Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine learning (50)
- Deep learning (32)
- Sea level rise (22)
- Algorithms (20)
- Simulation (19)
-
- Digital libraries (18)
- Computer simulation (17)
- Artificial intelligence (16)
- Cybersecurity (16)
- Modeling (16)
- Neural networks (16)
- Climate change (15)
- Thin films (15)
- Security (14)
- Electron diffraction (13)
- Engineering (13)
- Blockchain (12)
- Chemical elements (12)
- Cavity (11)
- Plasma (11)
- Cancer (10)
- Computer vision (10)
- Feature extraction (10)
- Internet of things (10)
- Models (10)
- Polymers (10)
- Sensors (10)
- Atomic force microscopy (9)
- Information retrieval (9)
- Remote sensing (9)
- Publication Year
- Publication
-
- Electrical & Computer Engineering Faculty Publications (254)
- Electrical & Computer Engineering Theses & Dissertations (85)
- Computer Science Faculty Publications (70)
- Mechanical & Aerospace Engineering Faculty Publications (50)
- Mechanical & Aerospace Engineering Theses & Dissertations (49)
-
- Engineering Management & Systems Engineering Faculty Publications (48)
- Computer Science Theses & Dissertations (47)
- Engineering Management & Systems Engineering Theses & Dissertations (47)
- Computational Modeling & Simulation Engineering Theses & Dissertations (45)
- Engineering Technology Faculty Publications (44)
- Civil & Environmental Engineering Theses & Dissertations (41)
- Civil & Environmental Engineering Faculty Publications (40)
- Physics Faculty Publications (37)
- Bioelectrics Publications (35)
- Physics Theses & Dissertations (29)
- VMASC Publications (28)
- Chemistry & Biochemistry Faculty Publications (26)
- Computational Modeling & Simulation Engineering Faculty Publications (26)
- Cybersecurity Undergraduate Research Showcase (25)
- Chemistry & Biochemistry Theses & Dissertations (17)
- Mathematics & Statistics Theses & Dissertations (16)
- Modeling, Simulation and Visualization Student Capstone Conference (16)
- Mathematics & Statistics Faculty Publications (14)
- Information Technology & Decision Sciences Faculty Publications (11)
- OES Faculty Publications (9)
- CCPO Publications (8)
- Virginia Journal of Science (8)
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (6)
- March 13, 2013: Regional Sea Level Rise Assessment, Adaptation and Flood Mitigation Projects (6)
- OES Theses and Dissertations (6)
- Publication Type
Articles 31 - 60 of 1206
Full-Text Articles in Physical Sciences and Mathematics
Towards Intelligent Runtime Framework For Distributed Heterogeneous Systems, Polykarpos Thomadakis
Towards Intelligent Runtime Framework For Distributed Heterogeneous Systems, Polykarpos Thomadakis
Computer Science Theses & Dissertations
Scientific applications strive for increased memory and computing performance, requiring massive amounts of data and time to produce results. Applications utilize large-scale, parallel computing platforms with advanced architectures to accommodate their needs. However, developing performance-portable applications for modern, heterogeneous platforms requires lots of effort and expertise in both the application and systems domains. This is more relevant for unstructured applications whose workflow is not statically predictable due to their heavily data-dependent nature. One possible solution for this problem is the introduction of an intelligent Domain-Specific Language (iDSL) that transparently helps to maintain correctness, hides the idiosyncrasies of lowlevel hardware, and …
Study Of Microphonic Effects On The C100 Cryomodule For High Energy Electron Beam Accelerators, Caleb James Hull
Study Of Microphonic Effects On The C100 Cryomodule For High Energy Electron Beam Accelerators, Caleb James Hull
Mechanical & Aerospace Engineering Theses & Dissertations
The Continuous Electron Beam Accelerator Facility (CEBAF) at Thomas Jefferson National Laboratory (JLab) is a particle accelerator which can accelerate an electron beam to relativistic speeds and apply the beam onto target samples. The C100 superconducting radio frequency (SRF) cavity is the primary accelerating structure of the C100 cryomodule, one of the many cryomodules which compose the CEBAF linear accelerator. SRF cavities are particularly sensitive to internal and external vibrations that can result in a phenomenon called microphonics which degrade the operational stability of a cryomodule.
The purpose of this thesis is to investigate the significance of mechanical disturbances on …
Towards A Robust Defense: A Multifaceted Approach To The Detection And Mitigation Of Neural Backdoor Attacks Through Feature Space Exploration And Analysis, Liuwan Zhu
Electrical & Computer Engineering Theses & Dissertations
From voice assistants to self-driving vehicles, machine learning(ML), especially deep learning, revolutionizes the way we work and live, through the wide adoption in a broad range of applications. Unfortunately, this widespread use makes deep learning-based systems a desirable target for cyberattacks, such as generating adversarial examples to fool a deep learning system to make wrong decisions. In particular, many recent studies have revealed that attackers can corrupt the training of a deep learning model, e.g., through data poisoning, or distribute a deep learning model they created with “backdoors” planted, e.g., distributed as part of a software library, so that the …
Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane
Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane
Engineering Management & Systems Engineering Theses & Dissertations
Cloud Manufacturing(CMfg) is an advanced manufacturing model that caters to fast-paced agile requirements (Putnik, 2012). For manufacturing complex products that require extensive resources, manufacturers explore advanced manufacturing techniques like CMfg as it becomes infeasible to achieve high standards through complete ownership of manufacturing artifacts (Kuan et al., 2011). CMfg, with other names such as Manufacturing as a Service (MaaS) and Cyber Manufacturing (NSF, 2020), addresses the shortcoming of traditional manufacturing by building a virtual cyber enterprise of geographically distributed entities that manufacture custom products through collaboration.
With manufacturing venturing into cyberspace, Digital Trust issues concerning product quality, data, and intellectual …
Evaluating Direct Filtration As An Alternative To Conventional Carbon-Based Advanced Treatment For Indirect Potable Reuse, Savannah M. Flemmer
Evaluating Direct Filtration As An Alternative To Conventional Carbon-Based Advanced Treatment For Indirect Potable Reuse, Savannah M. Flemmer
Civil & Environmental Engineering Theses & Dissertations
Hampton Roads Sanitation District (HRSD) is recharging purified wastewater into the Potomac Aquifer via the Sustainable Water Initiative for Tomorrow (SWIFT) project. Conventional SWIFT treatment applies coagulation, flocculation, sedimentation, ozonation, biofiltration, granular activated carbon (GAC) adsorption, and ultraviolet disinfection to secondary effluent to produce water that meets drinking water standards for managed aquifer recharge. HRSD is considering implementing direct filtration as an alternative to conventional treatment for two additional SWIFT facilities. Direct filtration presents an opportunity for significant cost savings by eliminating sedimentation, shortening flocculation detention time, and reducing coagulant usage. Without upstream removal of solids and organics, however, biofilters …
Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla
Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla
Computer Science Theses & Dissertations
The definition of scholarly content has expanded to include the data and source code that contribute to a publication. While major archiving efforts to preserve conventional scholarly content, typically in PDFs (e.g., LOCKSS, CLOCKSS, Portico), are underway, no analogous effort has yet emerged to preserve the data and code referenced in those PDFs, particularly the scholarly code hosted online on Git Hosting Platforms (GHPs). Similarly, Software Heritage is working to archive public source code, but there is value in archiving the surrounding ephemera that provide important context to the code while maintaining their original URIs. In current implementations, source code …
Biocrude Production From Lignin In Hydrothermal Medium: Effect Of Rapid Heating And Short Residence Time, Kyoko Hirayama
Biocrude Production From Lignin In Hydrothermal Medium: Effect Of Rapid Heating And Short Residence Time, Kyoko Hirayama
Civil & Environmental Engineering Theses & Dissertations
This study aims to address knowledge gaps in the production of valuable products from waste streams generated during lignocellulosic biofuel production. The primary objective is to develop a process that converts lignin, a byproduct of bioethanol refineries, into a sustainable biolubricant.
The first chapter examines recent advancements in synthesizing biolubricants and investigates their scalability. It explores innovative materials, catalysts, chemical modification approaches, and additives that have emerged in the field. A particular hurdle is the oxidative stability of biolubricants derived from plant oils, which are prone to autooxidation due to their C=C bonds. To overcome this, the study aims to …
Optimal Domain-Partitioning Algorithm For Real-Life Transportation Networks And Finite Element Meshes, Jimesh Bhagatji, Sharanabasaweshwara Asundi, Eric Thompson, Duc T. Nguyen
Optimal Domain-Partitioning Algorithm For Real-Life Transportation Networks And Finite Element Meshes, Jimesh Bhagatji, Sharanabasaweshwara Asundi, Eric Thompson, Duc T. Nguyen
Civil & Environmental Engineering Faculty Publications
For large-scale engineering problems, it has been generally accepted that domain-partitioning algorithms are highly desirable for general-purpose finite element analysis (FEA). This paper presents a heuristic numerical algorithm that can efficiently partition any transportation network (or any finite element mesh) into a specified number of subdomains (usually depending on the number of parallel processors available on a computer), which will result in “minimising the total number of system BOUNDARY nodes” (as a primary criterion) and achieve “balancing work loads” amongst the subdomains (as a secondary criterion). The proposed seven-step heuristic algorithm (with enhancement features) is based on engineering common sense …
Gradient-Based Trade-Off Design For Engineering Applications, Lena A. Royster, Gene Hou
Gradient-Based Trade-Off Design For Engineering Applications, Lena A. Royster, Gene Hou
Mechanical & Aerospace Engineering Faculty Publications
The goal of the trade-off design method presented in this study is to achieve newly targeted performance requirements by modifying the current values of the design variables. The trade-off design problem is formulated in the framework of Sequential Quadratic Programming. The method is computationally efficient as it is gradient-based, which, however, requires the performance functions to be differentiable. A new equation to calculate the scale factor to control the size of the design variables is introduced in this study, which can ensure the new design achieves the targeted performance objective. Three formal approaches are developed in this study for trade-off …
Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer
Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer
School of Cybersecurity Faculty Publications
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of …
Fabrication Of Solid Oxide Fuel Cell Components Using Stereolithography 3d Printing, Hannah Dyer
Fabrication Of Solid Oxide Fuel Cell Components Using Stereolithography 3d Printing, Hannah Dyer
Mechanical & Aerospace Engineering Theses & Dissertations
Transitioning from fossil fuel supplied energy to renewable technology must meet cost efficient parameters throughout the manufacturing process while possessing the characteristics of a functioning and reliable power source. With a significant demand in renewable energy products, developmental techniques require adaptive approaches and procedures for novel materials in the manufacturing phase. This report proposes how a solid oxide fuel cell (SOFC), a renewable energy system, can employ additive manufacturing for directly 3D printing its components by utilizing stereolithography (SLA) 3D printing techniques. Fabrication of the printed components from the mixtures were first mixed with varying concentrations of ceramic powder and …
Nb3Sn Coating Of Twin Axis Cavity And Other Complex Srf Cavity Structures, Jayendrika Kumari Tiskumara
Nb3Sn Coating Of Twin Axis Cavity And Other Complex Srf Cavity Structures, Jayendrika Kumari Tiskumara
Physics Theses & Dissertations
In the field of Accelerator Science, for the low cost and increased quality factor, thin films coated niobium cavities are used in the modern SRF research. Within the potential substances, Nb3Sn has shown higher critical temperature than niobium. Here the tin vapor diffusion method is used as the preferred technique to coat niobium cavities. So far, only elliptical cavities have been coated with Nb3Sn and this technique has not yet been applied to cavities with complex geometries, which are also helpful in the accelerator science field. The Half-wave resonator could provide us data across frequencies of …
Measurements Of Magnetic Field Penetration Of Materials For Superconducting Radiofrequency Cavities, Iresha Harshani Senevirathne
Measurements Of Magnetic Field Penetration Of Materials For Superconducting Radiofrequency Cavities, Iresha Harshani Senevirathne
Physics Theses & Dissertations
Superconducting Radio Frequency (SRF) cavities used in particle accelerators are typically formed from or coated with superconducting materials. Currently high purity niobium is the material of choice for SRF cavities which have been optimized to operate near their theoretical field limits. This brings about the need for significant R&D efforts to develop next generation superconducting materials which could outperform Nb and keep up with the demands of new accelerator facilities. To achieve high quality factors and accelerating gradients, the cavity material should be able to remain in the superconducting Meissner state under high RF magnetic field without penetration of quantized …
Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego
Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego
Electrical & Computer Engineering Theses & Dissertations
World Health Organization (WHO) data show that around 684,000 people die from falls yearly, making it the second-highest mortality rate after traffic accidents [1]. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. In light of the recent widespread adoption of wearable sensors, it has become increasingly critical that fall detection models are developed that can effectively process large and sequential sensor signal data. Several researchers have recently developed fall detection algorithms based on wearable sensor data. However, real-time fall detection remains challenging because of the wide …
Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen
Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen
Modeling, Simulation and Visualization Student Capstone Conference
Practical work guides for complex procedures are significant and highly affect the efficiency and accuracy of on-site users. This paper presents a technique to generate virtual work guides automatically for complex procedures. Firstly, the procedure information is extracted from the electronic manual in PDF format. And then, the extracted procedure steps are mapped to the virtual model parts in preparation for animation between adjacent steps. Next, smooth animations of the procedure are generated based on a 3D natural cubic spline curve to improve the spatial ability of the work guide. In addition, each step's annotation is automatically adjusted to improve …
The Legacy Of Colonization And Civil Societies In South Africa, Erika Frydenlund, Melissa Miller-Felton, Bolu Ayankojo
The Legacy Of Colonization And Civil Societies In South Africa, Erika Frydenlund, Melissa Miller-Felton, Bolu Ayankojo
Modeling, Simulation and Visualization Student Capstone Conference
This research analyzes the unique ways that civil societies operate in Sub-Saharan Africa in the context of post-apartheid Cape Town, South Africa. Decades after the demise of apartheid, remnants of inequality remain without the promise of actionable change. We used a computational modeling approach to understand the dynamics of migrants in the receiving community as derived from qualitative interviews conducted with 24 stakeholders in Cape Town, South Africa between 2020 and 2021. Our findings show that the presence of NGOs can promote access to resources and reduce xenophobia if they can have the right influence on government policies.
Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith
Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith
Modeling, Simulation and Visualization Student Capstone Conference
Mathematics is an important subject that is pervasive across many disciplines. It is also a subject that has proven to be challenging to both teach and learn. Students face many challenges with learning math such as a lack of motivation and anxiety. To address these challenges, game-based learning has become a popular approach to stimulate students and create a more positive classroom environment. It can serve as an alternative or supplement to traditional teaching and can better engage students while developing a positive attitude toward learning. The use of games in a classroom can create a more exciting and engaging …
Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry
Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry
Modeling, Simulation and Visualization Student Capstone Conference
This work explores collecting performance metrics and leveraging the output for prediction on a memory-intensive parallel image classification algorithm - Inception v3 (or "Inception3"). Experimental results were collected by nvidia-smi on a computational node DGX-1, equipped with eight Tesla V100 Graphic Processing Units (GPUs). Time series analysis was performed on the GPU utilization data taken, for multiple runs, of Inception3’s image classification algorithm (see Figure 1). The time series model applied was Seasonal Autoregressive Integrated Moving Average Exogenous (SARIMAX).
Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis
Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis
Modeling, Simulation and Visualization Student Capstone Conference
Maritime autonomy, specifically the use of autonomous and semi-autonomous maritime vessels, is a key enabling technology supporting a set of diverse and critical research areas, including coastal and environmental resilience, assessment of waterway health, ecosystem/asset monitoring and maritime port security. Critical to the safe, efficient and reliable operation of an autonomous maritime vessel is its ability to perceive on-the-fly the external environment through onboard sensors. In this paper, buoy detection for LiDAR images is explored by using several tools and techniques: machine learning methods, Unity Game Engine (herein referred to as Unity) simulation, and traditional image processing. The Unity Game …
Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla
Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla
Modeling, Simulation and Visualization Student Capstone Conference
This study analyzes the impact of Venezuelan migrants on local frustration levels in Colombia. The study found a relationship between the influx of Venezuelan migrants and the level of frustration among locals towards migrants, infrastructure, government, and geopolitics. Additionally, we identified that frustration types have an impact on other frustrations. The study used articles from a national newspaper in Colombia from 2015 to 2020. News articles were coded during a previous study qualitatively and categorized into frustration types. The code frequencies were then used as variables in this study. We used path modeling to statistically study the relationship between dependent …
The Effectiveness Of Visualization Techniques For Supporting Decision-Making, Cansu Yalim, Holly A. H. Handley
The Effectiveness Of Visualization Techniques For Supporting Decision-Making, Cansu Yalim, Holly A. H. Handley
Modeling, Simulation and Visualization Student Capstone Conference
Although visualization is beneficial for evaluating and communicating data, the efficiency of various visualization approaches for different data types is not always evident. This research aims to address this issue by investigating the usefulness of several visualization techniques for various data kinds, including continuous, categorical, and time-series data. The qualitative appraisal of each technique's strengths, weaknesses, and interpretation of the dataset is investigated. The research questions include: which visualization approaches perform best for different data types, and what factors impact their usefulness? The absence of clear directions for both researchers and practitioners on how to identify the most effective visualization …
Enhancement Of Deep Learning Protein Structure Prediction, Ruoming Shen
Enhancement Of Deep Learning Protein Structure Prediction, Ruoming Shen
Modeling, Simulation and Visualization Student Capstone Conference
Protein modeling is a rapidly expanding field with valuable applications in the pharmaceutical industry. Accurate protein structure prediction facilitates drug design, as extensive knowledge about the atomic structure of a given protein enables scientists to target that protein in the human body. However, protein structure identification in certain types of protein images remains challenging, with medium resolution cryogenic electron microscopy (cryo-EM) protein density maps particularly difficult to analyze. Recent advancements in computational methods, namely deep learning, have improved protein modeling. To maximize its accuracy, a deep learning model requires copious amounts of up-to-date training data.
This project explores DeepSSETracer, a …
Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund
Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund
Modeling, Simulation and Visualization Student Capstone Conference
The sudden arrival of many migrants can present new challenges for host communities and create negative attitudes that reflect that tension. In the case of Colombia, with the influx of over 2.5 million Venezuelan migrants, such tensions arose. Our research objective is to investigate how those sentiments arise in social media. We focused on monitoring derogatory terms for Venezuelans, specifically veneco and veneca. Using a dataset of 5.7 million tweets from Colombian users between 2015 and 2021, we determined the proportion of tweets containing those terms. We observed a high prevalence of xenophobic and defamatory language correlated with the …
An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen
An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen
Modeling, Simulation and Visualization Student Capstone Conference
This work presents an algorithm for finding data dependencies in a discrete-event simulation system, from the event graph of the system. The algorithm can be used within a parallel discrete-event simulation. Also presented is an experimental system and event graph, which is used for testing the algorithm. Results indicate that the algorithm can provide information about which vertices in the experimental event graph can affect other vertices, and the minimum amount of time in which this interference can occur.
U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa
U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa
Modeling, Simulation and Visualization Student Capstone Conference
Satellite image analysis of natural disasters is critical for effective emergency response, relief planning, and disaster prevention. Semantic segmentation is believed to be on of the best techniques to capture pixelwise information in computer vision. In this work we will be using a U-Net architecture to do a three class semantic segmentation for the Xview2 dataset to capture the level of damage caused by different natural disaster which is beyond the visual scope of human eyes.
Statistical Approach To Quantifying Interceptability Of Interaction Scenarios For Testing Autonomous Surface Vessels, Benjamin E. Hargis, Yiannis E. Papelis
Statistical Approach To Quantifying Interceptability Of Interaction Scenarios For Testing Autonomous Surface Vessels, Benjamin E. Hargis, Yiannis E. Papelis
Modeling, Simulation and Visualization Student Capstone Conference
This paper presents a probabilistic approach to quantifying interceptability of an interaction scenario designed to test collision avoidance of autonomous navigation algorithms. Interceptability is one of many measures to determine the complexity or difficulty of an interaction scenario. This approach uses a combined probability model of capability and intent to create a predicted position probability map for the system under test. Then, intercept-ability is quantified by determining the overlap between the system under test probability map and the intruder’s capability model. The approach is general; however, a demonstration is provided using kinematic capability models and an odometry-based intent model.
Towards Nlp-Based Conceptual Modeling Frameworks, David Shuttleworth, Jose Padilla
Towards Nlp-Based Conceptual Modeling Frameworks, David Shuttleworth, Jose Padilla
Modeling, Simulation and Visualization Student Capstone Conference
This paper presents preliminary research using Natural Language Processing (NLP) to support the development of conceptual modeling frameworks. NLP-based frameworks are intended to lower the barrier of entry for non-modelers to develop models and to facilitate communication across disciplines considering simulations in research efforts. NLP drives conceptual modeling in two ways. Firstly, it attempts to automate the generation of conceptual models and simulation specifications, derived from non-modelers’ narratives, while standardizing the conceptual modeling process and outcome. Secondly, as the process is automated, it is simpler to replicate and be followed by modelers and non-modelers. This allows for using a common …
Enhancing Pedestrian-Autonomous Vehicle Safety In Low Visibility Scenarios: A Comprehensive Simulation Method, Zizheng Yan, Yang Liu, Hong Yang
Enhancing Pedestrian-Autonomous Vehicle Safety In Low Visibility Scenarios: A Comprehensive Simulation Method, Zizheng Yan, Yang Liu, Hong Yang
Modeling, Simulation and Visualization Student Capstone Conference
Self-driving cars raise safety concerns, particularly regarding pedestrian interactions. Current research lacks a systematic understanding of these interactions in diverse scenarios. Autonomous Vehicle (AV) performance can vary due to perception accuracy, algorithm reliability, and environmental dynamics. This study examines AV-pedestrian safety issues, focusing on low visibility conditions, using a co-simulation framework combining virtual reality and an autonomous driving simulator. 40 experiments were conducted, extracting surrogate safety measures (SSMs) from AV and pedestrian trajectories. The results indicate that low visibility can impair AV performance, increasing conflict risks for pedestrians. AV algorithms may require further enhancements and validations for consistent safety performance …
Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan
Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan
Cybersecurity Undergraduate Research Showcase
Cybercrime and attack methods have been steadily increasing since the 2019 pandemic. In the years following 2019, the number of victims and attacks per hour rapidly increased as businesses and organizations transitioned to digital environments for business continuity amidst lockdowns. In most scenarios cybercriminals continued to use conventional attack methods and known vulnerabilities that would cause minimal damage to an organization with a robust cyber security posture. However, zero-day exploits have skyrocketed across all industries with an increasingly growing technological landscape encompassing internet of things (IoT), cloud hosting, and more advanced mobile technologies. Reports by Mandiant Threat Intelligence (2022) concluded …
Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng
Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng
Cybersecurity Undergraduate Research Showcase
Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.
MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …