Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Brian Andrews (1)
- Brian Ferguson (1)
- COVID-19 (1)
- Categorical Imperatives (1)
- Censorship (1)
-
- Claire Rosas (1)
- Cloud gaming (1)
- Command & control (1)
- Computer-generated animation (1)
- Consumption (1)
- Crypto-mining (1)
- DIBS (1)
- DePaul School of Cinematic Arts (1)
- DePaul School of Computing (1)
- DePaul School of Design (1)
- Dean David Miller (1)
- Elimination of Forever Chemicals (1)
- Expert Talk Series (1)
- Food Scarcity (1)
- Idea Realization Lab (1)
- Impediments (1)
- Information Security and Research Education (1)
- Interviews (1)
- Joint All-Domain Command and Control (JADC2) (1)
- Mobile apps (1)
- Multi-Domain Operations (MDO) (1)
- NSA (1)
- National Science Foundation (1)
- Nutritional Optimization (1)
- Ownership (1)
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Information Security
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Visual Art In The Age Of Ai, Roshnica Gurung
Visual Art In The Age Of Ai, Roshnica Gurung
Cybersecurity Undergraduate Research Showcase
Artists and researchers have been deeply interested in using AI programs that generate art for quite some time now. As a result, there have been many advancements in making AI more accessible and easier to use for the public. This is because AI is not just for business anymore. Nowadays an individual without a college degree with even the slightest interest in art can go on a website like Stable Diffusion and create an artistic image using a text prompt in a quick couple minutes. The only limit is your imagination- and your internet’s stability. This accessibility was a huge …
A Qualitative Look Into Repair Practices, Jumana Labib
A Qualitative Look Into Repair Practices, Jumana Labib
Undergraduate Student Research Internships Conference
This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …
Ready Raider One: Exploring The Misuse Of Cloud Gaming Services, Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang
Ready Raider One: Exploring The Misuse Of Cloud Gaming Services, Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang
Computer Science Faculty Publications
Cloud gaming has become an emerging computing paradigm in recent years, allowing computer games to offload complex graphics and logic computation to the cloud. To deliver a smooth and high-quality gaming experience, cloud gaming services have invested abundant computing resources in the cloud, including adequate CPUs, top-tier GPUs, and high-bandwidth Internet connections. Unfortunately, the abundant computing resources offered by cloud gaming are vulnerable to misuse and exploitation for malicious purposes. In this paper, we present an in-depth study on security vulnerabilities in cloud gaming services. Specifically, we reveal that adversaries can purposely inject malicious programs/URLs into the cloud gaming services …
Spring 2020
In The Loop
Letter from the Dean: Advancing Past Adversity; Look Who's Talking: Expert Talk Series; Seen and Heard; Keeping It Real: Client Web Projects for Students; OMG, It's DIBS, LOL!; X-ray Vision: Brian Andrews bones up on anthropomorphic entities and virtual realty in an audacious Project Bluelight film; Nothing But Net: Shannon Linares scores a win for female and first-generation college students in network engineering and cybersecurity careers; Mix Master: Claire Rosas blends disciplines and social synergy in her designs, from egg-ceptional typography to adaptive ergs
Developing A Serious Game To Explore Joint All Domain Command And Control, Nathaniel W. Flack
Developing A Serious Game To Explore Joint All Domain Command And Control, Nathaniel W. Flack
Theses and Dissertations
Changes in the geopolitical landscape and increasing technological complexity have prompted the U.S. Military to coin Multi-Domain Operations (MDO) and Joint All-Domain Command and Control as terms to describe an over-arching strategy that frames the complexity of warfare across both traditional and emerging warfighting domains. Teaching new and advanced concepts associated with these terms requires both innovation as well as distinct education and training tools in order to realize the cultural change advocated by senior military leaders. BSN, a Collectible Card Game, was developed to teach concepts integral to MDO and initiate discussion on military strategy.