Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Artificial Intelligence and Robotics

Old Dominion University

2023

Keyword
Publication
Publication Type

Articles 1 - 30 of 71

Full-Text Articles in Physical Sciences and Mathematics

The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati Dec 2023

The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati

Cybersecurity Undergraduate Research Showcase

This paper explores the transformative potential of integrating Artificial Intelligence (AI) with established cybersecurity frameworks such as the Cybersecurity Maturity Model Certification (CMMC) and the National Institute of Standards and Technology (NIST) Special Publication 800-171. The thesis argues that the relationship between AI and these frameworks has the capacity to transform risk management in cybersecurity, where it could serve as a critical element in threat mitigation. In addition to addressing AI’s capabilities, this paper acknowledges the risks and limitations of these systems, highlighting the need for extensive research and monitoring when relying on AI. One must understand boundaries when integrating …


The Analysis And Impact Of Artificial Intelligence On Job Loss, Ava Baratz Dec 2023

The Analysis And Impact Of Artificial Intelligence On Job Loss, Ava Baratz

Cybersecurity Undergraduate Research Showcase

This paper illustrates the analysis and impact of Artificial Intelligence (AI) on job loss across various industries. This paper will discuss an overview of AI technology, a brief history of AI in industry, the positive impacts of AI, the negative impacts of AI on employment, AI considerations that contribute to job loss, the future outlook of AI, and employment loss mitigation strategies Various professional source articles and reputable blog posts will be used to finalize research on this topic.


Rising Threat - Deepfakes And National Security In The Age Of Digital Deception, Dougo Kone-Sow Dec 2023

Rising Threat - Deepfakes And National Security In The Age Of Digital Deception, Dougo Kone-Sow

Cybersecurity Undergraduate Research Showcase

This paper delves into the intricate landscape of deepfakes, exploring their genesis, capabilities, and far-reaching implications. The rise of deepfake technology presents an unprecedented threat to American national security, propagating disinformation and manipulation across various media formats. Notably, deepfakes have evolved from a historical backdrop of disinformation campaigns, merging with the advancements of artificial intelligence (AI) and machine learning to craft convincing but false multimedia content.

Examining the capabilities of deepfakes reveals their potential for misuse, evidenced by instances targeting individuals, companies, and even influencing political events like the 2020 U.S. elections. The paper highlights the direct threats posed by …


Integrating Ai Into Uavs, Huong Quach Dec 2023

Integrating Ai Into Uavs, Huong Quach

Cybersecurity Undergraduate Research Showcase

This research project explores the application of Deep Learning (DL) techniques, specifically Convolutional Neural Networks (CNNs), to develop a smoke detection algorithm for deployment on mobile platforms, such as drones and self-driving vehicles. The project focuses on enhancing the decision-making capabilities of these platforms in emergency response situations. The methodology involves three phases: algorithm development, algorithm implementation, and testing and optimization. The developed CNN model, based on ResNet50 architecture, is trained on a dataset of fire, smoke, and neutral images obtained from the web. The algorithm is implemented on the Jetson Nano platform to provide responsive support for first responders. …


New Paths Of Attacks: Revealing The Adaptive Integration Of Artificial Intelligence In Evolving Cyber Threats Targeting Social Media Users And Their Data, Larry Teasley Dec 2023

New Paths Of Attacks: Revealing The Adaptive Integration Of Artificial Intelligence In Evolving Cyber Threats Targeting Social Media Users And Their Data, Larry Teasley

Cybersecurity Undergraduate Research Showcase

The intersection between artificial intelligence tools and social media has opened doors to numerous opportunities and risks. This research delves into the escalating threat landscape in a society heavily dependent on social media. Despite the efforts by social media companies and cybersecurity professionals to mitigate cyber-attacks, the constant advancements of new technologies render social media platforms increasingly vulnerable. Malicious actors exploit generative AI to collect user data, enhancing cyber threats on social media. Notably, generative AI amplifies phishing attacks, disseminates false information, and propagates propaganda, posing substantial challenges to platform security. Ease access to large language models (LLMs) further complicates …


Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins Nov 2023

Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins

Cybersecurity Undergraduate Research Showcase

This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.


Faster, Cheaper, And Better Cfd: A Case For Machine Learning To Augment Reynolds-Averaged Navier-Stokes, John Peter Romano Ii Oct 2023

Faster, Cheaper, And Better Cfd: A Case For Machine Learning To Augment Reynolds-Averaged Navier-Stokes, John Peter Romano Ii

Mechanical & Aerospace Engineering Theses & Dissertations

In recent years, the field of machine learning (ML) has made significant advances, particularly through applying deep learning (DL) algorithms and artificial intelligence (AI). The literature shows several ways that ML may enhance the power of computational fluid dynamics (CFD) to improve its solution accuracy, reduce the needed computational resources and reduce overall simulation cost. ML techniques have also expanded the understanding of underlying flow physics and improved data capture from experimental fluid dynamics.

This dissertation presents an in-depth literature review and discusses ways the field of fluid dynamics has leveraged ML modeling to date. The author selects and describes …


Towards A Robust Defense: A Multifaceted Approach To The Detection And Mitigation Of Neural Backdoor Attacks Through Feature Space Exploration And Analysis, Liuwan Zhu Aug 2023

Towards A Robust Defense: A Multifaceted Approach To The Detection And Mitigation Of Neural Backdoor Attacks Through Feature Space Exploration And Analysis, Liuwan Zhu

Electrical & Computer Engineering Theses & Dissertations

From voice assistants to self-driving vehicles, machine learning(ML), especially deep learning, revolutionizes the way we work and live, through the wide adoption in a broad range of applications. Unfortunately, this widespread use makes deep learning-based systems a desirable target for cyberattacks, such as generating adversarial examples to fool a deep learning system to make wrong decisions. In particular, many recent studies have revealed that attackers can corrupt the training of a deep learning model, e.g., through data poisoning, or distribute a deep learning model they created with “backdoors” planted, e.g., distributed as part of a software library, so that the …


Towards Intelligent Runtime Framework For Distributed Heterogeneous Systems, Polykarpos Thomadakis Aug 2023

Towards Intelligent Runtime Framework For Distributed Heterogeneous Systems, Polykarpos Thomadakis

Computer Science Theses & Dissertations

Scientific applications strive for increased memory and computing performance, requiring massive amounts of data and time to produce results. Applications utilize large-scale, parallel computing platforms with advanced architectures to accommodate their needs. However, developing performance-portable applications for modern, heterogeneous platforms requires lots of effort and expertise in both the application and systems domains. This is more relevant for unstructured applications whose workflow is not statically predictable due to their heavily data-dependent nature. One possible solution for this problem is the introduction of an intelligent Domain-Specific Language (iDSL) that transparently helps to maintain correctness, hides the idiosyncrasies of lowlevel hardware, and …


Inverse Mappers For Qcd Global Analysis, Manal Almaeen Aug 2023

Inverse Mappers For Qcd Global Analysis, Manal Almaeen

Computer Science Theses & Dissertations

Inverse problems – using measured observations to determine unknown parameters – are well motivated but challenging in many scientific problems. Mapping parameters to observables is a well-posed problem with unique solutions, and therefore can be solved with differential equations or linear algebra solvers. However, the inverse problem requires backward mapping from observable to parameter space, which is often nonunique. Consequently, solving inverse problems is ill-posed and a far more challenging computational problem.

Our motivated application in this dissertation is the inverse problems in nuclear physics that characterize the internal structure of the hadrons. We first present a machine learning framework …


What Effects Do Large Language Models Have On Cybersecurity, Josiah Marshall May 2023

What Effects Do Large Language Models Have On Cybersecurity, Josiah Marshall

Cybersecurity Undergraduate Research Showcase

Large Language Models (LLMs) are artificial intelligence (AI) tools that can process, summarize, and translate texts and predict future words in a sentence, letting the LLM generate sentences similar to how humans talk and write. One concern that needs to be flagged is that, often, the content generated by different LLMs is inaccurate. LLMs are trained on code that can be used to detect data breaches, detect ransomware, and even pinpoint organizational vulnerabilities in advance of a cyberattack. LLMs are new but have unbelievable potential with their ability to generate code that brings awareness to cyber analysts and IT professionals. …


Opportunities And Challenges From Major Disasters Lessons Learned Of Long-Term Recovery Group Members, Eduardo E. Landaeta May 2023

Opportunities And Challenges From Major Disasters Lessons Learned Of Long-Term Recovery Group Members, Eduardo E. Landaeta

Graduate Program in International Studies Theses & Dissertations

Natural hazards caused by the alteration of weather patterns expose populations at risk, with an outcome of economic loss, property damage, personal injury, and loss of life. The unpredictability of disasters is a topic of concern to most governments. Disaster policies need more attention in aligning mitigation opportunities with disaster housing recovery (DHR). The effect of flooding, which primarily impacts housing in coastal areas, is one of the most serious issues associated with natural hazard. Flooding has a variety of causes and implications, especially for vulnerable populations who are exposed to it. DHR is complex, involving the need for effective …


Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego May 2023

Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego

Electrical & Computer Engineering Theses & Dissertations

World Health Organization (WHO) data show that around 684,000 people die from falls yearly, making it the second-highest mortality rate after traffic accidents [1]. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. In light of the recent widespread adoption of wearable sensors, it has become increasingly critical that fall detection models are developed that can effectively process large and sequential sensor signal data. Several researchers have recently developed fall detection algorithms based on wearable sensor data. However, real-time fall detection remains challenging because of the wide …


Visual Art In The Age Of Ai, Roshnica Gurung Apr 2023

Visual Art In The Age Of Ai, Roshnica Gurung

Cybersecurity Undergraduate Research Showcase

Artists and researchers have been deeply interested in using AI programs that generate art for quite some time now. As a result, there have been many advancements in making AI more accessible and easier to use for the public. This is because AI is not just for business anymore. Nowadays an individual without a college degree with even the slightest interest in art can go on a website like Stable Diffusion and create an artistic image using a text prompt in a quick couple minutes. The only limit is your imagination- and your internet’s stability. This accessibility was a huge …


Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis Apr 2023

Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis

Modeling, Simulation and Visualization Student Capstone Conference

Maritime autonomy, specifically the use of autonomous and semi-autonomous maritime vessels, is a key enabling technology supporting a set of diverse and critical research areas, including coastal and environmental resilience, assessment of waterway health, ecosystem/asset monitoring and maritime port security. Critical to the safe, efficient and reliable operation of an autonomous maritime vessel is its ability to perceive on-the-fly the external environment through onboard sensors. In this paper, buoy detection for LiDAR images is explored by using several tools and techniques: machine learning methods, Unity Game Engine (herein referred to as Unity) simulation, and traditional image processing. The Unity Game …


Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund Apr 2023

Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund

Modeling, Simulation and Visualization Student Capstone Conference

The sudden arrival of many migrants can present new challenges for host communities and create negative attitudes that reflect that tension. In the case of Colombia, with the influx of over 2.5 million Venezuelan migrants, such tensions arose. Our research objective is to investigate how those sentiments arise in social media. We focused on monitoring derogatory terms for Venezuelans, specifically veneco and veneca. Using a dataset of 5.7 million tweets from Colombian users between 2015 and 2021, we determined the proportion of tweets containing those terms. We observed a high prevalence of xenophobic and defamatory language correlated with the …


Statistical Approach To Quantifying Interceptability Of Interaction Scenarios For Testing Autonomous Surface Vessels, Benjamin E. Hargis, Yiannis E. Papelis Apr 2023

Statistical Approach To Quantifying Interceptability Of Interaction Scenarios For Testing Autonomous Surface Vessels, Benjamin E. Hargis, Yiannis E. Papelis

Modeling, Simulation and Visualization Student Capstone Conference

This paper presents a probabilistic approach to quantifying interceptability of an interaction scenario designed to test collision avoidance of autonomous navigation algorithms. Interceptability is one of many measures to determine the complexity or difficulty of an interaction scenario. This approach uses a combined probability model of capability and intent to create a predicted position probability map for the system under test. Then, intercept-ability is quantified by determining the overlap between the system under test probability map and the intruder’s capability model. The approach is general; however, a demonstration is provided using kinematic capability models and an odometry-based intent model.


Towards Nlp-Based Conceptual Modeling Frameworks, David Shuttleworth, Jose Padilla Apr 2023

Towards Nlp-Based Conceptual Modeling Frameworks, David Shuttleworth, Jose Padilla

Modeling, Simulation and Visualization Student Capstone Conference

This paper presents preliminary research using Natural Language Processing (NLP) to support the development of conceptual modeling frameworks. NLP-based frameworks are intended to lower the barrier of entry for non-modelers to develop models and to facilitate communication across disciplines considering simulations in research efforts. NLP drives conceptual modeling in two ways. Firstly, it attempts to automate the generation of conceptual models and simulation specifications, derived from non-modelers’ narratives, while standardizing the conceptual modeling process and outcome. Secondly, as the process is automated, it is simpler to replicate and be followed by modelers and non-modelers. This allows for using a common …


Enhancing Pedestrian-Autonomous Vehicle Safety In Low Visibility Scenarios: A Comprehensive Simulation Method, Zizheng Yan, Yang Liu, Hong Yang Apr 2023

Enhancing Pedestrian-Autonomous Vehicle Safety In Low Visibility Scenarios: A Comprehensive Simulation Method, Zizheng Yan, Yang Liu, Hong Yang

Modeling, Simulation and Visualization Student Capstone Conference

Self-driving cars raise safety concerns, particularly regarding pedestrian interactions. Current research lacks a systematic understanding of these interactions in diverse scenarios. Autonomous Vehicle (AV) performance can vary due to perception accuracy, algorithm reliability, and environmental dynamics. This study examines AV-pedestrian safety issues, focusing on low visibility conditions, using a co-simulation framework combining virtual reality and an autonomous driving simulator. 40 experiments were conducted, extracting surrogate safety measures (SSMs) from AV and pedestrian trajectories. The results indicate that low visibility can impair AV performance, increasing conflict risks for pedestrians. AV algorithms may require further enhancements and validations for consistent safety performance …


Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan Apr 2023

Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan

Cybersecurity Undergraduate Research Showcase

Cybercrime and attack methods have been steadily increasing since the 2019 pandemic. In the years following 2019, the number of victims and attacks per hour rapidly increased as businesses and organizations transitioned to digital environments for business continuity amidst lockdowns. In most scenarios cybercriminals continued to use conventional attack methods and known vulnerabilities that would cause minimal damage to an organization with a robust cyber security posture. However, zero-day exploits have skyrocketed across all industries with an increasingly growing technological landscape encompassing internet of things (IoT), cloud hosting, and more advanced mobile technologies. Reports by Mandiant Threat Intelligence (2022) concluded …


Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng Apr 2023

Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng

Cybersecurity Undergraduate Research Showcase

Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.

MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …


Artificial Intelligence In Higher Education: The State Of The Field, Helen Crompton, Diane Burke Apr 2023

Artificial Intelligence In Higher Education: The State Of The Field, Helen Crompton, Diane Burke

Teaching & Learning Faculty Publications

This systematic review provides unique findings with an up-to-date examination of artificial intelligence (AI) in higher education (HE) from 2016 to 2022. Using PRISMA principles and protocol, 138 articles were identified for a full examination. Using a priori, and grounded coding, the data from the 138 articles were extracted, analyzed, and coded. The findings of this study show that in 2021 and 2022, publications rose nearly two to three times the number of previous years. With this rapid rise in the number of AIEd HE publications, new trends have emerged. The findings show that research was conducted in six of …


Architectural Design Of A Blockchain-Enabled, Federated Learning Platform For Algorithmic Fairness In Predictive Health Care: Design Science Study, Xueping Liang, Juan Zhao, Yan Chen, Eranga Bandara, Sachin Shetty Jan 2023

Architectural Design Of A Blockchain-Enabled, Federated Learning Platform For Algorithmic Fairness In Predictive Health Care: Design Science Study, Xueping Liang, Juan Zhao, Yan Chen, Eranga Bandara, Sachin Shetty

VMASC Publications

Background: Developing effective and generalizable predictive models is critical for disease prediction and clinical decision-making, often requiring diverse samples to mitigate population bias and address algorithmic fairness. However, a major challenge is to retrieve learning models across multiple institutions without bringing in local biases and inequity, while preserving individual patients' privacy at each site.

Objective: This study aims to understand the issues of bias and fairness in the machine learning process used in the predictive health care domain. We proposed a software architecture that integrates federated learning and blockchain to improve fairness, while maintaining acceptable prediction accuracy and minimizing overhead …


Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework For Civilian Urban Air Mobility, Md. Shirajum Munir, Sumit Howlader Dipro, Kamrul Hasan, Tariqul Islam, Sachin Shetty Jan 2023

Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework For Civilian Urban Air Mobility, Md. Shirajum Munir, Sumit Howlader Dipro, Kamrul Hasan, Tariqul Islam, Sachin Shetty

VMASC Publications

Urban air mobility (UAM) has become a potential candidate for civilization for serving smart citizens, such as through delivery, surveillance, and air taxis. However, safety concerns have grown since commercial UAM uses a publicly available communication infrastructure that enhances the risk of jamming and spoofing attacks to steal or crash crafts in UAM. To protect commercial UAM from cyberattacks and theft, this work proposes an artificial intelligence (AI)-enabled exploratory cyber-physical safety analyzer framework. The proposed framework devises supervised learning-based AI schemes such as decision tree, random forests, logistic regression, K-nearest neighbors (KNN), and long short-term memory (LSTM) for predicting and …


Digital Transformation, Applications, And Vulnerabilities In Maritime And Shipbuilding Ecosystems, Rafael Diaz, Katherine Smith Jan 2023

Digital Transformation, Applications, And Vulnerabilities In Maritime And Shipbuilding Ecosystems, Rafael Diaz, Katherine Smith

VMASC Publications

The evolution of maritime and shipbuilding supply chains toward digital ecosystems increases operational complexity and needs reliable communication and coordination. As labor and suppliers shift to digital platforms, interconnection, information transparency, and decentralized choices become ubiquitous. In this sense, Industry 4.0 enables "smart digitalization" in these environments. Many applications exist in two distinct but interrelated areas related to shipbuilding design and shipyard operational performance. New digital tools, such as virtual prototypes and augmented reality, begin to be used in the design phases, during the commissioning/quality control activities, and for training workers and crews. An application relates to using Virtual Prototypes …


The Use Of Artificial Intelligence To Detect Students Sentiments And Emotions In Gross Anatomy Reflections, Krzysztof J. Rechowicz, Carrie A. Elzie Jan 2023

The Use Of Artificial Intelligence To Detect Students Sentiments And Emotions In Gross Anatomy Reflections, Krzysztof J. Rechowicz, Carrie A. Elzie

VMASC Publications

Students' reflective writings in gross anatomy provide a rich source of complex emotions experienced by learners. However, qualitative approaches to evaluating student writings are resource heavy and timely. To overcome this, natural language processing, a nascent field of artificial intelligence that uses computational techniques for the analysis and synthesis of text, was used to compare health professional students' reflections on the importance of various regions of the body to their own lives and those of the anatomical donor dissected. A total of 1365 anonymous writings (677 about a donor, 688 about self) were collected from 132 students. Binary and trinary …


Unmasking Deception In Vanets: A Decentralized Approach To Verifying Truth In Motion, Susan Zehra, Syed R. Rizvi, Steven Olariu Jan 2023

Unmasking Deception In Vanets: A Decentralized Approach To Verifying Truth In Motion, Susan Zehra, Syed R. Rizvi, Steven Olariu

College of Sciences Posters

VANET, which stands for "Vehicular Ad Hoc Network," is a wireless network that allows vehicles to communicate with each other and with infrastructure, such as Roadside Units (RSUs), with the aim of enhancing road safety and improving the overall driving experience through real-time exchange of information and data. VANET has various applications, including traffic management, road safety alerts, and navigation. However, the security of VANET can be compromised if a malicious user alters the content of messages transmitted, which can harm both individual vehicles and the overall trust in VANET technology. Ensuring the correctness of messages is crucial for the …


Evaluation Of Scalable Quantum And Classical Machine Learning For Particle Tracking Classification In Nuclear Physics, Polykarpos Thomadakis, Emmanuel Billias, Nikos Chrisochoides Jan 2023

Evaluation Of Scalable Quantum And Classical Machine Learning For Particle Tracking Classification In Nuclear Physics, Polykarpos Thomadakis, Emmanuel Billias, Nikos Chrisochoides

The Graduate School Posters

Future particle accelerators will exceed by far the current data size (1015) per experiment, and high- luminosity program(s) will produce more than 300 times as much data. Classical Machine Learning (ML) likely will benefit from new tools based on quantum computing. Particle track reconstruction is the most computationally intensive process in nuclear physics experiments. A combinatorial approach exhaustively tests track measurements (“hits”), represented as images, to identify those that form an actual particle trajectory, which is then used to reconstruct track parameters necessary for the physics experiment. Quantum Machine Learning (QML) could improve this process in multiple ways, …


Ml-Based Surrogates And Emulators, Tareq Alghamdi, Yaohang Li, Nobuo Sato Jan 2023

Ml-Based Surrogates And Emulators, Tareq Alghamdi, Yaohang Li, Nobuo Sato

College of Sciences Posters

No abstract provided.


Patch-Wise Training With Convolutional Neural Networks To Synthetically Upscale Cfd Simulations, John P. Romano, Alec C. Brodeur, Oktay Baysal Jan 2023

Patch-Wise Training With Convolutional Neural Networks To Synthetically Upscale Cfd Simulations, John P. Romano, Alec C. Brodeur, Oktay Baysal

Mechanical & Aerospace Engineering Faculty Publications

This paper expands the authors’ prior work[1], which focuses on developing a convolutional neural network (CNN) model capable of mapping time-averaged, unsteady Reynold’s-averaged Navier-Stokes (URANS) simulations to higher resolution results informed by time-averaged detached eddy simulations (DES). The authors present improvements over the prior CNN autoencoder model that result from hyperparameter optimization, increased data set augmentation through the adoption of a patch-wise training approach, and the predictions of primitive variables rather than vorticity magnitude. The training of the CNN model developed in this study uses the same URANS and DES simulations of a transonic flow around several NACA 4-digit airfoils …