Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- World Maritime University (25)
- Embry-Riddle Aeronautical University (13)
- Olivet Nazarene University (4)
- Purdue University (4)
- Portland State University (2)
-
- University at Albany, State University of New York (2)
- University of Kentucky (2)
- Yale University (2)
- Augustana College (1)
- Cedarville University (1)
- Georgia College (1)
- Georgia Southern University (1)
- Illinois State University (1)
- Kansas State University Libraries (1)
- Pepperdine University (1)
- Stephen F. Austin State University (1)
- University of Dayton (1)
- Virginia Commonwealth University (1)
- Western Washington University (1)
- Keyword
-
- Conference Calls (2)
- Corporate Earnings (2)
- Text Analytics (2)
- Acoustic indices (1)
- Artificial intelligence (1)
-
- Birds -- Ecology (1)
- Birds -- Effect of habitat connectivity on (1)
- Cedarville (1)
- College (1)
- Collegiality (1)
- Community need (1)
- Convolutional neural networks (1)
- Copulas (Mathematical statistics) (1)
- Cross-disciplinary communication (1)
- Deforestation (1)
- Development (1)
- Diversity (1)
- Drought forecasting -- Mathematical models (1)
- Early college programs (1)
- Ecological Responsibility (1)
- GIS (1)
- Geography (1)
- Habitat (1)
- Habitat conservation (1)
- Human computer interaction (1)
- Human in the loop (1)
- Human rights practice (1)
- Indonesia (1)
- Infrastructure (1)
- LDCs (1)
- Publication
-
- MARENER 2017 (25)
- Annual ADFSL Conference on Digital Forensics, Security and Law (13)
- Kankakee River Watershed Conference (4)
- CHAR (2)
- Commonwealth Computational Summit (2)
-
- MODVIS Workshop (2)
- Student Research Symposium (2)
- Yale Day of Data (2)
- Academic Chairpersons Conference Proceedings (1)
- Annual Symposium on Biomathematics and Ecology Education and Research (1)
- Biennial Conference: The Social Practice of Human Rights (1)
- Biology and Medicine Through Mathematics Conference (1)
- Celebration of Learning (1)
- Charleston Library Conference (1)
- Georgia College Student Research Events (1)
- Graduate Student Symposium (1)
- National Youth Advocacy and Resilience Conference (1)
- School of Human Sciences Research Showcase (1)
- Seaver College Research And Scholarly Achievement Symposium (1)
- The Research and Scholarship Symposium (2013-2019) (1)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (1)
- File Type
Articles 1 - 30 of 65
Full-Text Articles in Physical Sciences and Mathematics
Building Academic/Practitioner Teams For Human Rights Projects: Examples, Lessons Learned, And Pitfalls To Avoid, Theresa Harris
Building Academic/Practitioner Teams For Human Rights Projects: Examples, Lessons Learned, And Pitfalls To Avoid, Theresa Harris
Biennial Conference: The Social Practice of Human Rights
Academics are increasingly interested in getting out of their classrooms and labs to contribute their knowledge, expertise, and resources to help communities develop evidence-based policies. In addition to post-election initiatives such as the March for Science and 314 Action, many academics are joining “without borders”-type programs and organizations that connect academics with opportunities to volunteer their time and talents for “social good.”
One of the longest-running of these is On-call Scientists, an initiative of the American Association for the Advancement of Science (AAAS) that connects human rights organizations with pro bono scientists across all fields — life, physical, behavioral, and …
Informing Responders Using Gis And Gps, Deidre Mccarthy
Informing Responders Using Gis And Gps, Deidre Mccarthy
CHAR
Hurricane Katrina devastated the Gulf Coast in August 2005 and created the single largest disaster for cultural resources that the United States has witnessed since the inception of the National Historic Preservation Act (NHPA) in 1966. Notably, the NHPA created the National Register of Historic Places, our nation’s catalog of important cultural resources. The NHPA also stipulates that any federal undertaking which may adversely affect National Register eligible resources be mitigated. For the Federal Emergency Management Agency (FEMA), Katrina created the largest compliance project ever under Section 106 of the NHPA.
Although causing a great deal of damage, Katrina also …
Keynote Address: Climate Change: From Global To New York Scale, Christopher D. Thorncroft
Keynote Address: Climate Change: From Global To New York Scale, Christopher D. Thorncroft
CHAR
This talk is concerned with the science and impacts of climate change from global to New York scales. It will provide an assessment of how the climate has changed over the past Century based on a purely observational perspective. The scientific basis for anthroprogenic climate change will be explained and discussed including a description of the “greenhouse effect” and why it is important for life on this planet. We will briefly discuss global and local consequences of a warmer climate and what we need to be prepared for going forward in the coming decades.
Wrangle Your Data Like A Pro With The Data Processing Power Of Python, Geoffrey P. Timms, Jeremy M. Brown
Wrangle Your Data Like A Pro With The Data Processing Power Of Python, Geoffrey P. Timms, Jeremy M. Brown
Charleston Library Conference
Management, delivery, and marketing of library resources and collections necessitate interaction with a plethora of data from many sources and in many forms. Accessing and transforming data into meaningful information or different formats used in library automation can be time consuming, but a working knowledge of a programming language can improve efficiency in many facets of librarianship. From processing lists to creating extensible markup language (XML), from editing machine-readable cataloging (MARC) records before upload to automating statistical reports, the Python programming language and third-party application programming interfaces (APIs) can be used to accomplish both behind-the-scenes tasks and end-user facing projects. …
Cloud‐Based Text Analytics Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie
Cloud‐Based Text Analytics Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie
Commonwealth Computational Summit
No abstract provided.
Cloud-Based Text Analytics: Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie
Cloud-Based Text Analytics: Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie
Commonwealth Computational Summit
Does management language cohesion in earnings conference calls matter to the capital market? As a part of the research on the above question, and taking advantage of the modern IT technologies, this project:
- harvested 115,882 earnings conference call transcripts from SeekingAlpha.com
- parsed and structured 89,988 transcripts using regular expressions in Stata
- analyzed 179,976 text files using Amazon Elastic Compute Cloud (Amazon EC2), which
- saved almost 2 years (675 days) of the project time
Modeling Voting Dynamics In A Two-Party System: Social Interaction And Media Consumption, Caleb Ignace
Modeling Voting Dynamics In A Two-Party System: Social Interaction And Media Consumption, Caleb Ignace
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
Acoustic Signatures Of Habitat Types In The Miombo Woodlands Of Western Tanzania, Sheryl Vanessa Amorocho, Dante Francomano, Kristen M. Bellisario, Ben Gottesman, Bryan C. Pijanowski
Acoustic Signatures Of Habitat Types In The Miombo Woodlands Of Western Tanzania, Sheryl Vanessa Amorocho, Dante Francomano, Kristen M. Bellisario, Ben Gottesman, Bryan C. Pijanowski
The Summer Undergraduate Research Fellowship (SURF) Symposium
The Miombo Woodlands of Tanzania comprise several habitat types that are home to a great number of flora and fauna. Understanding their responses to increasing human disturbance is important for conservation, especially in places where people depend so directly on their local ecosystem services to survive. Soundscapes are a powerful approach to study complex biomes undergoing change. The sounds emitted by soniferous fauna characterize the acoustic profile of the landscapes they inhabit such that habitats with the highest acoustic abundance are considered as the most diverse and possibly more ecologically resilient. However, acoustic variability within similar habitat types may pose …
Shape Features Underlying The Perception Of Liquids, Jan Jaap R. Van Assen, Pascal Barla, Roland W. Fleming
Shape Features Underlying The Perception Of Liquids, Jan Jaap R. Van Assen, Pascal Barla, Roland W. Fleming
MODVIS Workshop
No abstract provided.
Dynamic Modeling Of Problem Drinkers Undergoing Behavioral Treatment, Rebecca A. Everett
Dynamic Modeling Of Problem Drinkers Undergoing Behavioral Treatment, Rebecca A. Everett
Biology and Medicine Through Mathematics Conference
No abstract provided.
Large-Scale Discovery Of Visual Features For Object Recognition, Drew Linsley, Sven Eberhardt, Dan Shiebler, Thomas Serre
Large-Scale Discovery Of Visual Features For Object Recognition, Drew Linsley, Sven Eberhardt, Dan Shiebler, Thomas Serre
MODVIS Workshop
A central goal in vision science is to identify features that are important for object and scene recognition. Reverse correlation methods have been used to uncover features important for recognizing faces and other stimuli with low intra-class variability. However, these methods are less successful when applied to natural scenes with variability in their appearance.
To rectify this, we developed Clicktionary, a web-based game for identifying features for recognizing real-world objects. Pairs of participants play together in different roles to identify objects: A “teacher” reveals image regions diagnostic of the object’s category while a “student” tries to recognize the object. Aggregating …
Case Study: A New Method For Investigating Crimes Against Children, Hallstein Asheim Hansen, Stig Andersen, Stefan Axelsson, Svein Hopland
Case Study: A New Method For Investigating Crimes Against Children, Hallstein Asheim Hansen, Stig Andersen, Stefan Axelsson, Svein Hopland
Annual ADFSL Conference on Digital Forensics, Security and Law
Investigations of crimes against children are often complex, both in terms of the varied and large amount of digital technology encountered and the offensive nature of the crimes. Such cases are numerous, large, and prioritised, requiring digital forensics competence. Earlier digital forensics was considered and treated as a typical forensic science like fingerprint analysis, performed in a laboratory isolated from the investigative team. This decoupled way of working has proved to be both inefficient and error prone.
At the Digital Forensic Unit of Oslo Police District we have developed a new way of working that addresses many of the problems …
Exploring Digital Evidence With Graph Theory, Imani Palmer, Boris Gelfand, Roy Campbell
Exploring Digital Evidence With Graph Theory, Imani Palmer, Boris Gelfand, Roy Campbell
Annual ADFSL Conference on Digital Forensics, Security and Law
The analysis phase of the digital forensic process is the most complex. The analysis phase remains very subjective to the views of the forensic practitioner. There are many tools dedicated to assisting the investigator during the analysis process. However, they do not address the challenges. Digital forensics is in need of a consistent approach to procure the most judicious conclusions from the digital evidence. The objective of this paper is to discuss the ability of graph theory, a study of related mathematical structures, to aid in the analysis phase of the digital forensic process. We develop a graph-based representation of …
Digital Forensics Tool Selection With Multi-Armed Bandit Problem, Umit Karabiyik, Tugba Karabiyik
Digital Forensics Tool Selection With Multi-Armed Bandit Problem, Umit Karabiyik, Tugba Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital forensics investigation is a long and tedious process for an investigator in general. There are many tools that investigators must consider, both proprietary and open source. Forensics investigators must choose the best tool available on the market for their cases to make sure they do not overlook any evidence resides in suspect device within a reasonable time frame. This is however hard decision to make, since learning and testing all available tools make their job only harder. In this project, we define the digital forensics tool selection for a specific investigative task as a multi-armed bandit problem assuming that …
Downstream Competence Challenges And Legal/Ethical Risks In Digital Forensics, Michael M. Losavio, Antonio Losavio
Downstream Competence Challenges And Legal/Ethical Risks In Digital Forensics, Michael M. Losavio, Antonio Losavio
Annual ADFSL Conference on Digital Forensics, Security and Law
Forensic practice is an inherently human-mediated system, from processing and collection of evidence to presentation and judgment. This requires attention to human factors and risks which can lead to incorrect judgments and unjust punishments.
For digital forensics, such challenges are magnified by the relative newness of the discipline and the use of electronic evidence in forensic proceedings. Traditional legal protections, rules of procedure and ethics rules mitigate these challenges. Application of those traditions better ensures forensic findings are reliable. This has significant consequences where findings may impact a person's liberty or property, a person's life or even the political direction …
Detecting Deception In Asynchronous Text, Fletcher Glancy
Detecting Deception In Asynchronous Text, Fletcher Glancy
Annual ADFSL Conference on Digital Forensics, Security and Law
Glancy and Yadav (2010) developed a computational fraud detection model (CFDM) that successfully detected financial reporting fraud in the text of the management’s discussion and analysis (MDA) portion of annual filings with the United States Securities and Exchange Commission (SEC). This work extends the use of the CFDM to additional genres, demonstrates the generalizability of the CFDM and the use of text mining for quantitatively detecting deception in asynchronous text. It also demonstrates that writers committing fraud use words differently from truth tellers.
Understanding Deleted File Decay On Removable Media Using Differential Analysis, James H. Jones Jr, Anurag Srivastava, Josh Mosier, Connor Anderson, Seth Buenafe
Understanding Deleted File Decay On Removable Media Using Differential Analysis, James H. Jones Jr, Anurag Srivastava, Josh Mosier, Connor Anderson, Seth Buenafe
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital content created by picture recording devices is often stored internally on the source device, on either embedded or removable media. Such storage media is typically limited in capacity and meant primarily for interim storage of the most recent image files, and these devices are frequently configured to delete older files as necessary to make room for new files. When investigations involve such devices and media, it is sometimes these older deleted files that would be of interest. It is an established fact that deleted file content may persist in part or in its entirety after deletion, and identifying the …
Development Of A Professional Code Of Ethics In Digital Forensics, Kathryn C. Seigfried-Spellar, Marcus Rogers, Danielle M. Crimmins 2184089
Development Of A Professional Code Of Ethics In Digital Forensics, Kathryn C. Seigfried-Spellar, Marcus Rogers, Danielle M. Crimmins 2184089
Annual ADFSL Conference on Digital Forensics, Security and Law
Academics, government officials, and practitioners suggest the field of digital forensics is in need of a professional code of ethics. In response to this need, the authors developed and proposed a professional code of ethics in digital forensics. The current paper will discuss the process of developing the professional code of ethics, which included four sets of revisions based on feedback and suggestions provided by members of the digital forensic community. The final version of the Professional Code of Ethics in Digital Forensics includes eight statements, and we hope this is a step toward unifying the field of digital forensics …
Defining A Cyber Jurisprudence, Peter R. Stephenson Phd
Defining A Cyber Jurisprudence, Peter R. Stephenson Phd
Annual ADFSL Conference on Digital Forensics, Security and Law
Jurisprudence is the science and philosophy or theory of the law. Cyber law is a very new concept and has had, compared with other, older, branches of the law, little structured study. However, we have entered the cyber age and the law - on all fronts - is struggling to keep pace with technological advances in cyberspace. This research explores a possible theory and philosophy of cyber law, and, indeed, whether it is feasible to develop and interpret a body of law that addresses current and emerging challenges in cyber space.
While there is an expanding discussion of the nature …
Fast Filtering Of Known Png Files Using Early File Features, Sean Mckeown, Gordon Russell, Petra Leimich
Fast Filtering Of Known Png Files Using Early File Features, Sean Mckeown, Gordon Russell, Petra Leimich
Annual ADFSL Conference on Digital Forensics, Security and Law
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given media, comparing individual digests with a database of known contraband. However, the large capacities of modern storage media, and increased time pressure on forensics examiners, necessitates that more efficient processing mechanisms be developed. This work describes a technique for creating signatures for images of the PNG format which only requires a tiny fraction of the file to effectively distinguish between a large number of images. Highly …
Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou
Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou
Annual ADFSL Conference on Digital Forensics, Security and Law
In recent times, DNS tunneling techniques have been used for malicious purposes, however network security mechanisms struggle to detect them. Network forensic analysis has been proven effective, but is slow and effort intensive as Network Forensics Analysis Tools struggle to deal with undocumented or new network tunneling techniques. In this paper, we present a machine learning approach, based on feature subsets of network traffic evidence, to aid forensic analysis through automating the inference of protocols carried within DNS tunneling techniques. We explore four network protocols, namely, HTTP, HTTPS, FTP, and POP3. Three features are extracted from the DNS tunneled traffic: …
Detect Kernel-Mode Rootkits Via Real Time Logging & Controlling Memory Access, Satoshi Tanda, Irvin Homem, Igor Korkin
Detect Kernel-Mode Rootkits Via Real Time Logging & Controlling Memory Access, Satoshi Tanda, Irvin Homem, Igor Korkin
Annual ADFSL Conference on Digital Forensics, Security and Law
Modern malware and spyware platforms attack existing antivirus solutions and even Microsoft PatchGuard. To protect users and business systems new technologies developed by Intel and AMD CPUs may be applied. To deal with the new malware we propose monitoring and controlling access to the memory in real time using Intel VT-x with EPT. We have checked this concept by developing MemoryMonRWX, which is a bare-metal hypervisor. MemoryMonRWX is able to track and trap all types of memory access: read, write, and execute. MemoryMonRWX also has the following competitive advantages: fine-grained analysis, support of multi-core CPUs and 64-bit Windows 10. MemoryMonRWX …
An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora
An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper presents a case study that occurred while observing peer-to-peer network communications on a botnet monitoring station and shares how tools were developed to discover what ultimately was identified as Mirai and many related IoT DDOS Botnets. The paper explains how researchers developed a customized protocol dissector in Wireshark using the Lua coding language, and how this enabled them to quickly identify new DDOS variants over a five month period of study.
Kelihos Botnet: A Never-Ending Saga, Arsh Arora, Max Gannon, Gary Warner
Kelihos Botnet: A Never-Ending Saga, Arsh Arora, Max Gannon, Gary Warner
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper investigates the recent behavior of the Kelihos botnet, a spam-sending botnet that accounts for many millions of emails sent each day. The paper demonstrates how a team of students are able to perform a longitudinal malware study, making significant observations and contributions to the understanding of a major botnet using tools and techniques taught in the classroom. From this perspective the paper has two objectives: encouragement and observation. First, by providing insight into the methodology and tools used by student researchers to document and understand a botnet, the paper strives to embolden other academic programs to follow a …
An Operational Drought Prediction Framework With Application Of Vine Copula Functions, Mahkameh Zarekarizi
An Operational Drought Prediction Framework With Application Of Vine Copula Functions, Mahkameh Zarekarizi
Student Research Symposium
Early and accurate drought predictions can benefit water resources and emergency managers by enhancing drought preparedness. Soil moisture memory is shown to contain helpful information for prediction of future values. This study uses the soil moisture memory to predict their future states via multivariate statistical modeling. We present a drought forecasting framework which issues monthly and seasonal drought forecasts. This framework estimates droughts with different lead times and updates the forecasts when more data become available. Forecasts are generated by conditioning future soil moisture values on antecedent drought status. The statistical model is initialized by soil moisture simulations retrieved from …
The Importance Of Urban Habitat Connectivity And Influence On Native Avian Species And Community Science, Kristen S. Gulick
The Importance Of Urban Habitat Connectivity And Influence On Native Avian Species And Community Science, Kristen S. Gulick
Student Research Symposium
In what ways do small-scale urban backyards contribute to local bird abundance and biodiversity? In what ways might these yards serve as an ‘extension’ of neighboring native forest areas? This project investigates the contribution that a group of backyards, certified through the Backyard Habitat Certification Program, have in the suburb of Hillsdale, Oregon, which is adjacent to the natural area of Keller Woodland. Backyard owners functioning as citizen or community scientists assisted with conducting residential bird point-counts once a week in each backyard and the natural area. Counts were done for a total of 8 weeks during nesting season to …
Recognition, Internalization, Growth: Intuitive Design For Archival Representation, Jaime L. Ganzel
Recognition, Internalization, Growth: Intuitive Design For Archival Representation, Jaime L. Ganzel
Graduate Student Symposium
Although there is a pressing need for archival description and access systems to be more intuitive and user-friendly, the uniqueness of archival records presents significant barriers to establishing simplistic and standardized conventions for the representation of archival materials. Indecipherable finding aids and access tools prevent new and inexperienced researchers from accessing the unique information and documentation held in archives. This article aims to help open the archival record to new and non-traditional archival users, support individual development of archival literacy skills, and cultivate a greater level of archival awareness in our society by developing a usable model for archivists to …
Investigating Trust And Trust Recovery In Human-Robot Interactions, Abigail L. Thomson
Investigating Trust And Trust Recovery In Human-Robot Interactions, Abigail L. Thomson
Celebration of Learning
As artificial intelligence and robotics continue to advance and be used in increasingly different functions and situations, it is important to look at how these new technologies will be used. An important factor in how a new resource will be used is how much it is trusted. This experiment was conducted to examine people’s trust in a robotic assistant when completing a task, how mistakes affect this trust, and if the levels of trust exhibited with a robot assistant were significantly different than if the assistant were human. The task was to watch a computer simulation of the three-cup monte …
Mapping Community Space And Place In Mto Wa Mbu, Tanzania Through Surveys And Gis, Jessica Craigg
Mapping Community Space And Place In Mto Wa Mbu, Tanzania Through Surveys And Gis, Jessica Craigg
Georgia College Student Research Events
Cities throughout the African continent have been developing at an unprecedented pace, many of them due to the influence of the tourism industry. This is particularly true in Tanzania, a country famous for its national parks and their draw to tourists who help provide money for development. However, the only way to get the whole story on how to spend this money is through the experiences and needs of the people themselves. This study focuses on a small town in northeastern Tanzania, Mto wa Mbu, situated near Lake Manyara National Park, and its people’s perceptions of the park and community. …
2017 Symposium Overview, Cedarville University
2017 Symposium Overview, Cedarville University
The Research and Scholarship Symposium (2013-2019)
Click the "Download" button in the top right corner to view the abstract booklet.