When Is An Owl More Than An Owl? An Interaction Analysis Of A Computer Science Co-Design Conversation On Cultural Relevance,
2023
Stanford University
When Is An Owl More Than An Owl? An Interaction Analysis Of A Computer Science Co-Design Conversation On Cultural Relevance, Stephanie M. Robillard, Victor R. Lee, Jody Clarke-Midura, Jessica F. Shumway
Publications
The learning sciences community is currently exploring new ways to enact productive and equitable co-design research-practice partnerships that are sensitive to all the concerns and needs of stakeholders. The paper contributes to that still-growing literature through an interaction analysis of a co-design discussion involving school district partners that unfolded about cultural relevance and sensitivity in relation to the use of a specific image in an elementary school coding lesson. The episode involved looking moment-by-moment at how district educators recognized and acknowledged that a specific design decision could be harmful for a minoritized population of students enrolled in the district. However, …
Design And Control Of A Tunable-Stiffness Coiled-Spring Actuator,
2023
SEAS, University of Pennsylvania
Design And Control Of A Tunable-Stiffness Coiled-Spring Actuator, Shivangi Misra, Mason Mitchell, Rongqian Chen, Cynthia Sung
Lab Papers (GRASP)
We propose a novel design for a lightweight and compact tunable stiffness actuator capable of stiffness changes up to 20x. The design is based on the concept of a coiled spring, where changes in the number of layers in the spring change the bulk stiffness in a near-linear fashion. We present an elastica nested rings model for the deformation of the proposed actuator and empirically verify that the designed stiffness-changing spring abides by this model. Using the resulting model, we design a physical prototype of the tunable-stiffness coiled-spring actuator and discuss the effect of design choices on the resulting achievable …
Leveraging Aruco Fiducial Marker System For Bridge Displacement Estimation Using Unmanned Aerial Vehicles,
2023
University of Nebraska-Lincoln
Leveraging Aruco Fiducial Marker System For Bridge Displacement Estimation Using Unmanned Aerial Vehicles, Mohamed Aly
Computer Science and Engineering: Theses, Dissertations, and Student Research
The use of unmanned aerial vehicles (UAVs) in construction sites has been widely growing for surveying and inspection purposes. Their mobility and agility have enabled engineers to use UAVs in Structural Health Monitoring (SHM) applications to overcome the limitations of traditional approaches that require labor-intensive installation, extended time, and long-term maintenance. One of the critical applications of SHM is measuring bridge deflections during the bridge operation period. Due to the complex remote sites of bridges, remote sensing techniques, such as camera-equipped drones, can facilitate measuring bridge deflections. This work takes a step to build a pipeline using the state-of-the-art computer …
Source Code Plagiarism Detection Using Jplag & Stack Overflow Data,
2023
Western Kentucky University
Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu
Masters Theses & Specialist Projects
Advancements in computer technology and internet services have led to the availability of vast amounts of information like videos, articles, research papers, and code samples. Free online information will increase the possibility of plagiarism and collusion among students. People can commit plagiarism in both text and code [1], as tools used to detect plagiarism between texts and between codes are distinct. Traditionally plagiarism in code is detected using manual inspection, which is a tedious process and misses to compare code from previous submissions and external sources. To overcome this issue, systems that can automatically detect plagiarism in code were developed …
Pillow Based Sleep Tracking Device Using Raspberry Pi,
2023
California State University, San Bernardino
Pillow Based Sleep Tracking Device Using Raspberry Pi, Venkatachalam Seviappan
Electronic Theses, Projects, and Dissertations
Almost half of all people have sleep interruptions at some point in their lives, making sleep disorders a common issue that affects a sizeable section of the population. Both their physical and emotional well-being may suffer as a result of this.Insomnia, which is a prevalent sleep disorder, is identified by symptoms including insufficient sleep duration and quality, trouble initiating sleep, multiple nighttime awakenings, early morning awakenings, and non-restorative sleep. It is essential to employ sleep monitoring systems to detect sleeping disorders as soon as possible for prompt diagnosis and treatment. To avoid sleep related health issues, there are plenty of …
Ransomware: What Is Ransomware, And How To Prevent It,
2023
Old Dominion University
Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers
Cybersecurity Undergraduate Research
This research paper answers the question, “What is Ransomware, and How to prevent it?”. This paper will discuss what ransomware is, its history about ransomware, how ransomware attacks Windows systems, how to prevent ransomware, how to handle ransomware once it is already on the network, ideas for training professionals to avoid ransomware, and how anti-virus helps defend against ransomware. Many different articles, case studies, and professional blogs will be used to complete the research on this topic
Game Based Learning: Engaging Students And Measuring Their Progress,
2023
Southern Adventist University
Game Based Learning: Engaging Students And Measuring Their Progress, Jonathan Stover, Siegwart Mayr
Campus Research Day
Digital natives are constantly surrounded by technology. Therefore, traditional methods of teaching are becoming obsolete and increasingly creative solutions are required to keep students engaged. Among these solutions is a concept called game based learning. Game based learning is a unique educational experience that incorporates the engagement factors of video games with education. Even though it is still in an early stage of adoption, game based learning has been proven to be a surprisingly effective tool for providing students with a valuable educational experience. Even with this evidence in mind, current game based learning programs still hold the potential to …
Machine Learning Based Software Fault Prediction Models,
2023
Research Scholar CST, MRU, India
Machine Learning Based Software Fault Prediction Models, Gurmeet Kaur, Jyoti Pruthi, Parul Gandhi
Karbala International Journal of Modern Science
The study aims to identify soft-computing-based software fault prediction models that assist in resolving issues related to the quality, reliability, and cost of the software projects. It proposes models for implementation of software fault prediction using decision-tree regression and the K-nearest neighbor technique of machine learning. The proposed models have been designed and implemented in Python using designed metric suites as input, and the predicted-faults as output, for the real-time, wider dataset from the Promise repository. By comparing the prediction and validation results of the proposed models for the same dataset, it has been concluded that the decision-tree regression-based fault …
Research On Construction Method Of Ubiquitous Operating System Open Source Ecosystem Based On Internet Of Everything,
2023
School of Journalism and Information Communication, Huazhong University of Science and Technology, Wuhan 430074, China
Research On Construction Method Of Ubiquitous Operating System Open Source Ecosystem Based On Internet Of Everything, Meng Wang, Weidong Li
Bulletin of Chinese Academy of Sciences (Chinese Version)
Building an independent, healthy, and sustainable open source ecosystem is a key link in the development and application of ubiquitous operating system. Aiming at the Internet of Everything, combined with the new characteristics of ubiquitous operating system, this study summarizes the constituent elements and system model of ubiquitous operating system open source ecosystem, and puts forward the construction method of ubiquitous operating system open source ecosystem. This study provides new ideas to promote the iterative innovation of ubiquitous operating system, integrate the isolated island of ubiquitous operating system open source ecosystem, and promote the preliminary practice and collaborative development of …
From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research,
2023
Department of Philosophy, Peking University, Beijing 100871, China; Peking University Third Hospital, Beijing 100191, China
From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu Zhuang, Cheng Zhou
Bulletin of Chinese Academy of Sciences (Chinese Version)
In recent years, artificial intelligence has become a key direction of medical and health-related research and a hot spot of international competition. In order to investigate the current situation and challenges in hospital-led artificial intelligence researched, this study selects 14 national pilot hospitals to promote the high-quality development of public hospitals as samples, adopts a combination of quantitative and qualitative methods, analyzes the research articles related to artificial intelligence published by the sample hospitals in recent years, and analyzes the technical challenges in the hospital-led artificial intelligence research. The results show that although the number of hospital-led artificial intelligence research …
Lack Of Black Female Diversity Within The Cybersecurity Workforce,
2023
Old Dominion University
Lack Of Black Female Diversity Within The Cybersecurity Workforce, Eric Preston
Cybersecurity Undergraduate Research
Cybersecurity methods, strategies, and programs for protecting computers and electronic devices have become critically important in all aspects of the technological infrastructure. However, while this is a vastly growing field that has a large workforce, it suffers from a lack of representation, specifically for Black/African American females. This study examines the barriers that prevent Black women from having representation within the cybersecurity workforce and solutions that address them. Some barriers noted include a lack of role models and resources, historical discrimination and systemic barriers, and cultural norms. Additionally, implications created by these barriers include less diversity, a lack of career …
Role Of Ai In Threat Detection And Zero-Day Attacks,
2023
Old Dominion University
Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan
Cybersecurity Undergraduate Research
Cybercrime and attack methods have been steadily increasing since the 2019 pandemic. In the years following 2019, the number of victims and attacks per hour rapidly increased as businesses and organizations transitioned to digital environments for business continuity amidst lockdowns. In most scenarios cybercriminals continued to use conventional attack methods and known vulnerabilities that would cause minimal damage to an organization with a robust cyber security posture. However, zero-day exploits have skyrocketed across all industries with an increasingly growing technological landscape encompassing internet of things (IoT), cloud hosting, and more advanced mobile technologies. Reports by Mandiant Threat Intelligence (2022) concluded …
A Comprehensive Study On Crypto-Algorithms,
2023
Siksha O Anusandhan Deemed to be University
A Comprehensive Study On Crypto-Algorithms, Sucheta Panda, Sushree Bibhuprada B. Priyadarshini
International Journal of Smart Sensor and Adhoc Network
In the field of computer network and security, cryptography plays a vital role for secure data transmission as it follows the principle of data confidentiality, integrity, non-repudiation, authentication. By using several cryptographic algorithms, a user can deliver and receive the message in more convenient way. In this paper, we have collaborated on various cryptographic algorithms, several types of cryptographic techniques along with different types of security attacks prevailing in case of cryptography. During the exchanging of any sort of information, the key generation, encryption and decryption processes are examined in more details in the current paper. We have discussed regarding …
Open Resources For Teaching Iot Physical Security,
2023
Kennesaw State University
Open Resources For Teaching Iot Physical Security, Maria Valero
All Things Open
The Internet of Things (IoT) and physical devices are around us all the time. From a simple watch that measures your heartbeat to an advanced voice assistant that turns on your light, IoT devices are everywhere. Teaching security in this type of physical device is a new topic, and finding good quality resources for teaching is also a complicated task. In this project, the instructor took the best online open-source materials and created 15 modules with hands-on activities that teach students about the interaction with IoT devices and their security. The materials include labs with emulators of physical devices like …
Domain Specific Analysis Of Privacy Practices And Concerns In The Mobile Application Market,
2023
Louisiana State University and Agricultural and Mechanical College
Domain Specific Analysis Of Privacy Practices And Concerns In The Mobile Application Market, Fahimeh Ebrahimi Meymand
LSU Doctoral Dissertations
Mobile applications (apps) constantly demand access to sensitive user information in exchange for more personalized services. These-mostly unjustified-data collection tactics have raised major privacy concerns among mobile app users. Existing research on mobile app privacy aims to identify these concerns, expose apps with malicious data collection practices, assess the quality of apps' privacy policies, and propose automated solutions for privacy leak detection and prevention. However, existing solutions are generic, frequently missing the contextual characteristics of different application domains. To address these limitations, in this dissertation, we study privacy in the app store at a domain level. Our objective is to …
Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware,
2023
Old Dominion University
Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng
Cybersecurity Undergraduate Research
Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.
MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …
Assessing The Ability Of Arduino-Based Sensor Systems To Monitor Changes In Water Quality,
2023
Georgia Southern University
Assessing The Ability Of Arduino-Based Sensor Systems To Monitor Changes In Water Quality, Josiah Hacker
Honors College Theses
Access to safe water is vital to public health. While developed countries like the United States are recognized as having reliable and safe water, many small water utilities struggle with supplying consistent water quality. Technicians of these utilities will periodically test water samples from the influent and throughout the distribution system. However, this laborious and costly process does not capture sudden changes in influent water quality due to environmental conditions or pipes breaking in the distribution system. Here I show how an Arduino-based sensor can be used as a real-time, low-cost monitor of water quality parameters. Specifically, I developed a …
The Fashion Visual Search Using Deep Learning Approach,
2023
Department of Computer Engineering, K.J. Somaiya College of Engineering, Ramrao Adik Institute of Technology, Mumbai, Maharashtra, India
The Fashion Visual Search Using Deep Learning Approach, Smita V. Bhoir, Sunita R. Patil
Library Philosophy and Practice (e-journal)
In recent years, the World Wide Web (WWW) has established itself as a popular source of information. Using an effective approach to investigate the vast amount of information available on the internet is essential if we are to make the most of the resources available. Visual data cannot be indexed using text-based indexing algorithms because it is significantly larger and more complex than text. Content-Based Image Retrieval, as a result, has gained widespread attention among the scientific community (CBIR). Input into a CBIR system that is dependent on visible features of the user's input image at a low level is …
Investigating The Use Of Recurrent Neural Networks In Modeling Guitar Distortion Effects,
2023
Belmont University
Investigating The Use Of Recurrent Neural Networks In Modeling Guitar Distortion Effects, Caleb Koch, Scott Hawley, Andrew Fyfe
Belmont University Research Symposium (BURS)
Guitar players have been modifying their guitar tone with audio effects ever since the mid-20th century. Traditionally, these effects have been achieved by passing a guitar signal through a series of electronic circuits which modify the signal to produce the desired audio effect. With advances in computer technology, audio “plugins” have been created to produce audio effects digitally through programming algorithms. More recently, machine learning researchers have been exploring the use of neural networks to replicate and produce audio effects initially created by analog and digital effects units. Recurrent Neural Networks have proven to be exceptional at modeling audio effects …
Accurate Indoor Navigation System Based On Imu/Lp-Mm Integrated Method Using Kalman Filter Algorithm,
2023
Hadramout university
Accurate Indoor Navigation System Based On Imu/Lp-Mm Integrated Method Using Kalman Filter Algorithm, Abdullah Mohammed Bahasan
Hadhramout University Journal of Natural & Applied Sciences
Abstract
The demand for navigation systems is rapidly increasing, especially in indoor environments which the signal of GPS is not available. Therefore the Inertial Measurement Unit (IMU) system is a suitable navigation system in such indoor environments. It usually consists of three accelerometers and three gyroscopes to determine position, velocity and attitude information, respectively, without need of any external source. But this type of navigation systems has errors growth with time due to accelerometers and gyroscopes drifts. This paper introduces indoor navigation system based on integrated IMU navigation system with proposed system called Landmarks Points-Map Matching (LP-MM) system using Kalman …
