Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 8845

Full-Text Articles in Physical Sciences and Mathematics

Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover May 2022

Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover

Computer Science and Computer Engineering Undergraduate Honors Theses

Graphics processing units (GPUs) have become a widely used technology for various purposes. While their intended use is accelerating graphics rendering, their parallel computing capabilities have expanded their use into other areas. They are used in computer gaming, deep learning for artificial intelligence and mining cryptocurrencies. Their rise in popularity led to research involving several security aspects, including this paper’s focus, memory vulnerabilities. Research documented many vulnerabilities, including GPUs not implementing address space layout randomization, not zeroing out memory after deallocation, and not initializing newly allocated memory. These vulnerabilities can lead to a victim’s sensitive data being leaked ...


A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall May 2022

A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall

Computer Science and Computer Engineering Undergraduate Honors Theses

The ability to synthesize custom DNA molecules has led to the feasibility of DNA nanotechnology. Synthesis is time-consuming and expensive, so simulations of proposed DNA designs are necessary. Open-source simulators, such as oxDNA, are available but often difficult to configure and interface with. Packages such as oxdna-tile-binding pro- vide an interface for oxDNA which allows for the ability to create scripts that automate the configuration process. This project works to improve the scripts in oxdna-tile-binding to improve integration with job scheduling systems commonly used in high-performance computing environments, improve ease-of-use and consistency within the scripts compos- ing oxdna-tile-binding, and move ...


Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan May 2022

Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan

Computer Science and Computer Engineering Undergraduate Honors Theses

The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.


The Iwar Range + 21 Years: Cyber Defense Education In 2022, Joseph H. Schafer, Chris Morrell, Ray Blaine May 2022

The Iwar Range + 21 Years: Cyber Defense Education In 2022, Joseph H. Schafer, Chris Morrell, Ray Blaine

Military Cyber Affairs

Twenty-one years ago, The IWAR Range paper published by CCSC described nascent information assurance (now cybersecurity[1]) education programs and the inspiration and details for constructing cyber ranges and facilitating cyber exercises. This paper updates the previously published work by highlighting the dramatic evolution of the cyber curricula, exercise networks and ranges, influences, and environments over the past twenty years.

[1] In 2014, DoD adopted “cybersecurity” instead of “information assurance.” [34:1]


Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague May 2022

Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague

Computer Science and Computer Engineering Undergraduate Honors Theses

The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor's Algorithm. NIST proposed a standardization effort in creating a new class of asymmetric cryptography named Post-Quantum Cryptography (PQC). These new algorithms will be resistant against both classical computers and sufficiently powerful quantum computers. Although the new algorithms seem mathematically secure, they can possibly be broken by a class of attacks known as side-channels attacks (SCA). Side-channel attacks involve exploiting the hardware that the algorithm runs on to figure out secret values that could break the security of the ...


Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover May 2022

Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover

Computer Science and Computer Engineering Undergraduate Honors Theses

Network Intrusion Detection Systems (NIDS) are one layer of defense that can be used to protect a network from cyber-attacks. They monitor a network for any malicious activity and send alerts if suspicious traffic is detected. Two of the most common open-source NIDS are Snort and Suricata. Snort was first released in 1999 and became the industry standard. The one major drawback of Snort has been its single-threaded architecture. Because of this, Suricata was released in 2009 and uses a multithreaded architecture. Snort released Snort 3 last year with major improvements from earlier versions, including implementing a new multithreaded architecture ...


Symbolic Ns-3 For Efficient Exhaustive Testing, Jianfei Shao May 2022

Symbolic Ns-3 For Efficient Exhaustive Testing, Jianfei Shao

Computer Science and Engineering: Theses, Dissertations, and Student Research

Exhaustive testing is an important type of simulation, where a user exhaustively simulates a protocol for all possible cases with respect to some uncertain factors, such as all possible packet delays or packet headers. It is useful for completely evaluating the protocol performance, finding the worst-case performance, and detecting possible design or implementation bugs of a protocol. It is, however, time consuming to use the brute force method with current NS-3, a widely used network simulator, for exhaustive testing. In this paper, we present our work on Sym-NS-3 for more efficient exhaustive testing, which leverages a powerful program analysis technique ...


How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar May 2022

How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar

Information Systems Undergraduate Honors Theses

Since the founding of computers, data scientists have been able to engineer devices that increase individuals’ opportunities to communicate with each other. In the 1990s, the internet took over with many people not understanding its utility. Flash forward 30 years, and we cannot live without our connection to the internet. The internet of information is what we called early adopters with individuals posting blogs for others to read, this was known as Web 1.0. As we progress, platforms became social allowing individuals in different areas to communicate and engage with each other, this was known as Web 2.0 ...


Monitoring The M-Dwarf Host Stars Of Tess Exoplanet Candidates: Stellar Flares And Habitability, Ashley Lieber May 2022

Monitoring The M-Dwarf Host Stars Of Tess Exoplanet Candidates: Stellar Flares And Habitability, Ashley Lieber

Physics Undergraduate Honors Theses

In the search for life beyond our solar system, the study of M-dwarfs has become increasingly important due to their unique characteristics including their small size, flaring capabilities, and long lifespans. Their small size allows for exoplanet detection due to observable gravitational interactions, and the stellar flares could potentially trigger prebiotic life on exoplanets in the system. Lastly, their long lifespans may provide the conditions necessary to foster prebiotic life and the development of more complex organisms over time. Flare rate is a critical factor in determining the habitability of the exoplanet due to its potential to damage or incubate ...


Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta Apr 2022

Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta

Computer Science and Engineering: Theses, Dissertations, and Student Research

Today, the use of Internet of Things (IoT) devices is higher than ever and it is growing rapidly. Many IoT devices are usually manufactured by home appliance manufacturers where security and privacy are not the foremost concern. When an IoT device is connected to a network, currently there does not exist a strict authentication method that verifies the identity of the device, allowing any rogue IoT device to authenticate to an access point. This thesis addresses the issue by introducing methods for continuous and re-authentication of static and dynamic IoT devices, respectively. We introduce mechanisms and protocols for authenticating a ...


Unconventional Computation Including Quantum Computation, Bruce J. Maclennan Apr 2022

Unconventional Computation Including Quantum Computation, Bruce J. Maclennan

Faculty Publications and Other Works -- EECS

Unconventional computation (or non-standard computation) refers to the use of non-traditional technologies and computing paradigms. As we approach the limits of Moore’s Law, progress in computation will depend on going beyond binary electronics and on exploring new paradigms and technologies for information processing and control. This book surveys some topics relevant to unconventional computation, including the definition of unconventional computations, the physics of computation, quantum computation, DNA and molecular computation, and analog computation. This book is the content of a course taught at UTK.


Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger Apr 2022

Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger

Honors Projects

As global internet usage expands, websites are growing in both size and complexity. Contrary to the common belief that the internet is immaterial and “environmentally friendly”, web pages have significant negative environmental impacts (Frick, 2015). Websites contribute to global greenhouse gas (GHG) emissions and electricity consumption. Considering the current climate crisis, it is crucial that web developers be aware of the impact that their work has on the environment and actively work to improve site energy efficiency. With a lack of regulation and awareness, the environmental impact of websites has remained unchecked despite growing concerns for sustainability. Further research and ...


Correlation Between The Compatibility Of Anthropometric Design Of Educational Furniture And Neck Pain In The Faculty Of Physical Therapy At Delta University, Amira H. Mohammed Apr 2022

Correlation Between The Compatibility Of Anthropometric Design Of Educational Furniture And Neck Pain In The Faculty Of Physical Therapy At Delta University, Amira H. Mohammed

Delta University Scientific Journal

No abstract provided.


Molecular Characterization Of Blakpc, Blandm1, And Acra Genes In Klebsiella Pneumoniae, Rasha Medhat El-Morsi Apr 2022

Molecular Characterization Of Blakpc, Blandm1, And Acra Genes In Klebsiella Pneumoniae, Rasha Medhat El-Morsi

Delta University Scientific Journal

Abstract

Klebsiella pneumonia (K. pneumonia) harboring blaKPC, blaNDM1, and acrA genes are highly resistant and inactivate all β-lactam antibiotics including carbapenems. This study aimed to molecularly characterization of these enzymes in K. pneumonia isolates. A total of sixty-seven clinical isolates of multiple drug-resistant (MDR) K. pneumonia were collected from different sites of infection, characterized and subjected to antimicrobial susceptibility testing, double-disc diffusion Synergy test (DDST) and Modified-Hodge test (MHT). blaKPC, acrA , blaNDM1 genes amplified by PCR. K. pneumonia isolates carrying these resistance genes were fully identified by 16S rRNA sequencing and the relatedness of isolates was ...


Protective Effects Of Artemisinin On The Placenta Of L-Name Induced Preeclampsia In Rat, Hanan Eissa El Shafey Hanan Apr 2022

Protective Effects Of Artemisinin On The Placenta Of L-Name Induced Preeclampsia In Rat, Hanan Eissa El Shafey Hanan

Delta University Scientific Journal

Background: Preeclampsia (PE) is a pregnancy induced hypertensive disorder and an important cause of maternal and fetal morbidity and mortality. It affects about 3 - 8% of all pregnancies worldwide. Placental factors that arise from placental hypoxia/ischemia set off molecular and cellular cascades, resulting in vascular endothelial dysfunction.

Objective: The aim of study was to clarify the possible protective effect of Artemisinin (ART) on the placenta of L-NAME induced PE in rats and to explore possible involved mechanisms.

Method: Thirty pregnant female Sparge Dawley rats were randomly divided into 3 groups (10 rats/each): The control group, PE-group, and ART ...


Homology Modeling And Docking Studies Of Peroxisomal Carnitine O-Octanoyltransferase, Rania Khalil Apr 2022

Homology Modeling And Docking Studies Of Peroxisomal Carnitine O-Octanoyltransferase, Rania Khalil

Delta University Scientific Journal

Computational docking is used for optimizing known drugs and for defining new binders by simulating their binding mode and affinity. AutoDock tools have been widely cited as necessary tools in structure-based drug design. These methods are rapid enough to declare virtual screening of ligand libraries. We selected a target involved in transferases enzyme class and provided a fully reproducible docking protocol. This paper will show how docking techniques would be an important asset to identify new ligands interactions with transferases. We used Non-3D structures of chosen transferases and built models for the proteins in trying to find putative compounds against ...


Characterizing And Predicting Human Visual Perception Of Unmanned Aerial Vehicle Gestures, Paul Fletcher Apr 2022

Characterizing And Predicting Human Visual Perception Of Unmanned Aerial Vehicle Gestures, Paul Fletcher

Computer Science and Engineering: Theses, Dissertations, and Student Research

Unmanned Aerial Vehicles (UAVs) are being used in public domains and hazardous environments where effective communication strategies are critical. UAV gesture techniques have been shown to communicate meaning to human observers and may be ideal in contexts that require lightweight systems such as unmanned aerial flight, however, this work may be limited to an idealized range of viewer perspectives. As gesture is a visual communication technique it is necessary to consider how the perception of a robot gesture may suffer from obfuscation or self-occlusion from some viewpoints. This thesis presents the results of three online user-studies that examine participants’ ability ...


Real-Time Illumination Capture And Rendering On Mobile Devices, Snehal Padhye, James A. Ferwerda Apr 2022

Real-Time Illumination Capture And Rendering On Mobile Devices, Snehal Padhye, James A. Ferwerda

Frameless

We present our efforts to develop methods for rendering 3D objects on mobile devices using real-world dynamic illumination from the user’s environment. To achieve this, we use the front and back cameras on the mobile device to estimate the light distribution in the environment in real time. We then create a dynamic illumination map and render the object at interactive rates in a browser on the device using a web-based graphics API. This project achieves one of the goals of our related work on realistic visualization of virtual objects: to make virtual objects appear to be situated within the ...


Mixed Reality Prototype Device Showcase: Using Smart Glasses To Enhance Language Access, Aaron Parker, Connor Switenky, Roshan Mathew, Wendy Dannels Apr 2022

Mixed Reality Prototype Device Showcase: Using Smart Glasses To Enhance Language Access, Aaron Parker, Connor Switenky, Roshan Mathew, Wendy Dannels

Frameless

While the use of American Sign Language (ASL) interpreters and real-time captioning significantly increases deaf individuals’ ability to participate in a wide variety of functions, there are some limitations. The major problem is that current ways of providing communication and information access to deaf people require them to split their attention between the visual focus of the specific content and the interpreter/captioning display. At any given point in time, deaf people are forced to decide what explanation to miss with subsequent effects on topic comprehension and perceptions of the interaction and environments.


Novel 360-Degree Camera, Ian Gauger, Andrew Kurtz, Zakariya Niazi Apr 2022

Novel 360-Degree Camera, Ian Gauger, Andrew Kurtz, Zakariya Niazi

Frameless

Circle Optics is developing novel technology for low-parallax, real time, panoramic image capture using an integrated array of multiple adjacent polygonal-edged cameras. This technology can be optimized and deployed for a variety of markets, including cinematic VR. Circle Optics’ existing prototype, Hydra Alpha, will be demonstrated.


Warehouse And Logistics: Smart Picking With Vuzix Smart Glasses, Elise Hemink Apr 2022

Warehouse And Logistics: Smart Picking With Vuzix Smart Glasses, Elise Hemink

Frameless

Vuzix is an industry leader in augmented reality (AR) technology. We provide innovative products to an array of industries, a few being defense, security, enterprise, and consumers. Our AR technology provides a perfect balance of engagement in the digital and real worlds thanks to their innovative optics, AI apps and 5G capability.


Creating A Virtual Reality Experience In Service To A Non-Profit Agency, Frank Deese, Susan Lakin, Isabelle Anderson Apr 2022

Creating A Virtual Reality Experience In Service To A Non-Profit Agency, Frank Deese, Susan Lakin, Isabelle Anderson

Frameless

In the summer of 2018, RIT Professors Susan Lakin and Frank Deese discussed with the principal officers of the Society for the Protection and Care of Children (SPCC) in Rochester how the new technology of Virtual Reality might be used to not only impart information to viewers, but generate empathy for those receiving services from the organization as well as those performing those services. Their ultimate goal was to create an experience that could be viewed with VR headsets at fundraising events and on a website using low-cost Google Cardboard.


Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore Apr 2022

Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore

Symposium of Student Scholars

Climate change is happening, and many countries are already facing devastating consequences. Populations worldwide are adapting to the season's unpredictability they relay to lands for agriculture. Our first research was to develop an IoT Clusters Platform for Data Collection, analysis, and visualization. The platform comprises hardware parts with Raspberry Pi and Arduino's clusters connected to multiple sensors. The clusters transmit data collected in real-time to microservices-based servers where the data can be accessed and processed. Our objectives in developing this platform were to create an efficient data collection system, relatively cheap to implement and easy to deploy in ...


Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu Apr 2022

Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu

Modeling, Simulation and Visualization Student Capstone Conference

The Data-Enabled Advanced Training Program for Cybersecurity Research and Education (DeapSECURE) was introduced in 2018 as a non-degree training consisting of six modules covering a broad range of cyberinfrastructure techniques, including high performance computing, big data, machine learning and advanced cryptography, aimed at reducing the gap between current cybersecurity curricula and requirements needed for advanced research and industrial projects. By its third year, DeapSECURE, like many other educational endeavors, experienced abrupt changes brought by the COVID-19 pandemic. The training had to be retooled to adapt to fully online delivery. Hands-on activities were reformatted to accommodate self-paced learning. In this paper ...


Practical Considerations And Applications For Autonomous Robot Swarms, Rory Alan Hector Apr 2022

Practical Considerations And Applications For Autonomous Robot Swarms, Rory Alan Hector

LSU Doctoral Dissertations

In recent years, the study of autonomous entities such as unmanned vehicles has begun to revolutionize both military and civilian devices. One important research focus of autonomous entities has been coordination problems for autonomous robot swarms. Traditionally, robot models are used for algorithms that account for the minimum specifications needed to operate the swarm. However, these theoretical models also gloss over important practical details. Some of these details, such as time, have been considered before (as epochs of execution). In this dissertation, we examine these details in the context of several problems and introduce new performance measures to capture practical ...


Human-Machine Communication: Complete Volume. Volume 4 Apr 2022

Human-Machine Communication: Complete Volume. Volume 4

Human-Machine Communication

This is the complete volume of HMC Volume 4.


Embracing Ai-Based Education: Perceived Social Presence Of Human Teachers And Expectations About Machine Teachers In Online Education, Jihyun Kim, Kelly Merrill Jr., Kun Xu, Deanna D. Sellnow Apr 2022

Embracing Ai-Based Education: Perceived Social Presence Of Human Teachers And Expectations About Machine Teachers In Online Education, Jihyun Kim, Kelly Merrill Jr., Kun Xu, Deanna D. Sellnow

Human-Machine Communication

Technological advancements in education have turned the idea of machines as teachers into a reality. To better understand this phenomenon, the present study explores how college students develop expectations (or anticipations) about a machine teacher, particularly an AI teaching assistant. Specifically, the study examines whether students’ previous experiences with online courses taught by a human teacher would influence their expectations about AI teaching assistants in future online courses. An online survey was conducted to collect data from college students in the United States. Findings indicate that positively experienced social presence of a human teacher helps develop positive expectations about an ...


Sex With Robots And Human-Machine Sexualities: Encounters Between Human-Machine Communication And Sexuality Studies, Marco Dehnert Apr 2022

Sex With Robots And Human-Machine Sexualities: Encounters Between Human-Machine Communication And Sexuality Studies, Marco Dehnert

Human-Machine Communication

Sex robots are a controversial topic. Understood as artificial-intelligence enhanced humanoid robots designed for use in partnered and solo sex, sex robots offer ample opportunities for theorizing from a Human-Machine Communication (HMC) perspective. This comparative literature review conjoins the seemingly disconnected literatures of HMC and sexuality studies (SeS) to explore questions surrounding intimacy, love, desire, sex, and sexuality among humans and machines. In particular, I argue for understanding human-machine sexualities as communicative sexuotechnical-assemblages, extending previous efforts in both HMC and SeS for more-than-human, ecological, and more fluid approaches to humans and machines, as well as to sex and sexuality. This ...


I Get By With A Little Help From My Bots: Implications Of Machine Agents In The Context Of Social Support, Austin Beattie, Andrew C. High Apr 2022

I Get By With A Little Help From My Bots: Implications Of Machine Agents In The Context Of Social Support, Austin Beattie, Andrew C. High

Human-Machine Communication

In this manuscript we discuss the increasing use of machine agents as potential sources of support for humans. Continued examination of the use of machine agents, particularly chatbots (or “bots”) for support is crucial as more supportive interactions occur with these technologies. Building off extant research on supportive communication, this manuscript reviews research that has implications for bots as support providers. At the culmination of the literature review, several propositions regarding how factors of technological efficacy, problem severity, perceived stigma, and humanness affect the process of support are proposed. By reviewing relevant studies, we integrate research on human-machine and supportive ...


Considering The Context To Build Theory In Hci, Hri, And Hmc: Explicating Differences In Processes Of Communication And Socialization With Social Technologies, Andrew Gambino, Bingjie Liu Apr 2022

Considering The Context To Build Theory In Hci, Hri, And Hmc: Explicating Differences In Processes Of Communication And Socialization With Social Technologies, Andrew Gambino, Bingjie Liu

Human-Machine Communication

The proliferation and integration of social technologies has occurred quickly, and the specific technologies with which we engage are ever-changing. The dynamic nature of the development and use of social technologies is often acknowledged by researchers as a limitation. In this manuscript, however, we present a discussion on the implications of our modern technological context by focusing on processes of socialization and communication that are fundamentally different from their interpersonal corollary. These are presented and discussed with the goal of providing theoretical building blocks toward a more robust understanding of phenomena of human-computer interaction, human-robot interaction, human-machine communication, and interpersonal ...