Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Conference

2020

Institution
Keyword
Publication

Articles 1 - 30 of 75

Full-Text Articles in Physical Sciences and Mathematics

Fundamentals Of Human-Centric Artificial Intelligence (A.I.): Comparative Analysis Of Europe And The U. S. Landscape, Torré A. Williams Dec 2020

Fundamentals Of Human-Centric Artificial Intelligence (A.I.): Comparative Analysis Of Europe And The U. S. Landscape, Torré A. Williams

Cybersecurity Undergraduate Research Showcase

This research is a comparative analysis of human-centric Artificial Intelligence (A.I.) in Europe and the U.S. This research establishes fundamentals that are critical to what makes A.I. human-centric. This research contains eight phases: 1) Lawful A.I.; 2) Robust A.I.; 3) Ethical A.I.; 4) Human-centric A.I.; 5) Current State of A.I.; 6) A.I. in Europe; 7) A.I. in the U.S.; 9) Importance of Human-centric A.I. This research shows that there are still ongoing changes with having a human-centric A.I. and why it is very important to society. This research is the beginning of the making of a successful and reliable human-centric …


Internet Of Things (Iot): Cybersecurity Risks In Healthcare, Ruhi Patel Dec 2020

Internet Of Things (Iot): Cybersecurity Risks In Healthcare, Ruhi Patel

Cybersecurity Undergraduate Research Showcase

The rapid growth and investment in the Internet of Things (IoT) has significantly impacted how individuals and industries operate. The Internet of Things (IoT) refers to a network of physical, technology-embedded objects that communicate, detect, and interact with their external environment or internal state (Hung, 2017). According to Tankovska (2020), IoT devices are estimated to reach 21.5 billion units by 2025. This technological boom is leading various industrial sectors to notice a quick increase in cybersecurity risks and threats. One industrial sector has been particularly vulnerable to numerous cyber threats across the globe: healthcare. Oliver Noble (2020), a data encryption …


Personalized Immunotherapy Treatment Strategies For A System Of Chronic Myelogenous Leukemia, Paul Valle Nov 2020

Personalized Immunotherapy Treatment Strategies For A System Of Chronic Myelogenous Leukemia, Paul Valle

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Deep Learning With Physics Informed Neural Networks For The Airborne Spread Of Covid-19 In Enclosed Spaces, Udbhav Muthakana, Padmanabhan Seshaiyer, Maziar Raissi, Long Nguyen Nov 2020

Deep Learning With Physics Informed Neural Networks For The Airborne Spread Of Covid-19 In Enclosed Spaces, Udbhav Muthakana, Padmanabhan Seshaiyer, Maziar Raissi, Long Nguyen

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


A Study Of Sentiment Of Covid-19 Related Tweets In The Usa, Jack Luu, Rosangela Follmann Nov 2020

A Study Of Sentiment Of Covid-19 Related Tweets In The Usa, Jack Luu, Rosangela Follmann

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Suggestions And Recommendations For Fulfillment And Implementation Of The Project For Broadband Internet In Macedonia, Zoran Aleksov, Boris Arsov, Vergim Sherifi, Nenad Popovic Oct 2020

Suggestions And Recommendations For Fulfillment And Implementation Of The Project For Broadband Internet In Macedonia, Zoran Aleksov, Boris Arsov, Vergim Sherifi, Nenad Popovic

UBT International Conference

Nowadays, broadband is defined on the basis of a number of parameters that can be offered through existing electronic communications networks (fixed or mobile networks) and the construction of some next generation of advanced electronic communications networks. This is extremely important for the quality of the received service, because with the existence of a quality electronic communication network, you will distribute a quality and fast data transfer to the end users, some of whom actually want it. Optical cable, among other types of cables, using the Operator and the access method known as " fiber to the home ", has …


Usage Of The Symbols And Dionis Square In The Cryptosystem Of Dionis, Dionis Shabani Oct 2020

Usage Of The Symbols And Dionis Square In The Cryptosystem Of Dionis, Dionis Shabani

UBT International Conference

The rapid developments of technology which have brought with them a host of benefits to humanity have also left behind a host of spaces which have mostly aided cyber piracy who exploit the many benefits of the internet for purposes that are in their favor,but these actions which negatively affect the privacy of all internet users. In this project I will present some modifications which are enabled through the 16x16 square of Dionis with 256 elements based in the Masonic Cipher method, with the help of which based on the rules I have created and developed it is different from …


An Alternative Probabilistic Protocol For Relaying Wireless Networks, Faton Maliqi Oct 2020

An Alternative Probabilistic Protocol For Relaying Wireless Networks, Faton Maliqi

UBT International Conference

In this paper we propose an alternative probabilistic protocol for relaying wireless network. Usually, the communication protocols are designed to be deterministic when it comes to the order of retransmission from the communication nodes. In contrast, we propose an alternative probabilistic protocol where the retransmitting nodes are chosen probabilistically, and which allows easier performance optimization. Using Monte Carlo simulations, we will show at which location of the Relay do we get the best performance. Due to energy consuming concern and due to lower complexity advantage, as required in technologies such as Internet of Things (IoT), we will consider the case …


Constructing Hadamard Matrices Using Binary Codes, Hizer Leka, Faton Kabashi Oct 2020

Constructing Hadamard Matrices Using Binary Codes, Hizer Leka, Faton Kabashi

UBT International Conference

In this paper is presented a very efficient method for constructing Hadamard matrices, using binary code products. We will construct such matrices using the scalar production of two vectors and the tensor production of Hadamard matrices. This method is based on the representation of the natural number as a binary code which takes only two values 0 or 1. Such a method of generating Hadamard matrices can be used in practice to generate different codes, in telecommunication systems, to correct blocked codes, but also in science as for example in Boolean algebra.


Proposal Of A Legal Framework Through The Development Of New Domain Specific Languages (Dsl) In Compliance With Gdpr, Tea Tavanxhiu, Andrea Alberici, Kozeta Sevrani Oct 2020

Proposal Of A Legal Framework Through The Development Of New Domain Specific Languages (Dsl) In Compliance With Gdpr, Tea Tavanxhiu, Andrea Alberici, Kozeta Sevrani

UBT International Conference

The adaptation of company processes to the EU Regulation represents a major opportunity to review, update and improve the internal processes and management tools used. The loss of data, in most cases, causes serious damage to the image and very often the total closure of the company. The legislation therefore represents an opportunity and a stimulus to verify the management methods applied, to define an organizational model and a code of conduct (policies, processes, rules / provisions and controls) capable of improving internal processes, defining and achieving desired objectives, ensure data and systems protection with proper risk management and assessment. …


Big Data Analytics On Cloud: Challenges, Techniques And Technologies, Aleksander Biberaj, Olimpion Shurdi, Bledar Kazia, Renalda Kushe, Alban Rakipi Oct 2020

Big Data Analytics On Cloud: Challenges, Techniques And Technologies, Aleksander Biberaj, Olimpion Shurdi, Bledar Kazia, Renalda Kushe, Alban Rakipi

UBT International Conference

These days it is known that Big Data Analytics is taking a huge attention from researchers and also from business. We all are witness of the data growth that every institution, company or even individuals store in order to use them in the future. There is a big potential to extract useful data from this Big Data that is stored usually in Cloud because sometimes there is not enough local space to store big amounts of data. There is a huge number of sectors where Big Data can be helpful including economic and business activities, public administration, national security, scientific …


Peer To Peer Audio And Video Communication, Kushtrim Pacaj, Kujtim Hyseni, Donika Sfishta Oct 2020

Peer To Peer Audio And Video Communication, Kushtrim Pacaj, Kujtim Hyseni, Donika Sfishta

UBT International Conference

In this paper we introduce a simple way on how you can build your own “end-to- end” audio and video chat. You can expect to learn how to add new features on it, as well as building your own signaling server, your mobile UI and mobile calls logic implemented in a perfect coexistence between NodeJS, Java and Kotlin. What makes this application special is the possibility to express yourself with different annotations while you’re on a video chat.


Performance Evaluation Of Non-Relational Data On Big Data Environments, Edmond Jajaga, Edi Hasaj Oct 2020

Performance Evaluation Of Non-Relational Data On Big Data Environments, Edmond Jajaga, Edi Hasaj

UBT International Conference

Big data management is a real challenge for traditional systems. The experimental evaluation is performed on measurement of performance of five different databases with an open non-relational dataset. It was structured and tested separately in each store, giving some advantages and limitations to them from a practical point of view. The results are drawn based on the throughput per number of users executed respectively. It was loaded and executed more than a million of records in each and every database. Following its semi-persistent model, Redis performed better than other databases.


Multithreaded Approach For Using Blockchain As An Automated Versioning Tool, Arber Kadriu, Dijar Kadriu, Donjet Salihi, Edmond Jajaga Oct 2020

Multithreaded Approach For Using Blockchain As An Automated Versioning Tool, Arber Kadriu, Dijar Kadriu, Donjet Salihi, Edmond Jajaga

UBT International Conference

Blockchain is a new and growing technology with a bright future ahead. It can be implemented in many different ways and different industries like banking, cryptocurrencies, health information systems etc. Its powerfulness in security and systematic tracking of different items makes it one of its kind and attractive to work with. This technology is also a suitable environment for multithreaded programming to be adopted in, while using blocks and items to be tracked by single threads. This paper presents an innovative approach of using blockchain as a versioning control tool for personal or commercial usage.


Aspects Of The Use Of Nanotechnology And Nanomedicine In Medicine, Muhamet Avdyli, Era Kastrati Oct 2020

Aspects Of The Use Of Nanotechnology And Nanomedicine In Medicine, Muhamet Avdyli, Era Kastrati

UBT International Conference

The purpose of this paper is to show aspects of the application of nanotechnology nowadays, especially in health. Nanotechnologies are the design, characterization, production and application of structures, equipment and systems by controlling the shape and size at the nanometer scale. The special branch that deals with the study of medicine in nanotechnology is called nanomedicine. Nanomedicine is a branch of medicine that applies the knowledge and tools of nanotechnology in the prevention and treatment of disease. Nanomedicine involves the use of nanoscale materials, such as nanoparticles and nanorobots, for diagnostic, dispersing, sensitizing, or activating purposes in a living organism. …


Oauth2.0 In Securing Apis, Olimpion Shurdi, Aleksander Biberaj, Igli Tafa, Genci Mesi Oct 2020

Oauth2.0 In Securing Apis, Olimpion Shurdi, Aleksander Biberaj, Igli Tafa, Genci Mesi

UBT International Conference

Today’s modern applications are mostly designed around API’s. API’s are used for a variety of things such as passing data to another webservice reading data from a database etc. The problem with this is that not all the API’s are secure. Most of the today’s API’s are old and rely only on an authentication token where the user data often had to share their credentials with the application to enable such an API call on their behalf or string them, which is often hardcoded. We will focus on OAUTH 2.0 as new protocol in securing our API’s. This is a …


Contingency Planning Amidst A Pandemic, Natalie C. Belford Oct 2020

Contingency Planning Amidst A Pandemic, Natalie C. Belford

KSU Proceedings on Cybersecurity Education, Research and Practice

Proper prior planning prevents pitifully poor performance: The purpose of this research is to address mitigation approaches - disaster recovery, contingency planning, and continuity planning - and their benefits as they relate to university operations during a worldwide pandemic predicated by the Novel Coronavirus (COVID-19). The most relevant approach pertaining to the University’s needs and its response to the Coronavirus pandemic will be determined and evaluated in detail.


Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin Oct 2020

Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin

KSU Proceedings on Cybersecurity Education, Research and Practice

Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails, phone calls, as well as the human burden for answering the same or similar questions again and again based on questions we received from previous camps. This paper introduces our practical experience to implement an AI-powered chatbot for middle and high school cybersecurity camps …


A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad Oct 2020

A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad

KSU Proceedings on Cybersecurity Education, Research and Practice

Serious games can challenge users in competitive and entertaining ways. Educators have used serious games to increase student engagement in cybersecurity education. Serious games have been developed to teach students various cybersecurity topics such as safe online behavior, threats and attacks, malware, and more. They have been used in cybersecurity training and education at different levels. Serious games have targeted different audiences such as K-12 students, undergraduate and graduate students in academic institutions, and professionals in the cybersecurity workforce. In this paper, we provide a survey of serious games used in cybersecurity education and training. We categorize these games into …


Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman Oct 2020

Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman

KSU Proceedings on Cybersecurity Education, Research and Practice

This study extends the body of literature concerning security compliance by investigating the antecedents of HIPPA security compliance. A conceptual model, specifying a set of hypothesized relationships between management support, security awareness, security culture; security behavior, and risk of sanctions to address their effect on HIPAA security compliance is presented. This model was developed based on the review of the literature, Protection Motivation Theory, and General Deterrence Theory. Specifically, the aim of the study is to examine the mediating role of risk of sanctions on HIPAA security compliance.


Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus Oct 2020

Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus

KSU Proceedings on Cybersecurity Education, Research and Practice

Social engineering is the technique in which the attacker sends messages to build a relationship with the victim and convinces the victim to take some actions that lead to significant damages and losses. Industry and law enforcement reports indicate that social engineering incidents costs organizations billions of dollars. Phishing is the most pervasive social engineering attack. While email filtering and warning messages have been implemented for over three decades, organizations are constantly falling for phishing attacks. Prior research indicated that attackers use phishing emails to create an urgency and fear response in their victims causing them to use quick heuristics, …


Towards An Assessment Of Judgment Errors In Social Engineering Attacks Due To Environment And Device Type, Tommy Pollock, Yair Levy, Wei Li, Ajoy Kumar Oct 2020

Towards An Assessment Of Judgment Errors In Social Engineering Attacks Due To Environment And Device Type, Tommy Pollock, Yair Levy, Wei Li, Ajoy Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

Phishing continues to be a significant invasive threat to computer and mobile device users. Cybercriminals continuously develop new phishing schemes using email, and malicious search engine links to gather personal information of unsuspecting users. This information is used for financial gains through identity theft schemes or draining financial accounts of victims. Users are often distracted and fail to fully process the phishing attacks then unknowingly fall victim to the scam until much later. Users operating mobile phones and computers are likely to make judgment errors when making decisions in distracting environments due to cognitive overload. Distracted users can fail to …


Cybersecurity Strategy Against Cyber Attacks Towards Smart Grids With Pvs, Fangyu Li, Maria Valero, Liang Zhao, Yousef Mahmoud Oct 2020

Cybersecurity Strategy Against Cyber Attacks Towards Smart Grids With Pvs, Fangyu Li, Maria Valero, Liang Zhao, Yousef Mahmoud

KSU Proceedings on Cybersecurity Education, Research and Practice

Cyber attacks threaten the security of distribution power grids, such as smart grids. The emerging renewable energy sources such as photovoltaics (PVs) with power electronics controllers introduce new potential vulnerabilities. Based on the electric waveform data measured by waveform sensors in the smart grids, we propose a novel cyber attack detection and identification approach. Firstly, we analyze the cyber attack impacts (including cyber attacks on the solar inverter causing unusual harmonics) on electric waveforms in distribution power grids. Then, we propose a novel deep learning based mechanism including attack detection and attack diagnosis. By leveraging the electric waveform sensor data …


Visual Cryptography Scheme With Digital Watermarking In Sharing Secret Information From Car Number Plate Digital Images, Ana Savic, Goran Bjelobaba, Radosav Veselinovic, Hana Stefanovic Oct 2020

Visual Cryptography Scheme With Digital Watermarking In Sharing Secret Information From Car Number Plate Digital Images, Ana Savic, Goran Bjelobaba, Radosav Veselinovic, Hana Stefanovic

UBT International Conference

In this paper a visual cryptography scheme with a binary additive stream cipher is used to form the meaningless shares (share images or multiple layers) of original digital image, hiding some secret information. Each share image holds some information, but at the receiver side only when all of them are superimposed, the secret information is revealed by human vision without any complex computation. Proposed algorithm for generating shares is applied in MATLAB programming environment, using MATLAB built-in functions to create sequences of pseudorandom numbers or streams, which are used to make share images of original digital image. The input image …


How Do Kosovo Firms Utilize Business Intelligence? An Exploratory Study, Ardian Hyseni Oct 2020

How Do Kosovo Firms Utilize Business Intelligence? An Exploratory Study, Ardian Hyseni

UBT International Conference

The purpose of this paper is to examine how Kosovo firms utilize business intelligence to analyze their data and better understand the past, present and the future of their firm. Business intelligence offers firms the ability to analyze large amount of data quicker and more effective. Decision making has become easier with the use of BI tools, but making the right decision at right time has become vital for the firms performance. This research will contribute on business industry by providing evidence how Kosovo firms utilize the BI system, what BI tools and what business values and processes BI offers …


The Hidden Advantage Among Digital Natives Within Bug Bounty Programs, James (Jimmy) Allah-Mensah Oct 2020

The Hidden Advantage Among Digital Natives Within Bug Bounty Programs, James (Jimmy) Allah-Mensah

Cybersecurity Undergraduate Research Showcase

Bug bounty programs are a great way for companies and organizations to help keep their systems and information secure; however, there are only a limited number of white hat hacking participant spots. With only so many seats available at the table, being able to determine the most qualified group of individuals is critical to the efficiency of the program at large. Digital natives, people born into the digital age, provide an instinctive approach when dealing with technology. On the other hand, digital immigrants, people who grew up before the digital age and had to adapt to new technology, evidently utilize …


Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore Aug 2020

Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore

Cybersecurity Undergraduate Research Showcase

The future of smart homes is filled with excitement and ample opportunity to live in an environment that features extraordinary convenience and energy efficiency. Devices such as Amazon Alexa and Roku Smart TV’s feature voice interaction options that provide the user with enhanced functionality. While voice-activated devices are accommodating, it is imperative to acknowledge how they work on the backend. The problem is that these devices collect and share a large amount of data from users who are oftentimes unaware that it’s even happening. The Snitch App is being developed in order to inform the user of what exactly is …


Web Developer Summer Intern At Keller Williams Realty- Cs 7995, Revatee Vaidya, Project Advisor: Dawn Tatum Jul 2020

Web Developer Summer Intern At Keller Williams Realty- Cs 7995, Revatee Vaidya, Project Advisor: Dawn Tatum

C-Day Computing Showcase

The purpose of this poster is to outline the duties of a Summer intern at Keller Williams Realty in Atlanta, Georgia as a Web Developer Intern. At Keller Williams, my aim was to develop and design websites for Blue Apple Real Estate School and Blue Apple Homes using WordPress and Learn Dash. The poster discusses my summer training, projects I was involved in, Technologies I used and my future goals.


Global Product And Technology Intern, Adp- Cs 7995, Keerthi Manchukonda, Project Advisor: Dawn Tatum Jul 2020

Global Product And Technology Intern, Adp- Cs 7995, Keerthi Manchukonda, Project Advisor: Dawn Tatum

C-Day Computing Showcase

I'm working on API for the PDF service generation of the Canadian Tax forms(Federal and Provinces) in specific. But it can be used for all countries and states.


Global & Product Technology Intern Adp- Cs 7995, Neha Gosavi, Project Advisor: Dawn Tatum Jul 2020

Global & Product Technology Intern Adp- Cs 7995, Neha Gosavi, Project Advisor: Dawn Tatum

C-Day Computing Showcase

I am Neha Gosavi. I am graduate student in Computer Science and currently doing summer internship as Global Product & Technology Intern at ADP. As intern I am part of SRE team(Site Reliability Engineer ).SRE team comprised of engineers taken from a diverse set of disciplines. This cross functional team was designed to support one of the key product offered by the company. I was involved with AWS cloud migration Poject and docker application, Splunk dashboard.