Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Kennesaw State University (20)
- University for Business and Technology in Kosovo (13)
- Old Dominion University (11)
- University of Central Florida (6)
- Minnesota State University Moorhead (5)
-
- Arcadia University (3)
- Illinois State University (3)
- The University of San Francisco (3)
- South Dakota State University (2)
- University of North Florida (2)
- University of Windsor (2)
- Ouachita Baptist University (1)
- Purdue University (1)
- University of Nebraska at Omaha (1)
- Virginia Commonwealth University (1)
- Western Washington University (1)
- Keyword
-
- Big Data (2)
- Machine Learning (2)
- Math (2)
- 4G and 5G network; wireless; fiber to the home (1)
- AI (1)
-
- API (1)
- Adjoint Method (1)
- Analogy (1)
- And Computer Sciences -- Research – Posters; Edward Waters College--Undergraduates--Research--Posters; Stanford University--Undergraduates--Research--Posters (1)
- And Computer Sciences -- Research – Posters (1)
- Android (1)
- Application (1)
- Authorization (1)
- Automatic-Repeat Request Protocol (ARQ) (1)
- BI Tools (1)
- Big Data Analytics (1)
- Blockchain (1)
- Broadband internet; telecommunication infrastructure; access; optical cable; regulation; network coverage (1)
- Business (1)
- Business Intelligence (1)
- Cassandra (1)
- Cloud Computing (1)
- Communication Protocol (1)
- Cooperative Communication (1)
- Couchbase (1)
- Data Analysis (1)
- Data Storage. (1)
- Decision Making (1)
- Decryption (1)
- Deep Learning (1)
- Publication
-
- C-Day Computing Showcase (13)
- UBT International Conference (13)
- Cybersecurity Undergraduate Research Showcase (11)
- KSU Proceedings on Cybersecurity Education, Research and Practice (7)
- Electronic Literature Organization Conference 2020 (5)
-
- Student Academic Conference (5)
- Annual Symposium on Biomathematics and Ecology Education and Research (3)
- Capstone Showcase (3)
- Creative Activity and Research Day - CARD (3)
- OSSA Conference Archive (2)
- SDSU Data Science Symposium (2)
- Showcase of Osprey Advancements in Research and Scholarship (SOARS) (2)
- Biology and Medicine Through Mathematics Conference (1)
- International Crisis and Risk Communication Conference (1)
- Purdue Road School (1)
- Scholars Day Conference (1)
- Scholars Week (1)
- UNO Student Research and Creative Activity Fair (1)
Articles 1 - 30 of 75
Full-Text Articles in Physical Sciences and Mathematics
Fundamentals Of Human-Centric Artificial Intelligence (A.I.): Comparative Analysis Of Europe And The U. S. Landscape, Torré A. Williams
Fundamentals Of Human-Centric Artificial Intelligence (A.I.): Comparative Analysis Of Europe And The U. S. Landscape, Torré A. Williams
Cybersecurity Undergraduate Research Showcase
This research is a comparative analysis of human-centric Artificial Intelligence (A.I.) in Europe and the U.S. This research establishes fundamentals that are critical to what makes A.I. human-centric. This research contains eight phases: 1) Lawful A.I.; 2) Robust A.I.; 3) Ethical A.I.; 4) Human-centric A.I.; 5) Current State of A.I.; 6) A.I. in Europe; 7) A.I. in the U.S.; 9) Importance of Human-centric A.I. This research shows that there are still ongoing changes with having a human-centric A.I. and why it is very important to society. This research is the beginning of the making of a successful and reliable human-centric …
Internet Of Things (Iot): Cybersecurity Risks In Healthcare, Ruhi Patel
Internet Of Things (Iot): Cybersecurity Risks In Healthcare, Ruhi Patel
Cybersecurity Undergraduate Research Showcase
The rapid growth and investment in the Internet of Things (IoT) has significantly impacted how individuals and industries operate. The Internet of Things (IoT) refers to a network of physical, technology-embedded objects that communicate, detect, and interact with their external environment or internal state (Hung, 2017). According to Tankovska (2020), IoT devices are estimated to reach 21.5 billion units by 2025. This technological boom is leading various industrial sectors to notice a quick increase in cybersecurity risks and threats. One industrial sector has been particularly vulnerable to numerous cyber threats across the globe: healthcare. Oliver Noble (2020), a data encryption …
Personalized Immunotherapy Treatment Strategies For A System Of Chronic Myelogenous Leukemia, Paul Valle
Personalized Immunotherapy Treatment Strategies For A System Of Chronic Myelogenous Leukemia, Paul Valle
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
Deep Learning With Physics Informed Neural Networks For The Airborne Spread Of Covid-19 In Enclosed Spaces, Udbhav Muthakana, Padmanabhan Seshaiyer, Maziar Raissi, Long Nguyen
Deep Learning With Physics Informed Neural Networks For The Airborne Spread Of Covid-19 In Enclosed Spaces, Udbhav Muthakana, Padmanabhan Seshaiyer, Maziar Raissi, Long Nguyen
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
A Study Of Sentiment Of Covid-19 Related Tweets In The Usa, Jack Luu, Rosangela Follmann
A Study Of Sentiment Of Covid-19 Related Tweets In The Usa, Jack Luu, Rosangela Follmann
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
Suggestions And Recommendations For Fulfillment And Implementation Of The Project For Broadband Internet In Macedonia, Zoran Aleksov, Boris Arsov, Vergim Sherifi, Nenad Popovic
Suggestions And Recommendations For Fulfillment And Implementation Of The Project For Broadband Internet In Macedonia, Zoran Aleksov, Boris Arsov, Vergim Sherifi, Nenad Popovic
UBT International Conference
Nowadays, broadband is defined on the basis of a number of parameters that can be offered through existing electronic communications networks (fixed or mobile networks) and the construction of some next generation of advanced electronic communications networks. This is extremely important for the quality of the received service, because with the existence of a quality electronic communication network, you will distribute a quality and fast data transfer to the end users, some of whom actually want it. Optical cable, among other types of cables, using the Operator and the access method known as " fiber to the home ", has …
Usage Of The Symbols And Dionis Square In The Cryptosystem Of Dionis, Dionis Shabani
Usage Of The Symbols And Dionis Square In The Cryptosystem Of Dionis, Dionis Shabani
UBT International Conference
The rapid developments of technology which have brought with them a host of benefits to humanity have also left behind a host of spaces which have mostly aided cyber piracy who exploit the many benefits of the internet for purposes that are in their favor,but these actions which negatively affect the privacy of all internet users. In this project I will present some modifications which are enabled through the 16x16 square of Dionis with 256 elements based in the Masonic Cipher method, with the help of which based on the rules I have created and developed it is different from …
An Alternative Probabilistic Protocol For Relaying Wireless Networks, Faton Maliqi
An Alternative Probabilistic Protocol For Relaying Wireless Networks, Faton Maliqi
UBT International Conference
In this paper we propose an alternative probabilistic protocol for relaying wireless network. Usually, the communication protocols are designed to be deterministic when it comes to the order of retransmission from the communication nodes. In contrast, we propose an alternative probabilistic protocol where the retransmitting nodes are chosen probabilistically, and which allows easier performance optimization. Using Monte Carlo simulations, we will show at which location of the Relay do we get the best performance. Due to energy consuming concern and due to lower complexity advantage, as required in technologies such as Internet of Things (IoT), we will consider the case …
Constructing Hadamard Matrices Using Binary Codes, Hizer Leka, Faton Kabashi
Constructing Hadamard Matrices Using Binary Codes, Hizer Leka, Faton Kabashi
UBT International Conference
In this paper is presented a very efficient method for constructing Hadamard matrices, using binary code products. We will construct such matrices using the scalar production of two vectors and the tensor production of Hadamard matrices. This method is based on the representation of the natural number as a binary code which takes only two values 0 or 1. Such a method of generating Hadamard matrices can be used in practice to generate different codes, in telecommunication systems, to correct blocked codes, but also in science as for example in Boolean algebra.
Proposal Of A Legal Framework Through The Development Of New Domain Specific Languages (Dsl) In Compliance With Gdpr, Tea Tavanxhiu, Andrea Alberici, Kozeta Sevrani
Proposal Of A Legal Framework Through The Development Of New Domain Specific Languages (Dsl) In Compliance With Gdpr, Tea Tavanxhiu, Andrea Alberici, Kozeta Sevrani
UBT International Conference
The adaptation of company processes to the EU Regulation represents a major opportunity to review, update and improve the internal processes and management tools used. The loss of data, in most cases, causes serious damage to the image and very often the total closure of the company. The legislation therefore represents an opportunity and a stimulus to verify the management methods applied, to define an organizational model and a code of conduct (policies, processes, rules / provisions and controls) capable of improving internal processes, defining and achieving desired objectives, ensure data and systems protection with proper risk management and assessment. …
Big Data Analytics On Cloud: Challenges, Techniques And Technologies, Aleksander Biberaj, Olimpion Shurdi, Bledar Kazia, Renalda Kushe, Alban Rakipi
Big Data Analytics On Cloud: Challenges, Techniques And Technologies, Aleksander Biberaj, Olimpion Shurdi, Bledar Kazia, Renalda Kushe, Alban Rakipi
UBT International Conference
These days it is known that Big Data Analytics is taking a huge attention from researchers and also from business. We all are witness of the data growth that every institution, company or even individuals store in order to use them in the future. There is a big potential to extract useful data from this Big Data that is stored usually in Cloud because sometimes there is not enough local space to store big amounts of data. There is a huge number of sectors where Big Data can be helpful including economic and business activities, public administration, national security, scientific …
Peer To Peer Audio And Video Communication, Kushtrim Pacaj, Kujtim Hyseni, Donika Sfishta
Peer To Peer Audio And Video Communication, Kushtrim Pacaj, Kujtim Hyseni, Donika Sfishta
UBT International Conference
In this paper we introduce a simple way on how you can build your own “end-to- end” audio and video chat. You can expect to learn how to add new features on it, as well as building your own signaling server, your mobile UI and mobile calls logic implemented in a perfect coexistence between NodeJS, Java and Kotlin. What makes this application special is the possibility to express yourself with different annotations while you’re on a video chat.
Performance Evaluation Of Non-Relational Data On Big Data Environments, Edmond Jajaga, Edi Hasaj
Performance Evaluation Of Non-Relational Data On Big Data Environments, Edmond Jajaga, Edi Hasaj
UBT International Conference
Big data management is a real challenge for traditional systems. The experimental evaluation is performed on measurement of performance of five different databases with an open non-relational dataset. It was structured and tested separately in each store, giving some advantages and limitations to them from a practical point of view. The results are drawn based on the throughput per number of users executed respectively. It was loaded and executed more than a million of records in each and every database. Following its semi-persistent model, Redis performed better than other databases.
Multithreaded Approach For Using Blockchain As An Automated Versioning Tool, Arber Kadriu, Dijar Kadriu, Donjet Salihi, Edmond Jajaga
Multithreaded Approach For Using Blockchain As An Automated Versioning Tool, Arber Kadriu, Dijar Kadriu, Donjet Salihi, Edmond Jajaga
UBT International Conference
Blockchain is a new and growing technology with a bright future ahead. It can be implemented in many different ways and different industries like banking, cryptocurrencies, health information systems etc. Its powerfulness in security and systematic tracking of different items makes it one of its kind and attractive to work with. This technology is also a suitable environment for multithreaded programming to be adopted in, while using blocks and items to be tracked by single threads. This paper presents an innovative approach of using blockchain as a versioning control tool for personal or commercial usage.
Aspects Of The Use Of Nanotechnology And Nanomedicine In Medicine, Muhamet Avdyli, Era Kastrati
Aspects Of The Use Of Nanotechnology And Nanomedicine In Medicine, Muhamet Avdyli, Era Kastrati
UBT International Conference
The purpose of this paper is to show aspects of the application of nanotechnology nowadays, especially in health. Nanotechnologies are the design, characterization, production and application of structures, equipment and systems by controlling the shape and size at the nanometer scale. The special branch that deals with the study of medicine in nanotechnology is called nanomedicine. Nanomedicine is a branch of medicine that applies the knowledge and tools of nanotechnology in the prevention and treatment of disease. Nanomedicine involves the use of nanoscale materials, such as nanoparticles and nanorobots, for diagnostic, dispersing, sensitizing, or activating purposes in a living organism. …
Oauth2.0 In Securing Apis, Olimpion Shurdi, Aleksander Biberaj, Igli Tafa, Genci Mesi
Oauth2.0 In Securing Apis, Olimpion Shurdi, Aleksander Biberaj, Igli Tafa, Genci Mesi
UBT International Conference
Today’s modern applications are mostly designed around API’s. API’s are used for a variety of things such as passing data to another webservice reading data from a database etc. The problem with this is that not all the API’s are secure. Most of the today’s API’s are old and rely only on an authentication token where the user data often had to share their credentials with the application to enable such an API call on their behalf or string them, which is often hardcoded. We will focus on OAUTH 2.0 as new protocol in securing our API’s. This is a …
Contingency Planning Amidst A Pandemic, Natalie C. Belford
Contingency Planning Amidst A Pandemic, Natalie C. Belford
KSU Proceedings on Cybersecurity Education, Research and Practice
Proper prior planning prevents pitifully poor performance: The purpose of this research is to address mitigation approaches - disaster recovery, contingency planning, and continuity planning - and their benefits as they relate to university operations during a worldwide pandemic predicated by the Novel Coronavirus (COVID-19). The most relevant approach pertaining to the University’s needs and its response to the Coronavirus pandemic will be determined and evaluated in detail.
Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin
Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin
KSU Proceedings on Cybersecurity Education, Research and Practice
Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails, phone calls, as well as the human burden for answering the same or similar questions again and again based on questions we received from previous camps. This paper introduces our practical experience to implement an AI-powered chatbot for middle and high school cybersecurity camps …
A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad
A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad
KSU Proceedings on Cybersecurity Education, Research and Practice
Serious games can challenge users in competitive and entertaining ways. Educators have used serious games to increase student engagement in cybersecurity education. Serious games have been developed to teach students various cybersecurity topics such as safe online behavior, threats and attacks, malware, and more. They have been used in cybersecurity training and education at different levels. Serious games have targeted different audiences such as K-12 students, undergraduate and graduate students in academic institutions, and professionals in the cybersecurity workforce. In this paper, we provide a survey of serious games used in cybersecurity education and training. We categorize these games into …
Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman
Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman
KSU Proceedings on Cybersecurity Education, Research and Practice
This study extends the body of literature concerning security compliance by investigating the antecedents of HIPPA security compliance. A conceptual model, specifying a set of hypothesized relationships between management support, security awareness, security culture; security behavior, and risk of sanctions to address their effect on HIPAA security compliance is presented. This model was developed based on the review of the literature, Protection Motivation Theory, and General Deterrence Theory. Specifically, the aim of the study is to examine the mediating role of risk of sanctions on HIPAA security compliance.
Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus
Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus
KSU Proceedings on Cybersecurity Education, Research and Practice
Social engineering is the technique in which the attacker sends messages to build a relationship with the victim and convinces the victim to take some actions that lead to significant damages and losses. Industry and law enforcement reports indicate that social engineering incidents costs organizations billions of dollars. Phishing is the most pervasive social engineering attack. While email filtering and warning messages have been implemented for over three decades, organizations are constantly falling for phishing attacks. Prior research indicated that attackers use phishing emails to create an urgency and fear response in their victims causing them to use quick heuristics, …
Towards An Assessment Of Judgment Errors In Social Engineering Attacks Due To Environment And Device Type, Tommy Pollock, Yair Levy, Wei Li, Ajoy Kumar
Towards An Assessment Of Judgment Errors In Social Engineering Attacks Due To Environment And Device Type, Tommy Pollock, Yair Levy, Wei Li, Ajoy Kumar
KSU Proceedings on Cybersecurity Education, Research and Practice
Phishing continues to be a significant invasive threat to computer and mobile device users. Cybercriminals continuously develop new phishing schemes using email, and malicious search engine links to gather personal information of unsuspecting users. This information is used for financial gains through identity theft schemes or draining financial accounts of victims. Users are often distracted and fail to fully process the phishing attacks then unknowingly fall victim to the scam until much later. Users operating mobile phones and computers are likely to make judgment errors when making decisions in distracting environments due to cognitive overload. Distracted users can fail to …
Cybersecurity Strategy Against Cyber Attacks Towards Smart Grids With Pvs, Fangyu Li, Maria Valero, Liang Zhao, Yousef Mahmoud
Cybersecurity Strategy Against Cyber Attacks Towards Smart Grids With Pvs, Fangyu Li, Maria Valero, Liang Zhao, Yousef Mahmoud
KSU Proceedings on Cybersecurity Education, Research and Practice
Cyber attacks threaten the security of distribution power grids, such as smart grids. The emerging renewable energy sources such as photovoltaics (PVs) with power electronics controllers introduce new potential vulnerabilities. Based on the electric waveform data measured by waveform sensors in the smart grids, we propose a novel cyber attack detection and identification approach. Firstly, we analyze the cyber attack impacts (including cyber attacks on the solar inverter causing unusual harmonics) on electric waveforms in distribution power grids. Then, we propose a novel deep learning based mechanism including attack detection and attack diagnosis. By leveraging the electric waveform sensor data …
Visual Cryptography Scheme With Digital Watermarking In Sharing Secret Information From Car Number Plate Digital Images, Ana Savic, Goran Bjelobaba, Radosav Veselinovic, Hana Stefanovic
Visual Cryptography Scheme With Digital Watermarking In Sharing Secret Information From Car Number Plate Digital Images, Ana Savic, Goran Bjelobaba, Radosav Veselinovic, Hana Stefanovic
UBT International Conference
In this paper a visual cryptography scheme with a binary additive stream cipher is used to form the meaningless shares (share images or multiple layers) of original digital image, hiding some secret information. Each share image holds some information, but at the receiver side only when all of them are superimposed, the secret information is revealed by human vision without any complex computation. Proposed algorithm for generating shares is applied in MATLAB programming environment, using MATLAB built-in functions to create sequences of pseudorandom numbers or streams, which are used to make share images of original digital image. The input image …
How Do Kosovo Firms Utilize Business Intelligence? An Exploratory Study, Ardian Hyseni
How Do Kosovo Firms Utilize Business Intelligence? An Exploratory Study, Ardian Hyseni
UBT International Conference
The purpose of this paper is to examine how Kosovo firms utilize business intelligence to analyze their data and better understand the past, present and the future of their firm. Business intelligence offers firms the ability to analyze large amount of data quicker and more effective. Decision making has become easier with the use of BI tools, but making the right decision at right time has become vital for the firms performance. This research will contribute on business industry by providing evidence how Kosovo firms utilize the BI system, what BI tools and what business values and processes BI offers …
The Hidden Advantage Among Digital Natives Within Bug Bounty Programs, James (Jimmy) Allah-Mensah
The Hidden Advantage Among Digital Natives Within Bug Bounty Programs, James (Jimmy) Allah-Mensah
Cybersecurity Undergraduate Research Showcase
Bug bounty programs are a great way for companies and organizations to help keep their systems and information secure; however, there are only a limited number of white hat hacking participant spots. With only so many seats available at the table, being able to determine the most qualified group of individuals is critical to the efficiency of the program at large. Digital natives, people born into the digital age, provide an instinctive approach when dealing with technology. On the other hand, digital immigrants, people who grew up before the digital age and had to adapt to new technology, evidently utilize …
Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore
Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore
Cybersecurity Undergraduate Research Showcase
The future of smart homes is filled with excitement and ample opportunity to live in an environment that features extraordinary convenience and energy efficiency. Devices such as Amazon Alexa and Roku Smart TV’s feature voice interaction options that provide the user with enhanced functionality. While voice-activated devices are accommodating, it is imperative to acknowledge how they work on the backend. The problem is that these devices collect and share a large amount of data from users who are oftentimes unaware that it’s even happening. The Snitch App is being developed in order to inform the user of what exactly is …
Web Developer Summer Intern At Keller Williams Realty- Cs 7995, Revatee Vaidya, Project Advisor: Dawn Tatum
Web Developer Summer Intern At Keller Williams Realty- Cs 7995, Revatee Vaidya, Project Advisor: Dawn Tatum
C-Day Computing Showcase
The purpose of this poster is to outline the duties of a Summer intern at Keller Williams Realty in Atlanta, Georgia as a Web Developer Intern. At Keller Williams, my aim was to develop and design websites for Blue Apple Real Estate School and Blue Apple Homes using WordPress and Learn Dash. The poster discusses my summer training, projects I was involved in, Technologies I used and my future goals.
Global Product And Technology Intern, Adp- Cs 7995, Keerthi Manchukonda, Project Advisor: Dawn Tatum
Global Product And Technology Intern, Adp- Cs 7995, Keerthi Manchukonda, Project Advisor: Dawn Tatum
C-Day Computing Showcase
I'm working on API for the PDF service generation of the Canadian Tax forms(Federal and Provinces) in specific. But it can be used for all countries and states.
Global & Product Technology Intern Adp- Cs 7995, Neha Gosavi, Project Advisor: Dawn Tatum
Global & Product Technology Intern Adp- Cs 7995, Neha Gosavi, Project Advisor: Dawn Tatum
C-Day Computing Showcase
I am Neha Gosavi. I am graduate student in Computer Science and currently doing summer internship as Global Product & Technology Intern at ADP. As intern I am part of SRE team(Site Reliability Engineer ).SRE team comprised of engineers taken from a diverse set of disciplines. This cross functional team was designed to support one of the key product offered by the company. I was involved with AWS cloud migration Poject and docker application, Splunk dashboard.