Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Self-Sovereign Digital Identities, Maryam M. Ahmed, Bijayata Shrestha, Nick Ivanov Apr 2024

Self-Sovereign Digital Identities, Maryam M. Ahmed, Bijayata Shrestha, Nick Ivanov

STEM Student Research Symposium Posters

In today's digital landscape, the dominance of internet giants over our digital identities raises concerns regarding user control and privacy. These companies aggregate vast amounts of data from diverse sources, ranging from online interactions to personal information shared on their platforms. This centralized control impedes individual autonomy and privacy. To address these challenges, we propose Self-Sovereign Digital Identities (SSDIs) as a solution. SSDIs empower individuals with control over their online identity information, encompassing ownership, security, privacy, and portability. By decentralizing identity management, SSDIs offer users autonomy and enhance privacy protection. Moreover, we introduce Sans-Chain Smart Contracts, a novel approach to …


Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner Jan 2020

Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner

Capstone Showcase

The website, arcadia-transfer-equiv.com, was drafted and created for Bill Enick, Registrar at Arcadia University. This was an expansion of a preliminary version of the website created by Caleigh Diefenthaler, Christian Charney, and Dylan Power. The site includes two transfer equivalency tools which can be used to search for course equivalencies by academic institution or by a given Arcadia course. The tools, which pull from a database maintained by the Registrar, will display courses that have transferred to the University successfully. The website also hosts two interactive forms. These forms allow Arcadia students to request approval for courses that have or …


Connection: An Autism-Focused Dating App, Cyrena Johnson May 2018

Connection: An Autism-Focused Dating App, Cyrena Johnson

Scholars Week

30% of US internet users 18-29 use dating apps to find partners. Meanwhile, only 9% of adults with autism are married—and there are no popular dating apps designed for ASDs. We propose the app Connection, a dating app designed for the autistic community. Using queries and informal analysis, we created possible features and prototype displays for Connection to show its future application.


Pop-Up Java: An Augmented Reality Mobile Game To Teach Java, Richard Myers Jan 2017

Pop-Up Java: An Augmented Reality Mobile Game To Teach Java, Richard Myers

Georgia Undergraduate Research Conference

As computers become more and more ubiquitous, it becomes increasingly important and prevalent to teach coding. Coding builds important life skills such as organization, higher order thinking, self-esteem, socialization and teamwork, among many others. However, learning the skills necessary to design and create an efficient program from scratch takes a lot of practice that can often be confusing and frustrating to newcomers.

There are a large number of programming languages in the world, each with their own merits. The TIOBE Programming Community Index calculates the popularity of programming languages by tallying search queries on major search engines, and shows that …


Bacibeans: A Netbeans Plugin For Concurrent Programs, Ashley Broadwell Mar 2014

Bacibeans: A Netbeans Plugin For Concurrent Programs, Ashley Broadwell

Seaver College Research And Scholarly Achievement Symposium

C-- is a programming language developed by M. Ben-Ari to teach principles of concurrent and distributed programming. It is a small subset of the C language but with the added features of concurrency, semaphores, and monitors. BACI is an acronym for Ben-Ari Concurrency Interpreter. JavaBACI is an open-source command line concurrency simulator used by students to compile and run C-- programs. NetBeans is an integrated development environment (IDE) that many students use in our courses to develop Java and C++ programs. This talk describes the development of a NetBeans plug-in we call BACIBeans that integrates JavaBACI into NetBeans, combining the …


Creating A Faculty Learning Community To Support Scholarship Of Teaching And Learning Among Stem University Faculty, Cher C. Hendricks, Myrna Gantner Mar 2013

Creating A Faculty Learning Community To Support Scholarship Of Teaching And Learning Among Stem University Faculty, Cher C. Hendricks, Myrna Gantner

Interdisciplinary STEM Teaching & Learning Conference (2012-2019)

In this session, we describe the creation of a Faculty Learning Community for university faculty in science, mathematics, and computer science. These faculty, recipients of mini-grants funded by the USG STEM Initiative, are studying ways to improve their instruction and increase student learning in STEM courses. Through the FLC, they are able to collaborate and support each others’ work.


Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel Aug 2009

Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel

International Conference on Information and Communication Technologies

Authentication, access control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitable security measures must be taken. However, this security is itself an overhead which must be accounted for. A trade-off must exist between performance and security. This trade-off must be carefully managed so as not to deteriorate the systems being secured. This calls for the true …


Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik Aug 2009

Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik

International Conference on Information and Communication Technologies

In this paper, we present and compare two-stage type-2 fuzzy logic advisor (FLA) for subjective decision making in the domain of students' performance evaluation. We test our proposed model for evaluating students' performance in our computer science and engineering department at HBCC/KFUPM in two domains namely cooperating training and capstone/senior project assessment where we find these FLAs very useful and promising. In our proposed model, the assessment criteria for different components of cooperative training and senior project are transformed into linguistic labels and evaluation information is extracted into the form of IF-THEN rules from the experts. These rules are modeled …