Pyroscan: Wildfire Behavior Prediction System,
2024
Arkansas Tech University
Pyroscan: Wildfire Behavior Prediction System, Derek H. Thompson, Parker A. Padgett, Timothy C. Johnson
ATU Research Symposium
During a wildfire, it is of the utmost importance to be updated about all information of the wildfire. Wind speed, wind direction and dry grass often works as fuel for the fire allowing it to spread in multiple directions. These different factors are often issues for any firefighting organization that is trying to help fight the fire. An uncontrolled wildfire is often a threat to wildlife, property, and worse, human and animal lives. In our paper, we propose an artificial intelligence (AI) powered fire tracking and prediction application utilizing Unmanned Aerial Vehicles (UAV) to inform fire fighters regarding the probability …
League Of Learning: Deep Learning For Soccer Action Video Classification,
2024
Arkansas Tech University
League Of Learning: Deep Learning For Soccer Action Video Classification, Musfikur Rahaman
ATU Research Symposium
The field of sports video analysis using deep learning is rapidly advancing. Proper classification and analysis of sports videos are essential to manage the growing sports media content. It offers numerous benefits for the media, advertising, analytics, and education sectors. Soccer, also known as football, worldwide, is among the most popular sports. This research study used a deep learning-based approach for soccer action detection. Deep learning has become a popular machine learning technique, especially for image and video classification. We have used the SoccerAct dataset, which consists of ten soccer actions like corner, foul, freekick, goal kick, long pass, on …
Predictive Ai Applications For Sar Cases In The Us Coast Guard,
2024
Old Dominion University
Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson
Cybersecurity Undergraduate Research Showcase
This paper explores the potential integration of predictive analytics AI into the United States Coast Guard's (USCG) Search and Rescue Optimal Planning System (SAROPS) for deep sea and nearshore search and rescue (SAR) operations. It begins by elucidating the concept of predictive analytics AI and its relevance in military applications, particularly in enhancing SAR procedures. The current state of SAROPS and its challenges, including complexity and accuracy issues, are outlined. By integrating predictive analytics AI into SAROPS, the paper argues for streamlined operations, reduced training burdens, and improved accuracy in locating drowning personnel. Drawing on insights from military AI applications …
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization,
2024
University of Central Florida
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication
This is the complete volume of HMC Volume 7. Special Issue on Mediatization
Enhancing Information Architecture With Machine Learning For Digital Media Platforms,
2024
Georgia Southern University
Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner
Honors College Theses
Modern advancements in machine learning are transforming the technological landscape, including information architecture within user experience design. With the unparalleled amount of user data generated on online media platforms and applications, an adjustment in the design process to incorporate machine learning for categorizing the influx of semantic data while maintaining a user-centric structure is essential. Machine learning tools, such as the classification and recommendation system, need to be incorporated into the design for user experience and marketing success. There is a current gap between incorporating the backend modeling algorithms and the frontend information architecture system design together. The aim of …
Cyber Attacks Against Industrial Control Systems,
2024
Louisiana State University
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
LSU Master's Theses
Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …
Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering,
2024
Computers and Automatic Control Engineering, Faculty of Engineering, Tanta University, Egypt
Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony
Journal of Engineering Research
Aging significantly affects human health and the overall economy, yet understanding of the underlying molecular mechanisms remains limited. Among all human genes, almost three hundred and five have been linked to human aging. While certain subsets of these genes or specific aging-related genes have been extensively studied. There has been a lack of comprehensive examination encompassing the entire set of aging-related genes. Here, the main objective is to overcome understanding based on an innovative approach that combines the capabilities of deep learning. Particularly using One-Dimensional Deep AutoEncoder (1D-DAE). Followed by the K-means clustering technique as a means of unsupervised learning. …
Blockchain Design For A Secure Pharmaceutical Supply Chain,
2024
University of Massachusetts Amherst
Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu
Masters Theses
In the realm of pharmaceuticals, particularly during the challenging times of the COVID-19 pandemic, the supply chain for drugs has faced significant strains. The increased demand for vaccines and therapeutics has revealed critical weaknesses in the current drug supply chain management systems. If not addressed, these challenges could lead to severe societal impacts, including the rise of counterfeit medications and diminishing trust in government authorities.
The study identified that more than the current strategies, such as the Drug Supply Chain Security Act (DSCSA) in the U.S., which focuses on unique authentication and traceability codes for prescription drugs, is needed to …
Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics,
2024
Islamic University of Science and Technology
Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan
Research Symposium
Background: The system's performance may be impacted by the high-dimensional feature dataset, attributed to redundant, non-informative, or irrelevant features, commonly referred to as noise. To mitigate inefficiency and suboptimal performance, our goal is to identify the optimal and minimal set of features capable of representing the entire dataset. Consequently, the Feature Selector (Fs) serves as an operator, transforming an m-dimensional feature set into an n-dimensional feature set. This process aims to generate a filtered dataset with reduced dimensions, enhancing the algorithm's efficiency.
Methods: This paper introduces an innovative feature selection approach utilizing a genetic algorithm with an ensemble crossover operation …
Deepfake It Til You Make It: How To Make A Short Film,
2024
Olivet Nazarene University
Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee
ELAIA
A recent development in the realm of computer technology is the deepfake. Deepfakes, which train a computer model to digitally superimpose one person’s face onto another body in a separate video, has its uses for good and for ill, with the unfortunate tendency to the latter. The vast majority of deepfakes are used for pornography, most commonly depicting female celebrities as the subjects. At the less notable level, it is also often used for revenge pornography. These aspects of deepfake technology are rarely discussed in mainstream media, which tends to focus on the less harmful uses, such as those for …
Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification,
2024
California Polytechnic State University, San Luis Obispo
Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao
Master's Theses
Understanding the temporal evolution of cells poses a significant challenge in developmental biology. This study embarks on a comparative analysis of various machine-learning techniques to classify cell colony images across different timestamps, thereby aiming to capture dynamic transitions of cellular states. By performing Transfer Learning with state-of-the-art classification networks, we achieve high accuracy in categorizing single-timestamp images. Furthermore, this research introduces the integration of temporal models, notably LSTM (Long Short Term Memory Network), R-Transformer (Recurrent Neural Network enhanced Transformer) and ViViT (Video Vision Transformer), to undertake this classification task to verify the effectiveness of incorporating temporal features into the classification …
Text Summarization,
2024
Kennesaw State University
Text Summarization, Varun Gottam, Anusha Vunnam, Purna Sarovar Puvvada
Symposium of Student Scholars
The current era is known as the information era. Every day, millions of gigabytes of data are being transferred from one point to another. As the creation of data became easy, it became hard to keep track of the important points and the gist of data especially in areas such as research and news. To solve this conundrum, text summarization is introduced. This is a process of summarizing text from across different documents or large datasets such that it can be read and understood easily by both humans and machines.
Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative,
2024
Kean University
Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino
Center for Cybersecurity
In brief:
- Humanitarian agencies responding to conflict face massive challenges in distributing aid. Cyberattacks add to that burden.
- This short overview, tailored for non-technical leaders, demystifies the process and equips clouds security experts to proactively champion cloud security at non-profits, and non-governmental organizations.
Proactive Cybersecurity is a Humanitarian Imperative | CSA (cloudsecurityalliance.org)
Multi-Perspective Analysis For Derivative Financial Product Prediction With Stacked Recurrent Neural Networks, Natural Language Processing And Large Language Model,
2024
The Graduate Center, City University of New York
Multi-Perspective Analysis For Derivative Financial Product Prediction With Stacked Recurrent Neural Networks, Natural Language Processing And Large Language Model, Ethan Lo
Dissertations, Theses, and Capstone Projects
This study developed a multi-perspective, AI-powered model for predicting E-Mini S&P 500 Index Futures prices, tackling the challenging market dynamics of these derivative financial instruments. Leveraging FinBERT for analysis of Wall Street Journal data alongside technical indicators, trader positioning, and economic factors, my stacked recurrent neural network built with LSTMs and GRUs achieves significantly improved accuracy compared to single sub-models. Furthermore, ChatGPT generation of human-readable analysis reports demonstrates the feasibility of using large language models in financial analysis. This research pioneers the use of stacked RNNs and LLMs for multi-perspective financial analysis, offering a novel blueprint for automated prediction and …
The Role Of Artificial Intelligence In Determining The Criminal Fingerprint,
2024
Journal of Police and Legal Sciences
The Role Of Artificial Intelligence In Determining The Criminal Fingerprint, Saeed Al Matrooshi
Journal of Police and Legal Sciences
The research aimed to identify the motives and justifications for the use of artificial intelligence in predicting crimes, to explain the challenges of artificial intelligence algorithms, the risks of bias and their ethical rules, and to highlight the role of artificial intelligence in identifying the criminal fingerprint during the detection of crimes. The research relied on the analytical approach, for the purpose of identifying the motives and justifications for the use of intelligence. Artificial intelligence in crime detection, explaining the challenges of artificial intelligence algorithms, their risks of bias, and ethical rules, and exploring how artificial intelligence technology can hopefully …
The Aim To Decentralize Economic Systems With Blockchains And Crypto,
2024
The Sam M. Walton College of Business at the University of Arkansas
The Aim To Decentralize Economic Systems With Blockchains And Crypto, Mary Lacity
Arkansas Law Review
As an information systems (“IS”) professor, I wrote this Article for legal professionals new to blockchains and crypto. This target audience likely is most interested in crypto for its legal implications—depending on whether it functions as currencies, securities, commodities, or properties; however, legal professionals also need to understand crypto’s origin, how transactions work, and how they are governed.
Securing Edge Computing: A Hierarchical Iot Service Framework,
2024
Northern Kentucky University
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Posters-at-the-Capitol
Title: Securing Edge Computing: A Hierarchical IoT Service Framework
Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.
Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University
Abstract:
Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.
Our secure by design approach prioritizes …
Dp-Smote: Integrating Differential Privacy And Oversampling Technique To Preserve Privacy In Smart Homes,
2024
Computer Science Department, Faculty of Science (Boys), Al-Azhar University, Cairo, Egypt
Dp-Smote: Integrating Differential Privacy And Oversampling Technique To Preserve Privacy In Smart Homes, Amr Tarek Elsayed, Almohammady Sobhi Alsharkawy, Mohamed Sayed Farag, Shaban Ebrahim Abu Yusuf
Al-Azhar Bulletin of Science
Smart homes represent intelligent environments where interconnected devices gather information, enhancing users’ living experiences by ensuring comfort, safety, and efficient energy management. To enhance the quality of life, companies in the smart device industry collect user data, including activities, preferences, and power consumption. However, sharing such data necessitates privacy-preserving practices. This paper introduces a robust method for secure sharing of data to service providers, grounded in differential privacy (DP). This empowers smart home residents to contribute usage statistics while safeguarding their privacy. The approach incorporates the Synthetic Minority Oversampling technique (SMOTe) and seamlessly integrates Gaussian noise to generate synthetic data, …
Promise And Limitations Of Supervised Optimal Transport-Based Graph Summarization Via Information Theoretic Measures,
2023
University of Maine
Promise And Limitations Of Supervised Optimal Transport-Based Graph Summarization Via Information Theoretic Measures, Sepideh Neshatfar
Electronic Theses and Dissertations
Graph summarization is a fundamental problem in the field of data analysis, aiming to distill extensive graph datasets into more manageable, yet informative representations. The challenge lies in creating compressed graphs that faithfully retain crucial structural information for downstream tasks. A recent advancement in this domain introduces an optimal transport-based framework that enables the incorporation of a priori knowledge regarding the importance of nodes, edges, and attributes during the graph summarization process. However, the statistical properties of this innovative framework remain largely unexplored. This master's thesis embarks on a comprehensive exploration of the field of graph summarization, with a particular …
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters,
2023
University of Southern Maine
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …
