Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Browse all Theses and Dissertations

2022

Information Technology

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Realistic Virtual Human Character Design Strategy And Experience For Supporting Serious Role-Playing Simulations On Mobile Devices, Sindhu Kumari Jan 2022

Realistic Virtual Human Character Design Strategy And Experience For Supporting Serious Role-Playing Simulations On Mobile Devices, Sindhu Kumari

Browse all Theses and Dissertations

Promoting awareness of social determinants of health (SDoH) among healthcare providers is important to improve the patient care experience and outcome as it helps providers understand their patients in a better way which can facilitate more efficient and effective communication about health conditions. Healthcare professionals are typically educated about SDoH through lectures, questionaries, or role-play-based approaches; but in today’s world, it is becoming increasingly possible to leverage modern technology to create more impactful and accessible tools for SDoH education. Wright LIFE (Lifelike Immersion for Equity) is a simulation-based training tool especially created for this purpose. It is a mobile app …


Few-Shot Malware Detection Using A Novel Adversarial Reprogramming Model, Ekula Praveen Kumar Jan 2022

Few-Shot Malware Detection Using A Novel Adversarial Reprogramming Model, Ekula Praveen Kumar

Browse all Theses and Dissertations

The increasing sophistication of malware has made detecting and defending against new strains a major challenge for cybersecurity. One promising approach to this problem is using machine learning techniques that extract representative features and train classification models to detect malware in an early stage. However, training such machine learning-based malware detection models represents a significant challenge that requires a large number of high-quality labeled data samples while it is very costly to obtain them in real-world scenarios. In other words, training machine learning models for malware detection requires the capability to learn from only a few labeled examples. To address …