Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Conference

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 250

Full-Text Articles in Public Affairs, Public Policy and Public Administration

Hgs-3 The Influence Of A Tandem Cycling Program In The Community On Physical And Functional Health, Therapeutic Bonds, And Quality Of Life For Individuals And Care Partners Coping With Parkinson’S Disease, Leila Djerdjour, Jennifer L. Trilk Apr 2024

Hgs-3 The Influence Of A Tandem Cycling Program In The Community On Physical And Functional Health, Therapeutic Bonds, And Quality Of Life For Individuals And Care Partners Coping With Parkinson’S Disease, Leila Djerdjour, Jennifer L. Trilk

SC Upstate Research Symposium

Purpose Statement: Several studies have shown that aerobic exercise can have a positive impact on alleviating symptoms experienced by individuals with Parkinson's disease (PD). Despite this evidence, the potential benefits of exercise for both PD patients and their care partners (PD dyad) remain unexplored. This research project investigates the effectiveness, therapeutic collaborations, and physical outcomes of a virtual reality (VR) tandem cycling program specifically designed for PD dyads.

Methods: Following approval from the Prisma Health Institutional Review Board, individuals with PD were identified and screened by clinical neurologists. The pre-testing measures for PD dyads (N=9) included emotional and cognitive status …


Mathematical Modeling Of The Impact Of Lobbying On Climate Policy, Andrew Jacoby, Claire Hannah, James Hutchinson, Jasmine Narehood, Aditi Ghosh, Padmanabhan Seshaiyer Nov 2023

Mathematical Modeling Of The Impact Of Lobbying On Climate Policy, Andrew Jacoby, Claire Hannah, James Hutchinson, Jasmine Narehood, Aditi Ghosh, Padmanabhan Seshaiyer

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Digital Transformation In Government: A Bibliometric Scoping Of African Aspirations And The Realities, Hossana Twinomurinzi, Sibukele Gumbo Sep 2023

Digital Transformation In Government: A Bibliometric Scoping Of African Aspirations And The Realities, Hossana Twinomurinzi, Sibukele Gumbo

African Conference on Information Systems and Technology

African countries have persistently ranked poorly in the United Nations E-Government Development index (EGDI). This study therefore sought to make sense of the nature and form of digital transformation (DX) in African governments. It used a bibliometric analysis and a critical realist lens to explore some of the underlying structures and generative mechanisms that influence DX. The key findings from 606 scholarly publications over the three decades of DX research reveals marked sharp contrasts, with South Africa dominating the research on DX, an underrepresentation of DX research from most African nations, and some influence from non-African nations, particularly the United …


Drug Ideologies Of The United States, Macy Montgomery May 2023

Drug Ideologies Of The United States, Macy Montgomery

Helm's School of Government Conference - American Revival: Citizenship & Virtue

The United States has been increasingly creating lenient drug policies. Seventeen states and Washington, the District of Columbia, legalized marijuana, and Oregon decriminalized certain drugs, including methamphetamine, heroin, and cocaine. The medical community has proven that drugs, including marijuana, have myriad adverse health side effects. This leads to two questions: Why does the United States government continue to create lenient drug policies, and what reasons do citizens give for legalizing drugs when the medical community has proven them harmful? The paper hypothesizes that the disadvantages of drug legalization outweigh its benefits because of the numerous harms it causes, such as …


U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa Apr 2023

U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa

Modeling, Simulation and Visualization Student Capstone Conference

Satellite image analysis of natural disasters is critical for effective emergency response, relief planning, and disaster prevention. Semantic segmentation is believed to be on of the best techniques to capture pixelwise information in computer vision. In this work we will be using a U-Net architecture to do a three class semantic segmentation for the Xview2 dataset to capture the level of damage caused by different natural disaster which is beyond the visual scope of human eyes.


A Qualitative Look Into Repair Practices, Jumana Labib Aug 2022

A Qualitative Look Into Repair Practices, Jumana Labib

Undergraduate Student Research Internships Conference

This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …


Chattanooga Crime Over Time: An Analysis Of Police Incident Open Data, Logan Bateman Apr 2022

Chattanooga Crime Over Time: An Analysis Of Police Incident Open Data, Logan Bateman

Campus Research Day

The police and citizens of Chattanooga may want to know where the most crime occurs, what time of day is crime or police incidents most likely to occur over time. This information can help them understand the crime hotspots in the area. This research work presents a dashboard built upon open data in attempt to bring understanding and insights to the police and citizens about police incidents from the city of Chattanooga over the past five years.


Oral, Cardiovascular And Respiratory Effects Of E-Cigarettes: Synthesis Of Literature, Nareh Eshgian Mar 2022

Oral, Cardiovascular And Respiratory Effects Of E-Cigarettes: Synthesis Of Literature, Nareh Eshgian

Annual Research Symposium

No abstract provided.


Streamlining Project Development Through Planning & Environmental Linkages, Karen Hadley, Brett Lackey Mar 2022

Streamlining Project Development Through Planning & Environmental Linkages, Karen Hadley, Brett Lackey

Purdue Road School

As transportation agencies continue to explore ways to be more efficient in the project development process, they are embracing integrated methodologies like planning and environmental linkages. This tool is practical, yet highly effective and inclusive, and teams across the country are experiencing its value. This presentation will highlight a variety of use cases, discuss lessons learned and best practices, and specifically address how planning and environmental linkages can be applied in Indiana and the Midwest.


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Exploring Optimal Lockdown Policies During The Covid-19 Pandemic, Cameron Bundy Oct 2021

Exploring Optimal Lockdown Policies During The Covid-19 Pandemic, Cameron Bundy

Symposium Of University Research and Creative Expression (SOURCE)

COVID-19 has impacted public and economic health worldwide. To bolster the economy and maintain human life, economic and epidemiological research is vital. Nations have implemented lockdowns intent on slowing the spread of the virus. This research examines how lockdown parameter adjustments can help control a nations fatalities. The study incorporated an SIRD disease model that is simulated over a 200 day period. The goal of the research is to take the SIRD model and use it to create a minimization function that analyzes dynamics that best produce minimal loss of GDP as well as low loss of life in a …


Anti-Vaxxers: Parents Fighting Science, Katie West Aug 2021

Anti-Vaxxers: Parents Fighting Science, Katie West

Symposium of Student Scholars

Immunizing children helps protect the health of our community, especially those people who cannot be immunized. Yet, since 1996 after a study was released that linked autism to vaccinations, there has been a trend of parents refusing to vaccinate their children. What are the demographics of the parents who believe their children are better off without vaccines? By knowing where these parents live and what decisions they make for their children’s education, counties and medical professionals can provide education and address their concerns.

My research involves data on 116,141 kindergarten classes from 2000-2015 in California. The two vaccine exemption options …


On The Front Lines Of Fire: How Do We Save Their Lives?, Cathrine Jatta Aug 2021

On The Front Lines Of Fire: How Do We Save Their Lives?, Cathrine Jatta

Symposium of Student Scholars

The National Institute for Occupational Safety and Health (NIOSH) reports that the United States depends on about 1.1 million firefighters to protect its citizens and property from fire. NIOSH adds that approximately 336,000 are career firefighters; 812,000 are volunteers; and 80 to 100 die in the line of duty each year. NIOSH investigates each fatality individually for the cause and prevention. In contrast, my research will look at a complete dataset of 2005 firefighter fatalities and see if any of the following variables may predict firefighter death: age, cause of death, property type, type of duty (e.g. on-duty, training), and …


The Right To Repair: (Re)Building A Better Future, Jumana Labib Aug 2021

The Right To Repair: (Re)Building A Better Future, Jumana Labib

Undergraduate Student Research Internships Conference

The goal of this research project was to take a multi-faceted, interdisciplinary approach to research and examine the Right to Repair movement’s progress, current repair practices, impediments, and imperatives, and the various large-scale implications (environmental, economic, social, etc.) stemming from diminished consumer freedom as a result of increased corporate greed and lack of governmental regulations with regards to repair and the environment. This poster exhibits the highlights of my general research project on the Right to Repair movement over the course of this four month internship, and aims to disseminate information about the movement to the wider public in an …


Mapping Renewal: How An Unexpected Interdisciplinary Collaboration Transformed A Digital Humanities Project, Elise Tanner, Geoffrey Joseph Apr 2021

Mapping Renewal: How An Unexpected Interdisciplinary Collaboration Transformed A Digital Humanities Project, Elise Tanner, Geoffrey Joseph

Digital Initiatives Symposium

Funded by a National Endowment for Humanities (NEH) Humanities Collections and Reference Resources Foundations Grant, the UA Little Rock Center for Arkansas History and Culture’s “Mapping Renewal” pilot project focused on creating access to and providing spatial context to archival materials related to racial segregation and urban renewal in the city of Little Rock, Arkansas, from 1954-1989. An unplanned interdisciplinary collaboration with the UA Little Rock Arkansas Economic Development Institute (AEDI) has proven to be an invaluable partnership. One team member from each department will demonstrate the Mapping Renewal website and discuss how the collaborative process has changed and shaped …


Mind The Gap: Understanding Stakeholder Reactions To Different Types Of Data Security, Audra Diers-Lawson, Amelia Symons Jan 2020

Mind The Gap: Understanding Stakeholder Reactions To Different Types Of Data Security, Audra Diers-Lawson, Amelia Symons

International Crisis and Risk Communication Conference

Data security breaches are an increasingly common problem for organizations, yet there are critical gaps in our understanding of how different stakeholders understand and evaluate organizations that have experienced these kinds of security breaches. While organizations have developed relatively standard approaches to responding to security breaches that: (1) acknowledge the situation; (2) highlight how much they value their stakeholders’ privacy and private information; and (3) focus on correcting and preventing the problem in the future, the effectiveness of this response strategy and factors influencing it have not been adequately explored. This experiment focuses on a 2 (type of organization) x …


Panel 9. Paper 9.3: Connecting Social And Physical Boundaries Of The Commons : Study Of Kuhl Irrigation Systems Of Kangra, Amit Tandon Oct 2019

Panel 9. Paper 9.3: Connecting Social And Physical Boundaries Of The Commons : Study Of Kuhl Irrigation Systems Of Kangra, Amit Tandon

ISCCL Scientific Symposia and Annual General Meetings // Symposiums scientifiques et assemblées générales annuelles de l'ISCCL // Simposios científicos yy las Asambleas Generales Anuales

Water has been a lifeline of Indian agrarian society. The thriving agrarian economy requires water for irrigation and the need for resources to the evolution of indigenous technology through generations of communities. Kuhl irrigation system of Kangra is a community managed traditional irrigation systems found in western Himalayan. These are a centuries-old network of interconnected drainage channels that drain water from nearby khads (rivers) into the fields. The irrigation systems have codified customary laws, systems of collective action for maintenance and preservation and various traditional livelihoods.

Kuhls of Kangra is a unique case where the community is owned and managed …


Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik May 2019

Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …


Consumption Profiles Of Illicit And Neuropsychiatric Drugs In Urban And Rural Communities In Kentucky Using Sewage Epidemiology, Tara Croft, Katelyn Foppe, Rhiannon Huffines, Bikram Subedi Nov 2018

Consumption Profiles Of Illicit And Neuropsychiatric Drugs In Urban And Rural Communities In Kentucky Using Sewage Epidemiology, Tara Croft, Katelyn Foppe, Rhiannon Huffines, Bikram Subedi

Posters-at-the-Capitol

The drug overdose deaths in the USA increased by ~20% from 2015 to 2016 to the total >63,600 drug overdose deaths in 2016. Kentucky is among the highest rate of drug overdose death states in the USA. The current estimates of the prevalence of substance abuse are based on the self-reported surveys, overdose/toxicological reports, and drug-related crime statistics. Survey-based conventional approaches are not only cost and time-intensive but also underestimate the actual consumption of drugs. As “wastewater never lie,” the drug residues in raw wastewater collected from the centralized wastewater treatment plants were utilized to determine the consumption rate of …


Climate Futures, Design And The Just Transition Schedule, Liberal Arts Division Nov 2018

Climate Futures, Design And The Just Transition Schedule, Liberal Arts Division

Climate Futures Symposium

Schedule of events distributed at the Symposium.


Contents, Adfsl May 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.