Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Precision Spraying Using Variable Time Delays And Vision-Based Velocity Estimation, Paolo Rommel Sanchez, Hong Zhang Oct 2023

Precision Spraying Using Variable Time Delays And Vision-Based Velocity Estimation, Paolo Rommel Sanchez, Hong Zhang

Henry M. Rowan College of Engineering Departmental Research

Traditionally, precision farm equipment often relies on real-time kinematics and global positioning systems (RTK-GPS) for accurate position and velocity estimates. This approach proved effective and widely adopted in developed regions where RTK-GPS satellite and base station availability and visibility are not limited. However, RTK-GPS signal can be limited in farm areas due to topographic and economic constraints. Thus, this study developed a precision sprayer that estimated the travel velocity locally by tracking the relative motion of plants using a deep-learning-based machine vision system. Sprayer valves were then controlled by variable time delay (VTD) queuing and dynamic filtering. The proposed velocity …


Malware Binary Image Classification Using Convolutional Neural Networks, John Kiger, Shen-Shyang Ho, Vahid Heydari Mar 2022

Malware Binary Image Classification Using Convolutional Neural Networks, John Kiger, Shen-Shyang Ho, Vahid Heydari

College of Science & Mathematics Departmental Research

The persistent shortage of cybersecurity professionals combined with enterprise networks tasked with processing more data than ever before has led many cybersecurity experts to consider automating some of the most common and time-consuming security tasks using machine learning. One of these cybersecurity tasks where machine learning may prove advantageous is malware analysis and classification. To evade traditional detection techniques, malware developers are creating more complex malware. This is achieved through more advanced methods of code obfuscation and conducting more sophisticated attacks. This can make the manual process of analyzing malware an infinitely more complex task. Furthermore, the proliferation of malicious …