Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (293)
- China Simulation Federation (140)
- Old Dominion University (96)
- Kennesaw State University (78)
- Missouri University of Science and Technology (65)
-
- University of Texas at El Paso (49)
- Lindenwood University (40)
- Dartmouth College (38)
- TÜBİTAK (37)
- Chinese Academy of Sciences (33)
- University of Nebraska - Lincoln (33)
- Zayed University (33)
- Edith Cowan University (32)
- Portland State University (31)
- Karbala International Journal of Modern Science (29)
- Utah State University (25)
- Clemson University (21)
- University of Tennessee, Knoxville (19)
- Michigan Technological University (18)
- Rowan University (17)
- Chapman University (16)
- Loyola University Chicago (16)
- University of Texas Rio Grande Valley (16)
- University of Central Florida (11)
- Western University (11)
- California Polytechnic State University, San Luis Obispo (10)
- City University of New York (CUNY) (10)
- MBZUAI (10)
- Air Force Institute of Technology (9)
- California State University, San Bernardino (9)
- Keyword
-
- Artificial intelligence (99)
- Machine learning (88)
- Deep learning (63)
- Artificial Intelligence (49)
- Machine Learning (43)
-
- Technical Reports (40)
- UTEP Computer Science Department (40)
- Cybersecurity (31)
- Deep Learning (27)
- AI (26)
- Generative AI (24)
- ChatGPT (22)
- Security (19)
- Computer vision (16)
- Blockchain (14)
- Classification (14)
- Computer Science (14)
- Clustering (13)
- Natural language processing (13)
- Optimization (13)
- Reinforcement learning (13)
- Privacy (12)
- Reinforcement Learning (12)
- Social media (12)
- Task analysis (12)
- Technology (12)
- Deep neural networks (11)
- Large Language Model (11)
- Algorithms (10)
- Data mining (10)
- Publication
-
- Research Collection School Of Computing and Information Systems (256)
- Journal of System Simulation (140)
- C-Day Computing Showcase (57)
- Computer Science Faculty Research & Creative Works (41)
- Departmental Technical Reports (CS) (40)
-
- Turkish Journal of Electrical Engineering and Computer Sciences (37)
- Faculty Scholarship (36)
- All Works (33)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (33)
- Computer Science Faculty Publications (32)
- Research outputs 2022 to 2026 (31)
- Theses and Dissertations (30)
- Karbala International Journal of Modern Science (29)
- Electronic Theses and Dissertations (20)
- Computer Science Senior Theses (19)
- All Graduate Theses and Dissertations, Fall 2023 to Present (16)
- Computer Science Faculty Publications and Presentations (16)
- Computer Science: Faculty Publications and Other Works (16)
- Dissertations and Theses Collection (Open Access) (14)
- Masters Theses (13)
- Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI (12)
- Doctoral Dissertations (12)
- Journal of Cybersecurity Education, Research and Practice (12)
- Dartmouth College Ph.D Dissertations (11)
- School of Computing: Faculty Publications (11)
- Electronic Thesis and Dissertation Repository (10)
- Faculty Publications (10)
- Honors Theses (10)
- Master's Theses (10)
- Dissertations and Doctoral Documents from University of Nebraska-Lincoln, 2023– (9)
- Publication Type
Articles 1 - 30 of 1694
Full-Text Articles in Physical Sciences and Mathematics
Interpreting Neural Networks For Particle Tracing In Fluid Simulation Ensembles: An Interactive Visualization Framework, Maanav Choubey
Interpreting Neural Networks For Particle Tracing In Fluid Simulation Ensembles: An Interactive Visualization Framework, Maanav Choubey
All Graduate Theses and Dissertations, Fall 2023 to Present
Understanding the internal mechanisms of neural networks, particularly Multi-Layer Perceptrons (MLP), is essential for their effective application in a variety of scientific domains. In particular, in the scientific visualization domain their adoption has recently shown to be a promising tool to predict particle trajectories in fluid dynamics simulation and aid the interactive visualization of flows. This research addresses the critical challenge of interpretability of such models.
While interpretability has been extensively explored in fields like computer vision and natural language processing, its application to time series data, particularly for particle tracing (or prediction of trajectories), has not garnered sufficient attention. …
Optimizing Mobility On Demand Systems: Multiagent Reinforcement Learning Approaches To Order Assignment And Vehicle Guidance, Jiyao Li
All Graduate Theses and Dissertations, Fall 2023 to Present
This dissertation explores ways to improve Mobility on Demand (MoD) systems, which are services like ride-sharing and autonomous taxi systems. The main goal is to make these services more efficient and reliable, benefiting both passengers and drivers by better matching the number of available vehicles with the number of people needing rides.
For ride-sharing services, a new method called T-Balance helps match riders with drivers and guides empty taxis to areas where more people need rides. This reduces wait times for passengers and increases earnings for drivers. Another method, called GRL-HM, looks at how riders and drivers behave to further …
Llm Potentiality And Awareness: A Position Paper From The Perspective Of Trustworthy And Responsible Ai Modeling, Iqbal H. Sarker
Llm Potentiality And Awareness: A Position Paper From The Perspective Of Trustworthy And Responsible Ai Modeling, Iqbal H. Sarker
Research outputs 2022 to 2026
Large language models (LLMs) are an exciting breakthrough in the rapidly growing field of artificial intelligence (AI), offering unparalleled potential in a variety of application domains such as finance, business, healthcare, cybersecurity, and so on. However, concerns regarding their trustworthiness and ethical implications have become increasingly prominent as these models are considered black-box and continue to progress. This position paper explores the potentiality of LLM from diverse perspectives as well as the associated risk factors with awareness. Towards this, we highlight not only the technical challenges but also the ethical implications and societal impacts associated with LLM deployment emphasizing fairness, …
Jamming Precoding In Af Relay-Aided Plc Systems With Multiple Eavessdroppers, Zhengmin Kong, Jiaxing Cui, Li Ding, Tao Huang, Shihao Yan
Jamming Precoding In Af Relay-Aided Plc Systems With Multiple Eavessdroppers, Zhengmin Kong, Jiaxing Cui, Li Ding, Tao Huang, Shihao Yan
Research outputs 2022 to 2026
Enhancing information security has become increasingly significant in the digital age. This paper investigates the concept of physical layer security (PLS) within a relay-aided power line communication (PLC) system operating over a multiple-input multiple-output (MIMO) channel based on MK model. Specifically, we examine the transmission of confidential signals between a source and a distant destination while accounting for the presence of multiple eavesdroppers, both colluding and non-colluding. We propose a two-phase jamming scheme that leverages a full-duplex (FD) amplify-and-forward (AF) relay to address this challenge. Our primary objective is to maximize the secrecy rate, which necessitates the optimization of the …
Asthma Prevalence Among United States Population Insights From Nhanes Data Analysis, Sarya Swed, Bisher Sawaf, Feras Al-Obeidat, Wael Hafez, Amine Rakab, Hidar Alibrahim, Mohamad Nour Nasif, Baraa Alghalyini, Abdul Rehman Zia Zaidi, Lamees Alshareef, Fadel Alqatati, Fathima Zamrath Zahir, Ashraf I. Ahmed, Mulham Alom, Anas Sultan, Abdullah Almahmoud, Agyad Bakkour, Ivan Cherrez-Ojeda
Asthma Prevalence Among United States Population Insights From Nhanes Data Analysis, Sarya Swed, Bisher Sawaf, Feras Al-Obeidat, Wael Hafez, Amine Rakab, Hidar Alibrahim, Mohamad Nour Nasif, Baraa Alghalyini, Abdul Rehman Zia Zaidi, Lamees Alshareef, Fadel Alqatati, Fathima Zamrath Zahir, Ashraf I. Ahmed, Mulham Alom, Anas Sultan, Abdullah Almahmoud, Agyad Bakkour, Ivan Cherrez-Ojeda
All Works
Asthma is a prevalent respiratory condition that poses a substantial burden on public health in the United States. Understanding its prevalence and associated risk factors is vital for informed policymaking and public health interventions. This study aims to examine asthma prevalence and identify major risk factors in the U.S. population. Our study utilized NHANES data between 1999 and 2020 to investigate asthma prevalence and associated risk factors within the U.S. population. We analyzed a dataset of 64,222 participants, excluding those under 20 years old. We performed binary regression analysis to examine the relationship of demographic and health related covariates with …
Sustainable Energysense: A Predictive Machine Learning Framework For Optimizing Residential Electricity Consumption, Murad Al-Rajab, Samia Loucif
Sustainable Energysense: A Predictive Machine Learning Framework For Optimizing Residential Electricity Consumption, Murad Al-Rajab, Samia Loucif
All Works
In a world where electricity is often taken for granted, the surge in consumption poses significant challenges, including elevated CO2 emissions and rising prices. These issues not only impact consumers but also have broader implications for the global environment. This paper endeavors to propose a smart application dedicated to optimizing the electricity consumption of household appliances. It employs Augmented Reality (AR) technology along with YOLO to detect electrical appliances and provide detailed electricity consumption insights, such as displaying the appliance consumption rate and computing the total electricity consumption based on the number of hours the appliance was used. The application …
Harnessing Collective Structure Knowledge In Data Augmentation For Graph Neural Networks, Rongrong Ma, Guansong Pang, Ling Chen
Harnessing Collective Structure Knowledge In Data Augmentation For Graph Neural Networks, Rongrong Ma, Guansong Pang, Ling Chen
Research Collection School Of Computing and Information Systems
Graph neural networks (GNNs) have achieved state-of-the-art performance in graph representation learning. Message passing neural networks, which learn representations through recursively aggregating information from each node and its neighbors, are among the most commonly-used GNNs. However, a wealth of structural information of individual nodes and full graphs is often ignored in such process, which restricts the expressive power of GNNs. Various graph data augmentation methods that enable the message passing with richer structure knowledge have been introduced as one main way to tackle this issue, but they are often focused on individual structure features and difficult to scale up with …
Exploring Post-Covid-19 Health Effects And Features With Advanced Machine Learning Techniques, Muhammad N. Islam, Md S. Islam, Nahid H. Shourav, Iftiaqur Rahman, Faiz A. Faisal, Md M. Islam, Iqbal H. Sarker
Exploring Post-Covid-19 Health Effects And Features With Advanced Machine Learning Techniques, Muhammad N. Islam, Md S. Islam, Nahid H. Shourav, Iftiaqur Rahman, Faiz A. Faisal, Md M. Islam, Iqbal H. Sarker
Research outputs 2022 to 2026
COVID-19 is an infectious respiratory disease that has had a significant impact, resulting in a range of outcomes including recovery, continued health issues, and the loss of life. Among those who have recovered, many experience negative health effects, particularly influenced by demographic factors such as gender and age, as well as physiological and neurological factors like sleep patterns, emotional states, anxiety, and memory. This research aims to explore various health factors affecting different demographic profiles and establish significant correlations among physiological and neurological factors in the post-COVID-19 state. To achieve these objectives, we have identified the post-COVID-19 health factors and …
Triadic Temporal-Semantic Alignment For Weakly-Supervised Video Moment Retrieval, Jin Liu, Jialong Xie, Fengyu Zhou, Shengfeng He
Triadic Temporal-Semantic Alignment For Weakly-Supervised Video Moment Retrieval, Jin Liu, Jialong Xie, Fengyu Zhou, Shengfeng He
Research Collection School Of Computing and Information Systems
Video Moment Retrieval (VMR) aims to identify specific event moments within untrimmed videos based on natural language queries. Existing VMR methods have been criticized for relying heavily on moment annotation bias rather than true multi-modal alignment reasoning. Weakly supervised VMR approaches inherently overcome this issue by training without precise temporal location information. However, they struggle with fine-grained semantic alignment and often yield multiple speculative predictions with prolonged video spans. In this paper, we take a step forward in the context of weakly supervised VMR by proposing a triadic temporalsemantic alignment model. Our proposed approach augments weak supervision by comprehensively addressing …
Development Of A Web-Based Information System For Student Leave Permission At Dar Al-Raudhah Islamic Boarding School: Iso Quality Standards Analysis, Bonita Destiana, Priyanto Priyanto, Rahmatul Irfan, Muhammad Gus Khamim, Muhammad Yusuf Ridlo, Muhammad Iqbal
Development Of A Web-Based Information System For Student Leave Permission At Dar Al-Raudhah Islamic Boarding School: Iso Quality Standards Analysis, Bonita Destiana, Priyanto Priyanto, Rahmatul Irfan, Muhammad Gus Khamim, Muhammad Yusuf Ridlo, Muhammad Iqbal
Elinvo (Electronics, Informatics, and Vocational Education)
Dar Al-Raudhah Entrepreneur, Islamic Boarding School, has adopted digital technology by upgrading hardware and software also investing in reliable internet infrastructure. However, this school still faces issues with students’ leave permission process due to reliance on manual bookkeeping and Excel, which leads to potential errors. Based on those problems, this research aims to create a web-based student leave permission system called SIPERSAN. The SIPERSAN system was developed with a Waterfall development model, which includes requirements analysis, design, implementation, testing, and deployment. The database is managed with MySQL, and the system is developed using PHP with the Laravel framework. Based on …
Efficient Multiplicative-To-Additive Function From Joye-Libert Cryptosystem And Its Application To Threshold Ecdsa, Haiyang Xue, Ho Man Au, Mengling Liu, Yin Kwan Chan, Handong Cui, Xiang Xie, Hon Tsz Yuen, Chengru Zhang
Efficient Multiplicative-To-Additive Function From Joye-Libert Cryptosystem And Its Application To Threshold Ecdsa, Haiyang Xue, Ho Man Au, Mengling Liu, Yin Kwan Chan, Handong Cui, Xiang Xie, Hon Tsz Yuen, Chengru Zhang
Research Collection School Of Computing and Information Systems
Threshold ECDSA receives interest lately due to its widespread adoption in blockchain applications. A common building block of all leading constructions involves a secure conversion of multiplicative shares into additive ones, which is called the multiplicative-to-additive (MtA) function. MtA dominates the overall complexity of all existing threshold ECDSA constructions. Specifically, O(n2) invocations of MtA are required in the case of n active signers. Hence, improvement of MtA leads directly to significant improvements for all state-of-the-art threshold ECDSA schemes.In this paper, we design a novel MtA by revisiting the Joye-Libert (JL) cryptosystem. Specifically, we revisit JL encryption and propose a JL-based …
Uncovering Merchants’ Willingness To Wait In On-Demand Food Delivery Markets, Jian Liang, Ya Zhao, Hai Wang, Zuopeng Xiao, Jintao Ke
Uncovering Merchants’ Willingness To Wait In On-Demand Food Delivery Markets, Jian Liang, Ya Zhao, Hai Wang, Zuopeng Xiao, Jintao Ke
Research Collection School Of Computing and Information Systems
While traditional on-demand food delivery services help restaurants reach more customers and enable doorstep deliveries, they also come with drawbacks, such as high commission fees and limited control over the delivery process. White-label food delivery services have emerged as an alternative, ready-to-use platform for restaurants to arrange delivery for customer orders received through their applications or websites, without the constraints imposed by traditional on-demand food delivery platforms or the need to develop an in-house delivery operation. Although several studies have investigated consumer behavior when using traditional on-demand food delivery services, there is limited research on merchants’ behavior when adopting white-label …
Resilient Tcp Variant Enabling Smooth Network Updates For Software-Defined Data Center Networks, Abdul Basit Dogar, Sami Ullah, Yiran Zhang, Hisham Alasmary, Muhammad Waqas, Sheng Chen
Resilient Tcp Variant Enabling Smooth Network Updates For Software-Defined Data Center Networks, Abdul Basit Dogar, Sami Ullah, Yiran Zhang, Hisham Alasmary, Muhammad Waqas, Sheng Chen
Research outputs 2022 to 2026
Network updates have become increasingly prevalent since the broad adoption of software-defined networks (SDNs) in data centers. Modern TCP designs, including cutting-edge TCP variants DCTCP, CUBIC, and BBR, however, are not resilient to network updates that provoke flow rerouting. In this paper, we first demonstrate that popular TCP implementations perform inadequately in the presence of frequent and inconsistent network updates, because inconsistent and frequent network updates result in out-of-order packets and packet drops induced via transitory congestion and lead to serious performance deterioration. We look into the causes and propose a network update-friendly TCP (NUFTCP), which is an extension of …
On The Lossiness Of 2k-Th Power And The Instantiability Of Rabin-Oaep, Haiyang Xue, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu
On The Lossiness Of 2k-Th Power And The Instantiability Of Rabin-Oaep, Haiyang Xue, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu
Research Collection School Of Computing and Information Systems
Seurin PKC 2014 proposed the 2-ï /4-hiding assumption which asserts the indistinguishability of Blum Numbers from pseudo Blum Numbers. In this paper, we investigate the lossiness of 2 k -th power based on the 2 k -ï /4-hiding assumption, which is an extension of the 2-ï /4-hiding assumption. And we prove that 2 k -th power function is a lossy trapdoor permutation over Quadratic Residuosity group. This new lossy trapdoor function has 2 k -bits lossiness for k -bits exponent, while the RSA lossy trapdoor function given by Kiltz et al. Crypto 2010 has k -bits lossiness for k -bits …
D2sr: Decentralized Detection, De-Synchronization, And Recovery Of Lidar Interference, Darshana Rathnayake, Hemanth Sabbella, Meera Radhakrishnan, Archan Misra
D2sr: Decentralized Detection, De-Synchronization, And Recovery Of Lidar Interference, Darshana Rathnayake, Hemanth Sabbella, Meera Radhakrishnan, Archan Misra
Research Collection School Of Computing and Information Systems
We address the challenge of multi-LiDAR interference, an issue of growing importance as LiDAR sensors are embedded in a growing set of pervasive devices. We introduce a novel approach named D2SR, enabling decentralized interference detection, mitigation, and recovery without explicit coordination among nearby LiDAR devices. D2SR comprises three stages: (a) Detection, which identifies interfered frames, (b) Mitigation, which performs time-shifting of a LiDAR’s active period to reduce interference, and (c) Recovery, which corrects or reconstructs the depth values in interfered regions of a depth frame. Key contributions include a lightweight interference detection algorithm achieving an F1-score of 92%, a simple …
Bibliography For "Ai: The Next Chapter Display", Arianna Tillman, Isabella Piechota
Bibliography For "Ai: The Next Chapter Display", Arianna Tillman, Isabella Piechota
Library Displays and Bibliographies
A bibliography created to support a display about artificial intelligence at the Leatherby Libraries during Fall 2024 at the Leatherby Libraries at Chapman University.
Generative Ai In Software Engineering Must Be Human-Centered: The Copenhagen Manifesto, D. Russo, S. Van Berkel Baltes, Christoph Treude
Generative Ai In Software Engineering Must Be Human-Centered: The Copenhagen Manifesto, D. Russo, S. Van Berkel Baltes, Christoph Treude
Research Collection School Of Computing and Information Systems
The advent of Generative Artificial Intelligence—systems that can produce human-like content such as text, music, visual art, or source code—marks not only a significant leap for Artificial Intelligence (AI) but also a pivotal moment for software practitioners and researchers. The role of software engineering researchers and practitioners in adopting the technologies that shape our world is critical. Historically, the human aspects of developing software have been treated as secondary to more technical innovations. However, the emergence of Generative AI will simultaneously enhance human capabilities while surfacing complex ethical, social, legal, and technical challenges.While primarily aimed at software engineering (SE) researchers …
Hisoma: A Hierarchical Multi-Agent Model Integrating Self-Organizing Neural Networks With Multi-Agent Deep Reinforcement Learning, Minghong Geng, Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan
Hisoma: A Hierarchical Multi-Agent Model Integrating Self-Organizing Neural Networks With Multi-Agent Deep Reinforcement Learning, Minghong Geng, Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Multi-agent deep reinforcement learning (MADRL) has shown remarkable advancements in the past decade. However, most current MADRL models focus on task-specific short-horizon problems involving a small number of agents, limiting their applicability to long-horizon planning in complex environments. Hierarchical multi-agent models offer a promising solution by organizing agents into different levels, effectively addressing tasks with varying planning horizons. However, these models often face constraints related to the number of agents or levels of hierarchies. This paper introduces HiSOMA, a novel hierarchical multi-agent model designed to handle long-horizon, multi-agent, multi-task decision-making problems. The top-level controller, FALCON, is modeled as a class …
What Do We Know About Hugging Face? A Systematic Literature Review And Quantitative Validation Of Qualitative Claims, Jason Jones, Wenxin Jiang, Nicholas Synovic, George K. Thiruvathukal, James C. Davis
What Do We Know About Hugging Face? A Systematic Literature Review And Quantitative Validation Of Qualitative Claims, Jason Jones, Wenxin Jiang, Nicholas Synovic, George K. Thiruvathukal, James C. Davis
Computer Science: Faculty Publications and Other Works
Background: Collaborative Software Package Registries (SPRs) are an integral part of the software supply chain. Much engineering work synthesizes SPR package into applications. Prior research has examined SPRs for traditional software, such as NPM (JavaScript) and PyPI (Python). Pre-Trained Model (PTM) Registries are an emerging class of SPR of increasing importance, because they support the deep learning supply chain.
Aims: Recent empirical research has examined PTM registries in ways such as vulnerabilities, reuse processes, and evolution. However, no existing research synthesizes them to provide a systematic understanding of the current knowledge. Some of the existing research includes qualitative …
Ocapo: Fine-Grained Occupancy-Aware, Empirically-Driven Pdc Control In Open-Plan, Shared Workspaces, Ravi Anuradha, Dulaj Sanjaya Weerakoon, Archan Misra
Ocapo: Fine-Grained Occupancy-Aware, Empirically-Driven Pdc Control In Open-Plan, Shared Workspaces, Ravi Anuradha, Dulaj Sanjaya Weerakoon, Archan Misra
Research Collection School Of Computing and Information Systems
Passive Displacement Cooling (PDC) is a relatively recent technology gaining attention as a means of significantly reducing building energy consumption overheads, especially in tropical climates. PDC eliminates the use of mechanical fans, instead using chilled-water heat exchangers to perform convective cooling. In this paper, we identify and characterize the impact of several key parameters affecting occupant comfort in a 1000m2 open-floor area (consisting of multiple zones) of a ZEB (Zero Energy Building) deployed with PDC units and tackle the problem of setting the temperature setpoint of the PDC units to assure occupant thermal comfort and yet conserve energy. We tackle …
Does Ceo Agreeableness Personality Mitigate Real Earnings Management?, Shan Liu, Xingying Wu, Nan Hu
Does Ceo Agreeableness Personality Mitigate Real Earnings Management?, Shan Liu, Xingying Wu, Nan Hu
Research Collection School Of Computing and Information Systems
Despite efforts to mitigate aggressive financial reporting, earnings management remains challenging to parties interested in inhibiting its dysfunctional effects. Using linguistic algorithms to assess CEO agreeableness personality from their unscripted texts in conference calls, we find that it is a determinant that mitigates a firm's real earnings management. Furthermore, such an effect is more pronounced when firms confront intensive market competition and financial distress and have weaker managerial entrenchment or when CEOs face stronger internal governance. Our findings persist even after we utilize several alternative real earnings management metrics and control other confounding personalities in prior earnings management studies. The …
Retrofitting A Legacy Cutlery Washing Machine Using Computer Vision, Hua Leong Fwa
Retrofitting A Legacy Cutlery Washing Machine Using Computer Vision, Hua Leong Fwa
Research Collection School Of Computing and Information Systems
Industry 4.0, the digitalization of manufacturing promises to lead to lowered cost, efficient processes and even discovery of new business models. However, many of the enterprises have huge investments in legacy machines which are not 'smart'. In this study, we thus designed a cost-efficient solution to retrofit a legacy conveyor belt-based cutlery washing machine with a commodity web camera. We then applied computer vision (using both traditional image processing and deep learning techniques) to infer the speed and utilization of the machine. We detailed the algorithms that we designed for computing both speed andutilization. With the existing operational constraints of …
How State Universities Are Addressing The Shortage Of Cybersecurity Professionals In The United States, Gary Harris
How State Universities Are Addressing The Shortage Of Cybersecurity Professionals In The United States, Gary Harris
Journal of Cybersecurity Education, Research and Practice
Cybersecurity threats have been a serious and growing problem for decades. In addition, a severe shortage of cybersecurity professionals has been proliferating for nearly as long. These problems exist in the United States and globally and are well documented in literature. This study examined what state universities are doing to help address the shortage of cybersecurity professionals since higher education institutions are a primary source to the workforce pipeline. It is suggested that the number of cybersecurity professionals entering the workforce is related to the number of available programs. Thus increasing the number of programs will increase the number of …
A Limited-Preemption Scheduling Model Inspired By Security Considerations, Benjamin Standaert, Fatima Raadia, Marion Sudvarg, Sanjoy Baruah, Thidapat Chantem, Nathan Fisher, Christopher Gill
A Limited-Preemption Scheduling Model Inspired By Security Considerations, Benjamin Standaert, Fatima Raadia, Marion Sudvarg, Sanjoy Baruah, Thidapat Chantem, Nathan Fisher, Christopher Gill
Computer Science and Engineering Publications and Presentations
Safety-critical embedded systems such as autonomous vehicles typically have only very limited computational capabilities on board that must be carefully managed to provide required enhanced functionalities. As these systems become more complex and inter-connected, some parts may need to be secured to prevent unauthorized access, or isolated to ensure correctness.
We propose the multi-phase secure (MPS) task model as a natural extension of the widely used sporadic task model for modeling both the timing and the security (and isolation) requirements for such systems. Under MPS, task phases reflect execution using different security mechanisms which each have associated execution time costs …
Synthesis Of Zno: Zro2 Nanocomposites Using Green Method For Medical Applications, Mohammed J. Tuama, Maysoon F. Alias
Synthesis Of Zno: Zro2 Nanocomposites Using Green Method For Medical Applications, Mohammed J. Tuama, Maysoon F. Alias
Karbala International Journal of Modern Science
These days, nanocomposites are very popular, especially in medical applications. The spread of diseases in general, and those caused by microbes and cancerous diseases in particular, and the increased resistance of these diseases to antibiotics, have led to the need for the rapid, low-cost, and environmentally friendly production of nanocomposites. To create the chemical G-ZnO: ZrO2 and S-ZnO: ZrO2 (green technique), two different plant extracts were utilized: Z. officinal and S. aromaticum. The effective synthesis and acceptable properties features of the nanoparticles were confirmed using characterization techniques such as X-ray diffraction (XRD), Fourier transform infrared (FTIR) , diffuse reflectance spectroscopy …
Systematic Review On Isolation, Purification, Characterization, And Industrial Applications Of Thermophilic Microbial Α- Amylases, Rugaiyah A. Arfah, Sarlan Sarlan, Abdul Karim, Anita Anita, Ahyar Ahmad, Paulina Taba, Harningsih Karim, Siti Halimah Larekeng, Dorothea Agnes Rampisela, Rusdina Bte Ladju
Systematic Review On Isolation, Purification, Characterization, And Industrial Applications Of Thermophilic Microbial Α- Amylases, Rugaiyah A. Arfah, Sarlan Sarlan, Abdul Karim, Anita Anita, Ahyar Ahmad, Paulina Taba, Harningsih Karim, Siti Halimah Larekeng, Dorothea Agnes Rampisela, Rusdina Bte Ladju
Karbala International Journal of Modern Science
The α-amylase enzyme, sourced from diverse organisms, including plants, animals, and bacteria, plays a crucial role in multiple industries, notably food processing sectors like cakes, fruit juices, and starch syrup. Research identifies thermophilic organisms as prime sources of this enzyme thriving at temperatures ranging from 41°C to 122°C. The enzyme purification was carried out using liquid-liquid extraction, which involved the exchange of substances between two liquid phases that were immiscible or partially soluble. The optimal temperature for α-amylase was 45 to 90°C. The best pH for bacterial and fungal α-amylases ranged from 5.0 to 10.5 and 5.0 to 9.0. Based …
The Aimag Project: Using Machine Learning To Predict Crustal Magnetic Anomaly Values, Xavier Gobble, Marlie Mollett, Dr. Dawn King, Dr. Cory Reed, Erin Knese
The Aimag Project: Using Machine Learning To Predict Crustal Magnetic Anomaly Values, Xavier Gobble, Marlie Mollett, Dr. Dawn King, Dr. Cory Reed, Erin Knese
Undergraduate Research Symposium
A detailed model of the Earth’s total magnetic field is important for acquiring the means for GPS-alternative, magnetic anomaly-based navigation. The Earth’s total magnetic field is an amalgam of 5 mechanisms: the geodynamo generated by the rotation of the Earth’s molten iron core, the fields induced by the flows of electric current in the atmosphere and oceans, the disturbance of the ionosphere by solar wind, and local anomalies attributable to ferromagnetic minerals present in the crust; the lattermost compose the crustal magnetic field. The EMAG2v3 dataset comprises a compilation of satellite, shipborne, and airborne magnetic measurements differenced from the Comprehensive …
Leveraging Propagation Delay For Wormhole Detection In Wireless Networks, Harry May, Travis Atkison
Leveraging Propagation Delay For Wormhole Detection In Wireless Networks, Harry May, Travis Atkison
Journal of Cybersecurity Education, Research and Practice
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based detection or specialized hardware, our method focuses on analyzing propagation delay timings to identify anomalous behavior indicative of wormhole attacks. The proposed methodology involves collecting propagation delay data in both normal network scenarios and scenarios with inserted malicious wormhole nodes. By comparing these delay timings, our approach aims to differentiate between legitimate network …
Understanding The Use Of Artificial Intelligence In Cybercrime, Sinyong Choi, Thomas Dearden, Katalin Parti
Understanding The Use Of Artificial Intelligence In Cybercrime, Sinyong Choi, Thomas Dearden, Katalin Parti
International Journal of Cybersecurity Intelligence & Cybercrime
Artificial intelligence is one of the newest innovations that offenders also exploit to satisfy their criminal desires. Although understanding cybercrimes associated with this relatively new technology is essential in developing proper preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the articles featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, ranging from deepfake in the metaverse to social engineering attacks. This issue includes articles that were presented by the winners of the student paper competition at the 2024 International White Hat Conference.
Cyber Victimization In The Healthcare Industry: Analyzing Offender Motivations And Target Characteristics Through Routine Activities Theory (Rat) And Cyber-Routine Activities Theory (Cyber-Rat), Yashna Praveen, Mijin Kim, Kyung-Shick Choi
Cyber Victimization In The Healthcare Industry: Analyzing Offender Motivations And Target Characteristics Through Routine Activities Theory (Rat) And Cyber-Routine Activities Theory (Cyber-Rat), Yashna Praveen, Mijin Kim, Kyung-Shick Choi
International Journal of Cybersecurity Intelligence & Cybercrime
The integration of computer technology in healthcare has revolutionized patient care but has also introduced significant cyber risks. Despite the healthcare sector being a primary target for cyber-attacks, research on the dynamics of these threats and practical solutions remains limited. Understanding the complexities of cyberattacks in this sector is critical, as the impact extends beyond financial losses to directly affect patient care and the protection of sensitive information. This paper applies Routine Activities Theory (RAT) and Cyber Routine Activities Theory (C-RAT) to analyze high-tech cyber victimization case studies in healthcare. The analysis explores the motivations behind these attacks and identifies …