Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Implement Multi-Factor Authentication On All Federal Systems Now, Megan Walsh Sep 2020

Implement Multi-Factor Authentication On All Federal Systems Now, Megan Walsh

Student Papers in Public Policy

The White House Office of Management and Budget recorded 31,107 information security incidents in fiscal year 2018. The most common attacks to gain access to a user’s login credentials were e-mail/phishing, web-based attack, and brute force entering of username/password combinations. Given this high number of incidents, strong reliance on computers for everyday business, and common attacks that target passwords, information security should be a priority for information technology administrators working in federal agencies.


A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak Sep 2020

A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak

Faculty Publications

Wireless underground sensor networks (WUSNs) are becoming ubiquitous in many areas. The design of robust systems requires extensive understanding of the underground (UG) channel characteristics. In this paper, an UG channel impulse response is modeled and validated via extensive experiments in indoor and field testbed settings. The three distinct types of soils are selected with sand and clay contents ranging from $13\%$ to $86\%$ and $3\%$ to $32\%$, respectively. The impacts of changes in soil texture and soil moisture are investigated with more than $1,200$ measurements in a novel UG testbed that allows flexibility in soil moisture control. Moreover, the …


Prerequisite Course Recommendation Based On Course Description And Students’ Grades, Haozhe Zhou Aug 2020

Prerequisite Course Recommendation Based On Course Description And Students’ Grades, Haozhe Zhou

The Journal of Purdue Undergraduate Research

No abstract provided.


Estimating Vehicular Traffic Intensity With Deep Learning And Semantic Segmentation, Logan Bradley-Trietsch Aug 2020

Estimating Vehicular Traffic Intensity With Deep Learning And Semantic Segmentation, Logan Bradley-Trietsch

The Journal of Purdue Undergraduate Research

No abstract provided.


Comparison Of Machine Learning Models: Gesture Recognition Using A Multimodal Wrist Orthosis For Tetraplegics, Charlie Martin Aug 2020

Comparison Of Machine Learning Models: Gesture Recognition Using A Multimodal Wrist Orthosis For Tetraplegics, Charlie Martin

The Journal of Purdue Undergraduate Research

Many tetraplegics must wear wrist braces to support paralyzed wrists and hands. However, current wrist orthoses have limited functionality to assist a person’s ability to perform typical activities of daily living other than a small pocket to hold utensils. To enhance the functionality of wrist orthoses, gesture recognition technology can be applied to control mechatronic tools attached to a novel fabricated wrist brace. Gesture recognition is a growing technology for providing touchless human-computer interaction that can be particularly useful for tetraplegics with limited upper-extremity mobility. In this study, three gesture recognition models were compared—two dynamic time-warping models and a hidden …


A First Look At Forensic Analysis Of Sailfishos, Krassimir Tzvetanov, Umit Karabiyik Aug 2020

A First Look At Forensic Analysis Of Sailfishos, Krassimir Tzvetanov, Umit Karabiyik

Faculty Publications

SailfishOS is a Linux kernel-based embedded device operation system, mostly deployed on cell phones. Currently, there is no sufficient research in this space, and at the same time, this operating system is gaining popularity, so it is likely for investigators to encounter it in the field. This paper focuses on mapping the digital artifacts pertinent to an investigation, which can be found on the filesystem of a phone running SailfishOS 3.2. Currently, there is no other known publicly available research and no commercially available solutions for the acquisition and analysis of this platform. This is a major gap, as the …


Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman Jun 2020

Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

This article emphasizes the increasing importance of artificial intelligence (AI) in military and national security policy making. It seeks to inform interested individuals about the proliferation of publicly accessible U.S. government and military literature on this multifaceted topic. An additional objective of this endeavor is encouraging greater public awareness of and participation in emerging public policy debate on AI's moral and national security implications..


All You Need To Know About Cybersecurity Ever! In 45 Minutes, Joe Beckman Mar 2020

All You Need To Know About Cybersecurity Ever! In 45 Minutes, Joe Beckman

Purdue Road School

This session will cover the information every local government official needs to know to keep their data safe from hackers.


Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium, Usman Raza, Abdul Salam Feb 2020

Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium, Usman Raza, Abdul Salam

Faculty Publications

Storm drains and sanitary sewers are prone to backups and overflows due to extra amount wastewater entering the pipes. To prevent that, it is imperative to efficiently monitor the urban underground infrastructure. The combination of sensors system and wireless underground communication system can be used to realize urban underground IoT applications, e.g., storm water and wastewater overflow monitoring systems. The aim of this article is to establish a feasibility of the use of wireless underground communications techniques, and wave propagation through the subsurface soil and asphalt layers, in an underground pavement system for storm water and sewer overflow monitoring application. …