Lidar Segmentation-Based Adversarial Attacks On Autonomous Vehicles,
2023
University of Minnesota Morris
Lidar Segmentation-Based Adversarial Attacks On Autonomous Vehicles, Blake Johnson
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Autonomous vehicles utilizing LiDAR-based 3D perception systems are susceptible to adversarial attacks. This paper focuses on a specific attack scenario that relies on the creation of adversarial point clusters with the intention of fooling the segmentation model utilized by LiDAR into misclassifying point cloud data. This can be translated into the real world with the placement of objects (such as road signs or cardboard) at these adversarial point cluster locations. These locations are generated through an optimization algorithm performed on said adversarial point clusters that are introduced by the attacker.
(R2051) Analysis Of Map/Ph1, Ph2/2 Queueing Model With Working Breakdown, Repairs, Optional Service, And Balking,
2023
Puducherry Technological University
(R2051) Analysis Of Map/Ph1, Ph2/2 Queueing Model With Working Breakdown, Repairs, Optional Service, And Balking, G. Ayyappan, G. Archana
Applications and Applied Mathematics: An International Journal (AAM)
In this paper, a classical queueing system with two types of heterogeneous servers has been considered. The Markovian Arrival Process (MAP) is used for the customer arrival, while phase type distribution (PH) is applicable for the offering of service to customers as well as the repair time of servers. Optional service are provided by the servers to the unsatisfied customers. The server-2 may get breakdown during the busy period of any type of service. Though the server- 2 got breakdown, server-2 has a capacity to provide the service at a slower rate to the current customer who is receiving service …
The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?,
2023
nQube Data Science Inc.
The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?, Jason D. Fiege, Anastasia (Stasi) D. Baran
International Conference on Gambling & Risk Taking
Abstract
It is difficult for individual players to detect differences in theoretical hold between slot machines without playing an unrealistically large number of games. This difficulty occurs because the fractional loss incurred by a player converges only slowly to the theoretical hold in the presence of volatility designed into slot pay tables. Nevertheless, many operators believe that players can detect changes in hold or differences compared to competition, especially in a locals casino market, and therefore resist increasing holds. Instead of investigating whether individual players can detect differences in hold, we ask whether a population of casino regulars who share …
Algorithmic Bias: Causes And Effects On Marginalized Communities,
2023
University of San Diego
Algorithmic Bias: Causes And Effects On Marginalized Communities, Katrina M. Baha
Undergraduate Honors Theses
Individuals from marginalized backgrounds face different healthcare outcomes due to algorithmic bias in the technological healthcare industry. Algorithmic biases, which are the biases that arise from the set of steps used to solve or analyze a problem, are evident when people from marginalized communities use healthcare technology. For example, many pulse oximeters, which are the medical devices used to measure oxygen saturation in the blood, are not able to accurately read people who have darker skin tones. Thus, people with darker skin tones are not able to receive proper health care due to their pulse oximetry data being inaccurate. This …
Creating Project Contrast: A Video Game Exploring Consciousness And Qualia,
2023
Seattle Pacific University
Creating Project Contrast: A Video Game Exploring Consciousness And Qualia, Pierce Papke
Honors Projects
Project Contrast is a video game that explores how the unique traits inherent to video games might engage reflective player responses to qualitative experience. Project Contrast does this through suspension of disbelief, avatar projection, presence, player agency in storytelling, visual perception, functional gameplay, and art. Considering the difficulty in researching qualitative experience due to its subjectivity and circular explanations, I created Project Contrast not to analyze qualia, though that was my original hope. I instead created Project Contrast as an avenue for player self-reflection and learning about qualitative experience. While video games might be just code and art on a …
Understanding Data Mining And Its Relation To Information Systems,
2023
CUNY New York City College of Technology
Understanding Data Mining And Its Relation To Information Systems, Malak Alammari
Publications and Research
This research project aims to enrich an Open Educational Resource (OER) textbook on Introduction to Information Systems/Technology with a focus on data mining and its relation to hardware and software components of information systems. The study will address the following research questions: (1) What is data mining? and (2) How does data relate to the hardware and software components of information systems? To answer these questions, the researcher will conduct research to ascertain the current state of data mining and its relevance in the field of information systems/technology. The results of the research will be incorporated into an existing OER …
Areas Of Same Cardinal Direction,
2023
The University of Maine
Areas Of Same Cardinal Direction, Periyandy Thunendran
Electronic Theses and Dissertations
Cardinal directions, such as North, East, South, and West, are the foundation for qualitative spatial reasoning, a common field of GIS, Artificial Intelligence, and cognitive science. Such cardinal directions capture the relative spatial direction relation between a reference object and a target object, therefore, they are important search criteria in spatial databases. The projection-based model for such direction relations has been well investigated for point-like objects, yielding a relation algebra with strong inference power. The Direction Relation Matrix defines the simple region-to-region direction relations by approximating the reference object to a minimum bounding rectangle. Models that capture the direction between …
Procedural Level Generation For A Top-Down Roguelike Game,
2023
Loyola Marymount University
Procedural Level Generation For A Top-Down Roguelike Game, Kieran Ahn, Tyler Edmiston
Honors Thesis
In this file, I present a sequence of algorithms that handle procedural level generation for the game Fragment, a game designed for CMSI 4071 and CMSI 4071 in collaboration with students from the LMU Animation department. I use algorithms inspired by graph theory and implementing best practices to the best of my ability. The full level generation sequence is comprised of four algorithms: the terrain generation, boss room placement, player spawn point selection, and enemy population. The terrain generation algorithm takes advantage of tree traversal methods to create a connected graph of walkable tiles. The boss room placement algorithm randomly …
Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness.,
2023
University of Nebraska at Omaha
Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman
Theses/Capstones/Creative Projects
This essay explores the relationship between individuals' cybersecurity education, literacy, awareness, and preparedness. While cybersecurity is often associated with complex hacking scenarios, the majority of data breaches and cyber-attacks result from individuals inadvertently falling prey to phishing emails and malware. The lack of standardized education and training in cybersecurity, coupled with the rapid expansion of technology diversity, raises concerns about individuals' cybersecurity preparedness. As individuals are the first line of defense and the weakest link in cybersecurity, understanding the influence of education, literacy, and awareness on their adherence to best practices is crucial. This work aims to survey a diverse …
The State And Use Of Virtual Tutors,
2023
University of Nebraska at Omaha
The State And Use Of Virtual Tutors, Thomas Anthone
Theses/Capstones/Creative Projects
Virtual tutoring is the process by which students and teachers participate in the learning experience in an online, virtual, or networked environment. This process can not only separate the participants from each other in a physical space, but it can also separate them by time. Virtual tutoring can take the form of the group of students coming together synchronously in an online setting and receiving lessons from a single tutor, or by asynchronous learning in which the teacher pre-plans lessons in advance that the students consume on their own time. The advent of online learning technologies and virtual learning environments …
Universal Computation Using Self-Assembling, Crisscross Dna Slats,
2023
University of Arkansas, Fayetteville
Universal Computation Using Self-Assembling, Crisscross Dna Slats, Jackson S. Bullard
Computer Science and Computer Engineering Undergraduate Honors Theses
I first give a brief introduction to formal models of computation. I then present three different approaches for computation in the aTAM. I later detail generating systems of crisscross slats given an arbitrary algorithm encoded in the form of a Turing machine. Crisscross slats show potential due to their high levels of cooperativity, so it is hoped that implementations utilizing slats are more robust to various growth errors compared to the aTAM. Finally, my software converts arbitrary crisscross slat systems into various physical representations that assist in analyzing their potential to be realized in experiments.
A Programmatic Geographic Information Systems Analysis Of Plant Hardiness Zones,
2023
East Tennessee State University
A Programmatic Geographic Information Systems Analysis Of Plant Hardiness Zones, Andrew Bowen
Electronic Theses and Dissertations
The Plant Hardiness Zone Map consists of thirteen geographical zones that describe whether a plant can survive based on average annual minimal temperatures. As climate change progresses, minimum temperatures in all regions are expected to change. This work programmatically evaluates predicted future climate projection data and converts it to United States Department of Agriculture-defined hardiness zones. Through the next 80 years, hardiness zones are projected to move poleward; in effect, colder zones will lose area and warmer zones will gain area globally. Some implications include changes in crop growing degree days, which could alter crop productivity, migration and settlement of …
Linux Malware Obfuscation,
2023
University of Arkansas, Fayetteville
Linux Malware Obfuscation, Brian Roden
Computer Science and Computer Engineering Undergraduate Honors Theses
Many forms of malicious software use techniques and tools that make it harder for their functionality to be parsed, both by antivirus software and reverse-engineering methods. Historically, the vast majority of malware has been written for the Windows operating system due to its large user base. As such, most efforts made for malware detection and analysis have been performed on that platform. However, in recent years, we have seen an increase in malware targeting servers running Linux and other Unix-like operating systems resulting in more emphasis of malware research on these platforms. In this work, several obfuscation techniques for Linux …
A Survey And Comparative Study On Vulnerability Scanning Tools,
2023
University of Arkansas, Fayetteville
A Survey And Comparative Study On Vulnerability Scanning Tools, Cassidy Khounborine
Computer Science and Computer Engineering Undergraduate Honors Theses
Vulnerability scanners are a tool used by many organizations and developers as part of their vulnerability management. These scanners aid in the security of applications, databases, networks, etc. There are many different options available for vulnerability scanners that vary in the analysis method they encompass or target for which they scan, among many other features. This thesis explores the different types of scanners available and aims to ease the burden of selecting the ideal vulnerability scanner for one’s needs by conducting a survey and comparative analysis of vulnerability scanners. Before diving into the vulnerability scanners available, background information is provided …
Identifying Social Media Users That Are Susceptible To Phishing Attacks,
2023
William & Mary
Identifying Social Media Users That Are Susceptible To Phishing Attacks, Zoe Metzger
Undergraduate Honors Theses
Phishing scams are a billion-dollar problem. According to Threatpost, in 2020, business email compromise phishing attacks cost the US economy $ 1.8 billion. Social media phishing scams are also on the rise with 74% of companies experiencing social media attacks in 2021 according to Proofpoint. Educating users about phishing scams is an effective strategy for reducing phishing attacks. Despite efforts to combat phishing, the number of attacks continues to rise, likely indicative of a reticence of users to change online behaviors. Existing research into predicting vulnerable social media users that are susceptible to phishing mostly focuses on content analysis of …
Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions,
2023
East Tennessee State University
Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau
Undergraduate Honors Theses
Access control models and implementation guidelines for determining, provisioning, and de-provisioning user permissions are challenging due to the differing approaches, unique for each organization, the lack of information provided by case studies concerning the organization’s security policies, and no standard means of implementation procedures or best practices. Although there are multiple access control models, one stands out, role-based access control (RBAC). RBAC simplifies maintenance by enabling administrators to group users with similar permissions. This approach to managing user permissions supports the principle of least privilege and separation of duties, which are needed to ensure an organization maintains acceptable user access …
Survey Of Input Modalities In The Western World,
2023
University of Tennessee, Knoxville
Survey Of Input Modalities In The Western World, John Ezat Sadik
Masters Theses
Having your account compromised can lead to serious complications in your life. One
way accounts become compromised is through the security risks associated with weak
passwords and reused passwords [22,23]. In this thesis, we seek to understand how
entering passwords on non-PC devices contributes to the problems of weak and reused
passwords. To do so, we conducted a survey that was distributed to people in the
the Western World. In our survey results, we found that users commented about
how the current password model was not created with a variety of device types in
mind, which created frustrations and complexity …
Procedural City Generation With Combined Architectures For Real-Time Visualization,
2023
Clemson University
Procedural City Generation With Combined Architectures For Real-Time Visualization, Griffin Poyck
All Theses
The work and research of this paper sought to build upon traditional city generation and simulation in creating a tool that both realistically simulates cities and their prominent features and also creates aesthetic and artistically rich cities using assets that combine several contemporary or near contemporary architectural styles. The major city features simulated are the surrounding terrain, road networks, individual buildings, and building placement. The tools used to both create and integrate these features were created in Houdini with Unreal Engine 5 as the intended final destination. This research was influenced by the city, town, and road networking of Ghost …
From Deep Mutational Mapping Of Allosteric Protein Landscapes To Deep Learning Of Allostery And Hidden Allosteric Sites: Zooming In On “Allosteric Intersection” Of Biochemical And Big Data Approaches,
2023
Chapman University
From Deep Mutational Mapping Of Allosteric Protein Landscapes To Deep Learning Of Allostery And Hidden Allosteric Sites: Zooming In On “Allosteric Intersection” Of Biochemical And Big Data Approaches, Gennady M. Verkhivker, Mohammed Alshahrani, Grace Gupta, Sian Xiao, Peng Tao
Mathematics, Physics, and Computer Science Faculty Articles and Research
The recent advances in artificial intelligence (AI) and machine learning have driven the design of new expert systems and automated workflows that are able to model complex chemical and biological phenomena. In recent years, machine learning approaches have been developed and actively deployed to facilitate computational and experimental studies of protein dynamics and allosteric mechanisms. In this review, we discuss in detail new developments along two major directions of allosteric research through the lens of data-intensive biochemical approaches and AI-based computational methods. Despite considerable progress in applications of AI methods for protein structure and dynamics studies, the intersection between allosteric …
Counterventions: A Reparative Reflection On Interventionist Hci,
2023
Purdue University
Counterventions: A Reparative Reflection On Interventionist Hci, Rua Mae Williams, Louanne E. Boyd, Juan E. Gilbert
Engineering Faculty Articles and Research
Research in HCI applied to clinical interventions relies on normative assumptions about which bodies and minds are healthy, valuable, and desirable. To disrupt this normalizing drive in HCI, we define a “counterventional approach” to intervention technology design informed by critical scholarship and community perspectives. This approach is meant to unsettle normative assumptions of intervention as urgent, necessary, and curative. We begin with a historical overview of intervention in HCI and its critics. Then, through reparative readings of past HCI projects in autism intervention, we illustrate the emergent principles of a counterventional approach and how it may manifest research outcomes that …
