Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Engineering

Research On Mechanical Configuration Of Automatic Container Terminals Based On Simulation Optimization Method, Shaozheng Yu, Dongshi Sun, Chen Jing, Yongchao Li Dec 2019

Research On Mechanical Configuration Of Automatic Container Terminals Based On Simulation Optimization Method, Shaozheng Yu, Dongshi Sun, Chen Jing, Yongchao Li

Journal of System Simulation

Abstract: In the study of mechanical configuration problem of automated container terminal, a system simulation model based on discrete event simulation is constructed. The key parameters and interference factors that affect the performance of the system are fully considered in the model and a mechanical scheduling algorithm interface to ensure the effectiveness of the simulation model is designed. On the premise of ensuring the reliability of the container terminal system, a cycle optimization method of mechanical configuration scheme is proposed to minimize the cost. An example is given to solve the mechanical configuration scheme of an automatic container terminal. …


Automated Dynamic Detection Of Self-Hiding Behaviors, Luke Baird Nov 2019

Automated Dynamic Detection Of Self-Hiding Behaviors, Luke Baird

Student Works

Certain Android applications, such as but not limited to malware, conceal their presence from the user, exhibiting a self-hiding behavior. Consequently, these apps put the user’s security and privacy at risk by performing tasks without the user’s awareness. Static analysis has been used to analyze apps for self-hiding behavior, but this approach is prone to false positives and suffers from code obfuscation. This research proposes a set of three tools utilizing a dynamic analysis method of detecting self-hiding behavior of an app in the home, installed, and running application lists on an Android emulator. Our approach proves both highly accurate …


Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers Oct 2019

Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers

Student Works

Android applications that conceal themselves from a user, defined as exhibiting a “self-hiding behavior,” pose a threat to the user’s privacy, as these applications can live on a device undetected by the user. Malicious applications can do this to execute without being found by the user. Three lists are analyzed in particular—the home, running, and installed lists—as they are directly related to the typical Android app life cycle. Additionally, self-hiding behavior in the device admin list is analyzed due to the potential for catastrophic actions to be taken by device admin malware. This research proposes four dynamic analysis tools that …


Design And Creation Of A System Of Machines To Automate Quality Control Processes For Atms, Miguel D. Pedrozo Apr 2019

Design And Creation Of A System Of Machines To Automate Quality Control Processes For Atms, Miguel D. Pedrozo

Undergraduate Distinction Papers

This project is based around the quality control processes used to test ATMs. Currently, a person will manually run through each function of the ATM in order to find modes of failure. As the case with all repetitive jobs, it is an unwanted task and is simple enough to be automated. The new solution I propose allows for a system of devices to operate the functions of the ATM autonomously with little to no human intervention. Additionally, this solution is more reliable when diagnosing a problem as it will eventually communicate with the ATM directly in a closed loop system …


Recipe For Disaster, Zac Travis Mar 2019

Recipe For Disaster, Zac Travis

MFA Thesis Exhibit Catalogs

Today’s rapid advances in algorithmic processes are creating and generating predictions through common applications, including speech recognition, natural language (text) generation, search engine prediction, social media personalization, and product recommendations. These algorithmic processes rapidly sort through streams of computational calculations and personal digital footprints to predict, make decisions, translate, and attempt to mimic human cognitive function as closely as possible. This is known as machine learning.

The project Recipe for Disaster was developed by exploring automation in technology, specifically through the use of machine learning and recurrent neural networks. These algorithmic models feed on large amounts of data as a …


Examination Of Adoption Theory On The Devops Practice Of Continuous Delivery, Andrew John Anderson Jan 2019

Examination Of Adoption Theory On The Devops Practice Of Continuous Delivery, Andrew John Anderson

Walden Dissertations and Doctoral Studies

Many organizations have difficulty adopting advanced software development practices. Some software development project managers in large organizations are not aligned with the relationship between performance expectancy, effort expectancy, social influence, and facilitating conditions, as moderated by experience, with intent to adopt the DevOps practice of continuous delivery. The purpose of this study was to examine the statistical relationships between the independent variables—performance expectancy, effort expectancy, social influence, and facilitating conditions, as moderated by experience—and the dependent variable of behavioral intent to adopt a continuous delivery system. Venkatesh, Morris, Davis, and Davis's unified theory of acceptance and use of technology provided …


Robotic Automation Of A Cnc Machine, Jace Hovey Jan 2019

Robotic Automation Of A Cnc Machine, Jace Hovey

Honors Undergraduate Theses

Robotic automation of CNC machines is becoming more popular as robot technology advances and becomes more readily available. While some CNC machines can run autonomously with part catchers, vertical milling centers require an external entity to keep the machine running. Collaborative and Industrial robots are the two main selections for automating a vertical CNC milling machine. We investigate specifically which robot type is most effective for machine tending a Haas VF2 vertical milling center. To do this a cell floor plan, risk assessment, overall equipment effectiveness evaluation, and a total cost analysis are performed to compare robots. With this results …


Comparing Defeasible Argumentation And Non-Monotonic Fuzzy Reasoning Methods For A Computational Trust Problem With Wikipedia, Ryan Kirwan Jan 2019

Comparing Defeasible Argumentation And Non-Monotonic Fuzzy Reasoning Methods For A Computational Trust Problem With Wikipedia, Ryan Kirwan

Dissertations

Computational trust is an ever-more present issue with the surge in autonomous agent development. Represented as a defeasible phenomenon, problems associated with computational trust may be solved by the appropriate reasoning methods. This paper compares two types of such methods, Defeasible Argumentation and Non-Monotonic Fuzzy Logic to assess which is more effective at solving a computational trust problem centred around Wikipedia editors. Through the application of these methods with real-data and a set of knowledge-bases, it was found that the Fuzzy Logic approach was statistically significantly better than the Argumentation approach in its inferential capacity.


Should Robots Prosecute And Defend?, Stephen E. Henderson Dec 2018

Should Robots Prosecute And Defend?, Stephen E. Henderson

Stephen E Henderson

Even when we achieve the ‘holy grail’ of artificial intelligence—machine intelligence that is at least as smart as a human being in every area of thought—there may be classes of decisions for which it is intrinsically important to retain a human in the loop. On the common account of American criminal adjudication, the role of prosecutor seems to include such decisions given the largely unreviewable declination authority, whereas the role of defense counsel would seem fully susceptible of automation. And even for the prosecutor, the benefits of automation might outweigh the intrinsic decision-making loss, given that the ultimate decision—by judge …