Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

23,597 Full-Text Articles 38,421 Authors 8,340,641 Downloads 263 Institutions

All Articles in Computer Engineering

Faceted Search

23,597 full-text articles. Page 1 of 931.

Flexible Strain Gauge Sensors As Real-Time Stretch Receptors For Use In Biomimetic Bpa Muscle Applications, Rochelle Jubert 2024 Portland State University

Flexible Strain Gauge Sensors As Real-Time Stretch Receptors For Use In Biomimetic Bpa Muscle Applications, Rochelle Jubert

Student Research Symposium

This work presents a novel approach to real-time length sensing for biomimetic Braided Pneumatic Actuators (BPAs) as artificial muscles in soft robotics applications. The use of artificial muscles enables the development of more interesting robotic designs that no longer depend on single rotation joints controlled by motors. Developing robots with these capabilities, however, produces more complexities in control and sensing. Joint encoders, the mainstay of robotic feedback, can no longer be used, so new methods of sensing are needed to get feedback on muscle behavior to implement intelligent controls. To address this need, flexible strain gauge sensors from Portland company, …


Machine Learning For Intrusion Detection Into Unmanned Aerial System 6g Networks, Faisal Alrefaei 2024 Embry-Riddle Aeronautical University

Machine Learning For Intrusion Detection Into Unmanned Aerial System 6g Networks, Faisal Alrefaei

Doctoral Dissertations and Master's Theses

Progress in the development of wireless network technology has played a crucial role in the evolution of societies and provided remarkable services over the past decades. It remotely offers the ability to execute critical missions and effective services that meet the user's needs. This advanced technology integrates cyber and physical layers to form cyber-physical systems (CPS), such as the Unmanned Aerial System (UAS), which consists of an Unmanned Aerial Vehicle (UAV), ground network infrastructure, communication link, etc. Furthermore, it plays a crucial role in connecting objects to create and develop the Internet of Things (IoT) technology. Therefore, the emergence of …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel 2024 University at Albany, SUNY

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie 2024 Washington State University

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, LTC Ekzhin Ear, Dr. Shouhuai Xu 2024 University of Colorado, Colorado Springs (UCCS)

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin 2024 Washington State University

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin

Military Cyber Affairs

Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.


Machine Learning Security For Tactical Operations, Dr. DeNaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu 2024 Virginia Tech

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar 2024 University at Albany

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora 2024 Virginia Tech

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark 2024 University of South Alabama

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Poster Presentations

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Diegetic Sonification For Low Vision Gamers, Jhané Dawes 2024 Kennesaw State University

Diegetic Sonification For Low Vision Gamers, Jhané Dawes

Master's Theses

There are not many games designed for all players that provide accommodations for low vision users. This means that low vision users may not get to engage with the gaming community in the same way as their sighted peers. In this thesis, I explore how diegetic sonification can be used as a tool to support these low vision gamers in the typical gaming environment. I asked low vision players to engage with a prototype game level with two diegetic sonification techniques applied, without the use of their corrective lenses. I found that participants had more enjoyment and experienced less difficulty …


Summonable Construction Delivery Robot, Kevin M. Lewis 2024 Northern Illinois University

Summonable Construction Delivery Robot, Kevin M. Lewis

Honors Capstones

In many different construction industries, there is a need for tools, parts, and other necessary items to be transported quickly and efficiently over various types of terrain. Human resources have often been used to address these needs, which can become very time and cost inefficient over long periods. The design proposal here is aimed at addressing this need by developing an autonomous outdoor mobile robot based on a quadrupedal robot design. This approach differs by incorporating a wheeled and quadrupedal hybrid actuation system that provides terrain negotiation and speed at the appropriate times. The team uses Robot Operating System (ROS) …


Effectiveness Of Cnn-Lstm Models Used For Apple Stock Forecasting, Ethan White 2024 California State University, San Bernardino

Effectiveness Of Cnn-Lstm Models Used For Apple Stock Forecasting, Ethan White

Electronic Theses, Projects, and Dissertations

This culminating experience project investigates the effectiveness of convolutional neural networks mixed with long short-term memory (CNN-LSTM) models, and an ensemble method, extreme gradient boosting (XGBoost), in predicting closing stock prices. This quantitative analysis utilizes recent AAPL stock data from the NASDAQ index. The chosen research questions (RQs) are: RQ1. What are the optimal hyperparameters for CNN-LSTM models in stock price forecasting? RQ2. What is the best architecture for CNN-LSTM models in this context? RQ3. How can ensemble techniques like XGBoost effectively enhance the predictions of CNN-LSTM models for stock price forecasting?

The research questions were answered through a thorough …


Simulating And Training Autonomous Rover Navigation In Unity Engine Using Local Sensor Data, Christopher Pace 2024 Liberty University

Simulating And Training Autonomous Rover Navigation In Unity Engine Using Local Sensor Data, Christopher Pace

Senior Honors Theses

Autonomous navigation is essential to remotely operating mobile vehicles on Mars, as communication takes up to 20 minutes to travel between the Earth and Mars. Several autonomous navigation methods have been implemented in Mars rovers and other mobile robots, such as odometry or simultaneous localization and mapping (SLAM) until the past few years when deep reinforcement learning (DRL) emerged as a viable alternative. In this thesis, a simulation model for end-to-end DRL Mars rover autonomous navigation training was created using Unity Engine, using local inputs such as GNSS, LiDAR, and gyro. This model was then trained in navigation in a …


Automatic Speech Recognition For Air Traffic Control Using Convolutional Lstm, Sakshi Nakashe 2024 California State University, San Bernardino

Automatic Speech Recognition For Air Traffic Control Using Convolutional Lstm, Sakshi Nakashe

Electronic Theses, Projects, and Dissertations

The need for automatic speech recognition in air traffic control is critical as it enhances the interaction between the computer and human. Speech recognition helps to automatically transcribe the communication between the pilots and the air traffic controllers, which reduces the time taken for administrative tasks. This project aims to provide improvement to the Automatic Speech Recognition (ASR) system for air traffic control by investigating the impact of convolution LSTM model on ASR as suggested by previous studies. The research questions are: (Q1) Comparing the performance of ConvLSTM with other conventional models, how does ConvLSTM perform with respect to recognizing …


Understanding Timing Error Characteristics From Overclocked Systolic Multiply-Accumulate Arrays In Fpgas, Andrew S. Chamberlin 2024 Utah State University

Understanding Timing Error Characteristics From Overclocked Systolic Multiply-Accumulate Arrays In Fpgas, Andrew S. Chamberlin

All Graduate Theses and Dissertations, Fall 2023 to Present

Artificial Intelligence (AI) is one of the biggest fields of research for computer hardware right now. Hardware accelerators are chips (such as graphics cards) that are purpose built to be the best at a specific type of operation. AI hardware accelerators are a growing field of research. Part of hardware in general is a digital clock that controls the pace at which computations occur. If this clock runs too quickly, the hardware won't have enough time to finish its computation. We call that a timing error. This paper focuses on studying the characteristics of timing errors in a small custom …


Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark 2024 University of South Alabama

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Honors Theses

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Investigating Autonomous Ground Vehicles For Weed Elimination, Abraham Mitchell 2024 University of Arkansas, Fayetteville

Investigating Autonomous Ground Vehicles For Weed Elimination, Abraham Mitchell

Computer Science and Computer Engineering Undergraduate Honors Theses

The management of weeds in crop fields is a continuous agricultural problem. The use of herbicides is the most common solution, but herbicidal resistance decreases effectiveness, and the use of herbicides has been found to have severe adverse effects on human health and the environment. The use of autonomous drone systems for weed elimination is an emerging solution, but challenges in GPS-based localization and navigation can impact the effectiveness of these systems. The goal of this thesis is to evaluate techniques for minimizing localization errors of drones as they attempt to eliminate weeds. A simulation environment was created to model …


Cultural Awareness Application, Bharat Gupta 2024 California State University, San Bernardino

Cultural Awareness Application, Bharat Gupta

Electronic Theses, Projects, and Dissertations

In an increasingly interconnected global landscape, cultural awareness and competency have become indispensable skills for individuals and organizations alike. This paper introduces a pioneering cultural awareness application, grounded in the Cultural Orientation Model—a comprehensive framework devised by Dr. Walker [8]to guide individuals in understanding, appreciating, and effectively engaging with diverse cultures. The application encompasses ten primary dimensions, each representing fundamental aspects of social life shared by members of any socio-cultural environment. Through a combination of cultural education, interactive learning, guidance on cultural etiquette, and integration of cultural events, the application aims to foster empathy, tolerance, and effective cross-cultural communication skills. …


A Smart Hybrid Enhanced Recommendation And Personalization Algorithm Using Machine Learning, Aswin Kumar Nalluri 2024 California State University - San Bernardino

A Smart Hybrid Enhanced Recommendation And Personalization Algorithm Using Machine Learning, Aswin Kumar Nalluri

Electronic Theses, Projects, and Dissertations

In today’s age of streaming services, the effectiveness and precision of recommendation systems are crucial in improving user satisfaction. This project introduces the Smart Hybrid Enhanced Recommendation and Personalization Algorithm (SHERPA) a cutting-edge machine learning approach aimed at transforming how movie suggestions are made. By combining Term Frequency Inverse Document Frequency (TF-IDF) for content based filtering and Alternating Squares (ALS) with Weighted Regularization for filtering SHERPA offers a sophisticated method for delivering tailored recommendations.

The algorithm underwent evaluation using a dataset that included over 50 million ratings from 480,000 Netflix users encompassing 17,000 movie titles. The performance of SHERPA was …


Digital Commons powered by bepress