Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Conference

2023

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 162

Full-Text Articles in Physical Sciences and Mathematics

The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati Dec 2023

The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati

Cybersecurity Undergraduate Research Showcase

This paper explores the transformative potential of integrating Artificial Intelligence (AI) with established cybersecurity frameworks such as the Cybersecurity Maturity Model Certification (CMMC) and the National Institute of Standards and Technology (NIST) Special Publication 800-171. The thesis argues that the relationship between AI and these frameworks has the capacity to transform risk management in cybersecurity, where it could serve as a critical element in threat mitigation. In addition to addressing AI’s capabilities, this paper acknowledges the risks and limitations of these systems, highlighting the need for extensive research and monitoring when relying on AI. One must understand boundaries when integrating …


The Vulnerabilities To The Rsa Algorithm And Future Alternative Algorithms To Improve Security, James Johnson Dec 2023

The Vulnerabilities To The Rsa Algorithm And Future Alternative Algorithms To Improve Security, James Johnson

Cybersecurity Undergraduate Research Showcase

The RSA encryption algorithm has secured many large systems, including bank systems, data encryption in emails, several online transactions, etc. Benefiting from the use of asymmetric cryptography and properties of number theory, RSA was widely regarded as one of most difficult algorithms to decrypt without a key, especially since by brute force, breaking the algorithm would take thousands of years. However, in recent times, research has shown that RSA is getting closer to being efficiently decrypted classically, using algebraic methods, (fully cracked through limited bits) in which elliptic-curve cryptography has been thought of as the alternative that is stronger than …


The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby Dec 2023

The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby

Cybersecurity Undergraduate Research Showcase

The significance of cybersecurity methods, strategies, and programs in protecting computers and electronic devices is crucial throughout the technological infrastructure. Despite the considerable growth in the cybersecurity field and its expansive workforce, there exists a notable underrepresentation, specifically among Black/African American females. This study examines the barriers hindering the inclusion of Black women in the cybersecurity workforce such as socioeconomic factors, limited educational access, biases, and workplace culture. The urgency of addressing these challenges calls for solutions such as education programs, mentorship initiatives, creating inclusive workplace environments, and promoting advocacy and increased awareness within the cybersecurity field. Additionally, this paper …


The Analysis And Impact Of Artificial Intelligence On Job Loss, Ava Baratz Dec 2023

The Analysis And Impact Of Artificial Intelligence On Job Loss, Ava Baratz

Cybersecurity Undergraduate Research Showcase

This paper illustrates the analysis and impact of Artificial Intelligence (AI) on job loss across various industries. This paper will discuss an overview of AI technology, a brief history of AI in industry, the positive impacts of AI, the negative impacts of AI on employment, AI considerations that contribute to job loss, the future outlook of AI, and employment loss mitigation strategies Various professional source articles and reputable blog posts will be used to finalize research on this topic.


Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson Dec 2023

Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson

Cybersecurity Undergraduate Research Showcase

For this research project I used a Raspberry Pi device and conducted online research to investigate potential security vulnerabilities along with mitigation strategies. I configured the Raspberry Pi by using the proper peripherals such as an HDMI cord, a microUSB adapter that provided 5V and at least 700mA of current, a TV monitor, PiSwitch, SD Card, keyboard, and mouse. I installed the Rasbian operating system (OS). The process to install the Rasbian took about 10 minutes to boot starting at 21:08 on 10/27/2023 and ending at 21:18. 1,513 megabytes (MB) was written to the SD card running at (2.5 MB/sec). …


Rising Threat - Deepfakes And National Security In The Age Of Digital Deception, Dougo Kone-Sow Dec 2023

Rising Threat - Deepfakes And National Security In The Age Of Digital Deception, Dougo Kone-Sow

Cybersecurity Undergraduate Research Showcase

This paper delves into the intricate landscape of deepfakes, exploring their genesis, capabilities, and far-reaching implications. The rise of deepfake technology presents an unprecedented threat to American national security, propagating disinformation and manipulation across various media formats. Notably, deepfakes have evolved from a historical backdrop of disinformation campaigns, merging with the advancements of artificial intelligence (AI) and machine learning to craft convincing but false multimedia content.

Examining the capabilities of deepfakes reveals their potential for misuse, evidenced by instances targeting individuals, companies, and even influencing political events like the 2020 U.S. elections. The paper highlights the direct threats posed by …


Integrating Ai Into Uavs, Huong Quach Dec 2023

Integrating Ai Into Uavs, Huong Quach

Cybersecurity Undergraduate Research Showcase

This research project explores the application of Deep Learning (DL) techniques, specifically Convolutional Neural Networks (CNNs), to develop a smoke detection algorithm for deployment on mobile platforms, such as drones and self-driving vehicles. The project focuses on enhancing the decision-making capabilities of these platforms in emergency response situations. The methodology involves three phases: algorithm development, algorithm implementation, and testing and optimization. The developed CNN model, based on ResNet50 architecture, is trained on a dataset of fire, smoke, and neutral images obtained from the web. The algorithm is implemented on the Jetson Nano platform to provide responsive support for first responders. …


New Paths Of Attacks: Revealing The Adaptive Integration Of Artificial Intelligence In Evolving Cyber Threats Targeting Social Media Users And Their Data, Larry Teasley Dec 2023

New Paths Of Attacks: Revealing The Adaptive Integration Of Artificial Intelligence In Evolving Cyber Threats Targeting Social Media Users And Their Data, Larry Teasley

Cybersecurity Undergraduate Research Showcase

The intersection between artificial intelligence tools and social media has opened doors to numerous opportunities and risks. This research delves into the escalating threat landscape in a society heavily dependent on social media. Despite the efforts by social media companies and cybersecurity professionals to mitigate cyber-attacks, the constant advancements of new technologies render social media platforms increasingly vulnerable. Malicious actors exploit generative AI to collect user data, enhancing cyber threats on social media. Notably, generative AI amplifies phishing attacks, disseminates false information, and propagates propaganda, posing substantial challenges to platform security. Ease access to large language models (LLMs) further complicates …


Lip(S) Service: A Socioethical Overview Of Social Media Platforms’ Censorship Policies Regarding Consensual Sexual Content, Sage Futrell Dec 2023

Lip(S) Service: A Socioethical Overview Of Social Media Platforms’ Censorship Policies Regarding Consensual Sexual Content, Sage Futrell

Cybersecurity Undergraduate Research Showcase

The regulation of sexual exploitation on social media is a pressing issue that has been addressed by government legislation. However, laws such as FOSTA-SESTA has inadvertently restricted consensual expressions of sexuality as well. In four social media case studies, this paper investigates the ways in which marginalized groups have been impacted by changing censorship guidelines on social media, and how content moderation methods can be inclusive of these groups. I emphasize the qualitative perspectives of sex workers and queer creators in these case studies, in addition to my own experiences as a content moderation and social media management intern for …


A Review Of Threat Vectors To Dna Sequencing Pipelines, Tyler Rector Dec 2023

A Review Of Threat Vectors To Dna Sequencing Pipelines, Tyler Rector

Cybersecurity Undergraduate Research Showcase

Bioinformatics is a steadily growing field that focuses on the intersection of biology with computer science. Tools and techniques developed within this field are quickly becoming fixtures in genomics, forensics, epidemiology, and bioengineering. The development and analysis of DNA sequencing and synthesis have enabled this significant rise in demand for bioinformatic tools. Notwithstanding, these bioinformatic tools have developed in a research context free of significant cybersecurity threats. With the significant growth of the field and the commercialization of genetic information, this is no longer the case. This paper examines the bioinformatic landscape through reviewing the biological and cybersecurity threats within …


Privacy Concerns And Proposed Solutions With Iot In Wearable Technology, Hyacinth Abad Dec 2023

Privacy Concerns And Proposed Solutions With Iot In Wearable Technology, Hyacinth Abad

Cybersecurity Undergraduate Research Showcase

This paper examines the dynamic relationship between IoT cybersecurity and privacy concerns associated with wearable devices. IoT, with its exponential growth, presents both opportunities and challenges in terms of accessibility, integrity, availability, scalability, confidentiality, and interoperability. Cybersecurity concerns arise as diverse attack surfaces exploit vulnerabilities in IoT systems, necessitating robust defenses. In the field of wearable technology, these devices offer benefits like health data tracking and real-time communication. However, the adoption of these devices raises privacy concerns. The paper explores proposed solutions, including mechanisms for user-controlled data collection, the implementation of Virtual Trip Line (VTL) and virtual wall approaches, and …


How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim Dec 2023

How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim

Cybersecurity Undergraduate Research Showcase

The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …


Gr-493 Advancing Non-Invasive Glucose Monitoring Through Integrated Physical Factors And Wavelength Optimization, El Arbi Belfarsi Nov 2023

Gr-493 Advancing Non-Invasive Glucose Monitoring Through Integrated Physical Factors And Wavelength Optimization, El Arbi Belfarsi

C-Day Computing Showcase

This work examines the effects of physical factors like skin tone, temperature, thickness, and humidity on the performance of GlucoCheck, a non-invasive glucose monitoring device using IR technology. It delves into how these variables influence light absorption and scattering in the skin, affecting IR image quality in GlucoCheck. The research addresses how skin humidity alters transmittance, and skin temperature and color diversely impact light absorption. These findings underscore the importance of considering these variables to improve glucose level predictions. We propose a data collection strategy using advanced sensors for real-time acquisition of these factors, integrating them into the algorithm for …


Uc-401 Website Hardening And Ethical Hacking, Alex L Liu, Samrat H Pandya, Kennedy A Sanchez, Kenny M Frontin, Komlan I Wogomebu Nov 2023

Uc-401 Website Hardening And Ethical Hacking, Alex L Liu, Samrat H Pandya, Kennedy A Sanchez, Kenny M Frontin, Komlan I Wogomebu

C-Day Computing Showcase

This project is to showcase a real life scenario of securing a theoretical business website on Red Hat Linux, Apache, MariaDB, and PHP hosted in a virtual machine. The project objective is for a team to research ways to secure the theoretical business website, develop and implement security policies, and perform a red/blue team exercise. This project is a way for a team to exercise ethical hacking in a closed environment to obtain experience.


Uc-424 Ai Limitations For Web Devlopment, Jacob J. Lalicata, Josh Garske, Thomas Rowlinson, Matthew Madrigal, Muyiwa E. Adewumi Nov 2023

Uc-424 Ai Limitations For Web Devlopment, Jacob J. Lalicata, Josh Garske, Thomas Rowlinson, Matthew Madrigal, Muyiwa E. Adewumi

C-Day Computing Showcase

This research project delves into the exploratory journey of using an AI (Artificial Intelligence), specifically ChatGPT, to assist in developing an auction website. Highlighting the iterative process of problem identification, solution finding, and implementation during development, this project aims to furnish insights into leveraging AI capabilities while addressing its limitations. Through this, developers and AI enthusiasts can gain a comprehensive understanding of effective collaboration with AI, addressing common pitfalls, and devising solutions during software development.


Uc-491 Spectrum Analysis Cli Tool, Vitor B. Santos, Trey Redden, Sam Corella, Christopher Flores Santos, Jonathan Glennon Nov 2023

Uc-491 Spectrum Analysis Cli Tool, Vitor B. Santos, Trey Redden, Sam Corella, Christopher Flores Santos, Jonathan Glennon

C-Day Computing Showcase

The Spectrum Analysis CLI Tool takes in .mp4 recordings of a Spectrum Analyzer, converts them programmatically into values the application can understand and outputs this data into a .csv file. This file can be parsed/filtered by the user with commands during upload of the .mp4 recording, or anytime after the recording has been processed.


Uc-502 Chess App With Ai, Connor Handley, John Paul Cohran, Cole Smith, Paul Russell, Eric Tsai Nov 2023

Uc-502 Chess App With Ai, Connor Handley, John Paul Cohran, Cole Smith, Paul Russell, Eric Tsai

C-Day Computing Showcase

The objective of this project is to create a website that contains a virtual chess game, where the user can play against an opponent powered by an artificial intelligence model. This chess platform will be a widely accessible and user-friendly way to become more familiar with and practice the game of chess.


Ur-484 Ai Detection – Chat Gpt, Wylder Everett, Daniel Mode, Paul Nguyen, Alfred Johnson, Bilal Khan Nov 2023

Ur-484 Ai Detection – Chat Gpt, Wylder Everett, Daniel Mode, Paul Nguyen, Alfred Johnson, Bilal Khan

C-Day Computing Showcase

With the emergence of large language models (LLM) and Artificial Intelligence (AI) assistants like ChatGPT, accompanying tremendous potentials are critical challenges. Indeed, these assistant systems can provide quality information with conveniences. However, the generated contents are highly problematic being seemingly indistinguishable from that of human. The implication of this issue is severe in science, education, and domains that value original contents. With such motivation, this project addresses the task of identifying ChatGPT-synthesized texts with a focus on education, specifically, in short-answer questions. The goal of the project is to develop an AI technology that identifies synthesized texts by comparing such …


Gr-504 Synthetic Dna Sequence Generation And Classification For Species Discrimination, Nishat Tasnim Nov 2023

Gr-504 Synthetic Dna Sequence Generation And Classification For Species Discrimination, Nishat Tasnim

C-Day Computing Showcase

The two main goals of this research are to apply machine learning models in computational biology to classify DNA sequences from different species and to create synthetic DNA sequences using GANs. Generative Adversarial Networks (GANs) synthesize DNA sequences while preserving key characteristics like sequence length and GC content. The dataset is enhanced by these artificial sequences, which makes classification jobs better. The classification accuracy of black rat and human genome sequences is evaluated using machine learning models, including Random Forest, SVM, and Logistic Regression. Notably, when trained with synthetic data, all models perform better.


Gc-447 Bio-Contribute, Tejaswi Divi, Kiranmayi Tandra, Sainath Reddy Bheemireddy, Chandrasekhar Reddy Bheemireddy, Sharanya Chinthakuntla Nov 2023

Gc-447 Bio-Contribute, Tejaswi Divi, Kiranmayi Tandra, Sainath Reddy Bheemireddy, Chandrasekhar Reddy Bheemireddy, Sharanya Chinthakuntla

C-Day Computing Showcase

The "Bio-Contribute" challenge is an ambitious initiative aimed at revolutionizing the way facts are generated and shared in lifestyle sciences. Bio-Contribute encompasses various aspects, including design, development, and facts collection. It leverages Figma for innovation, ensuring a user-friendly and collaborative interface. The challenge has completed the frontend development section, permitting customers to carry out various movements, which include content advent and information seizure with the help of the GPT-3 era. This report gives an in-depth analysis of the venture's progression, strategies used, and initial outcomes, demonstrating its potential to convert statistics introduction and sharing in the discipline of lifestyles sciences.


Uc-454 Resilient Infrastructures: Enhancing Akwaaba's Cyber Defenses, Christian Mckee, Mateen Begum, Marisa G. Diaz, Kelvin Nguyen, Shreya Patel Nov 2023

Uc-454 Resilient Infrastructures: Enhancing Akwaaba's Cyber Defenses, Christian Mckee, Mateen Begum, Marisa G. Diaz, Kelvin Nguyen, Shreya Patel

C-Day Computing Showcase

The project focuses on securing the server infrastructure of Akwaaba, a Caribbean-inspired steakhouse chain with locations in New York City, Atlanta, and Los Angeles. It involves assessing risks, implementing mitigation strategies, and establishing access policies for the on-premise servers. The student team will analyze the Red Hat Linux-based Virtual Machine hosting the WordPress website, which uses PHP, MariaDB, and Apache. Their objective is to prevent intrusions and data breaches that could compromise customer and business data. Furthermore, the team will perform Red and Blue team penetration testing to evaluate security measures and simulate potential attacks. They will incorporate the latest …


Uc-523: It 4983 Server Hardening, Manuel Chico, Gilbert Vuong, Harrison Jones, George Barber Nov 2023

Uc-523: It 4983 Server Hardening, Manuel Chico, Gilbert Vuong, Harrison Jones, George Barber

C-Day Computing Showcase

The team was assigned the responsibility of securing a web server. This business website is hosted on a technology stack comprising Apache, MariaDB, Red Hat Linux, and PHP. Our initial task involves conducting a comprehensive assessment of the provided network to identify vulnerabilities and assess potential risks. Subsequently, we will develop a robust security policy plan in alignment with the standards set forth by the National Institute of Standards and Technology (NIST) and industry best practices. Once the plan was approved, our group will proceed to implement the recommended changes to fortify the network, ensuring it complies with industry best …


Egc-442 Sars-Cov-2 Spike And Ace2 Protein-Protein Interactions Database, Jovanny Duran Salgado, Durga Narayana Varma Addepalli, Travis Meeks, Pooja Venkata Ramana Adapa, Divya Sri Ambati Nov 2023

Egc-442 Sars-Cov-2 Spike And Ace2 Protein-Protein Interactions Database, Jovanny Duran Salgado, Durga Narayana Varma Addepalli, Travis Meeks, Pooja Venkata Ramana Adapa, Divya Sri Ambati

C-Day Computing Showcase

SARS-CoV-2 protein interactions are essential for viral replication and pathogenesis. To better understand these interactions, we have created a database using AWS (Amazon Web Services) to store data extracted from protein simulations. This database can be used to study the structure and function of SARS-CoV-2 proteins and their interactions with each other and with host cell proteins.


Gc-479 Bioeduhub, Tejesh R Chintam, Shiswa Preethi Chopparapu, Viswa Narendra Reddy Panati, Lithin Venkata Sai Pasupuleti, Aravind Chopparapu Nov 2023

Gc-479 Bioeduhub, Tejesh R Chintam, Shiswa Preethi Chopparapu, Viswa Narendra Reddy Panati, Lithin Venkata Sai Pasupuleti, Aravind Chopparapu

C-Day Computing Showcase

Our project introduces an interactive and personalized learning experience aligned with the Next Generation Science Standards (NGSS). Users can explore a diverse range of topics related to biodiversity and environmental issues through quizzes, games, simulations, experiments, videos, podcasts, and articles. The web app adapts content to individual interests and provides tailored feedback to enhance knowledge, skills, attitudes, and behaviors related to these critical subjects. The user-friendly interface and comprehensive modules, including video lectures, readings, quizzes, hands-on experiments, debates, and assessments, ensure a holistic learning journey. Join us on a pathway to understanding and mitigating climate change while making a positive …


Gc-511 Predicting Stock Prices Using Different Machine Learning And Deep Learning Models, Afnan Crystal, Rohith Sundar Jonnalagadda, Hrithik Singh Chandel Nov 2023

Gc-511 Predicting Stock Prices Using Different Machine Learning And Deep Learning Models, Afnan Crystal, Rohith Sundar Jonnalagadda, Hrithik Singh Chandel

C-Day Computing Showcase

Our project focuses on the challenge of predicting the daily closing prices and stock movements of Amazon, one of the world's largest and most dynamic corporations. Amazon's stock prices are known for their unpredictability and are influenced by a multitude of intricate factors. Our project aims to provide accurate and reliable forecasts for Amazon's stock prices, going beyond mere predictions. The analysis employs a comprehensive approach, comparing the performance of three distinct machine learning and deep learning models: Linear Regression, Support Vector Machine (SVM), and Multi-Layered Perceptron (MLP) for financial time series data. The dataset we used spans from January …


Gr-397 Conceptualizing A Toc-Enhanced Chatbot: Pattern Recognition And Interaction, Sumaiya Tasneem, Sharon Elugoti, Chinni Cherrishma Reddy Aduri, Purna Pavan Kumar Kolli, Krishna Vamsi Anche Nov 2023

Gr-397 Conceptualizing A Toc-Enhanced Chatbot: Pattern Recognition And Interaction, Sumaiya Tasneem, Sharon Elugoti, Chinni Cherrishma Reddy Aduri, Purna Pavan Kumar Kolli, Krishna Vamsi Anche

C-Day Computing Showcase

A chatbot is a software which is capable of communicating with human by using natural language processing. In our project, we plan to develop a Python-based chatbot that integrates theory of computation (TOC) concepts, including finite automata and regular expressions. The chatbot will interact with users, recognizing patterns and keywords in their inputs. We’ll begin by defining initial regular expressions for basic user interactions including greetings and inquiries.Future developments may enhance regular expressions and broaden the chatbot’s TOC-related capabilities, creating a versatile educational tool with practical TOC applications.


Gr-469 A Simulation Model Of The Traffic Signal System Using Java, Lingtao Chen Nov 2023

Gr-469 A Simulation Model Of The Traffic Signal System Using Java, Lingtao Chen

C-Day Computing Showcase

A traffic signal controls the flow of traffic at the intersection of two or more roadways. The first system of traffic signals was installed in London, England, in 1868. In this project, I will develop a simulation model for the traffic signal system using Java. The model will simulate the traffic signal system at a single four-way intersection. Also, I will compare the system performance with different input parameters, such as the number of vehicles and the cycle length, using various performance metrics, such as average waiting time and average sojourn time.


Egr-470 Optimizing The Search In Location Using Svm, Naive Bayes, K-Means And Knn, Lalitha Sangamithra Mantha, Krishna Chaitanya Naraparaju, Abhishikth Vadlamani Nov 2023

Egr-470 Optimizing The Search In Location Using Svm, Naive Bayes, K-Means And Knn, Lalitha Sangamithra Mantha, Krishna Chaitanya Naraparaju, Abhishikth Vadlamani

C-Day Computing Showcase

The widespread adoption of global positioning technology has led to an increase in products featuring GPS functionality. These devices gather large amounts of location data. However, inherent inaccuracies in GPS data collection are unavoidable. To address these challenges, we shift our focus to identifying the closest points in a location. This requires gathering data to measure distances between a point and all others, and keeping a record of the nearest points. In this project, the Naive Bayes,SVM, k-means, and KNN algorithms are employed to determine the nearest points.


Egr-490 Importance Of Food Recognition On Blood Glucose Monitoring, Afnan Crystal Nov 2023

Egr-490 Importance Of Food Recognition On Blood Glucose Monitoring, Afnan Crystal

C-Day Computing Showcase

Maintaining blood sugar under control requires eating a healthy and balanced diet, exercising, and adhering to medications. Dietary consumption must be under strict control for diabetic patients’ general health. Traditional techniques for monitoring dietary consumption include recollection and manual record-keeping, which can be tedious and prone to mistakes. However, automated technologies for maintaining records that make use of computer vision, such as food image recognition systems, can streamline chronic health management for diabetics. These solutions seek to efficiently track daily food intake and consequential calories to facilitate and encourage lifestyle improvements. With this goal in mind, we design a Machine …


Egr-494 Using A Non-System Language To Implement An Optimized Round Robin Scheduling Algorithm, Francis E Nweke Nov 2023

Egr-494 Using A Non-System Language To Implement An Optimized Round Robin Scheduling Algorithm, Francis E Nweke

C-Day Computing Showcase

The objective of this project is to create an optimized Round Robin scheduling algorithm in C# and examine the related performance metrics. In this study, I will evaluate performance by implementing the optimized model in a non-system language such as (C#). Our simulation would provide insight into the execution of many processes while taking into account arrival times, burst timings, and user-defined time quantum. We can interact with the simulator because it is a Graphical User Interface (GUI) software.