The Evolution Of The Internet And Social Media: A Literature Review,
2021
Technological University Dublin
The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy
Articles
This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …
A Review On Sentiment Analysis Techniques And Applications,
2021
Bhilai Institute of Technology, Durg
A Review On Sentiment Analysis Techniques And Applications, Eshaa Gogia
Graduate Research in Engineering and Technology (GRET)
With rapid strides of development and advent of technology, world has become more data-driven than it ever was. Historic analysis, forecasts, predictions and the consequent machine learning algorithms have become much accurate and efficient. Social media handles are thus a very valuable source of data in this era. A thorough analysis of the on-going trends and patterns which convey various expressions and emotions on these social media handles can be used to make a sentiment analyzer. The paper has a concrete objective of not only providing a review about the concepts of sentiment analysis so far but also propose a …
Enhanced Security Utilizing Side Channel Data Analysis,
2021
Southern Methodist University
Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor
Computer Science and Engineering Theses and Dissertations
The physical state of a system is affected by the activities and processes in which it is tasked with carrying out. In the past there have been many instances where such physical changes have been exploited by bad actors in order to gain insight into the operational state and even the data being held on a system. This method of side channel exploitation is very often effective due to the relative difficulty of obfuscating activity on a physical level. However, in order to take advantage of side channel data streams one must have a detailed working knowledge of how a …
A Systematic Review On Blockchain In Education: Opportunities And Challenges,
2021
Walden University
A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi
Walden Faculty and Staff Publications
This study focuses on bloackchain as an emerging technology regarding its use to restructure the systems and advance education upon quality outcomes. What are the benefits of integrating blockchain in education concerning system reformation and advancement in developing better educational process for all encompassing learning outcomes? With the recent developments of blockchain applications across multiple domains, the education industry seems to be benefited from this technology in considerable degree. Transcripts and certificates play a vital role in individual’s life so it needs to be stored in tamper-proof and long term available ledger. In pursuant to addressing afore stated question, this …
A Systematic Review On Blockchain In Education: Opportunities And Challenges,
2021
Walden University
A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi, Navin Duwadi
School of Information Systems and Technology Publications
This study focuses on bloackchain as an emerging technology regarding its use to restructure the systems and advance education upon quality outcomes. What are the benefits of integrating blockchain in education concerning system reformation and advancement in developing better educational process for all encompassing learning outcomes? With the recent developments of blockchain applications across multiple domains, the education industry seems to be benefited from this technology in considerable degree. Transcripts and certificates play a vital role in individual’s life so it needs to be stored in tamper-proof and long term available ledger. In pursuant to addressing afore stated question, this …
Detecting Malware In Memory With Memory Object Relationships,
2021
Mississippi State University
Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr.
Theses and Dissertations
Malware is a growing concern that not only affects large businesses but the basic consumer as well. As a result, there is a need to develop tools that can identify the malicious activities of malware authors. A useful technique to achieve this is memory forensics. Memory forensics is the study of volatile data and its structures in Random Access Memory (RAM). It can be utilized to pinpoint what actions have occurred on a computer system.
This dissertation utilizes memory forensics to extract relationships between objects and supervised machine learning as a novel method for identifying malicious processes in a system …
Digitization Of Academic Libraries Through Cloud Environment,
2021
Hindustan Institute of Technology and Science (Hindustan University)
Digitization Of Academic Libraries Through Cloud Environment, Sivankalai S, Virumandi A, Sivasekaran K, Jeyanthi R, M Sharmila
Library Philosophy and Practice (e-journal)
Libraries may soon be able to establish and manage their own data centres. This paradigm would allow libraries to control the apps and data stores that include sensitive and private information about their users' personal and financial information. The provisioning and management of infrastructure for a Web-based digital library present several complicated difficulties for library administrators. In this article, we address the challenges that digital libraries confront, and the efforts being made to solve those challenges. Infrastructure virtualization and cloud Environment are incredibly enticing options, but they are being challenged by the expansion of the indexed document collection, the addition …
Federated Agentless Detection Of Endpoints Using Behavioral And Characteristic Modeling,
2021
University of Tennessee, Knoxville
Federated Agentless Detection Of Endpoints Using Behavioral And Characteristic Modeling, Hansaka Angel Dias Edirisinghe Kodituwakku
Doctoral Dissertations
During the past two decades computer networks and security have evolved that, even though we use the same TCP/IP stack, network traffic behaviors and security needs have significantly changed. To secure modern computer networks, complete and accurate data must be gathered in a structured manner pertaining to the network and endpoint behavior. Security operations teams struggle to keep up with the ever-increasing number of devices and network attacks daily. Often the security aspect of networks gets managed reactively instead of providing proactive protection. Data collected at the backbone are becoming inadequate during security incidents. Incident response teams require data that …
Lung Nodules Identification In Ct Scans Using Multiple Instance Learning.,
2021
University of Louisville
Lung Nodules Identification In Ct Scans Using Multiple Instance Learning., Wiem Safta
Electronic Theses and Dissertations
Computer Aided Diagnosis (CAD) systems for lung nodules diagnosis aim to classify nodules into benign or malignant based on images obtained from diverse imaging modalities such as Computer Tomography (CT). Automated CAD systems are important in medical domain applications as they assist radiologists in the time-consuming and labor-intensive diagnosis process. However, most available methods require a large collection of nodules that are segmented and annotated by radiologists. This process is labor-intensive and hard to scale to very large datasets. More recently, some CAD systems that are based on deep learning have emerged. These algorithms do not require the nodules to …
Ahmedabad City App,
2021
California State University, San Bernardino
Ahmedabad City App, Rushabh Picha
Electronic Theses, Projects, and Dissertations
The Ahmedabad City App is a city guide app that provides information on the city's accessible resources. The project's goal is to provide a concrete, one-stop platform for finding information on all of Ahmedabad's accessible resources. The main goal is to simplify the railway's schedule and make it easier for customers to get from one point to another swiftly and safely. Emergency connections such as the blood bank, fire department, police station, and hospitals will be included in the app. Restaurants and picnic areas are also included in the rejuvenation process.
The proposed system uses SQLite as the database and …
Machine Learning For Unmanned Aerial System (Uas) Networking,
2021
Embry-Riddle Aeronautical University
Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang
Doctoral Dissertations and Master's Theses
Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex …
An Analysis Of Camera Configurations And Depth Estimation Algorithms For Triple-Camera Computer Vision Systems,
2021
California Polytechnic State University, San Luis Obispo
An Analysis Of Camera Configurations And Depth Estimation Algorithms For Triple-Camera Computer Vision Systems, Jared Peter-Contesse
Master's Theses
The ability to accurately map and localize relevant objects surrounding a vehicle is an important task for autonomous vehicle systems. Currently, many of the environmental mapping approaches rely on the expensive LiDAR sensor. Researchers have been attempting to transition to cheaper sensors like the camera, but so far, the mapping accuracy of single-camera and dual-camera systems has not matched the accuracy of LiDAR systems. This thesis examines depth estimation algorithms and camera configurations of a triple-camera system to determine if sensor data from an additional perspective will improve the accuracy of camera-based systems. Using a synthetic dataset, the performance of …
Digital Markers Of Autism,
2021
Center for Scientific Research and Higher Education of Ensenada (CICESE)
Digital Markers Of Autism, Ivonne Monarca, Franceli L. Cibrian, Monica Tentori
Engineering Faculty Articles and Research
Autism Spectrum Disorder (ASD) is a neurological condition that affects how a people communicate and interact with others. The use of screening tools during childhood is very important to detect those children who need to be referred for a diagnosis of ASD. However, most screening tools are based on parents' responses so the result can be subjective. In addition, most screening tools focus on social and communicative skills leaving aside sensory features, which have shown to have the potential to be ASD markers. Tactile processing has been little explored due to lack of tools to asses it, however with the …
Feel And Touch: A Haptic Mobile Game To Assess Tactile Processing,
2021
Center for Scientific Research and Higher Education of Ensenada (CICESE)
Feel And Touch: A Haptic Mobile Game To Assess Tactile Processing, Ivonne Monarca, Monica Tentori, Franceli L. Cibrian
Engineering Faculty Articles and Research
Haptic interfaces have great potential for assessing the tactile processing of children with Autism Spectrum Disorder (ASD), an area that has been under-explored due to the lack of tools to assess it. Until now, haptic interfaces for children have mostly been used as a teaching or therapeutic tool, so there are still open questions about how they could be used to assess tactile processing of children with ASD. This article presents the design process that led to the development of Feel and Touch, a mobile game augmented with vibrotactile stimuli to assess tactile processing. Our feasibility evaluation, with 5 children …
Let's Read: Designing A Smart Display Application To Support Codas When Learning Spoken Language,
2021
Chapman University
Let's Read: Designing A Smart Display Application To Support Codas When Learning Spoken Language, Katie Rodeghiero, Yingying Yuki Chen, Annika M. Hettmann, Franceli L. Cibrian
Engineering Faculty Articles and Research
Hearing children of Deaf adults (CODAs) face many challenges including having difficulty learning spoken languages, experiencing social judgment, and encountering greater responsibilities at home. In this paper, we present a proposal for a smart display application called Let's Read that aims to support CODAs when learning spoken language. We conducted a qualitative analysis using online community content in English to develop the first version of the prototype. Then, we conducted a heuristic evaluation to improve the proposed prototype. As future work, we plan to use this prototype to conduct participatory design sessions with Deaf adults and CODAs to evaluate the …
Ransomware Education: Availability, Accessibility, And Ease Of Use,
2021
Murray State University
Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager
Honors College Theses
With cybersecurity constantly in the media outlets with breaches, cybercrime, and cyberwarfare, it has become a significant concern for all. One of the most recent breaches in the summer of 2021 was the Colonial Pipeline breach, which has proven the country's reliance on these industrial control systems and networking. The systems were taken for ransom by a new type of ransomware written in a different programming language. Although the Colonial Pipeline breach was quickly addressed, the impact of the gas shortage and the response time were alarming at triaging the breach. However, this attack showed the public how dangerous ransomware …
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia,
2021
King Abdulaziz University, Saudi Arabia
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami
Future Computing and Informatics Journal
It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …
Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques,
2021
Ain Shams university
Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed
Future Computing and Informatics Journal
Steganography is one of the most important tools in the data security field as there is a huge amount of data transferred each moment over the internet. Hiding secret messages in an image has been widely used because the images are mostly used in social media applications. The proposed algorithm is a simple algorithm for hiding an image in another image. The proposed technique uses QR factorization to conceal the secret image. The technique successfully hid a gray and color image in another one and the performance of the algorithm was measured by PSNR, SSIM and NCC. The PSNR for …
Needle In A Haystack: Detecting Subtle Malicious Edits To Additive Manufacturing G-Code Files,
2021
CUNY New York City College of Technology
Needle In A Haystack: Detecting Subtle Malicious Edits To Additive Manufacturing G-Code Files, Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac
Publications and Research
Increasing usage of Digital Manufacturing (DM) in safety-critical domains is increasing attention on the cybersecurity of the manufacturing process, as malicious third parties might aim to introduce defects in digital designs. In general, the DM process involves creating a digital object (as CAD files) before using a slicer program to convert the models into printing instructions (e.g. g-code) suitable for the target printer. As the g-code is an intermediate machine format, malicious edits may be difficult to detect, especially when the golden (original) models are not available to the manufacturer. In this work we aim to quantify this hypothesis through …
Asynchronous, Distributed Optical Mutual Exclusion And Applications,
2021
Louisiana State University and Agricultural and Mechanical College
Asynchronous, Distributed Optical Mutual Exclusion And Applications, Ahmed Bahaael Mansour
LSU Doctoral Dissertations
Silicon photonics have drawn much recent interest in the setting of intra-chip andmodule communication. In this dissertation, we address a fundamental computationalproblem, mutual exclusion, in the setting of optical interconnects. As a main result, wepropose an optical network and an algorithm for it to distribute a token (shared resource)mutually exclusively among a set ofnprocessing elements. Following a request, the tokenis granted in constant amortized time andO(n) worst case time; this assumes constantpropagation time for light within the chip. Additionally, the distribution of tokens is fair,ensuring that no token request is denied more thann−1 times in succession; this is thebest possible. …