Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

PDF

Computer Engineering

2021

Institution
Keyword
Publication

Articles 1 - 30 of 324

Full-Text Articles in Engineering

The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy Dec 2021

The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy

Articles

This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …


Trip Based Modeling Of Fuel Consumption In Modern Heavy-Duty Vehicles Using Artificial Intelligence, Sasanka Katreddi, Arvind Thiruvengadam Dec 2021

Trip Based Modeling Of Fuel Consumption In Modern Heavy-Duty Vehicles Using Artificial Intelligence, Sasanka Katreddi, Arvind Thiruvengadam

Faculty & Staff Scholarship

Heavy-duty trucks contribute approximately 20% of fuel consumption in the United States of America (USA). The fuel economy of heavy-duty vehicles (HDV) is affected by several real-world parameters like road parameters, driver behavior, weather conditions, and vehicle parameters, etc. Although modern vehicles comply with emissions regulations, potential malfunction of the engine, regular wear and tear, or other factors could affect vehicle performance. Predicting fuel consumption per trip based on dynamic on-road data can help the automotive industry to reduce the cost and time for on-road testing. Data modeling can easily help to diagnose the reason behind fuel consumption with a …


Tooth Position Determination By Automatic Cutting And Marking Of Dental Panoramic X-Ray Film In Medical Image Processing, Yen-Cheng Huang, Chiung-An Chen, Tsung-Yi Chen, He-Sheng Chou, Wei-Chi Lin, Tzu-Chien Li, Jia-Jun Yuan, Szu-Yin Lin, Chun-Wei Li, Shih-Lun Chen, Yi-Cheng Mao, Patricia Angela R. Abu, Wei-Yuan Chiang, Wen-Shen Lo Dec 2021

Tooth Position Determination By Automatic Cutting And Marking Of Dental Panoramic X-Ray Film In Medical Image Processing, Yen-Cheng Huang, Chiung-An Chen, Tsung-Yi Chen, He-Sheng Chou, Wei-Chi Lin, Tzu-Chien Li, Jia-Jun Yuan, Szu-Yin Lin, Chun-Wei Li, Shih-Lun Chen, Yi-Cheng Mao, Patricia Angela R. Abu, Wei-Yuan Chiang, Wen-Shen Lo

Department of Information Systems & Computer Science Faculty Publications

This paper presents a novel method for automatic segmentation of dental X-ray images into single tooth sections and for placing every segmented tooth onto a precise corresponding position table. Moreover, the proposed method automatically determines the tooth’s position in a panoramic X-ray film. The image-processing step incorporates a variety of image-enhancement techniques, including sharpening, histogram equalization, and flat-field correction. Moreover, image processing was implemented iteratively to achieve higher pixel value contrast between the teeth and cavity. The next image-enhancement step is aimed at detecting the teeth cavity and involves determining the segment and points separating the upper and lower jaw, …


Defining And Detecting Toxicity On Social Media: Context And Knowledge Are Key, Amit Sheth, Valerie Shalin, Ugur Kursuncu Dec 2021

Defining And Detecting Toxicity On Social Media: Context And Knowledge Are Key, Amit Sheth, Valerie Shalin, Ugur Kursuncu

Publications

As the role of online platforms has become increasingly prominent for communication, toxic behaviors, such as cyberbullying and harassment, have been rampant in the last decade. On the other hand, online toxicity is multi-dimensional and sensitive in nature, which makes its detection challenging. As the impact of exposure to online toxicity can lead to serious implications for individuals and communities, reliable models and algorithms are required for detecting and understanding such communications. In this paper We define toxicity to provide a foundation drawing social theories. Then, we provide an approach that identifies multiple dimensions of toxicity and incorporates explicit knowledge …


A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi, Navin Duwadi Dec 2021

A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi, Navin Duwadi

School of Information Systems and Technology Publications

This study focuses on bloackchain as an emerging technology regarding its use to restructure the systems and advance education upon quality outcomes. What are the benefits of integrating blockchain in education concerning system reformation and advancement in developing better educational process for all encompassing learning outcomes? With the recent developments of blockchain applications across multiple domains, the education industry seems to be benefited from this technology in considerable degree. Transcripts and certificates play a vital role in individual’s life so it needs to be stored in tamper-proof and long term available ledger. In pursuant to addressing afore stated question, this …


A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi Dec 2021

A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi

Walden Faculty and Staff Publications

This study focuses on bloackchain as an emerging technology regarding its use to restructure the systems and advance education upon quality outcomes. What are the benefits of integrating blockchain in education concerning system reformation and advancement in developing better educational process for all encompassing learning outcomes? With the recent developments of blockchain applications across multiple domains, the education industry seems to be benefited from this technology in considerable degree. Transcripts and certificates play a vital role in individual’s life so it needs to be stored in tamper-proof and long term available ledger. In pursuant to addressing afore stated question, this …


Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii Dec 2021

Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii

Publications and Research

The spaces we live in go through many transformations over the course of a year, a month, or a day; My room has seen tremendous clutter and pristine order within the span of a few hours. My goal is to discover patterns within my space and formulate an understanding of the changes that occur. This insight will provide actionable direction for maintaining a cleaner environment, as well as provide some information about the optimal times for productivity and energy preservation.

Using a Raspberry Pi, I will set up automated image capture in a room in my home. These images will …


Computational Solutions To Exosomal Microrna Biomarker Detection In Pancreatic Cancer, Thuy T. An Dec 2021

Computational Solutions To Exosomal Microrna Biomarker Detection In Pancreatic Cancer, Thuy T. An

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Pancreatic cancer is the fourth leading cause of cancer death in the United States and the 5-year survival rate is only 5% to 10%. There are only a few non-specific symptoms associated with the early-stage cancer, therefore most patients are diagnosed in a late stage. Due to the lack of effective treatments and the fact that the early stage has a 39% 5-year survival rate, the biggest hope to control this disease is early detection. Therefore, discovery of effective and reliable non-invasive biomarkers for early detection of pancreatic cancer has been a major topic. Very recently, exosomal microRNAs have become …


Semantically Meaningful Sentence Embeddings, Rojina Deuja Dec 2021

Semantically Meaningful Sentence Embeddings, Rojina Deuja

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Text embedding is an approach used in Natural Language Processing (NLP) to represent words, phrases, sentences, and documents. It is the process of obtaining numeric representations of text to feed into machine learning models as vectors (arrays of numbers). One of the biggest challenges in text embedding is representing longer text segments like sentences. These representations should capture the meaning of the segment and the semantic relationship between its constituents. Such representations are known as semantically meaningful embeddings. In this thesis, we seek to improve upon the quality of sentence embeddings that capture semantic information.

The current state-of-the-art models are …


Digitization Of Academic Libraries Through Cloud Environment, Sivankalai S, Virumandi A, Sivasekaran K, Jeyanthi R, M Sharmila Dec 2021

Digitization Of Academic Libraries Through Cloud Environment, Sivankalai S, Virumandi A, Sivasekaran K, Jeyanthi R, M Sharmila

Library Philosophy and Practice (e-journal)

Libraries may soon be able to establish and manage their own data centres. This paradigm would allow libraries to control the apps and data stores that include sensitive and private information about their users' personal and financial information. The provisioning and management of infrastructure for a Web-based digital library present several complicated difficulties for library administrators. In this article, we address the challenges that digital libraries confront, and the efforts being made to solve those challenges. Infrastructure virtualization and cloud Environment are incredibly enticing options, but they are being challenged by the expansion of the indexed document collection, the addition …


Risk-Based Machine Learning Approaches For Probabilistic Transient Stability, Umair Shahzad Dec 2021

Risk-Based Machine Learning Approaches For Probabilistic Transient Stability, Umair Shahzad

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Power systems are getting more complex than ever and are consequently operating close to their limit of stability. Moreover, with the increasing demand of renewable wind generation, and the requirement to maintain a secure power system, the importance of transient stability cannot be overestimated. Considering its significance in power system security, it is important to propose a different approach for enhancing the transient stability, considering uncertainties. Current deterministic industry practices of transient stability assessment ignore the probabilistic nature of variables (fault type, fault location, fault clearing time, etc.). These approaches typically provide a conservative criterion and can result in expensive …


Comparative Analysis Of Kmer Counting And Estimation Tools, Ankitha Vejandla Dec 2021

Comparative Analysis Of Kmer Counting And Estimation Tools, Ankitha Vejandla

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The rapid development of next-generation sequencing (NGS) technologies for determining the sequence of DNA has revolutionized genome research in recent years. De novo assemblers are the most commonly used tools to perform genome assembly. Most of the assemblers use de Bruijn graphs that break the sequenced reads into smaller sequences (sub-strings), called kmers, where k denotes the length of the sub-strings. The kmer counting and analysis of kmer frequency distribution are important in genome assembly. The main goal of this research is to provide a detailed analysis of the performance of different kmer counting and estimation tools that are currently …


Let's Read: Designing A Smart Display Application To Support Codas When Learning Spoken Language, Katie Rodeghiero, Yingying Yuki Chen, Annika M. Hettmann, Franceli L. Cibrian Nov 2021

Let's Read: Designing A Smart Display Application To Support Codas When Learning Spoken Language, Katie Rodeghiero, Yingying Yuki Chen, Annika M. Hettmann, Franceli L. Cibrian

Engineering Faculty Articles and Research

Hearing children of Deaf adults (CODAs) face many challenges including having difficulty learning spoken languages, experiencing social judgment, and encountering greater responsibilities at home. In this paper, we present a proposal for a smart display application called Let's Read that aims to support CODAs when learning spoken language. We conducted a qualitative analysis using online community content in English to develop the first version of the prototype. Then, we conducted a heuristic evaluation to improve the proposed prototype. As future work, we plan to use this prototype to conduct participatory design sessions with Deaf adults and CODAs to evaluate the …


Digital Markers Of Autism, Ivonne Monarca, Franceli L. Cibrian, Monica Tentori Nov 2021

Digital Markers Of Autism, Ivonne Monarca, Franceli L. Cibrian, Monica Tentori

Engineering Faculty Articles and Research

Autism Spectrum Disorder (ASD) is a neurological condition that affects how a people communicate and interact with others. The use of screening tools during childhood is very important to detect those children who need to be referred for a diagnosis of ASD. However, most screening tools are based on parents' responses so the result can be subjective. In addition, most screening tools focus on social and communicative skills leaving aside sensory features, which have shown to have the potential to be ASD markers. Tactile processing has been little explored due to lack of tools to asses it, however with the …


Feel And Touch: A Haptic Mobile Game To Assess Tactile Processing, Ivonne Monarca, Monica Tentori, Franceli L. Cibrian Nov 2021

Feel And Touch: A Haptic Mobile Game To Assess Tactile Processing, Ivonne Monarca, Monica Tentori, Franceli L. Cibrian

Engineering Faculty Articles and Research

Haptic interfaces have great potential for assessing the tactile processing of children with Autism Spectrum Disorder (ASD), an area that has been under-explored due to the lack of tools to assess it. Until now, haptic interfaces for children have mostly been used as a teaching or therapeutic tool, so there are still open questions about how they could be used to assess tactile processing of children with ASD. This article presents the design process that led to the development of Feel and Touch, a mobile game augmented with vibrotactile stimuli to assess tactile processing. Our feasibility evaluation, with 5 children …


Plasmonic Field-Effect Transistors (Terafets) For 6g Communications, Michael Shur, Gregory Aizin, Taiichi Otsuji, Victor Ryzhii Nov 2021

Plasmonic Field-Effect Transistors (Terafets) For 6g Communications, Michael Shur, Gregory Aizin, Taiichi Otsuji, Victor Ryzhii

Publications and Research

Ever increasing demands of data traffic makes the transition to 6G communications in the 300 GHz band inevitable. Short-channel field-effect transistors (FETs) have demonstrated excellent potential for detection and generation of terahertz (THz) and sub-THz radiation. Such transistors (often referred to as TeraFETs) include short-channel silicon complementary metal oxide (CMOS). The ballistic and quasi-ballistic electron transport in the TeraFET channels determine the TeraFET response at the sub-THz and THz frequencies. TeraFET arrays could form plasmonic crystals with nanoscale unit cells smaller or comparable to the electron mean free path but with the overall dimensions comparable with the radiation wavelength. Such …


Ggnb: Graph-Based Gaussian Naive Bayes Intrusion Detection System For Can Bus, Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry Nov 2021

Ggnb: Graph-Based Gaussian Naive Bayes Intrusion Detection System For Can Bus, Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry

Computer Science Faculty Research

The national highway traffic safety administration (NHTSA) identified cybersecurity of the automobile systems are more critical than the security of other information systems. Researchers already demonstrated remote attacks on critical vehicular electronic control units (ECUs) using controller area network (CAN). Besides, existing intrusion detection systems (IDSs) often propose to tackle a specific type of attack, which may leave a system vulnerable to numerous other types of attacks. A generalizable IDS that can identify a wide range of attacks within the shortest possible time has more practical value than attack-specific IDSs, which is not a trivial task to accomplish. In this …


Real-Time Bidding Campaigns Optimization Using User Profile Settings, Luis Miralles-Pechuán, Muhammad Atif Qureshi, Brian Mac Namee Nov 2021

Real-Time Bidding Campaigns Optimization Using User Profile Settings, Luis Miralles-Pechuán, Muhammad Atif Qureshi, Brian Mac Namee

Articles

Real-time bidding is nowadays one of the most promising systems in the online advertising ecosystem. In this study, the performance of RTB campaigns is improved by optimising the parameters of the users' profiles and the publishers' websites. Most studies concerning optimising RTB campaigns are focused on the bidding strategy, i.e., estimating the best value for each bid. However, this research focuses on optimising RTB campaigns by finding out configurations that maximise both the number of impressions and the average profitability of the visits. An online campaign configuration generally consists of a set of parameters along with their values such as …


Multilayer Lateral Heterostructures Of Van Der Waals Crystals With Sharp, Carrier–Transparent Interfaces, Eli A. Sutter, Raymond R. Unocic, Juan-Carlos Idrobo, Peter Sutter Nov 2021

Multilayer Lateral Heterostructures Of Van Der Waals Crystals With Sharp, Carrier–Transparent Interfaces, Eli A. Sutter, Raymond R. Unocic, Juan-Carlos Idrobo, Peter Sutter

Department of Electrical and Computer Engineering: Faculty Publications

Research on engineered materials that integrate different 2D crystals has largely focused on two prototypical heterostructures: Vertical van der Waals stacks and lateral heterostructures of covalently stitched monolayers. Extending lateral integration to few layer or even multilayer van der Waals crystals could enable architectures that combine the superior light absorption and photonic properties of thicker crystals with close proximity to interfaces and efficient carrier separation within the layers, potentially benefiting applications such as photovoltaics. Here, the realization of multilayer heterstructures of the van der Waals semiconductors SnS and GeS with lateral interfaces spanning up to several hundred individual layers is …


Needle In A Haystack: Detecting Subtle Malicious Edits To Additive Manufacturing G-Code Files, Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac Nov 2021

Needle In A Haystack: Detecting Subtle Malicious Edits To Additive Manufacturing G-Code Files, Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac

Publications and Research

Increasing usage of Digital Manufacturing (DM) in safety-critical domains is increasing attention on the cybersecurity of the manufacturing process, as malicious third parties might aim to introduce defects in digital designs. In general, the DM process involves creating a digital object (as CAD files) before using a slicer program to convert the models into printing instructions (e.g. g-code) suitable for the target printer. As the g-code is an intermediate machine format, malicious edits may be difficult to detect, especially when the golden (original) models are not available to the manufacturer. In this work we aim to quantify this hypothesis through …


Analysis Of Library Book Borrower Patterns Using Apriori Association Data Mining Techniques, Lucky Zamzami, Ari Agung Prastowo, R Rulinawaty, Robbi Rahim Nov 2021

Analysis Of Library Book Borrower Patterns Using Apriori Association Data Mining Techniques, Lucky Zamzami, Ari Agung Prastowo, R Rulinawaty, Robbi Rahim

Library Philosophy and Practice (e-journal)

The library is one of the most important facilities because it manages collections of written works, printed works, and recorded works and can provide information resources as well as be a driving force for the advancement of an educational institution. Conventional libraries will have piles of book borrowing transaction data recorded in the agenda book, which is only an archive, and the placement of books far apart, which causes members to take longer to find books when borrowing books of different types, is an issue that must be addressed. To overcome these two issues, a recommendation for an intelligent system …


Virtual Reality As Pedagogical Tool To Enhance Experiential Learning: A Systematic Literature Review, Muhammad Mujtaba Asad, Aisha Naz Ansari, Prathamesh Churi, Mohammad Mehdi Tahanzadeh Nov 2021

Virtual Reality As Pedagogical Tool To Enhance Experiential Learning: A Systematic Literature Review, Muhammad Mujtaba Asad, Aisha Naz Ansari, Prathamesh Churi, Mohammad Mehdi Tahanzadeh

Institute for Educational Development, Karachi

Since half of the century, technology has dominated the modern era. The rapid advancement of technology has reached generating artificial intelligence and artificial realities. So, virtual reality is an emerging technology and is applicable in education as well. Virtual reality is a computer-generated simulation, where people can interact within an artificial environment. Moreover, in an educational setting, such an environment provides students with a chance to get experiential learning. This paper has a systematic literature review on emerging technologies, such as virtual reality as a pedagogical tool for enhancing students’ experiential learning. This review aims to explore and understand the …


Robust Feature Space Separation For Deep Convolutional Neural Network Training, Ali Sekmen, Mustafa Parlaktuna, Ayad Abdul-Malek, Erdem Erdemir, Ahmet Bugra Koku Nov 2021

Robust Feature Space Separation For Deep Convolutional Neural Network Training, Ali Sekmen, Mustafa Parlaktuna, Ayad Abdul-Malek, Erdem Erdemir, Ahmet Bugra Koku

Computer Science Faculty Research

This paper introduces two deep convolutional neural network training techniques that lead to more robust feature subspace separation in comparison to traditional training. Assume that dataset has M labels. The first method creates M deep convolutional neural networks called {DCNNi}M i=1 . Each of the networks DCNNi is composed of a convolutional neural network ( CNNi ) and a fully connected neural network ( FCNNi ). In training, a set of projection matrices are created and adaptively updated as representations for feature subspaces {S i}M i=1 . A rejection value is computed for each training based on its projections on …


Inverse Kinematics Of The 6dof C12xl, Carl Liu, Lili Ma Nov 2021

Inverse Kinematics Of The 6dof C12xl, Carl Liu, Lili Ma

Publications and Research

Industrial robotic manipulators are widely used in applications such as pick & place, welding, and assembly to perform repeated tasks in replace of human labor. Such tasks typically require fully autonomous mechanical arms that are capable of identifying the parts to operate, path planning, and trajectory generation & tracking. A robotic arm consists of a sequence of rigid links connected by movable components (the joints). Proper control of the arm’s motion requires the knowledge of inverse kinematics, which computes/outputs the joint variables, i.e., angles for revolute joints and displacement for prismatic joints, causing the robotic arm’s end effector (e.g., gripper, …


Disaster Recovery System And Service Continuity Of Digital Library, Sivankalai S, Virumandi A, Sivasekaran K, Sharmila M Nov 2021

Disaster Recovery System And Service Continuity Of Digital Library, Sivankalai S, Virumandi A, Sivasekaran K, Sharmila M

Library Philosophy and Practice (e-journal)

This paper will discuss catastrophe recovery and likelihood development for digital library structures. The article establishes a foundation for establishing Library continuity and disaster recovery strategies through the use of best practices. Library continuity development and catastrophe recovery are critical modules of the planning stage for a virtual digital library. Few institutions that experience a catastrophic disaster occurrence are powerless to recover always, but libraries can suggestively boost the possibility of long-term recovery of institutional digital resources by drafting a continuity and recovery strategy in preparation. This article is intended for system designers and administrators, as well as high-ranking library …


Cybert: Cybersecurity Claim Classification By Fine-Tuning The Bert Language Model, Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla Nov 2021

Cybert: Cybersecurity Claim Classification By Fine-Tuning The Bert Language Model, Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla

Department of Electrical and Computer Engineering: Faculty Publications

We introduce CyBERT, a cybersecurity feature claims classifier based on bidirectional encoder representations from transformers and a key component in our semi-automated cybersecurity vetting for industrial control systems (ICS). To train CyBERT, we created a corpus of labeled sequences from ICS device documentation collected across a wide range of vendors and devices. This corpus provides the foundation for fine-tuning BERT’s language model, including a prediction-guided relabeling process. We propose an approach to obtain optimal hyperparameters, including the learning rate, the number of dense layers, and their configuration, to increase the accuracy of our classifier. Fine-tuning all hyperparameters of the resulting …


A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner Nov 2021

A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner

FIU Electronic Theses and Dissertations

Cryptojacking is an act of using a victim's computation power without his/her consent. Unauthorized mining costs extra electricity consumption and decreases the victim host's computational efficiency dramatically. In this thesis, we perform an extensive research on cryptojacking malware from every aspects. First, we present a systematic overview of cryptojacking malware based on the information obtained from the combination of academic research papers, two large cryptojacking datasets of samples, and numerous major attack instances. Second, we created a dataset of 6269 websites containing cryptomining scripts in their source codes to characterize the in-browser cryptomining ecosystem by differentiating permissioned and permissionless cryptomining …


Reliability Models For Smartphone Applications, Sonia Meskini, Ali Bou Nassif, Luiz Fernando Capretz Nov 2021

Reliability Models For Smartphone Applications, Sonia Meskini, Ali Bou Nassif, Luiz Fernando Capretz

Electrical and Computer Engineering Publications

Smartphones have become the most used electronic devices. They carry out most of the functionalities of desktops, offering various useful applications that suit the user’s needs. Therefore, instead of the operator, the user has been the main controller of the device and its applications, therefore its reliability has become an emergent requirement. As a first step, based on collected smartphone applications failure data, we investigated and evaluated the efficacy of Software Reliability Growth Models (SRGMs) when applied to these smartphone data in order to check whether they achieve the same accuracy as in the desktop/laptop area. None of the selected …


Formulating Automated Responses To Cognitive Distortions For Cbt Interactions, Ignacio De Toledo, Giancarlo Salton, Robert J. Ross Nov 2021

Formulating Automated Responses To Cognitive Distortions For Cbt Interactions, Ignacio De Toledo, Giancarlo Salton, Robert J. Ross

Conference papers

One of the key ideas of Cognitive Behavioural Therapy (CBT) is the ability to convert negative or distorted thoughts into more realistic alternatives. Although modern machine learning techniques can be successfully applied to a variety of Natural Language Processing tasks, including Cognitive Behavioural Therapy, the lack of a publicly available dataset makes supervised training difficult for tasks such as reforming distorted thoughts. In this research, we constructed a small CBT dataset via crowd-sourcing, and leveraged state of the art pre-trained architectures to transform cognitive distortions, producing text that is relevant and more positive than the original negative thoughts. In particular, …


Traffic Collision Avoidance System: False Injection Viability, John Hannah, Robert F. Mills, Richard A. Dill, Douglas D. Hodson Nov 2021

Traffic Collision Avoidance System: False Injection Viability, John Hannah, Robert F. Mills, Richard A. Dill, Douglas D. Hodson

Faculty Publications

Safety is a simple concept but an abstract task, specifically with aircraft. One critical safety system, the Traffic Collision Avoidance System II (TCAS), protects against mid-air collisions by predicting the course of other aircraft, determining the possibility of collision, and issuing a resolution advisory for avoidance. Previous research to identify vulnerabilities associated with TCAS’s communication processes discovered that a false injection attack presents the most comprehensive risk to veritable trust in TCAS, allowing for a mid-air collision. This research explores the viability of successfully executing a false injection attack against a target aircraft, triggering a resolution advisory. Monetary constraints precluded …