Recent Submissions

  • Detecting transient events with genetic algorithms

    Palmieri, Dylan G.; Hartman, Chris; Lawlor, Orion; Genetti, Jon (2022-12)
    Accurately detecting and analyzing events in a power system is a difficult, but important task. This project aims to determine whether genetic algorithms are viable - in terms of both accuracy and efficiency - for detecting these events in large sets of power systems data. Although power systems events are intially classified using a trigger-based system at the time of the event, this project aims to show that power systems can be broken down into their component parts (lineto-line voltage, current, etc.) and analyzed in isolation after the fact with similar accuracy. The system attempts to achieve this goal by iteratively forecasting the next value in a time series dataset and calculating the root-mean-squared error (RMSE) of the prediction, which is then averaged over the whole sample. This approach did yield substantive results - most importantly, this means that the two main assumptions that the project is based on were validated. The paper dives into the metrics generated by this approach in an effort to explain these results. The results of the experiment are discussed, and the paper is concluded by recommending future areas of development that could benefit the project.
  • Google Workspace add-on for Google Drive notifications

    Russell, Tailon; Chappell, Glenn G.; Lawlor, Orion; Hartman, Christopher (2022-05)
    This project was designed to help collaborative teams receive timely notifications on changes that occur on shared resources. The end product of this project is a Google Workspace add-on that allows email messages to be sent when a Google Drive file is changed. Other services provide this feature are known as integration tools. Some such services are Zapier, Automate.io, Integromat. The issues with such tools are that they cost money the more they are used, having a large amount of files or folders in a cloud service like Google Drive will take more resources from the integration tool to track all of them, and notifications are not timely depending on how important instant notifications are to a user. The product of this project allows for instant notifications and for many files and folders, even if they are multiple folders deep, all while only taking up resources enough to contain information on the top-level folder or file.
  • Zauthly: a zero trust Oauth2 authorization tool

    Perry, Matthew Robert; Lawlor, Orion; Chappell, Glenn; Genetti, Jon (2022-05)
    Controlling authentication and authorization is a pivotal part of managing modern web resources. Over the past decade, Oauth and OpenID Connect have shown that they are capable and secure protocols used for secure communication between the Identity Providers (IdP) and requesting parties that consume them. Zero Trust (ZT) architectures are based on authenticating individual requests instead of machines or networks. ZT has shown a pathway that enables a more secure flow oftrusted communication. This is done by defining the control systems and their counterpart the data systems. Zauthly applies ZT principles to Oauth2 flows to create a middleware service that solely controls the authorization ofusers. It aims to enable increased security in existing tools and control flows while it utilizes Google as an IdP to enable authentication of end users. A Single Sign On (SSO) proxy is used to consume the provided Oauth2 authorization from Zauthly. Then its users are managed by a simple interface that communicates with a user database. Zauthly is designed to be deployed in a modular way drawing inspiration from the microservice architectural style. Its deployment is controlled by Docker and Docker-Compose to provide enhanced scalability and flexibility. This paper will explore the design choices of Zauthly, relevant drawbacks, and performance of the tool.
  • Designing trails with a path-planning algorithm

    Underwood, Mark; Lawlor, Orion; Chappell, Glenn G.; Hartman, Chris (2021-05)
    Designing the route of a trail, whether it be a hiking, mountain biking, or ATV trail, is a process currently done manually. Since a trail designer often chooses a path that minimizes certain costs, such as steepness, aspect, and proximity to existing structures, it is possible to automate this process using an algorithm. This paper describes Breadcrumbs, a program which uses GIS (Geographic Information Systems) data and a set of modifying weights to automatically create a trail route using a modified A* search algorithm. The operation of the program is described, and a number of experimental results are shown and discussed.
  • Measuring the impact of cooperative rewards on AI

    Harmon, Dain; Lawlor, Orion S.; Chappell, Glenn G.; Metzgar, Jonathan B. (2020-12)
    We consider the effects of varying individualistic and team rewards on learning for a Deep Q-Network AI in a multi-agent system, using a synthetic team game ‘Futlol’ designed for this purpose. Experimental results with this game using the OpenSpiel framework indicate that mixed reward structures result in lower win rates. It is unclear if this is due to faster learning on simpler reward structures or a flaw in the nature of the reward system.
  • Automated Remote Security Scoring Engine (ARSSE): gamification of cyber security education

    Chauhan, Arsh; Lawlor, Orion S.; Hartman, Christopher M.; Metzgar, Jonathan B. (2020-12)
    The goal of this project is to create an easy to use, extensible, and engaging method to compute scores interactively during a practical cyber security education. Gamification has been shown to be an effective teaching tool and has been used in the offensive cybersecurity education space (via Capture The Flag competitions and challenges such as hackthebox.eu) but there has not been an open-source effort to bring this idea to the defensive side (blue team) aspect of cybersecurity. The Automated Remote Security Scoring Engine (ARSSE, pronounced "Arsh") uses a combination of well maintained open-source tools and custom connectors to facilitate an easy to use, scalable, and secure system to check the state of a computer system against a desired state and award points based on passed checks. ARSSE has been released to the public with the hope that it will fill a gap in training the next generation of information security professionals.
  • A modular LoRaWAN inspired Internet of Things approach to collecting sensor data via Software Defined Radio

    Van Cise, Tristan; Genetti, Jon; Lawlor, Orion; Metzgar, Jonathan (2020-05)
    The emergence of simple Internet of Things (IoT) devices has habituated the ability to efficiently collect data and communicate information between devices with ease. Similarly, Software Defined Radio (SDR) has compacted radio communication into a USB dongle capable of receiving radio signals from most radio transmitters. In this approach, the ease of IoT device communication and versatility of SDR data collection and transmission techniques is combined to monitor building thermal decay. The system developed to collect thermal decay data is adapted from the Long Range Wide Area Network (LoRaWAN) IoT architecture and is designed to facilitate variable size collection environments and real-time data visualization. This paper will outline the implementation and capabilities of the collection system and highlight alternate applications and hardware implementations of the underlying framework.
  • LucidDream: Dynamic Story Generation through Directed Chatbot Interactions

    Stonebraker, Ryan; Metzgar, Jonathan; Lawlor, Orion; Hartman, Chris (2020-05)
    Natural Language Understanding and Generation are both areas of active research with widespread potential for story telling. This paper proposes an architecture for dynamically generating stories that allows a scene to be constructed and then dynamically written through the interaction of individual chatbots. Each chatbot in this environment is meant to mimic either the specific emotional profile of a character or holistically represent all of the character’s attributes. Chatbots are created using the conversation history so that they can understand context, a relevant sentence suggestion provided by a question-answering model to keep generated output on topic, and a finetuned version of the GPT-2 transformer-based language model to combine all of this information and generate text. This architecture serves as an ensemble method of approaching character modeling and also introduces the little-explored concept of emotional style transferring as a method for merging a story character’s emotional attributes with an independent training corpus. The question-answering model used in this study achieved 65.24% accuracy when tested on the Stanford Question-Answering Dataset and the emotion classification model achieved 57.3% accuracy on the International Survey on Emotion Antecedents and Reactions dataset. While neither of these performances are SOTA for their respective individual tasks, they are used in combination to produce state of the art directed story generation and pave the way for future research.
  • Examining thermokarst initiation with random forest models

    Spicer, Rawser W.; Bolton, W. Robert; Lawlor, Orion; Chappell, Glenn (2020-05)
    This project examines thermokarst initiation through the application of random forest models. Thermokarst initiation marks the start of the formation of thermokarst features. Changes in landscape, due to the thermokarst process, can result in changes in wildlife habitat, as well as energy, carbon and water fluxes. Random forests are an ensemble learning technique that combines the results of many independent decision trees to create results that avoid the overfitting in regular decision trees. Random forests were trained against an existing thermokarst initiation model. Results showed that random forests were useful in this context. Random forest hyperparameters were also examined through a multiparameter sensitivity analysis.
  • Applied machine learning using Twitter sentiment and time series data for stock market forecasting

    McKenna, Jacob; Hartman, Chris; Genetti, Jon; Metzgar, Jonathan (2020-05)
    This paper presents an approach to determine stock prices using Twitter sentiment. Due to the highly stochastic nature of the stock market, it is difficult to determine a model that accurately predicts prices. In Twitter Mood Predicts the Stock Market by Bollen, capturing tweets and classifying each tweet’s mood was useful in predicting the Dow Industrial Jones Average (DJIA). Accurately predicting a movement quantitatively is profitable. We present a method that captures sentiment from Twitter with mentions of specific companies to predict their price for the following day.
  • Improved ray tracing performance through tri-adaptive sampling

    Craddick, Tristan; Lawlor, Orion; Genetti, Jon; Metzgar, Jonathan (2020-05)
    Ray tracing is a technique capable of rendering high quality images by tracing rays from the camera position into the scene and examining the points they intersect with. With the advent of NVIDIA RTX hardware, improving renderer design through greater algorithmic efficiency will allow for even greater real-time rendering capabilities. Naive implementations are simple to implement and cheap enough to run well on modern systems, but often have issues with aliased edges due to lower quantities of rays for scene sampling. Techniques such as super-sampling are capable of reducing or entirely eliminating aliasing, but carry a high performance cost due to additional ray requirements. Under-sampling is a technique that allows a single ray to determine the color of multiple pixels, allowing for high performance in regions of little variation. The combination of these techniques is collectively referred to as Adaptive Sampling. Our implementation of this algorithm operates by rendering the scene at a low resolution and then sampling the resulting image to determine if rays are necessary at higher resolutions. In this project, we implement a form of this multiple-resolution approach based upon a triangular grid overlaying the pixel grid. Results on RTX cards indicate a performance increase of 29-40% over the naive renderer, and a 1-4% increase over the traditional adaptive sampling algorithm, all while achieving little degradation in quality compared to the ground truth image.
  • Trait extraction from article text

    Braxling, Trace; Hartman, Chris; Metzgar, Jonathan; Chappell, Glenn G. (2020-05)
    For a particular object, vast amounts of information exists within the Wikipedia article relating to that object. From this article, it is often desirable to produce simple, sentence length facts about this object. The purpose of this project is to explore a number of methods for producing single sentences that provide informational facts (or traits) from a given text. These methods are then evaluated in comparison to each other, as well as a hand picked ground truth . By analyzing these results, it can be determined which aspects of the methods is worth further examination for the task of trait extraction.
  • Best practices and metrics for virtual reality user interfaces

    Byam, Jay; Chappell, Glenn; Lawlor, Orion; Metzgar, Jonathan (2019-12)
    Virtual Reality (VR) technology has become increasingly effective and accessible within the past decade [15]. With this increase in the technology’s prevalence and cultural significance, certain interaction techniques and design choices have emerged as the most widely used and recommended. This research effort employs a VR experiment in which multiple selection methods, interface placements, and navigation techniques are compared side-by-side, and performance metrics and preference data are collected. Both best practice and to-be-avoided methods are examined, and the performance and preference data is analyzed. Determinations made based on the data gathered are partly in-line with expectations according to best practices, partly inconclusive, and partly contrary to the expected performance and preference results. Results suggest that virtual laser pointers and tapping are equally recommendable selection methods for most VR experiences, hand-mounted menus produce the best results overall, and despite performance advantages, joystick navigation should be avoided in VR due to user comfort concerns.
  • Toward computer generated folk music using Recurrent Neural Networks

    Weeden, Rohan E.; Lawlor, Orion; Chappell, Glenn; Genetti, Jon (2019-05)
    In this paper, we compare the effectiveness of two different types of Recurrent Neural Networks, fully connected and Long Short Term Memory, for modeling music compositions. We compare both the categorical accuracies of these models as well as the quality of generated compositions, and find that the model based on Long Short Term Memory is more effective in both cases. We find that the fully connected model is not capable of generating non repeating note sequences longer than a few measures, and that the Long Short Term Memory model can do significantly better in some cases.
  • Passively encouraging offline networking in small, concentrated communities through UI/UX design

    Mitchell, Addeline; Metzgar, Jonathan; Lawlor, Orion; Chappell, Glenn (2019-05)
    The goal of this project is to identify whether it is possible to encourage users to communicate with one an other face-to-face through User Interface (UI) and User Experience (UX) design. It is well known that users can be maliciously manipulated by design elements and that concerns have been raised about the effects o f social media on interpersonal communication. The key is to find non-harmful means of guiding users to the desired action of speaking face-to-face with others. User testing for a custom web app was conducted for the purposes of this project. It is hoped that the results will provide developers with new consideration for UI and UX design.
  • Closest pair optimization on modern hardware

    Bright, Jason; Chappell, Glenn G.; Lawlor, Orion; Hartman, Chris (2019-05)
    In this project we examine the performance of several algorithms for finding the closest pair of points out of a given set of points in a plane. We look at four algorithms, including brute force, recursive, non-recursive, and a random expected linear time for numbers of points ranging from one hundred to one billion. In our examination, we find that on average the non-recursive is the fastest, except for limited cases of 100 points for the brute force, and 32 bit spaces for the random expected linear.
  • Obstacle detection with Kinect V2 on a ground robot

    Fisher, Laurin; Lawlor, Orion; Hartman, Chris; Genetti, Jon (2018-12)
    This paper is about determining whether using a Kinect V2 (Xbox One Kinect) mounted on a LAYLA ground robot can be used to detect obstacles, by generating a heightmap with the depth data. We take several factors into consideration including: framerate, power consumption, field of view, and data noise.
  • Davix: a toolset for data analysis and visualization

    Gellhouse, Amanda L.; Nance, Kara; Hay, Brian; Genetti, Jon (2014-04)
  • Intelligent platform management interface protocol security

    Clayton, Syler W.; Hay, Brian; Nance, Kara; Genetti, Jon (2014-04)
    The Intelligent Platform Management Interface (IPMI) is a protocol that allows administrators to manage servers remotely. Hardware vendors including Dell, HP, Supermicro, IBM, Lenovo, Fujitsu and Oracle support IPMI though a Baseboard Management Controller (BMC) which can either be integrated into the motherboard or purchased as a pluggable module. The BMC runs silently alongside other components of the server and provides a lower level of hardware access than the Operating System (OS). This allows support for features like power cycling the server, mounting virtual media and accessing a remote console. The failure of BMC vendors to produce a more secure product, along with the inherent flaws of the IPMI protocol, increases the need for these systems' security capabilities to be evaluated. The IPMI protocol and various vendor implementations of the BMC has been the subject of recent scrutiny, and initial investigation has raised concerns about the security properties of these components. This project focuses on evaluating specific IPMI supported hardware and software setup in an environment modeled to simulate real use, for the explicit purpose of evaluating the security of the system. This project presents: several methods by which unprivileged users can gain remote access to the system, a list of best practices for proper configuration, a guide to clearing configuration settings before decommission, and a basic Metasploit module to scan for BMC related services.
  • A Methodology For Intelligent Honeypot Deployment And Active Engagement Of Attackers

    Hecker, Christopher R.; Nance, Kara; Hay, Brian (2012)
    The internet has brought about tremendous changes in the way we see the world, allowing us to communicate at the speed of light, and dramatically changing the face of business forever. Organizations are able to share their business strategies and sensitive or proprietary information across the globe in order to create a sense of cohesiveness. This ability to share information across the vastness of the internet also allows attackers to exploit these different avenues to steal intellectual property or gather information vital to the national security of an entire nation. As technology advances to include more devices accessing an organization's network and as more business is handled via the internet, attackers' opportunities increase daily. Honeypots were created in response to this cyber warfare. Honeypots provide a technique to gather information about attackers performing reconnaissance on a network or device without the voluminous logs obtained by the majority of intrusion detection systems. This research effort provides a methodology to dynamically generate context-appropriate honeynets. Administrators are able to modify the system to conform to the target environment and gather the information passively or through increasing degrees of active scanning. The information obtained during the process of scanning the environment aids the administrator in creating a network topology and understanding the flux of devices in the network. This research continues the effort to defend an organization's networks against the onslaught of attackers.

View more