneda, Anas Hourani, Magdalene Moy
SACAD: John Heinrichs Scholarly and Creative Activity Days
Crafting a standout resume is crucial in today’s competitive job market. Not only does it create a strong first impression on employers but it also it opens the doors for endless job opportunities. Despite existing resume assistance for FHSU students on the Career Services page, there's a lack of tools for generating or streamlining the resume writing process. To address this issue, an efficient resume builder utilizing OpenAI’s GPT-3.5 model was developed specifically for FHSU students. Its key features include intuitive template selection, dynamic AI-generated content for tailored resumes, multi-format output supporting PDF and Word formats, and a user-friendly experience …
Software Based Approach To Realtime Sports Graphics, 2024 Fort Hays State University
Software Based Approach To Realtime Sports Graphics, Honesty Beaton
SACAD: John Heinrichs Scholarly and Creative Activity Days
My research presents a software-based approach to real-time sports graphics, leveraging Unity, C#, and OpenCV. We aimed to enhance viewer engagement by providing dynamic and interactive graphics during sports broadcasts. My method involves real-time analysis of video feeds to cut out players, place them onto a virtual court, and underlay immersive visuals, giving the appearance that virtual visuals physically exist beneath a player. Evaluation of this approach demonstrates the effectiveness of utilizing a software-based approach for real-time sports graphics, akin to traditional hardware-based solutions
Acav: A Framework For Automatic Causality Analysis In Autonomous Vehicle Accident Recordings, 2024 Singapore Management University
Acav: A Framework For Automatic Causality Analysis In Autonomous Vehicle Accident Recordings, Huijia Sun, Christopher M. Poskitt, Yang Sun, Jun Sun, Yuqi Chen
Research Collection School Of Computing and Information Systems
The rapid progress of autonomous vehicles (AVs) has brought the prospect of a driverless future closer than ever. Recent fatalities, however, have emphasized the importance of safety validation through large-scale testing. Multiple approaches achieve this fully automatically using high-fidelity simulators, i.e., by generating diverse driving scenarios and evaluating autonomous driving systems (ADSs) against different test oracles. While effective at finding violations, these approaches do not identify the decisions and actions that caused them -- information that is critical for improving the safety of ADSs. To address this challenge, we propose ACAV, an automated framework designed to conduct causality analysis for …
Redriver: Runtime Enforcement For Autonomous Vehicles, 2024 Singapore Management University
Redriver: Runtime Enforcement For Autonomous Vehicles, Yang Sun, Christopher M. Poskitt, Xiaodong Zhang, Jun Sun
Research Collection School Of Computing and Information Systems
Autonomous driving systems (ADSs) integrate sensing, perception, drive control, and several other critical tasks in autonomous vehicles, motivating research into techniques for assessing their safety. While there are several approaches for testing and analysing them in high-fidelity simulators, ADSs may still encounter additional critical scenarios beyond those covered once they are deployed on real roads. An additional level of confidence can be established by monitoring and enforcing critical properties when the ADS is running. Existing work, however, is only able to monitor simple safety properties (e.g., avoidance of collisions) and is limited to blunt enforcement mechanisms such as hitting the …
Exploring The Potential Of Chatgpt In Automated Code Refinement: An Empirical Study, 2024 Singapore Management University
Exploring The Potential Of Chatgpt In Automated Code Refinement: An Empirical Study, Qi Guo, Shangqing Liu, Junming Cao, Xiaohong Li, Xin Peng, Xiaofei Xie, Bihuan Chen
Research Collection School Of Computing and Information Systems
Code review is an essential activity for ensuring the quality and maintainability of software projects. However, it is a time-consuming and often error-prone task that can significantly impact the development process. Recently, ChatGPT, a cutting-edge language model, has demonstrated impressive performance in various natural language processing tasks, suggesting its potential to automate code review processes. However, it is still unclear how well ChatGPT performs in code review tasks. To fill this gap, in this paper, we conduct the first empirical study to understand the capabilities of ChatGPT in code review tasks, specifically focusing on automated code refinement based on given …
Marco: A Stochastic Asynchronous Concolic Explorer, 2024 Singapore Management University
Marco: A Stochastic Asynchronous Concolic Explorer, Jie Hu, Yue Duan, Heng Yin
Research Collection School Of Computing and Information Systems
Concolic execution is a powerful program analysis technique for code path exploration. Despite recent advances that greatly improved the efficiency of concolic execution engines, path constraint solving remains a major bottleneck of concolic testing. An intelligent scheduler for inputs/branches becomes even more crucial. Our studies show that the previously under-studied branch-flipping policy adopted by state-of-the-art concolic execution engines has several limitations. We propose to assess each branch by its potential for new code coverage from a global view, concerning the path divergence probability at each branch. To validate this idea, we implemented a prototype Marco and evaluated it against the …