Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Randomly Generating The 3d Mesostructure Of Soil Rock Mixtures Based On The Full In Situ Digital Image Processed Information, Zhengsheng Li, Haiyang Yi, Cheng Zhu, Zhuang Zhuo, Guoshuan Liu Oct 2022

Randomly Generating The 3d Mesostructure Of Soil Rock Mixtures Based On The Full In Situ Digital Image Processed Information, Zhengsheng Li, Haiyang Yi, Cheng Zhu, Zhuang Zhuo, Guoshuan Liu

Henry M. Rowan College of Engineering Faculty Scholarship

Understanding the occurrence and evolution of geological disasters, such as landslides and debris flows, is facilitated by research on the performance of soil rock mixes (SRM). Recently, more and more researchers have been interested in studying the mesostructure reconstruction process of SRM. The present mesostructure generation approaches, however, have several weaknesses. One of the weaknesses is that they do not consider the impact of particle shape and therefore cannot ensure similarity to the in situ SRMs. In this study, a new mesostructure generation method that randomly generates SRMs based on the full in situ digital image processing (DIP) information is …


An Injury Severity Prediction-Driven Accident Prevention System, Gulsum Alicioglu, Bo Sun, Shen-Shyang Ho May 2022

An Injury Severity Prediction-Driven Accident Prevention System, Gulsum Alicioglu, Bo Sun, Shen-Shyang Ho

Faculty Scholarship for the College of Science & Mathematics

Traffic accidents are inevitable events that occur unexpectedly and unintentionally. Therefore, analyzing traffic data is essential to prevent fatal accidents. Traffic data analysis provided insights into significant factors and driver behavioral patterns causing accidents. Combining these patterns and the prediction model into an accident prevention system can assist in reducing and preventing traffic accidents. This study applied various machine learning models, including neural network, ordinal regression, decision tree, support vector machines, and logistic regression to have a robust prediction model in injury severity. The trained model provides timely and accurate predictions on accident occurrence and injury severity using real-world traffic …


Malware Binary Image Classification Using Convolutional Neural Networks, John Kiger, Shen-Shyang Ho, Vahid Heydari Mar 2022

Malware Binary Image Classification Using Convolutional Neural Networks, John Kiger, Shen-Shyang Ho, Vahid Heydari

Faculty Scholarship for the College of Science & Mathematics

The persistent shortage of cybersecurity professionals combined with enterprise networks tasked with processing more data than ever before has led many cybersecurity experts to consider automating some of the most common and time-consuming security tasks using machine learning. One of these cybersecurity tasks where machine learning may prove advantageous is malware analysis and classification. To evade traditional detection techniques, malware developers are creating more complex malware. This is achieved through more advanced methods of code obfuscation and conducting more sophisticated attacks. This can make the manual process of analyzing malware an infinitely more complex task. Furthermore, the proliferation of malicious …


Technical Analysis Of Thanos Ransomware, Ikuromor Ogiriki, Christopher Beck, Vahid Heydari Mar 2022

Technical Analysis Of Thanos Ransomware, Ikuromor Ogiriki, Christopher Beck, Vahid Heydari

Faculty Scholarship for the College of Science & Mathematics

Ransomware is a developing menace that encrypts users’ files and holds the decryption key hostage until the victim pays a ransom. This particular class of malware has been in charge of extortion hundreds of millions of dollars every year. Adding to the problem, generating new variations is cheap. Therefore, new malware can detect antivirus and intrusion detection systems and evade them or manifest in ways to make themselves undetectable. We must first understand the characteristics and behavior of various varieties of ransomware to create and construct effective security mechanisms to combat them. This research presents a novel dynamic and behavioral …