Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 931 - 960 of 57930

Full-Text Articles in Physical Sciences and Mathematics

Subject Analysis Ex Machina: Developing A Subject Heading Recommendation Service For Jmu Libraries, Steven W. Holloway Apr 2024

Subject Analysis Ex Machina: Developing A Subject Heading Recommendation Service For Jmu Libraries, Steven W. Holloway

Libraries

Results of a 2022 evaluation of ANNIF, open-source software designed to generate controlled vocabulary subject headings, using James Madison University Libraries resources.


A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Use Of Deep Learning In Content-Based Image Retrieval (Cbir), Angelina Das Apr 2024

Use Of Deep Learning In Content-Based Image Retrieval (Cbir), Angelina Das

ATU Research Symposium

In the world of computer vision and data retrieval, a crucial task is finding images within a database based on their visual content. This is known as content-based image retrieval (CBIR). As the number of digital images explodes across fields like online shopping, healthcare, and social media, the need for powerful and precise CBIR systems becomes ever more critical. Early CBIR methods depended on features crafted by hand, like color distributions, texture descriptions, and shape characteristics. However, these techniques often have difficulty capturing the true meaning of an image and might not handle very large datasets effectively. With the rise …


Optimizing Keyboard Layouts For English Text, David Sommerfield Apr 2024

Optimizing Keyboard Layouts For English Text, David Sommerfield

Research & Creative Achievement Day

QWERTY has been the de facto layout for English text input since its invention in 1874. Its continued usage has led to concerns about its ergonomic shortcomings. Previous attempts at layout creation have usually relied on manual observations of typing data rather than a predictive model. To address this issue, we propose a methodology that incorporates both corpus data from 22 million English websites and 8,228 hours of real-world typing data from participants. The corpus data is processed into bigrams and their number of occurrences. The typing data is preprocessed to exclude user-made typos, and then each bigram is tabulated …


Binder, Tyler A. Peaster, Lindsey M. Davenport, Madelyn Little, Alex Bales Apr 2024

Binder, Tyler A. Peaster, Lindsey M. Davenport, Madelyn Little, Alex Bales

ATU Research Symposium

Binder is a mobile application that aims to introduce readers to a book recommendation service that appeals to devoted and casual readers. The main goal of Binder is to enrich book selection and reading experience. This project was created in response to deficiencies in the mobile space for book suggestions, library management, and reading personalization. The tools we used to create the project include Visual Studio, .Net Maui Framework, C#, XAML, CSS, MongoDB, NoSQL, Git, GitHub, and Figma. The project’s selection of books were sourced from the Google Books repository. Binder aims to provide an intuitive interface that allows users …


Jsper (Just Stablediffusion Plus Easy Retraining), Adam Rusterholz, Meghan Finn, Zach Zolliecoffer, Zach Judy Apr 2024

Jsper (Just Stablediffusion Plus Easy Retraining), Adam Rusterholz, Meghan Finn, Zach Zolliecoffer, Zach Judy

ATU Research Symposium

JSPER is an an AI art generation Web Application that is both flexible and accessible. Our goal is to enable anyone to create and use their own customized art models, regardless of technical skill level. These models can be trained on almost anything, from a person, to an animal, to a specific object, or even style. The user only has to upload a handful of images of their subject. Then, training settings get optimized at the push of a button to match the type of subject the user is training. After training, their customized model can be used to generate …


Optimizing Campus Chat-Bot Experience Using Puaa: Integrating Large Language Model (Llm) Into University Ai Assistants, Sijan Panday, Zurab Sabakhtarishvili, Clayton Jensen Apr 2024

Optimizing Campus Chat-Bot Experience Using Puaa: Integrating Large Language Model (Llm) Into University Ai Assistants, Sijan Panday, Zurab Sabakhtarishvili, Clayton Jensen

ATU Research Symposium

The advent of large language models (LLMs) such as Chat-GPT and Bard marks a significant milestone in knowledge acquisition, offering a streamlined alternative to the traditionally labor-intensive process of navigating through multiple checkpoints on the web. This emerging trend in LLMs renders the prevalent rule-based chatbots, commonly utilized by universities, increasingly outdated and subpar. This research project proposes integrating LLM technology into university websites, specifically targeting the needs of students seeking information about their institutions by introducing PUAA (Personal University AI Assistant). Our approach involves using the Retrieval-Augmented Generation (RAG) framework, leveraging the capabilities of the LlamaIndex in conjunction with …


Genetic Association In Entylia Carinata Using Random Forest Classification, Caden J. Harper Apr 2024

Genetic Association In Entylia Carinata Using Random Forest Classification, Caden J. Harper

Research & Creative Achievement Day

The goal of this research was to identify locations in the genome of the Entylia carinata, known as the treehopper, that are associated with anomalous behavior exhibited by the species. Treehoppers are phytophagous insects and are shown to feed, reproduce, and rear their young on specific aster species. Observation has shown that the insects will disregard potential mates in close proximity in favor of those that originate from the same plant species as themselves. This behavior suggests genetic separation in the species based on plant nativity and warrants genetic analysis. Machine learning offers an effective genetic association technique due to …


Spoton, Corey A. Naegle, Caleb Mcclure, Chase M. Tallon, Holden J. O'Neal Apr 2024

Spoton, Corey A. Naegle, Caleb Mcclure, Chase M. Tallon, Holden J. O'Neal

ATU Research Symposium

SpotOn is a project developed to solve problems with owners losing their pets. The project is in short a solar-powered dog harness with GPS capability with its own application for mobile devices.


Techniques To Detect Fake Profiles On Social Media Using The New Age Algorithms – A Survey, A K M Rubaiyat Reza Habib, Edidiong Elijah Akpan Apr 2024

Techniques To Detect Fake Profiles On Social Media Using The New Age Algorithms – A Survey, A K M Rubaiyat Reza Habib, Edidiong Elijah Akpan

ATU Research Symposium

This research explores the growing issue of fake accounts in Online Social Networks [OSNs]. While platforms like Twitter, Instagram, and Facebook foster connections, their lax authentication measures have attracted many scammers and cybercriminals. Fake profiles conduct malicious activities, such as phishing, spreading misinformation, and inciting social discord. The consequences range from cyberbullying to deceptive commercial practices. Detecting fake profiles manually is often challenging and causes considerable stress and trust issues for the users. Typically, a social media user scrutinizes various elements like the profile picture, bio, and shared posts to identify fake profiles. These evaluations sometimes lead users to conclude …


Enhancing R2l Intrusion Detection Using Decision Trees, Stephen Sommer Apr 2024

Enhancing R2l Intrusion Detection Using Decision Trees, Stephen Sommer

Research & Creative Achievement Day

In the age of advancing technology, artificial intelligence, and big data, Remote to Local (R2L) attacks are increasingly threatening cloud computing environments, heightening concerns about security and privacy. Intrusion detection systems (IDS) using Artificial Intelligence play a role in safeguarding data integrity within databases by swiftly identifying and isolating suspicious records. Furthermore, machine learning techniques enhance the effectiveness of these IDS by continuously adapting to new attack patterns and improving accuracy. This research investigates the use of Decision Tree, a Machine Learning Algorithm for enhancing Remote to Local (R2L) intrusion detection capabilities, utilizing the KDD Cup 1999 dataset and the …


Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni Apr 2024

Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni

ATU Research Symposium

Abstract:

Anomaly detection, the identification of rare or unusual patterns that deviate from normal behavior, is a fundamental task with wide-ranging applications across various domains. Traditional machine learning techniques often struggle to effectively capture the complex temporal dynamics present in real-world data streams. Spiking Neural Networks (SNNs), inspired by the spiking nature of biological neurons, offer a promising approach by inherently modeling temporal information through precise spike timing. In this study, we investigate the use of Spiking Neural Networks (SNNs) for detecting anomalies or unusual patterns in data. We propose an SNN model that can learn what constitutes normal …


Innovating Inventory And Alert Systems With Object Tracking, Juan Harmse, Esther Peden Apr 2024

Innovating Inventory And Alert Systems With Object Tracking, Juan Harmse, Esther Peden

Campus Research Day

Security system users require safeguarding inventory from potential theft while reducing manual tracking of physical objects. Our contribution harnesses the power of artificial intelligence and computer vision with YOLO to automate the process of tracking inventory items. The system sends alerts to the inventory manager when it detects particular events. Our approach was evaluated with KernProf profiling, interference, and orientation tests. The results were overall positive in these testing areas.


Accessing Advanced National Supercomputing And Storage Resources For Computational Research, Ramazan Aygun Apr 2024

Accessing Advanced National Supercomputing And Storage Resources For Computational Research, Ramazan Aygun

All Things Open

This presentation will cover ACCESS (Advanced Cyberinfrastructure Coordination Ecosystem: Services & Support), and Kennesaw State University's involvement in Open Science Data Federation program as a data origin to help researchers and educators with or without supporting grants to utilize the nation’s advanced computing systems and services. ACCESS, a program established and funded by the National Science Foundation, is an ecosystem with capabilities for new modes of research and further democratizing participation. The presentation covers how to apply for allocations on ACCESS. The last part of the presentation will briefly explain Open Science Data Federation and Kennesaw State University's involvement as …


Providing Beginners With Interactive Exploration Of Error Messages In Clojure, John Walbran, Elena Machkasova Apr 2024

Providing Beginners With Interactive Exploration Of Error Messages In Clojure, John Walbran, Elena Machkasova

Undergraduate Research Symposium 2024

Programmers are imperfect, and will often make mistakes when programming and create a program error, for example, attempting to divide by zero. When a computer tries to run a program with an error, the program will halt and present the details of the error to the user in the form of an error message. These error messages are often very jargon-heavy, and are not designed to be palatable to a novice programmer. This creates significant friction for new programmers trying to learn programming languages. This work is a part of an ongoing project (called Babel) led by Elena Machkasova in …


Enhancing Evolutionary Computation: Optimizing Phylogeny-Informed Fitness Estimation Through Strategic Modifications, Chenfei Peng, Nic Mcphee Apr 2024

Enhancing Evolutionary Computation: Optimizing Phylogeny-Informed Fitness Estimation Through Strategic Modifications, Chenfei Peng, Nic Mcphee

Undergraduate Research Symposium 2024

In evolutionary computation, programs are developed using evolution's basic principles, such as selection, mutation, and recombination, to iteratively improve problem solutions towards optimal outcomes in a reasonable amount of time. To save time and be more efficient, we are currently exploring a modified version of phylogeny-informed fitness estimation. The original version evaluates each individual program on a subset of the training cases and estimates the performance everywhere else according to its parent's performance. Our approach involves comprehensive evaluation of promising programs across all training cases, increasing computational investment where the sub-sampled results indicated potential gains. This method led to our …


Algorithmic Approaches For Object Tracking And Facial Detection Using Drones, Kareem Shahatta, Peter Savarese, Gina Egitto, Jongwook Kim Apr 2024

Algorithmic Approaches For Object Tracking And Facial Detection Using Drones, Kareem Shahatta, Peter Savarese, Gina Egitto, Jongwook Kim

Computer Science Student Work

Drones are unmanned aerial vehicles that have a variety of uses in many fields such as package delivery and search operations. Tello is a small, programmable drone designed for educational purposes. We developed algorithms using DJI Tello Py, an open-source Application Programming Interface, to command the movements of Tello for tracking a target object (i.e., human). Our algorithms utilize digital image processing techniques on Tello's live video stream to optimize the number of movements Tello needs to reach its target. Our poster presentation will explain our approaches to implement object-tracking and facial detection for Tello, discuss lessons we learned, and …


Rescape: Transforming Coral-Reefscape Images For Quantitative Analysis, Zachary Ferris, Eraldo Ribeiro, Tomofumi Nagata, Robert Van Woesik Apr 2024

Rescape: Transforming Coral-Reefscape Images For Quantitative Analysis, Zachary Ferris, Eraldo Ribeiro, Tomofumi Nagata, Robert Van Woesik

Ocean Engineering and Marine Sciences Faculty Publications

Ever since the first image of a coral reef was captured in 1885, people worldwide have been accumulating images of coral reefscapes that document the historic conditions of reefs. However, these innumerable reefscape images suffer from perspective distortion, which reduces the apparent size of distant taxa, rendering the images unusable for quantitative analysis of reef conditions. Here we solve this century-long distortion problem by developing a novel computer-vision algorithm, ReScape, which removes the perspective distortion from reefscape images by transforming them into top-down views, making them usable for quantitative analysis of reef conditions. In doing so, we demonstrate the …


Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda Apr 2024

Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda

The African Journal of Information Systems

Computer science (CS) and information systems students seeking to work as software developers upon graduating are often required to create software that has a sound user experience (UX) and meets the needs of its users. This includes addressing unique user, context, and infrastructural requirements. This study sought to identify the factors that influence the perceptions of human-computer interaction (HCI) curriculum developers in higher education institutions (HEIs) in developing economies of Africa when it comes to curriculum design and delivery. A qualitative enquiry was conducted and consisted of fourteen interviews with HCI curriculum developers and UX practitioners in four African countries. …


5675 Wiredcats Scouting Hub, Sebastian Smiley Apr 2024

5675 Wiredcats Scouting Hub, Sebastian Smiley

Honors Theses

The WiredCats Scouting Hub was created to provide FIRST team 5675 with an application that allows them to make more informed strategic decisions regarding their competitive play. The app synthesizes data from multiple sources, parsing multiple data formats into a single source of truth. It also presents data to users through graphs and charts and provides interactive tables. The application meets the requirements set forth by the leadership of team 5675, effectively providing the capabilities they seek.


Kalamazoo Nature Center Mobile Application, Jacob Tebben Apr 2024

Kalamazoo Nature Center Mobile Application, Jacob Tebben

Honors Theses

This project aimed to address the challenge of enhancing visitor engagement and information dissemination at the Kalamazoo Nature Center (KNC) through the development of an integrated mobile and desktop application system. This initiative arose due to the limitations posed by traditional mobile applications which often become outdated and need to be updated by a dedicated software team. This project was designed for any user of the KNC desktop app to be able to update content on the mobile app, without the need of a dedicated software team.

The mobile application was designed for visitor use, enabling them to access up-to-date …


The Vulnerabilities Of Artificial Intelligence Models And Potential Defenses, Felix Iov Apr 2024

The Vulnerabilities Of Artificial Intelligence Models And Potential Defenses, Felix Iov

Cybersecurity Undergraduate Research Showcase

The rapid integration of artificial intelligence (AI) into various commercial products has raised concerns about the security risks posed by adversarial attacks. These attacks manipulate input data to disrupt the functioning of AI models, potentially leading to severe consequences such as self-driving car crashes, financial losses, or data breaches. We will explore neural networks, their weaknesses, and potential defenses. We will discuss adversarial attacks including data poisoning, backdoor attacks, evasion attacks, and prompt injection. Then, we will explore defense strategies such as data protection, input sanitization, and adversarial training. By understanding how adversarial attacks work and the defenses against them, …


A Reputation System For Provably-Robust Decision Making In Iot Blockchain Networks, Charles C. Rawlins, Sarangapani Jagannathan, Venkata Sriram Siddhardh Nadendla Apr 2024

A Reputation System For Provably-Robust Decision Making In Iot Blockchain Networks, Charles C. Rawlins, Sarangapani Jagannathan, Venkata Sriram Siddhardh Nadendla

Electrical and Computer Engineering Faculty Research & Creative Works

Blockchain systems have been successful in discerning truthful information from interagent interaction amidst possible attackers or conflicts, which is crucial for the completion of nontrivial tasks in distributed networking. However, the state-of-the-art blockchain protocols are limited to resource-rich applications where reliably connected nodes within the network are equipped with significant computing power to run lottery-based proof-of-work (pow) consensus. The purpose of this work is to address these challenges for implementation in a severely resource-constrained distributed network with internet of things (iot) devices. The contribution of this work is a novel lightweight alternative, called weight-based reputation (wbr) scheme, to classify new …


Research On Cross-Domain Unmanned Swarm Cooperative Anti-Submarine Search Method, Ning Wang, Xiaolong Liang, Jiaqiang Zhang, Yueqi Hou, Aiwu Yang Apr 2024

Research On Cross-Domain Unmanned Swarm Cooperative Anti-Submarine Search Method, Ning Wang, Xiaolong Liang, Jiaqiang Zhang, Yueqi Hou, Aiwu Yang

Journal of System Simulation

Abstract: For the maritime ASW search, a cross-domain unmanned swarm cooperative search method is proposed in which USVs are used as the communication relay of UAVs. The digital grid map is used to characterize the mission area and the kinematic model of cross-domain platform is constructed. The cooperative method of cross-domain unmanned systems is proposed, and the distributed information fusion mechanism of unmanned systems is designed. The search objective function for heterogeneous platforms is designed to guide the unmanned systems to make real-time decisions in search task. The simulation results show that the proposed method can be effective to the …


Simulation Verification And Decision-Making Key Technologies Of Unmanned Swarm Game Confrontation: A Survey, Xiaolong Liang, Aiwu Yang, Jiaqiang Zhang, Yueqi Hou, Ning Wang, Xiao Huang, Junbin Gong Apr 2024

Simulation Verification And Decision-Making Key Technologies Of Unmanned Swarm Game Confrontation: A Survey, Xiaolong Liang, Aiwu Yang, Jiaqiang Zhang, Yueqi Hou, Ning Wang, Xiao Huang, Junbin Gong

Journal of System Simulation

Abstract: Unmanned swarm game confrontation is a new combat mode and plays a crucial role in intelligent warfare. Its core is the autonomous generation of a series of game confrontation decision sequences to "empower" the swarm. The progress of system simulation verification for the unmanned swarm game confrontation is analyzed. The key technologies of the autonomous decision-making are discussed from three aspects, technology based on expert systems and game theory, technology based on swarm intelligence and optimization theory, and technology based on neural networks and reinforcement learning. The key technology research conducted by the author's team on the autonomous decisionmaking …


Research On Integration Of Virtual-Real Hybrid Simulation Experiment Environment For Unmanned Swarm, Huijie Yang, Taoshun Xiao, Chen Wu, Lingfeng Guo Apr 2024

Research On Integration Of Virtual-Real Hybrid Simulation Experiment Environment For Unmanned Swarm, Huijie Yang, Taoshun Xiao, Chen Wu, Lingfeng Guo

Journal of System Simulation

Abstract: Constructing the experiment environment and researching the core technology, key equipment and operation theory is the key step for the development of unmanned swarm. Based on the requirement of hybrid simulation environment for unmanned swarm, the elements of the experiment environment are analyzed, and the architecture is proposed, which is composed of common infrastructure, general experiment services, special experiment tools, security and support tool. The key experiment environment integration technology is studied from the aspects of experiment network, model data and experiment application. The feasibility of the method to construct the virtual-real hybrid simulation environment is verified by an …


Mixed-Variable Particle Swarm Optimization Algorithm Based On Competitive Coevolution, Hu Zhang, Heng Zhang, Zilu Huang, Zhe Wang, Qingpo Fu, Jin Peng, Feng Wang Apr 2024

Mixed-Variable Particle Swarm Optimization Algorithm Based On Competitive Coevolution, Hu Zhang, Heng Zhang, Zilu Huang, Zhe Wang, Qingpo Fu, Jin Peng, Feng Wang

Journal of System Simulation

Abstract: For the current algorithm, it is difficult to obtain the available solution due to the irregularity of problem decision space caused by the numerous mixed variable optimization problems during real industrial applications. The coevolution strategy is introduced and a mixed variable particle swarm optimization algorithm(CCPSO) based on competitive coevolution is proposed. The search direction adjustment mechanism based on tolerance is designed to judge the evolution state of particles, adaptively adjust the search direction of particles, avoid falling into local optimum, and balance the convergence and diversity of the population. The learning object generation mechanism is adopted for each particle …


Distributed Energy Management Strategy Of Microgrid Based On Master-Slave Game, Miaomiao Ma, Hao Wang, Lipeng Dong, Xiangjie Liu Apr 2024

Distributed Energy Management Strategy Of Microgrid Based On Master-Slave Game, Miaomiao Ma, Hao Wang, Lipeng Dong, Xiangjie Liu

Journal of System Simulation

Abstract: Under the operation mode of power market, based on two-layer master-slave game, a distributed energy management strategy for the microgrid is proposed to tackle the conflict between the overall optimal operation of renewable microgrid and the maximum profit of each investor. To fully consider the balance between energy supply and demand, the concept of power trading agent is introduced, and an integrated demand response strategy based on consumer satisfaction and adjustable load is proposed on the user side. Considering the initiative and decision-making ability of power supply and load, the decision-making game model is established with power trading agent …


Optimization Of Urban Traffic Microsimulation Model For Carbon Emission Reduction, Bo Liu, Jianxin Lin, Yini Liu, Dong Zhang Apr 2024

Optimization Of Urban Traffic Microsimulation Model For Carbon Emission Reduction, Bo Liu, Jianxin Lin, Yini Liu, Dong Zhang

Journal of System Simulation

Abstract: To assess the environmental benefits of transportation management or control strategies, a method to effectively integrate the micro-traffic simulation model and the micro-vehicle emission model is proposed. VISSIM platform is used to build a case micro traffic simulation model. K-means clustering method is used to divide the driving behavior into 4 types based on the acceleration and deceleration characteristics of different speed intervals of the trajectory data, and the global parameters of the simulation model are calibrated based on the driving characteristics, which quantitatively describe the total sensitivity of the parameters and the sensitivity of the interactions between the …


Asl-Catboost Method For Wind Turbine Fault Detection Integrated With Digital Twin, Hongtao Liang, Lingchao Kong, Guozhu Liu, Wenxuan Dong, Xiangyi Liu Apr 2024

Asl-Catboost Method For Wind Turbine Fault Detection Integrated With Digital Twin, Hongtao Liang, Lingchao Kong, Guozhu Liu, Wenxuan Dong, Xiangyi Liu

Journal of System Simulation

Abstract: In view of the low visibility of the current wind farm status monitoring and insufficient realtime operation and maintenance, based on the concept of digital twin five-dimensional model, the framework of wind farm digital twin five-dimensional model is constructed. Aiming at the insufficient fault detection capability of traditional algorithms and unbalanced positive and negative samples in fan fault data set, the improved ASL-CatBoost algorithm is proposed to achieve the accurate detection of fan fault status. Based on the digital twinning platform, combined with MATLAB/Simulink, the simulation mathematical model of doubly-fed wind turbine under the condition of blade mass imbalance …