Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, 2024 Kennesaw State University
Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu
Master's Theses
The rapid advancement in Deep Learning (DL), especially in Reinforcement Learning (RL) and Imitation Learning (IL), has positioned it as a promising approach for a multitude of autonomous robotic systems. However, the current methodologies are predominantly constrained to singular setups, necessitating substantial data and extensive training periods. Moreover, these methods have exhibited suboptimal performance in tasks requiring long-horizontal maneuvers, such as Radio Frequency Identification (RFID) inventory, where a robot requires thousands of steps to complete.
In this thesis, we address the aforementioned challenges by presenting the Cross-modal Reasoning Model (CMRM), a novel zero-shot Imitation Learning policy, to tackle long-horizontal robotic …
Brain Computer Interface-Based Drone Control Using Gyroscopic Data From Head Movements, 2024 Georgia Southern University
Brain Computer Interface-Based Drone Control Using Gyroscopic Data From Head Movements, Ikaia Cacha Melton
Honors College Theses
This research explores the potential of using gyroscopic data from a person’s head movement to control a DJI Tello quadcopter via a Brain-Computer Interface (BCI). In this study, over 100 gyroscopic recordings capturing the X, Y and Z columns (formally known as GyroX, GyroY, GyroZ) between 4 volunteers with the Emotiv Epoc X headset were collected. The Emotiv Epoc X data captured (left, right, still, and forward) head movements of each participant associated with the DJI Tello quadcopter navigation. The data underwent thorough processing and analysis, revealing distinctive patterns in charts using Microsoft Excel. A Python condition algorithm was then …
Flexible Strain Gauge Sensors As Real-Time Stretch Receptors For Use In Biomimetic Bpa Muscle Applications, 2024 Portland State University
Flexible Strain Gauge Sensors As Real-Time Stretch Receptors For Use In Biomimetic Bpa Muscle Applications, Rochelle Jubert
Student Research Symposium
This work presents a novel approach to real-time length sensing for biomimetic Braided Pneumatic Actuators (BPAs) as artificial muscles in soft robotics applications. The use of artificial muscles enables the development of more interesting robotic designs that no longer depend on single rotation joints controlled by motors. Developing robots with these capabilities, however, produces more complexities in control and sensing. Joint encoders, the mainstay of robotic feedback, can no longer be used, so new methods of sensing are needed to get feedback on muscle behavior to implement intelligent controls. To address this need, flexible strain gauge sensors from Portland company, …
Evaluating The Effect Of Noise On Secure Quantum Networks, 2024 Kennesaw State University
Evaluating The Effect Of Noise On Secure Quantum Networks, Karthick Anbalagan
Master's Theses
This thesis focuses on examining the resilience of secure quantum networks to environmental noise. Specifically, we evaluate the effectiveness of two well-known quantum key distribution (QKD) protocols: the Coherent One-Way (COW) protocol and Kak’s Three-Stage protocol (Kak06). The thesis systematically evaluates these protocols in terms of their efficiency, operational feasibility, and resistance to noise, thereby contributing to the progress of secure quantum communications. Using simulations, this study evaluates the protocols in realistic scenarios that include factors such as noise and decoherence. The results illustrate each protocol’s relative benefits and limitations, highlighting the three-stage protocol’s superior security characteristics, resistance to interference, …
Machine Learning For Intrusion Detection Into Unmanned Aerial System 6g Networks, 2024 Embry-Riddle Aeronautical University
Machine Learning For Intrusion Detection Into Unmanned Aerial System 6g Networks, Faisal Alrefaei
Doctoral Dissertations and Master's Theses
Progress in the development of wireless network technology has played a crucial role in the evolution of societies and provided remarkable services over the past decades. It remotely offers the ability to execute critical missions and effective services that meet the user's needs. This advanced technology integrates cyber and physical layers to form cyber-physical systems (CPS), such as the Unmanned Aerial System (UAS), which consists of an Unmanned Aerial Vehicle (UAV), ground network infrastructure, communication link, etc. Furthermore, it plays a crucial role in connecting objects to create and develop the Internet of Things (IoT) technology. Therefore, the emergence of …
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, 2024 University at Albany, SUNY
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, 2024 Washington State University
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, 2024 University of Colorado, Colorado Springs (UCCS)
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Generative Machine Learning For Cyber Security, 2024 Washington State University
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Military Cyber Affairs
Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.
Machine Learning Security For Tactical Operations, 2024 Virginia Tech
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Military Cyber Affairs
Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, 2024 University at Albany
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, 2024 Virginia Tech
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Simulating Information And Communication Applications In Employee Interaction Network Models, 2024 University of Mary Washington
Simulating Information And Communication Applications In Employee Interaction Network Models, Matthew Kanter
Student Research Submissions
Information and communication technology (ICT) use has been identified throughout its development and evolution with the Internet boom as a net positive tool for most employees and organizations in the working world. Only recently have studies regarding employees’ well-being begun to come to the forefront of research regarding these rapidly evolving technologies, however these are important issues to discuss in the context of work-life boundary management, emotional exhaustion, overwhelming stress levels, and moral disengagement among other employee well-being dimensions. To explore how employees’ well being might be influenced by ICT use, this study conducted a quantitative survey and analyzed a …
Understanding Timing Error Characteristics From Overclocked Systolic Multiply-Accumulate Arrays In Fpgas, 2024 Utah State University
Understanding Timing Error Characteristics From Overclocked Systolic Multiply-Accumulate Arrays In Fpgas, Andrew S. Chamberlin
All Graduate Theses and Dissertations, Fall 2023 to Present
Artificial Intelligence (AI) is one of the biggest fields of research for computer hardware right now. Hardware accelerators are chips (such as graphics cards) that are purpose built to be the best at a specific type of operation. AI hardware accelerators are a growing field of research. Part of hardware in general is a digital clock that controls the pace at which computations occur. If this clock runs too quickly, the hardware won't have enough time to finish its computation. We call that a timing error. This paper focuses on studying the characteristics of timing errors in a small custom …
Automated Brain Tumor Classifier With Deep Learning, 2024 California State University – San Bernardino
Automated Brain Tumor Classifier With Deep Learning, Venkata Sai Krishna Chaitanya Kandula
Electronic Theses, Projects, and Dissertations
Brain Tumors are abnormal growth of cells within the brain that can be categorized as benign (non-cancerous) or malignant (cancerous). Accurate and timely classification of brain tumors is crucial for effective treatment planning and patient care. Medical imaging techniques like Magnetic Resonance Imaging (MRI) provide detailed visualizations of brain structures, aiding in diagnosis and tumor classification[8].
In this project, we propose a brain tumor classifier applying deep learning methodologies to automatically classify brain tumor images without any manual intervention. The classifier uses deep learning architectures to extract and classify brain MRI images. Specifically, a Convolutional Neural Network (CNN) …
Recommendation System Using Machine Learning For Fertilizer Prediction, 2024 California State University, San Bernardino
Recommendation System Using Machine Learning For Fertilizer Prediction, Durga Rajesh Bommireddy
Electronic Theses, Projects, and Dissertations
This project presents the development of a sophisticated machine-learning model aimed at enhancing agricultural productivity by predicting the optimal fertilizer suited to specific crop requirements. Leveraging a diverse set of features including soil color, pH levels, rainfall, temperature, and crop type, our model offers tailored recommendations to farmers. Three powerful algorithms, Support Vector Machines (SVM), Artificial Neural Networks (ANN), and XG-Boost, were implemented to facilitate the prediction process. Through comprehensive experimentation and evaluation, we assessed the performance of each algorithm in accurately predicting the best fertilizer for maximizing crop yield. The project not only contributes to the advancement of machine …
Simulating And Training Autonomous Rover Navigation In Unity Engine Using Local Sensor Data, 2024 Liberty University
Simulating And Training Autonomous Rover Navigation In Unity Engine Using Local Sensor Data, Christopher Pace
Senior Honors Theses
Autonomous navigation is essential to remotely operating mobile vehicles on Mars, as communication takes up to 20 minutes to travel between the Earth and Mars. Several autonomous navigation methods have been implemented in Mars rovers and other mobile robots, such as odometry or simultaneous localization and mapping (SLAM) until the past few years when deep reinforcement learning (DRL) emerged as a viable alternative. In this thesis, a simulation model for end-to-end DRL Mars rover autonomous navigation training was created using Unity Engine, using local inputs such as GNSS, LiDAR, and gyro. This model was then trained in navigation in a …
A Smart Hybrid Enhanced Recommendation And Personalization Algorithm Using Machine Learning, 2024 California State University - San Bernardino
A Smart Hybrid Enhanced Recommendation And Personalization Algorithm Using Machine Learning, Aswin Kumar Nalluri
Electronic Theses, Projects, and Dissertations
In today’s age of streaming services, the effectiveness and precision of recommendation systems are crucial in improving user satisfaction. This project introduces the Smart Hybrid Enhanced Recommendation and Personalization Algorithm (SHERPA) a cutting-edge machine learning approach aimed at transforming how movie suggestions are made. By combining Term Frequency Inverse Document Frequency (TF-IDF) for content based filtering and Alternating Squares (ALS) with Weighted Regularization for filtering SHERPA offers a sophisticated method for delivering tailored recommendations.
The algorithm underwent evaluation using a dataset that included over 50 million ratings from 480,000 Netflix users encompassing 17,000 movie titles. The performance of SHERPA was …
Cultural Awareness Application, 2024 California State University, San Bernardino
Cultural Awareness Application, Bharat Gupta
Electronic Theses, Projects, and Dissertations
In an increasingly interconnected global landscape, cultural awareness and competency have become indispensable skills for individuals and organizations alike. This paper introduces a pioneering cultural awareness application, grounded in the Cultural Orientation Model—a comprehensive framework devised by Dr. Walker [8]to guide individuals in understanding, appreciating, and effectively engaging with diverse cultures. The application encompasses ten primary dimensions, each representing fundamental aspects of social life shared by members of any socio-cultural environment. Through a combination of cultural education, interactive learning, guidance on cultural etiquette, and integration of cultural events, the application aims to foster empathy, tolerance, and effective cross-cultural communication skills. …
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, 2024 University of South Alabama
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Honors Theses
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …