Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (180)
- University for Business and Technology in Kosovo (73)
- Old Dominion University (40)
- Purdue University (39)
- Institute of Business Administration (19)
-
- University of Nevada, Las Vegas (13)
- Kennesaw State University (12)
- University of Kentucky (10)
- University of Nebraska at Omaha (6)
- Georgia Southern University (5)
- Illinois State University (5)
- San Jose State University (5)
- Portland State University (4)
- Cedarville University (3)
- Western University (3)
- Illinois Math and Science Academy (2)
- Olivet Nazarene University (2)
- University of New Mexico (2)
- Arkansas Tech University (1)
- Australian Council for Educational Research (ACER) (1)
- Duquesne University (1)
- James Madison University (1)
- LSU Health Science Center (1)
- Minnesota State University Moorhead (1)
- Minnesota State University, Mankato (1)
- Missouri University of Science and Technology (1)
- Murray State University (1)
- South Dakota State University (1)
- Southern Adventist University (1)
- Southern Illinois University Carbondale (1)
- Keyword
-
- Machine learning (6)
- STEM (6)
- Simulation (6)
- Machine Learning (5)
- Optimization (4)
-
- Computer Science (3)
- Database (3)
- Education (3)
- Environment (3)
- Information security (3)
- NanoHUB (3)
- Natural language processing (3)
- Neural networks (3)
- Numerical simulation (3)
- Social media (3)
- Social networks (3)
- Visual Analytics (3)
- 5G (2)
- AODV (2)
- Algorithm (2)
- Android (2)
- Autonomous vehicles (2)
- Bandwidth (2)
- Big Data (2)
- Biological Cells (2)
- Cloud Computing (2)
- Communication (2)
- Complex Engineering Problems (2)
- Computer architecture (2)
- Computer networks (2)
- Publication Year
- Publication
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (174)
- UBT International Conference (73)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (29)
- Cybersecurity Undergraduate Research Showcase (25)
- International Conference on Information and Communication Technologies (19)
-
- Modeling, Simulation and Visualization Student Capstone Conference (14)
- Commonwealth Computational Summit (10)
- College of Engineering: Graduate Celebration Programs (9)
- KSU Proceedings on Cybersecurity Education, Research and Practice (8)
- The 8th International Conference on Physical and Numerical Simulation of Materials Processing (6)
- Annual Symposium on Biomathematics and Ecology Education and Research (5)
- Inaugural CSU IR Conference, 2015 (5)
- Interdisciplinary STEM Teaching & Learning Conference (2012-2019) (5)
- National Training Aircraft Symposium (NTAS) (5)
- UNO Student Research and Creative Activity Fair (5)
- 2010 Annual Nevada NSF EPSCoR Climate Change Conference (4)
- Student Research Symposium (4)
- Symposium of Student Scholars (3)
- The Research and Scholarship Symposium (2013-2019) (3)
- Undergraduate Student Research Internships Conference (3)
- Scholar Week 2016 - present (2)
- Shared Knowledge Conference (2)
- The International Student Science Fair 2018 (2)
- Undergraduate Research Symposium (2)
- 2009 - 2019 ACER Research Conferences (1)
- ASA Multidisciplinary Research Symposium (1)
- ATU Research Symposium (1)
- African Conference on Information Systems and Technology (1)
- Campus Research Day (1)
- Computer Science Graduate Research Workshop (1)
- File Type
Articles 1 - 30 of 439
Full-Text Articles in Engineering
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Optimization Of Memory Management Using Machine Learning, Luke Bartholomew
Optimization Of Memory Management Using Machine Learning, Luke Bartholomew
Campus Research Day
This paper is a proposed solution to the problem of memory safety using machine learning. Memory overload and corruption cause undesirable behaviors in a system that are addressed by memory safety implementations. This project uses machine learning models to classify different states of system memory from a dataset collected from a Raspberry Pi System. These models can then be used to classify real run time memory data and increase memory safety overall in a system.
Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni
Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni
ATU Research Symposium
Abstract:
Anomaly detection, the identification of rare or unusual patterns that deviate from normal behavior, is a fundamental task with wide-ranging applications across various domains. Traditional machine learning techniques often struggle to effectively capture the complex temporal dynamics present in real-world data streams. Spiking Neural Networks (SNNs), inspired by the spiking nature of biological neurons, offer a promising approach by inherently modeling temporal information through precise spike timing. In this study, we investigate the use of Spiking Neural Networks (SNNs) for detecting anomalies or unusual patterns in data. We propose an SNN model that can learn what constitutes normal …
A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector
A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector
Cybersecurity Undergraduate Research Showcase
CRASHOVERRIDE is a modular malware tailor-made for electric grid Industrial Control System (ICS) equipment and was deployed by a group named ELECTRUM in a Ukrainian substation. The malware would launch a protocol exploit to flip breakers and would then wipe the system of ICS files. Finally, it would execute a Denial Of Service (DOS) attack on protective relays. In effect, months of damage and thousands out of power. However, due to oversights the malware only caused a brief power outage. Though the implications of the malware are cause for researching and implementing countermeasures against others to come. The CISA recommends …
A Machine Learning Model Of Perturb-Seq Data For Use In Space Flight Gene Expression Profile Analysis, Liam F. Johnson, James Casaletto, Lauren Sanders, Sylvain Costes
A Machine Learning Model Of Perturb-Seq Data For Use In Space Flight Gene Expression Profile Analysis, Liam F. Johnson, James Casaletto, Lauren Sanders, Sylvain Costes
Graduate Industrial Research Symposium
The genetic perturbations caused by spaceflight on biological systems tend to have a system-wide effect which is often difficult to deconvolute it into individual signals with specific points of origin. Single cell multi-omic data can provide a profile of the perturbational effects, but does not necessarily indicate the initial point of interference within the network. The objective of this project is to take advantage of large scale and genome-wide perturbational datasets by using them to train a tuned machine learning model that is capable of predicting the effects of unseen perturbations in new data. Perturb-Seq datasets are large libraries of …
Using Natural Language Processing To Identify Mental Health Indicators In Aviation Voluntary Safety Reports, Michael Sawyer, Katherine Berry, Amelia Kinsella, R Jordan Hinson, Edward Bynum
Using Natural Language Processing To Identify Mental Health Indicators In Aviation Voluntary Safety Reports, Michael Sawyer, Katherine Berry, Amelia Kinsella, R Jordan Hinson, Edward Bynum
National Training Aircraft Symposium (NTAS)
Voluntary Safety Reporting Programs (VSRPs) are a critical tool in the aviation industry for monitoring safety issues observed by the frontline workforce. While VSRPs primarily focus on operational safety, report narratives often describe factors such as fatigue, workload, culture, staffing, and health, directly or indirectly impacting mental health. These reports can provide individual and organizational insights into aviation personnel's physical and psychological well-being. This poster introduces the AVIation Analytic Neural network for Safety events (AVIAN-S) model as a potential tool to extract and monitor these insights. AVIAN-S is a novel machine-learning model that leverages natural language processing (NLP) to analyze …
The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati
Cybersecurity Undergraduate Research Showcase
This paper explores the transformative potential of integrating Artificial Intelligence (AI) with established cybersecurity frameworks such as the Cybersecurity Maturity Model Certification (CMMC) and the National Institute of Standards and Technology (NIST) Special Publication 800-171. The thesis argues that the relationship between AI and these frameworks has the capacity to transform risk management in cybersecurity, where it could serve as a critical element in threat mitigation. In addition to addressing AI’s capabilities, this paper acknowledges the risks and limitations of these systems, highlighting the need for extensive research and monitoring when relying on AI. One must understand boundaries when integrating …
Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson
Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson
Cybersecurity Undergraduate Research Showcase
For this research project I used a Raspberry Pi device and conducted online research to investigate potential security vulnerabilities along with mitigation strategies. I configured the Raspberry Pi by using the proper peripherals such as an HDMI cord, a microUSB adapter that provided 5V and at least 700mA of current, a TV monitor, PiSwitch, SD Card, keyboard, and mouse. I installed the Rasbian operating system (OS). The process to install the Rasbian took about 10 minutes to boot starting at 21:08 on 10/27/2023 and ending at 21:18. 1,513 megabytes (MB) was written to the SD card running at (2.5 MB/sec). …
Integrating Ai Into Uavs, Huong Quach
Integrating Ai Into Uavs, Huong Quach
Cybersecurity Undergraduate Research Showcase
This research project explores the application of Deep Learning (DL) techniques, specifically Convolutional Neural Networks (CNNs), to develop a smoke detection algorithm for deployment on mobile platforms, such as drones and self-driving vehicles. The project focuses on enhancing the decision-making capabilities of these platforms in emergency response situations. The methodology involves three phases: algorithm development, algorithm implementation, and testing and optimization. The developed CNN model, based on ResNet50 architecture, is trained on a dataset of fire, smoke, and neutral images obtained from the web. The algorithm is implemented on the Jetson Nano platform to provide responsive support for first responders. …
Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins
Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins
Cybersecurity Undergraduate Research Showcase
This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.
Large Language Model Use Cases For Instruction, Plus A Primer On Prompt Engineering, Roy Haggerty, Justin Cochran
Large Language Model Use Cases For Instruction, Plus A Primer On Prompt Engineering, Roy Haggerty, Justin Cochran
LSU Health New Orleans Symposium Series on Artificial Intelligence
AMA Credit Designation Statement: The Louisiana State University School of Medicine, New Orleans designates this live activity for a maximum of 1.0 AMA PRA Category 1 Credit™. Physicians should claim only the credit commensurate with the extent of their participation in the activity.
NCPD Credit Designation Statement: Nursing participants may earn 1.0 NCPD contact hours. Each nursing participant must be present for the entire session for which NCPD contact hours are requested and must complete an evaluation of the session to receive credit.
Reducing Uncertainty In Sea-Level Rise Prediction: A Spatial-Variability-Aware Approach, Subhankar Ghosh, Shuai An, Arun Sharma, Jayant Gupta, Shashi Shekhar, Aneesh Subramanian
Reducing Uncertainty In Sea-Level Rise Prediction: A Spatial-Variability-Aware Approach, Subhankar Ghosh, Shuai An, Arun Sharma, Jayant Gupta, Shashi Shekhar, Aneesh Subramanian
I-GUIDE Forum
Given multi-model ensemble climate projections, the goal is to accurately and reliably predict future sea-level rise while lowering the uncertainty. This problem is important because sea-level rise affects millions of people in coastal communities and beyond due to climate change's impacts on polar ice sheets and the ocean. This problem is challenging due to spatial variability and unknowns such as possible tipping points (e.g., collapse of Greenland or West Antarctic ice-shelf), climate feedback loops (e.g., clouds, permafrost thawing), future policy decisions, and human actions. Most existing climate modeling approaches use the same set of weights globally, during either regression or …
A Social Profile-Based E-Learning Model, Xola Ntlangula
A Social Profile-Based E-Learning Model, Xola Ntlangula
African Conference on Information Systems and Technology
Many High Education Institutions (HEIs) have migrated to blended or complete online learning to cater for less interruption with learning. As such, there is a growing demand for personalized e-learning to accommodate the diversity of students' needs. Personalization can be achieved using recommendation systems powered by artificial intelligence. Although using student data to personalize learning is not a new concept, collecting and identifying appropriate data is necessary to determine the best recommendations for students. By reviewing the existing data collection capabilities of the e-learning platforms deployed by public universities in South Africa, we were able to establish the readiness of …
School Of Stem Poster Session, Keith Schimmel
School Of Stem Poster Session, Keith Schimmel
Scholar Week 2016 - present
Location: Reed 2nd floor Tech Center and lobby
This poster session will include displays of work from the School of STEM - Engineering Senior Design and Freshman Design Projects along with Undergraduate Research.
Senior Design Projects
(1) Holland - Shear-Die [Nathan Marks, Nolan Paape, Seth Beyer]
(2) Aginno - Solar-Powered Fish Pond Aeration System [Hoai Do, Bella Lopez, Kendyl Clark, Megan Schroeder]
(3) Peddinghaus - Tube Conveyor [Carson Caldwell, Alisha Wright, Michael Rollberg, Rebecca Witvoet]
(4) American Institute of Chemical Engineers (AIChE) Student Design Problem [Marissa Anderson, Brady Chambers, Cam Steele]
(5) Kankakee Elks Country Club and Golf …
Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen
Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen
Modeling, Simulation and Visualization Student Capstone Conference
Practical work guides for complex procedures are significant and highly affect the efficiency and accuracy of on-site users. This paper presents a technique to generate virtual work guides automatically for complex procedures. Firstly, the procedure information is extracted from the electronic manual in PDF format. And then, the extracted procedure steps are mapped to the virtual model parts in preparation for animation between adjacent steps. Next, smooth animations of the procedure are generated based on a 3D natural cubic spline curve to improve the spatial ability of the work guide. In addition, each step's annotation is automatically adjusted to improve …
Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith
Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith
Modeling, Simulation and Visualization Student Capstone Conference
Mathematics is an important subject that is pervasive across many disciplines. It is also a subject that has proven to be challenging to both teach and learn. Students face many challenges with learning math such as a lack of motivation and anxiety. To address these challenges, game-based learning has become a popular approach to stimulate students and create a more positive classroom environment. It can serve as an alternative or supplement to traditional teaching and can better engage students while developing a positive attitude toward learning. The use of games in a classroom can create a more exciting and engaging …
Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry
Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry
Modeling, Simulation and Visualization Student Capstone Conference
This work explores collecting performance metrics and leveraging the output for prediction on a memory-intensive parallel image classification algorithm - Inception v3 (or "Inception3"). Experimental results were collected by nvidia-smi on a computational node DGX-1, equipped with eight Tesla V100 Graphic Processing Units (GPUs). Time series analysis was performed on the GPU utilization data taken, for multiple runs, of Inception3’s image classification algorithm (see Figure 1). The time series model applied was Seasonal Autoregressive Integrated Moving Average Exogenous (SARIMAX).
Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis
Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis
Modeling, Simulation and Visualization Student Capstone Conference
Maritime autonomy, specifically the use of autonomous and semi-autonomous maritime vessels, is a key enabling technology supporting a set of diverse and critical research areas, including coastal and environmental resilience, assessment of waterway health, ecosystem/asset monitoring and maritime port security. Critical to the safe, efficient and reliable operation of an autonomous maritime vessel is its ability to perceive on-the-fly the external environment through onboard sensors. In this paper, buoy detection for LiDAR images is explored by using several tools and techniques: machine learning methods, Unity Game Engine (herein referred to as Unity) simulation, and traditional image processing. The Unity Game …
Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla
Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla
Modeling, Simulation and Visualization Student Capstone Conference
This study analyzes the impact of Venezuelan migrants on local frustration levels in Colombia. The study found a relationship between the influx of Venezuelan migrants and the level of frustration among locals towards migrants, infrastructure, government, and geopolitics. Additionally, we identified that frustration types have an impact on other frustrations. The study used articles from a national newspaper in Colombia from 2015 to 2020. News articles were coded during a previous study qualitatively and categorized into frustration types. The code frequencies were then used as variables in this study. We used path modeling to statistically study the relationship between dependent …
Enhancement Of Deep Learning Protein Structure Prediction, Ruoming Shen
Enhancement Of Deep Learning Protein Structure Prediction, Ruoming Shen
Modeling, Simulation and Visualization Student Capstone Conference
Protein modeling is a rapidly expanding field with valuable applications in the pharmaceutical industry. Accurate protein structure prediction facilitates drug design, as extensive knowledge about the atomic structure of a given protein enables scientists to target that protein in the human body. However, protein structure identification in certain types of protein images remains challenging, with medium resolution cryogenic electron microscopy (cryo-EM) protein density maps particularly difficult to analyze. Recent advancements in computational methods, namely deep learning, have improved protein modeling. To maximize its accuracy, a deep learning model requires copious amounts of up-to-date training data.
This project explores DeepSSETracer, a …
Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund
Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund
Modeling, Simulation and Visualization Student Capstone Conference
The sudden arrival of many migrants can present new challenges for host communities and create negative attitudes that reflect that tension. In the case of Colombia, with the influx of over 2.5 million Venezuelan migrants, such tensions arose. Our research objective is to investigate how those sentiments arise in social media. We focused on monitoring derogatory terms for Venezuelans, specifically veneco and veneca. Using a dataset of 5.7 million tweets from Colombian users between 2015 and 2021, we determined the proportion of tweets containing those terms. We observed a high prevalence of xenophobic and defamatory language correlated with the …
An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen
An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen
Modeling, Simulation and Visualization Student Capstone Conference
This work presents an algorithm for finding data dependencies in a discrete-event simulation system, from the event graph of the system. The algorithm can be used within a parallel discrete-event simulation. Also presented is an experimental system and event graph, which is used for testing the algorithm. Results indicate that the algorithm can provide information about which vertices in the experimental event graph can affect other vertices, and the minimum amount of time in which this interference can occur.
U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa
U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa
Modeling, Simulation and Visualization Student Capstone Conference
Satellite image analysis of natural disasters is critical for effective emergency response, relief planning, and disaster prevention. Semantic segmentation is believed to be on of the best techniques to capture pixelwise information in computer vision. In this work we will be using a U-Net architecture to do a three class semantic segmentation for the Xview2 dataset to capture the level of damage caused by different natural disaster which is beyond the visual scope of human eyes.
Statistical Approach To Quantifying Interceptability Of Interaction Scenarios For Testing Autonomous Surface Vessels, Benjamin E. Hargis, Yiannis E. Papelis
Statistical Approach To Quantifying Interceptability Of Interaction Scenarios For Testing Autonomous Surface Vessels, Benjamin E. Hargis, Yiannis E. Papelis
Modeling, Simulation and Visualization Student Capstone Conference
This paper presents a probabilistic approach to quantifying interceptability of an interaction scenario designed to test collision avoidance of autonomous navigation algorithms. Interceptability is one of many measures to determine the complexity or difficulty of an interaction scenario. This approach uses a combined probability model of capability and intent to create a predicted position probability map for the system under test. Then, intercept-ability is quantified by determining the overlap between the system under test probability map and the intruder’s capability model. The approach is general; however, a demonstration is provided using kinematic capability models and an odometry-based intent model.
Towards Nlp-Based Conceptual Modeling Frameworks, David Shuttleworth, Jose Padilla
Towards Nlp-Based Conceptual Modeling Frameworks, David Shuttleworth, Jose Padilla
Modeling, Simulation and Visualization Student Capstone Conference
This paper presents preliminary research using Natural Language Processing (NLP) to support the development of conceptual modeling frameworks. NLP-based frameworks are intended to lower the barrier of entry for non-modelers to develop models and to facilitate communication across disciplines considering simulations in research efforts. NLP drives conceptual modeling in two ways. Firstly, it attempts to automate the generation of conceptual models and simulation specifications, derived from non-modelers’ narratives, while standardizing the conceptual modeling process and outcome. Secondly, as the process is automated, it is simpler to replicate and be followed by modelers and non-modelers. This allows for using a common …
Enhancing Pedestrian-Autonomous Vehicle Safety In Low Visibility Scenarios: A Comprehensive Simulation Method, Zizheng Yan, Yang Liu, Hong Yang
Enhancing Pedestrian-Autonomous Vehicle Safety In Low Visibility Scenarios: A Comprehensive Simulation Method, Zizheng Yan, Yang Liu, Hong Yang
Modeling, Simulation and Visualization Student Capstone Conference
Self-driving cars raise safety concerns, particularly regarding pedestrian interactions. Current research lacks a systematic understanding of these interactions in diverse scenarios. Autonomous Vehicle (AV) performance can vary due to perception accuracy, algorithm reliability, and environmental dynamics. This study examines AV-pedestrian safety issues, focusing on low visibility conditions, using a co-simulation framework combining virtual reality and an autonomous driving simulator. 40 experiments were conducted, extracting surrogate safety measures (SSMs) from AV and pedestrian trajectories. The results indicate that low visibility can impair AV performance, increasing conflict risks for pedestrians. AV algorithms may require further enhancements and validations for consistent safety performance …
Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan
Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan
Cybersecurity Undergraduate Research Showcase
Cybercrime and attack methods have been steadily increasing since the 2019 pandemic. In the years following 2019, the number of victims and attacks per hour rapidly increased as businesses and organizations transitioned to digital environments for business continuity amidst lockdowns. In most scenarios cybercriminals continued to use conventional attack methods and known vulnerabilities that would cause minimal damage to an organization with a robust cyber security posture. However, zero-day exploits have skyrocketed across all industries with an increasingly growing technological landscape encompassing internet of things (IoT), cloud hosting, and more advanced mobile technologies. Reports by Mandiant Threat Intelligence (2022) concluded …
Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng
Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng
Cybersecurity Undergraduate Research Showcase
Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.
MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …
The Effects Of Demographics And Risk Factors On The Morphological Characteristics Of Human Femoropopliteal Arteries, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy
The Effects Of Demographics And Risk Factors On The Morphological Characteristics Of Human Femoropopliteal Arteries, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy
UNO Student Research and Creative Activity Fair
Background: Disease of the lower extremity arteries (Peripheral Arterial Disease, PAD) is associated with high morbidity and mortality. During disease development, the arteries adapt by changing their diameter, wall thickness, and residual deformations, but the effects of demographics and risk factors on this process are not clear.
Methods: Superficial femoral arteries from 736 subjects (505 male, 231 female, 12 to 99 years old, average age 51±17.8 years) and the associated demographic and risk factor variables were used to construct machine learning (ML) regression models that predicted morphological characteristics (diameter, wall thickness, and longitudinal opening angle resulting from the …
Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens
Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens
UNO Student Research and Creative Activity Fair
Human movement is inherently variable by nature. One of the most common analytical tools for assessing movement variability is the largest Lyapunov exponent (LyE) which quantifies the rate of trajectory divergence or convergence in an n-dimensional state space. One popular method for assessing LyE is the Wolf algorithm. Many studies have investigated how Wolf’s calculation of the LyE changes due to sampling frequency, filtering, data normalization, and stride normalization. However, a surprisingly understudied parameter needed for LyE computation is evolution time. The purpose of this study is to investigate how the LyE changes as a function of evolution time …