Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Nebraska at Omaha (18)
- Kennesaw State University (13)
- Purdue University (11)
- University for Business and Technology in Kosovo (10)
- Illinois State University (5)
-
- Western Washington University (4)
- Cedarville University (3)
- Northeastern Illinois University (3)
- University of Lynchburg (3)
- Embry-Riddle Aeronautical University (2)
- Kansas State University Libraries (2)
- Ohio Wesleyan University (2)
- Portland State University (2)
- Stephen F. Austin State University (2)
- The University of San Francisco (2)
- Yale University (2)
- Bucknell University (1)
- Duquesne University (1)
- Elizabethtown College (1)
- Florida International University (1)
- James Madison University (1)
- South Dakota State University (1)
- University of Northern Iowa (1)
- University of Tennessee at Chattanooga (1)
- Keyword
-
- Machine learning (3)
- IoT (2)
- Software (2)
- 5G (1)
- AI (1)
-
- Application (1)
- Attention (1)
- Automatic (1)
- Autonomous vehicles (1)
- BI Tools (1)
- Belonging (1)
- Big Data • Banking • Credit (1)
- Binocular vision; Stereopsis; Inverse optics; Multiple view geometry; Inverse projective geometry; (1)
- Biometrics (1)
- Blue Noise Sampling (1)
- Broadening participation (1)
- Business Intelligence (1)
- Collaboration (1)
- Collision avoidance (1)
- Colors (1)
- Computer Science (1)
- Computer software--Development; Computer security; (1)
- Computer vision (1)
- Cones spatial distribution (1)
- Cost estimation plan (1)
- Data Analysis (1)
- Data analysis (1)
- Data framework (1)
- Decision Making (1)
- Educational (1)
- Publication
-
- Computer Science Graduate Research Workshop (13)
- KSU Proceedings on Cybersecurity Education, Research and Practice (10)
- UBT International Conference (10)
- Annual Symposium on Biomathematics and Ecology Education and Research (5)
- MODVIS Workshop (5)
-
- UNO Student Research and Creative Activity Fair (5)
- Scholars Week (4)
- African Conference on Information Systems and Technology (3)
- Faculty Research and Creative Activities Symposium (3)
- Student Scholar Showcase (3)
- The Research and Scholarship Symposium (2013-2019) (3)
- Charleston Library Conference (2)
- Creative Activity and Research Day - CARD (2)
- Kansas State University Undergraduate Research Conference (2)
- Student Research Symposium (2)
- Student Symposium (2)
- Undergraduate Research Conference (2)
- Yale Day of Data (2)
- ASEE IL-IN Section Conference (1)
- Annual ADFSL Conference on Digital Forensics, Security and Law (1)
- Bucknell University Digital Scholarship Conference (1)
- Engagement & Service-Learning Summit (1)
- Landmark Conference Summer Research Symposium (1)
- Purdue GIS Day (1)
- Purdue Workshop on Nonproliferation: Technology and Approaches (1)
- Research in the Capitol (1)
- River Cities Industrial and Organizational Psychology Conference (1)
- SDSU Data Science Symposium (1)
- Showcase of Graduate Student Scholarship and Creative Activities (1)
- Space Traffic Management Conference (1)
- File Type
Articles 1 - 30 of 92
Full-Text Articles in Physical Sciences and Mathematics
Generating Contextual Text Embeddings For Emergency Department Chief Complaints Using Bert, David Chang
Generating Contextual Text Embeddings For Emergency Department Chief Complaints Using Bert, David Chang
Yale Day of Data
We applied BERT, a state-of-the-art natural language processing model, on chief complaint data from the Yale Emergency Department to map free-text notes to structured chief complaint categories.
Internet Searching Behaviors Of Low Literacy Breast Cancer Survivors, Francisco D. Iacobelli, Ginger L. Dragon, Giselle Mazur, Judy Guitelman
Internet Searching Behaviors Of Low Literacy Breast Cancer Survivors, Francisco D. Iacobelli, Ginger L. Dragon, Giselle Mazur, Judy Guitelman
Faculty Research and Creative Activities Symposium
Internet searching is a popular tool for patients to find health-related information. However, low literacy individuals are at a disadvantage with respect to their ability to evaluate online health information. When using common web search engines to find health information, behaviors such as misspelling, misappropriation of words and incomplete search queries can result in inadequate results and misleading information. The goal of this research is to understand the search strategies and common mistakes that low-literacy Latina breast cancer survivors exhibit when searching for information online in order to inform future information seeking interfaces. To explore search behaviors online we asked …
Integrating Problem Solving, Coding, Mathematics, And Pedagogy, John F. Erickson
Integrating Problem Solving, Coding, Mathematics, And Pedagogy, John F. Erickson
Faculty Research and Creative Activities Symposium
We present a case study illustrating an integrated approach to the teaching of problem solving, computation, and mathematics. This approach combines ideas from Polya, Ross, and Moore about mathematical pedagogy with a heavy dose of computer assisted calculation in the spirit of experimental mathematics facilitated by the rapid prototyping environment of Mathematica which is ideal for an exploratory approach to learning. Essentially, students learn math and programming the same way mathematicians do research and we believe that this can scale all the way from grammar school to graduate school. To be more specific, we start with an elementary recreational math …
Guiding Us Throughout A Sea Of Data - A Survey On Recommender Systems And Its Privacy Challenges, Xiwei Wang, Marcelo O. Sztainberg
Guiding Us Throughout A Sea Of Data - A Survey On Recommender Systems And Its Privacy Challenges, Xiwei Wang, Marcelo O. Sztainberg
Faculty Research and Creative Activities Symposium
Over the past decades, the Internet has served as the backbone connecting people to others, places and things. With the sheer volume of information generated everyday, people can feel overwhelmed when having to make a selection among the multiple options that normally come up after a search or application request. For example, when searching for news articles regarding a particular topic, the search engine will present a number of results to you. When looking for some product on shopping websites, there are usually several pages of results that match the keywords. It can be very challenging for people to find …
Redundancy Effect Of Vehicular Cloud’S Environment Using Location Estimate (Revise), Mohamed El-Tawab, Samy El-Tawab, M. Hossain Heydari
Redundancy Effect Of Vehicular Cloud’S Environment Using Location Estimate (Revise), Mohamed El-Tawab, Samy El-Tawab, M. Hossain Heydari
Showcase of Graduate Student Scholarship and Creative Activities
The rapid growth of modern wireless technology increases the invention of new applications using the concept of Internet of Things (IoT). Vehicular Cloud, which is a concept introduced recently to use the vehicles sitting idle for hours as a processing devices, has been a hot topic. This subject became more popular after the Department of Transportation’s (DOT) announcement of mandatory wireless capabilities of each vehicle since 2015. We investigate the idea of benefiting from the unused processing power of vehicles sitting in parking lots for a long period of time (e.g. an airport, or train station). Moreover, researchers propose the …
An Extensible Geospatial Data Framework (Geoedf) For Fair Science, Carol Song, Rajesh Kalyanam, Lan Zhao
An Extensible Geospatial Data Framework (Geoedf) For Fair Science, Carol Song, Rajesh Kalyanam, Lan Zhao
Purdue GIS Day
The growing urgency in dealing with the 21st century’s grand challenges associated with increasing population, food and water security, frequently occurring natural disasters, and changing climate demands innovative, collaborative, and multidisciplinary solutions for sustainability and resilience. However, scientific data, especially geospatial data, presents significant barriers to the effective access, use and sharing of data as they come in large volumes, from different sources, and with widely varying formats, resolutions, or annotation schemas that can differ among disciplines or even research groups. This presentation describes a recently funded NSF CSSI project to develop an open source, extensible geospatial data framework (GeoEDF), …
Read And Publish: What Can Libraries Expect?, Josh Horowitz
Read And Publish: What Can Libraries Expect?, Josh Horowitz
Charleston Library Conference
The author provides a publisher's perspective on the challenges and opportunities faced by a mid-sized society in navigating the current transition to open access licensing models.
Data Curation Workshop: Tips And Tools For Today, Matthew M. Benzing
Data Curation Workshop: Tips And Tools For Today, Matthew M. Benzing
Charleston Library Conference
The current state of research data is like a disorganized photo collection: a mix of formats scattered across different media without a lot of authority control. That is changing as the need to make data available to researchers across the world is becoming recognized. Researchers know that their data needs to be maintained and made accessible, but often they do not have the time or the inclination to get involved in all of the details. This provides an excellent opportunity for librarians. Data curation is the process of preparing data to be made available in a repository with the goal …
Vulnerability Of Passwords Consisting Of Numerical Repetitive Sequences In The Wpa2 Protocol, Genc Kelmendi, Edmond Hajrizi
Vulnerability Of Passwords Consisting Of Numerical Repetitive Sequences In The Wpa2 Protocol, Genc Kelmendi, Edmond Hajrizi
UBT International Conference
Protocols that govern wireless security WPA2/WPA have been proven much more secure in comparison to their predecessor WEP. However, the human factor jeopardizes the solidity of cryptography by implementing passwords consisting of programmatically predictable numerical structures such as 1234512345, 11114444, 999888777 and so on. This practice endangers the security of the WPA protocol in particular, as the locally stored WPA handshake can be attacked for an unlimited number of times using brute-force attacks. The methods presented in this paper are effective in decrypting such passwords within seconds using ordinary processor power. The prevalence of this vulnerable practice in the Prishtina …
Ai Leverage In Easing The 5g Complexity And Enhancing 5g Intelligent Connectivity, Xhafer Krasniqi
Ai Leverage In Easing The 5g Complexity And Enhancing 5g Intelligent Connectivity, Xhafer Krasniqi
UBT International Conference
As 5G era is approaching fast and pre-commercial 5G tests and trials are happening everywhere around the world, one of the key challenges for carriers and 5G providers is to maintain and operate the network complexity required to meet diverse services and personalized user experience requirements. This maintenance and operation have to be smarter and more agile in 5G than it was in previous generations. AI and ML can be leveraged in this case to ease 5G complexity and at the same time enhance the intelligent connectivity between diverse devices and diverse tiny end points, e.g. IoT sensors.
Machine learning …
Password Typo Correction Using Discrete Logarithms, Nikola K. Blanchrad
Password Typo Correction Using Discrete Logarithms, Nikola K. Blanchrad
UBT International Conference
As passwords remain the main online authentication method, focus has shifted from naive entropy to how usability improvements can increase security. Chatterjee et al. recently introduced the first two typotolerant password checkers, which improve usability at no security cost but are technically complex. We look at the more general problem of computing an edit distance between two strings without having direct access to those strings — by storing the equivalent of a hash. We propose a simpler algorithm for this problem that is asymptotically quasi-optimal in both bits stored and exchanged, at the cost of more computation on the server.
Establishing An Analytics Capability Within Hr, Rizwan Khan
Establishing An Analytics Capability Within Hr, Rizwan Khan
River Cities Industrial and Organizational Psychology Conference
With advancements in technology, HR finally has the tools available to collect and process people data. But is that all that is needed to successfully implement and sustain an analytics capability within HR? The purpose of this presentation/tutorial is to demonstrate a realistic journey The AES Corporation has taken thus far in developing its People Analytics capability. A framework for the implementation of People Analytics will be presented which incorporates themes in I/O Psychology that have been incorporated into the framework such as goal setting theory, job analysis, and change management. How this framework is operationalized will also be demonstrated …
How Do Kosovo Firms Utilize Business Intelligence? An Exploratory Study, Ardian Hyseni
How Do Kosovo Firms Utilize Business Intelligence? An Exploratory Study, Ardian Hyseni
UBT International Conference
The purpose of this paper is to examine how Kosovo firms utilize business intelligence to analyze their data and better understand the past, present and the future of their firm. Business intelligence offers firms the ability to analyze large amount of data quicker and more effective. Decision making has become easier with the use of BI tools, but making the right decision at right time has become vital for the firms performance. This research will contribute on business industry by providing evidence how Kosovo firms utilize the BI system, what BI tools and what business values and processes BI offers …
Analyzing The Linearity Of Some Operators, Faton Kabashi, Azir Jusufi, Hizer Leka
Analyzing The Linearity Of Some Operators, Faton Kabashi, Azir Jusufi, Hizer Leka
UBT International Conference
Linear operators occupy an important place in functional analysis and linear algebra, which are among the most important and substantive disciplines of mathematics, whose methods and results have created an indispensable apparatus for the development of numerical mathematics, theory of approximations, equations differential and especially mathematical physics and applied mathematics. Also, linear operators are a central object of study in vector space theory.
A linear operator is a function which satisfies the conditions of additivity and homogeneity. Not every function is linear operators. We will try to explore some functions which are also linear operators.
Improvement Of Gender Recognition Using The Cosfire Filter Framework (Simulations Platform Of Shape-Preserving Regression – Pchip), Virtyt Lesha, Arben Haveri, Jozef Bushati
Improvement Of Gender Recognition Using The Cosfire Filter Framework (Simulations Platform Of Shape-Preserving Regression – Pchip), Virtyt Lesha, Arben Haveri, Jozef Bushati
UBT International Conference
Biometrics is evolving every day more and more in technical sense and consequently faces with further challenges that become sharper. One of these challenges of is gender recognition that finds very important and key applications. In this paper, we consider the gender recognition process implemented through the Cosfire filter applied through Viola-Jones algorithm and simulated through the Matlab platform. Objective of this paper is improving the execution of gender recognition. The database contains 237 images of 128 to 128 pixels, where 128 are males and 109 are females. For each of them, gender recognition is performed by applying current and …
An Overview Of Big Data Analytics In Banking: Approaches, Challenges And Issues, Fisnik Doko, Igor Miskovski
An Overview Of Big Data Analytics In Banking: Approaches, Challenges And Issues, Fisnik Doko, Igor Miskovski
UBT International Conference
Banks are harnessing the power of Big Data. They use Big Data and Data Science to drive change towards data and analytics to gain an overall competitive advantage. The Big Data has potential to transform enterprise operations and processes especially in the banking sector, because they have huge amount of transaction data. The goal of this paper is to give an overview of different approaches and challenges that exists in Big Data in banking sector. The work presented here will fulfill the gap of research papers in the last five years, with focus on Big Data in central banks and …
Semantic Web Technologies, Dukagjin Hyseni
Semantic Web Technologies, Dukagjin Hyseni
UBT International Conference
This study attempts to highlight the great importance of developing Semantic Web as one of the best discovery of better data management and presentation within the WWW. Since the W3C's was discovered, initially providing classic web content as web 1.0 that had link / hyperlink of document`s location, then web 2.0 as web-applications have more advanced technologies to connect data, and finally semantic web as extension of web 3.0 also known as Linked Data. The results show that in addition to the rapid development of the Semantic Web, the demand to use its features by data publishers and data readers …
Applying Soa Approach To Financial Institution: Case Study, Agon Memeti, Florinda Imeri
Applying Soa Approach To Financial Institution: Case Study, Agon Memeti, Florinda Imeri
UBT International Conference
A financial institution is an institution that conducts financial transactions, such as depositing money, taking out loans and/or exchanging currencies. Systems used by them like any other system tend to skew old, but, the replacement and integration of these systems is a difficult due to the heterogeneous nature. Due to this it is imperative to consider alternative infrastructure such as SOA (service-oriented architecture), which is seen as the best technology for internal and external interfaces, resulting cost reductions associated with its deployment; combined with standardized protocols, and increased interoperability among IT infrastructures. Studies shows that this flexible architecture will encourage …
International Conference On Computer Science And Communication Engineering, University For Business And Technology - Ubt
International Conference On Computer Science And Communication Engineering, University For Business And Technology - Ubt
UBT International Conference
UBT Annual International Conference is the 8th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make them be aware of the recent …
Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne
Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
Wireless access points have greatly improved users' ability to connect to the Internet. However, they often lack the security mechanisms needed to protect users. Malicious actors could create a rogue access point (RAP), using a device such as the WiFi Pineapple Nano, that could trick users into connecting to an illegitimate access point (AP). To make them look legitimate, adversaries tend to setup RAPs to include a captive portal. This is very effective, since most public networks use captive portals as a means to provide genuine access. The objective of this study is to examine the effectiveness of RAP identification …
Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li
Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li
KSU Proceedings on Cybersecurity Education, Research and Practice
The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of software and mitigate the consequence of damages of data loss caused by potential malicious attacking. In this paper, we present a static security analysis approach with open source FindSecurityBugs plugin for Android StThe security threats to mobile application are growing explosively. Mobile app …
Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne
Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.
These replay attacks can be accomplished by capturing recorded …
A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar
A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar
KSU Proceedings on Cybersecurity Education, Research and Practice
The massive global network that connects billions of humans and millions of devices and allow them to communicate with each other is known as the internet. Over the last couple of decades, the internet has grown expeditiously and became easier to use and became a great educational tool. Now it can used as a weapon that can steal someone’s identity, expose someone’s financial information, or can destroy your networking devices. Even in the last decade, there have been more cyber attacks and threats destroying major companies by breaching the databases that have millions of personal information that can be sold …
An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam
An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam
KSU Proceedings on Cybersecurity Education, Research and Practice
The growing market of the mobile application is overtaking the web application. Mobile application development environment is open source, which attracts new inexperienced developers to gain hands on experience with applicationn development. However, the security of data and vulnerable coding practice is an issue. Among all mobile Operating systems such as, iOS (by Apple), Android (by Google) and Blackberry (RIM), Android dominates the market. The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via the inadvertent or side channel, unsecured sensitive data storage, data transition and many others. Most of these …
Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward
Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward
KSU Proceedings on Cybersecurity Education, Research and Practice
Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models.
This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It …
Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez
Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez
KSU Proceedings on Cybersecurity Education, Research and Practice
Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.
Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz
Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz
KSU Proceedings on Cybersecurity Education, Research and Practice
Today’s college and university cybersecurity programs often contain multiple laboratory activities on various different hardware and software-based cybersecurity tools. These include preventive tools such as firewalls, virtual private networks, and intrusion detection systems. Some of these are tools used in attacking a network, such as packet sniffers and learning how to craft cross-site scripting attacks or man-in-the-middle attacks. All of these are important in learning cybersecurity. However, there is another important component of cybersecurity education – teaching students how to protect a system or network from attackers by learning their motivations, and how they think, developing the students’ “abilities to …
Collaborating On Machine Reading: Training Algorithms To Read Complex Collections, Carrie M. Pirmann, Brian R. King, Bhagawat Acharya, Katherine M. Faull
Collaborating On Machine Reading: Training Algorithms To Read Complex Collections, Carrie M. Pirmann, Brian R. King, Bhagawat Acharya, Katherine M. Faull
Bucknell University Digital Scholarship Conference
Interdisciplinary collaboration between two faculty members in the humanities and computer science, a research librarian, and an undergraduate student has led to remarkable results in an ongoing international DH research project that has at its core 18th century manuscripts. The corpus stems from a vast collection of archival materials held by the Moravian Church in the UK, Germany, and the US. The number of pages to be transcribed, differences in handwriting styles, paper quality, and original language pose enormous problems for the feasibility of human transcription. This presentation will review the hypothesis, process, and findings of a summer research project …
Internet Core Functions: Security Today And Future State, Jeffrey Jones
Internet Core Functions: Security Today And Future State, Jeffrey Jones
KSU Proceedings on Cybersecurity Education, Research and Practice
Never in the history of the world has so much trust been given to something that so few understand. Jeff reviews three core functions of the Internet along with recent and upcoming changes that will impact security and the world.
Preparing For Tomorrow By Looking At Yesterday, Peter Dooley
Preparing For Tomorrow By Looking At Yesterday, Peter Dooley
KSU Proceedings on Cybersecurity Education, Research and Practice
Why do we learn? Why do we study history? Why do we research the work of others? The answer is that there is value today in what was already learned and experienced, successes and failures. Mr. Dooley, a 25-year security professional and 20-year hospitality executive, will share his experiences and how our history in security will help us in thinking about our future.