Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, 2024 Olivet Nazarene University
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer
ELAIA
Asteroid detection is a common field in astronomy for planetary defense, requiring observations from survey telescopes to detect and classify different objects. The amount of data collected each night is continually increasing as new and better-designed telescopes begin collecting information each year. This amount of data is quickly becoming unmanageable, and researchers are looking for ways to better process this data. The most feasible current solution is to implement computer algorithms to automatically detect these sources and then use machine learning to create a more efficient and accurate method of classification. Implementation of such methods has previously focused on larger …
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, 2024 PhD Student at AL-Baath University and work at Syrian Wireless Organization (SWO)
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …
Fair Fault-Tolerant Approach For Access Point Failures In Networked Control System Greenhouses, 2024 The American University in Cairo AUC
Fair Fault-Tolerant Approach For Access Point Failures In Networked Control System Greenhouses, Mohammed Ali Yaslam Ba Humaish
Theses and Dissertations
Greenhouse Networked Control Systems (NCS) are popular applications in modern agriculture due to their ability to monitor and control various environmental factors that can affect crop growth and quality. However, designing and operating a greenhouse in the context of NCS could be challenging due to the need for highly available and cost-efficient systems. This thesis presents a design methodology for greenhouse NCS that addresses these challenges, offering a framework to optimize crop productivity, minimize costs, and improve system availability and reliability. It contributes several innovations to the field of greenhouse NCS design. For example, it recommends using the 2.4GHz frequency …
Tree Localization In A Plantation Using Ultra Wideband Signals, 2024 Purdue University
Tree Localization In A Plantation Using Ultra Wideband Signals, Akshat Verma
The Journal of Purdue Undergraduate Research
No abstract provided.
Securing Edge Computing: A Hierarchical Iot Service Framework, 2024 Northern Kentucky University
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Posters-at-the-Capitol
Title: Securing Edge Computing: A Hierarchical IoT Service Framework
Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.
Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University
Abstract:
Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.
Our secure by design approach prioritizes …
Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, 2024 Northern Kentucky University
Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le
Posters-at-the-Capitol
Abstract
Purpose: The purpose of the study is to better understand the role and impact of video research podcasts in bridging the gap between academia and the general public, especially concerning the challenges of accessibility and comprehension of scholarly research.
Methods: A 10-question survey was administered to evaluate the effectiveness, utility, and acceptance of video recordings in research presentations. The survey also aimed to gather insights into the motivations, challenges, and benefits of using video podcasts for research dissemination. Results were then analyzed using the Unified Theory of Acceptance and Use of Technology (UTAUT) model.
Results: There were 102 respondents …
Alice In Cyberspace 2024, 2024 Kean University
Alice In Cyberspace 2024, Stanley Mierzwa
Center for Cybersecurity
‘Alice in Cyberspace’ Conference Nurtures Women’s Interest, Representation in Cybersecurity
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, 2024 Åbo Akademi University
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
Journal of International Technology and Information Management
This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, 2024 Pace University - New York
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
Journal of International Technology and Information Management
Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …
Reducing Food Scarcity: The Benefits Of Urban Farming, 2023 Brigham Young University
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, 2023 Air Force Institute of Technology
Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances
AFIT Patents
A method for cyber security monitor includes monitoring a network interface that is input-only configured to surreptitiously and covertly receive bit-level, physical layer communication between networked control and sensor field devices. During a training mode, a baseline distinct native attribute (DNA) fingerprint is generated for each networked field device. During a protection mode, a current DNA fingerprint is generated for each networked field device. The current DNA fingerprint is compared to the baseline DNA fingerprint for each networked field device. In response to detect at least one of RAA and PAA based on a change in the current DNA fingerprint …
Renovating The Ipmu Via Internet Of Things For Pollutant Emission Estimations In Poultry Facilities, 2023 University of Nebraska-Lincoln
Renovating The Ipmu Via Internet Of Things For Pollutant Emission Estimations In Poultry Facilities, Joshua Dotto
Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research
The emissions of ammonia (NH3), particulate matter (PM2.5), and carbon dioxide (CO2) are major concerns in poultry facilities. They can pose environmental concerns and nuances. Robust and affordable measurement systems are needed to accurately measure in-barn concentrations and quantify the emissions.
The Intelligent Portable Monitoring Unit (iPMU or PMU3) developed in 2016 was reconstructed into PMU4 to include upgraded NH3 and PM2.5 sensors and wireless connectivity for a low-cost, robust, and accurate air quality monitoring device with contactless data transfer using the concept of Internet of Things (IoT). In addition, a user-friendly …
On Dyadic Parity Check Codes And Their Generalizations, 2023 University of Nebraska-Lincoln
On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez
Department of Mathematics: Dissertations, Theses, and Student Research
In order to communicate information over a noisy channel, error-correcting codes can be used to ensure that small errors don’t prevent the transmission of a message. One family of codes that has been found to have good properties is low-density parity check (LDPC) codes. These are represented by sparse bipartite graphs and have low complexity graph-based decoding algorithms. Various graphical properties, such as the girth and stopping sets, influence when these algorithms might fail. Additionally, codes based on algebraically structured parity check matrices are desirable in applications due to their compact representations, practical implementation advantages, and tractable decoder performance analysis. …
Brunet: Disruption-Tolerant Tcp And Decentralized Wi-Fi For Small Systems Of Vehicles, 2023 California Polytechnic State University, San Luis Obispo
Brunet: Disruption-Tolerant Tcp And Decentralized Wi-Fi For Small Systems Of Vehicles, Nicholas Brunet
Master's Theses
Reliable wireless communication is essential for small systems of vehicles. However, for small-scale robotics projects where communication is not the primary goal, programmers frequently choose to use TCP with Wi-Fi because of their familiarity with the sockets API and the widespread availability of Wi-Fi hardware. However, neither of these technologies are suitable in their default configurations for highly mobile vehicles that experience frequent, extended disruptions. BRUNET (BRUNET Really Useful NETwork) provides a two-tier software solution that enhances the communication capabilities for Linux-based systems. An ad-hoc Wi-Fi network permits decentralized peer-to-peer and multi-hop connectivity without the need for dedicated network infrastructure. …
Decentralized Machine Learning On Blockchain: Developing A Federated Learning Based System, 2023 California Polytechnic State University, San Luis Obispo
Decentralized Machine Learning On Blockchain: Developing A Federated Learning Based System, Nikhil Sridhar
Master's Theses
Traditional Machine Learning (ML) methods usually rely on a central server to per-
form ML tasks. However, these methods have problems like security risks, data
storage issues, and high computational demands. Federated Learning (FL), on the
other hand, spreads out the ML process. It trains models on local devices and then
combines them centrally. While FL improves computing and customization, it still
faces the same challenges as centralized ML in security and data storage.
This thesis introduces a new approach combining Federated Learning and Decen-
tralized Machine Learning (DML), which operates on an Ethereum Virtual Machine
(EVM) compatible blockchain. The …
Cybersecurity In Critical Infrastructure Systems: Emulated Protection Relay, 2023 University of Arkansas, Fayetteville
Cybersecurity In Critical Infrastructure Systems: Emulated Protection Relay, Mitchell Bylak
Computer Science and Computer Engineering Undergraduate Honors Theses
Cyber-attacks on Critical Systems Infrastructure have been steadily increasing across the world as the capabilities of and reliance on technology have grown throughout the 21st century, and despite the influx of new cybersecurity practices and technologies, the industry faces challenges in its cooperation between the government that regulates law practices and the private sector that owns and operates critical infrastructure and security, which has directly led to an absence of eas- ily accessible information and learning resources on cybersecurity for use in public environments and educational settings. This honors research thesis addresses these challenges by submitting the development of an …
Making Tradable White Certificates Trustworthy, Anonymous, And Efficient Using Blockchains, 2023 Technological University Dublin
Making Tradable White Certificates Trustworthy, Anonymous, And Efficient Using Blockchains, Nouman Ashraf, Sachin Sharma, Sheraz Aslam, Khursheed Aurangzeb
Articles
Fossil fuel pollution has contributed to dramatic changes in the Earth’s climate, and this trend will continue as fossil fuels are burned at an ever-increasing rate. Many countries around the world are currently making efforts to reduce greenhouse gas emissions, and one of the methods is the Tradable White Certificate (TWC) mechanism. The mechanism allows organizations to reduce their energy consumption to generate energy savings certificates, and those that achieve greater energy savings can sell their certificates to those that fall short. However, there are some challenges to implementing this mechanism, such as the centralized and costly verification and control …
Closing The Gap: Leveraging Aes-Ni To Balance Adversarial Advantage And Honest User Performance In Argon2i, 2023 Purdue University
Closing The Gap: Leveraging Aes-Ni To Balance Adversarial Advantage And Honest User Performance In Argon2i, Nicholas Harrell, Nathaniel Krakauer
CERIAS Technical Reports
The challenge of providing data privacy and integrity while maintaining efficient performance for honest users is a persistent concern in cryptography. Attackers exploit advances in parallel hardware and custom circuit hardware to gain an advantage over regular users. One such method is the use of Application-Specific Integrated Circuits (ASICs) to optimize key derivation function (KDF) algorithms, giving adversaries a significant advantage in password guessing and recovery attacks. Other examples include using graphical processing units (GPUs) and field programmable gate arrays (FPGAs). We propose a focused approach to close the gap between adversarial advantage and honest user performance by leveraging the …
Security Datasets For Network Research, 2023 Rochester Institute of Technology
Security Datasets For Network Research, Bruce Hartpence, Bill Stackpole, Daryl Johnson
Data
This document describes the content of the security traffic datasets included in this collection and the conditions under which the packets were collected. These datasets were assembled from 2023 onward. There will be periodic updates or additions to the dataset collection. The current collection includes a variety of nmap intense scans, an Address Resolution Protocol Man in the Middle (ARP MITM) attack, an Internet Control Message Protocol (ICMP) Redirect MITM and an active directory enumeration attack.
When referencing these datasets, please use the following DOI: 10.57673/gccis-qj60
Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, 2023 United States Office of the President
Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden
Copyright, Fair Use, Scholarly Communication, etc.
Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.
My Administration places the highest urgency …