3d Bionic Arm, 2021 CUNY New York City College of Technology
3d Bionic Arm, Anny Baez Silfa
Publications and Research
Previous work had been done on what was an adaptation of a robotic arm for Roboqueen, which is a persistent research project of the Department of Computer Engineering Technology. This robotic arm consisted of removing the cardboard hands from the Roboqueen and being replaced by 3D printed fingers and wrists to add functionality that did not exist before. Servo motors connected to Arduinos hidden in the forearm will be used to move the fingers and pick up and hold objects in the hand. Currently, the Finger Myoware is an update of the robotic arm in order to understand how prosthetic ...
Enterprise Environment Modeling For Penetration Testing On The Openstack Virtualization Platform, 2021 Comenius University
Enterprise Environment Modeling For Penetration Testing On The Openstack Virtualization Platform, Vincent Karovič Jr., Jakub Bartaloš, Vincent Karovič, Michal Greguš
Journal of Global Business Insights
The article presents the design of a model environment for penetration testing of an organization using virtualization. The need for this model was based on the constantly increasing requirements for the security of information systems, both in legal terms and in accordance with international security standards. The model was created based on a specific team from the unnamed company. The virtual working environment offered the same functions as the physical environment. The virtual working environment was created in OpenStack and tested with a Linux distribution Kali Linux. We demonstrated that the virtual environment is functional and its security testable. Virtualizing ...
Dynamic Planning Networks, 2021 Western University
Dynamic Planning Networks, Norman Tasfi, Miriam A M Capretz
Electrical and Computer Engineering Publications
We introduce Dynamic Planning Networks (DPN), a novel architecture for deep reinforcement learning, that combines model-based and model-free aspects for online planning. Our architecture learns to dynamically construct plans using a learned state-transition model by selecting and traversing between simulated states and actions to maximize information before acting. DPN learns to efficiently form plans by expanding a single action conditional state transition at a time instead of exhaustively evaluating each action, reducing the number of state-transitions used during planning. We observe emergent planning patterns in our agent, including classical search methods such as breadth-first and depth-first search. DPN shows improved ...
Rebalancing Shared Mobility Systems By User Incentive Scheme Via Enforcement Learning, 2021 Rowan University
Rebalancing Shared Mobility Systems By User Incentive Scheme Via Enforcement Learning, Matthew Brian Schofield
Theses and Dissertations
Shared mobility systems regularly suffer from an imbalance of vehicle supply within the system, leading to users being unable to receive service. If such imbalance problems are not mitigated some users will not be serviced. There is an increasing interest in the use of reinforcement learning (RL) techniques for improving the resource supply balance and service level of systems. The goal of these techniques is to produce an effective user incentivization policy scheme to encourage users of a shared mobility system to slightly alter their travel behavior in exchange for a small monetary incentive. These slight changes in user behavior ...
Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, 2021 Independent Researcher
Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin
Journal of Digital Forensics, Security and Law
The security of a computer system depends on OS kernel protection. It is crucial to reveal and inspect new attacks on kernel data, as these are used by hackers. The purpose of this paper is to continue research into attacks on dynamically allocated data in the Windows OS kernel and demonstrate the capacity of MemoryRanger to prevent these attacks. This paper discusses three new hijacking attacks on kernel data, which are based on bypassing OS security mechanisms. The first two hijacking attacks result in illegal access to files open in exclusive access. The third attack escalates process privileges, without applying ...
Dependencyvis: Helping Developers Visualize Software Dependency Information, 2021 California Polytechnic State University, San Luis Obispo
Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui
Efficient Protocols For Multi-Party Computation, 2021 The Graduate Center, City University of New York
Efficient Protocols For Multi-Party Computation, Tahereh Jafarikhah
Dissertations, Theses, and Capstone Projects
Secure Multi-Party Computation (MPC) allows a group of parties to compute a join function on their inputs without revealing any information beyond the result of the computation. We demonstrate secure function evaluation protocols for branching programs, where the communication complexity is linear in the size of the inputs, and polynomial in the security parameter. Our result is based on the circular security of the Paillier's encryption scheme. Our work followed the breakthrough results by Boyle et al. [9; 11]. They presented a Homomorphic Secret Sharing scheme which allows the non-interactive computation of Branching Programs over shares of the secret ...
Pier Ocean Pier, 2021 California Polytechnic State University, San Luis Obispo
Pier Ocean Pier, Brandon J. Nowak
Pier Ocean Peer is a weatherproof box containing a Jetson Nano, connected to a cell modem and camera, and powered by a Lithium Iron Phosphate battery charged by a 50W solar panel. This system can currently provide photos to monitor the harbor seal population that likes to haul out at the base of the Cal Poly Pier, but more importantly it provides a platform for future expansion by other students either though adding new sensors directly to the Jetson Nano or by connecting to the jetson nano remotely through a wireless protocol of their choice.
Observation Of The Evolution Of Hide And Seek Ai, 2021 California Polytechnic State University, San Luis Obispo
Observation Of The Evolution Of Hide And Seek Ai, Anthony J. Catelani
Computer Science and Software Engineering
The purpose of this project is to observe the evolution of two artificial agents, a ‘Seeker’ and a ‘Hider’, as they play a simplified version of the game Hide and Seek. These agents will improve through machine learning, and will only be given an understanding of the rules of the game and the ability to navigate through the grid-like space where the game shall be played; they will not be taught or given any strategies, and will be made to learn from a clean slate. Of particular interest is observing the particular playstyle of hider and seeker intelligences as new ...
Applying Deep Learning On Financial Sentiment Analysis, 2021 The Graduate Center, City University of New York
Applying Deep Learning On Financial Sentiment Analysis, Cuiyuan Wang
Dissertations, Theses, and Capstone Projects
Portfolio Investment has always been appealing to investors and researchers. In the past, people tend to use historical trading information of the securities to predict the return or manage the portfolio. Nowadays, the literature has been proved that the market sentiment could predict asset prices. Specifically, it has been shown that the stock market movement is related to financial news and social media events. Thus, it becomes necessary to extract the sentiment of the financial news. We explicitly introduce the application of dictionary methods, traditional machine learning models and deep learning models on text classification. The experiment results show that ...
Characterization Of Time-Variant And Time-Invariant Assessment Of Suicidality On Reddit Using C-Ssrs, 2021 University of South Carolina - Columbia
Characterization Of Time-Variant And Time-Invariant Assessment Of Suicidality On Reddit Using C-Ssrs, Manas Gaur, Vamsi Aribandi, Amanuel Alambo, Ugur Kursuncu, Krishnaprasad Thirunarayan, Jonathan Beich, Jyotishman Pathak, Amit Sheth
Suicide is the 10th leading cause of death in the U.S (1999-2019). However, predicting when someone will attempt suicide has been nearly impossible. In the modern world, many individuals suffering from mental illness seek emotional support and advice on well-known and easily-accessible social media platforms such as Reddit. While prior artificial intelligence research has demonstrated the ability to extract valuable information from social media on suicidal thoughts and behaviors, these efforts have not considered both severity and temporality of risk. The insights made possible by access to such data have enormous clinical potential - most dramatically envisioned as a trigger ...
The Long-Term Cost Of Cyber Overreaction, 2021 Army Cyber Institute
The Long-Term Cost Of Cyber Overreaction, Jan Kallberg
ACI Journal Articles
The default modus operandi when facing negative cyber events is to overreact. It is essential to highlight the cost of overreaction, which needs to be a part of calculating when to engage and how. For an adversary probing cyber defenses, reactions provide information that can aggregate a clear picture of the defendant’s capabilities and preauthorization thresholds.
Ideally, potential adversaries cannot assess our strategic and tactical cyber capacities, but over time and numerous responses, the information advantage evaporates. A reactive culture triggered by cyberattacks provides significant information to a probing adversary, which seeks to understand underlying authorities and tactics, techniques ...
A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, 2021 Symbiosis International University and Pimpri Chinchwad College of Engineering, SPPU, Pune, India
A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr.
Library Philosophy and Practice (e-journal)
Background: This research aims to look into the work that has been done on Face Presentation attacks and detection with domain adaptation techniques from 2011 to 2021 utilizing bibliography methods.
Approaches: Diverse research articles on Face Presentation Attacks were retrieved using the two most popular databases Web of Science & Scopus. Research articles consider between 2011-2021. Some research results, such as documents by year, documents by source, documents by funding agencies, countries, etc are obtained using Web of Science and Scopus Analyzers. The analysis is performed using Vos Viewer version 1.6.16 and various parameters such as keywords, co-authorship, co-occurrences ...
Using An Integrative Machine Learning Approach To Study Microrna Regulation Networks In Pancreatic Cancer Progression, 2021 University of Nebraska-Lincoln
Using An Integrative Machine Learning Approach To Study Microrna Regulation Networks In Pancreatic Cancer Progression, Roland Madadjim
Computer Science and Engineering: Theses, Dissertations, and Student Research
With advances in genomic discovery tools, recent biomedical research has produced a massive amount of genomic data on post-transcriptional regulations related to various transcript factors, microRNAs, lncRNAs, epigenetic modifications, and genetic variations. In this direction, the field of gene regulation network inference is created and aims to understand the interactome regulations between these molecules (e.g., gene-gene, miRNA-gene) that take place to build models able to capture behavioral changes in biological systems. A question of interest arises in integrating such molecules to build a network while treating each specie in its uniqueness. Given the dynamic changes of interactome in chaotic ...
Design And Implementation Of A Microservices Web-Based Architecture For Code Deployment And Testing, 2021 Kennesaw State University
Design And Implementation Of A Microservices Web-Based Architecture For Code Deployment And Testing, Soin Abdoul Kassif Traore
Symposium of Student Scholars
Design and Implementation of a Microservices Web-based Architecture for CodeDeployment and Testing
Many tech stars like Netflix, Amazon, PayPal, eBay, and Twitter are evolving from monolithic to a microservice architecture due to the benefits for Agile and DevOps teams. Microservices architecture can be applied to multiple industries, like IoT, using containerization. Virtual containers give an ideal environment for developing and testing of IoT technologies. Since the IoT industry has an exponential growth, it is the responsibility of universities to teach IoT with hands-on labs to minimize the gap between what the students learn and what is on-demand in the job ...
An Investigation On Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset And Its Effectiveness, 2021 Kennesaw State University
An Investigation On Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset And Its Effectiveness, Md Jobair Hossain Faruk
Symposium of Student Scholars
Neurotechnology describes as one of the focal points of today’s research around the domain of Brain-Computer Interfaces (BCI). The primary attempts of BCI research are to decoding human speech from brain signals and controlling neuro-psychological patterns that would benefit people suffering from neurological disorders. In this study, we illustrate the progress of BCI research and present scores of unveiled contemporary approaches. First, we explore a decoding natural speech approach that is designed to decode human speech directly from the human brain onto a digital screen introduced by Facebook Reality Laband University of California San Francisco. Then, we study a ...
Framework For Collecting Data From Iot Device, 2021 Kennesaw State University
Framework For Collecting Data From Iot Device, Md Saiful Islam
Symposium of Student Scholars
The Internet of Things (IoT) is the most significant and blooming technology in the 21st century. IoT has rapidly developed by covering hundreds of applications in the civil, health, military, and agriculture areas. IoT is based on the collection of sensor data through an embedded system, and this embedded system uploads the data on the internet. Devices and sensor technologies connected over a network can monitor and measure data in real-time. The main challenge is to collect data from IoT devices, transmit them to store in the Cloud, and later retrieve them at any time for visualization and data analysis ...
Data Analysis Methods For Health Monitoring Sensors, 2021 Kennesaw State University
Data Analysis Methods For Health Monitoring Sensors, Shahriar Sobhan
Symposium of Student Scholars
Innovations in health monitoring systems are fundamental for the continuous improvement of remote healthcare. With the current presence of SARS-CoV-2, better known as COVID-19, in people’s daily lives, solutions for monitoring heart and especially respiration and pulmonary functions are more needed than ever. Besides, health monitoring systems are widely used for patients who need isolated care, unconscious patients who cannot get medical attention for themselves. As it is well-known, monitoring systems rely on sensor technologies. Currently, there are multiple research studies for remote monitoring using different types of sensors. In this effort, we survey the current approaches that utilize ...
Do I Have Your Attention ? Predicting Users' Engagement During Interviews With Biofeedback, Voice, And Supervised Machine Learning, Thaide Huichapa
Symposium of Student Scholars
Studies show that the quality of the information collected during an elicitation interview, and consequently the quality of the software product that needs to be developed, highly depends on the interviewee's engagement. Because of social expectations, interviewees tend to hide if they are bored or not engaged. To overcome this problem and support the analyst during the interviews, this research uses biometric data and voice features, together with supervised machine learning algorithms, to predict the interviewee's engagement. We built our solution on an experiment consisted of interviewing 31 participants. We collected the data using an Empatica wristband and ...
Grandparent-Grandchild Virtual Communication Study, 2021 University of San Diego
Grandparent-Grandchild Virtual Communication Study, Tanya Keval
Undergraduate Honors Theses
The cross generational bond between a grandparent and grandchild is extremely important. The stories, traditions, and beliefs that grandparents share with their grandchildren have the ability to shape their grandchildren’s beliefs. For grandparents, the role of being a grandparent and creating shared memories with their grandchildren leaves a positive impact on their mental health. Although the elderly population prefers to connect with others in-person, including their grandchildren, this face-to-face connection is not always possible due to schedules, distance, or health. Many products have been designed for grandparents and grandchildren to try to fill this communication gap when they are ...