Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Conference

2022

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 1054

Full-Text Articles in Physical Sciences and Mathematics

Federated Learning And Applications In Cybersecurity, Ani Sreekumar Dec 2022

Federated Learning And Applications In Cybersecurity, Ani Sreekumar

Cybersecurity Undergraduate Research Showcase

Machine learning is a subfield of artificial intelligence that focuses on making predictions about some outcome based on information from a dataset. In cybersecurity, machine learning is often used to improve intrusion detection systems and identify trends in data that could indicate an oncoming cyber attack. Data privacy is an extremely important aspect of cybersecurity, and there are many industries that have more demanding laws to ensure the security of user data. Due to these regulations, machine learning algorithms can not be widely utilized in these industries to improve outcomes and accuracy of predictions. However, federated learning is a recent …


Is Cybersecurity Training Practical Or Not?, Bhawnish Sharma Dec 2022

Is Cybersecurity Training Practical Or Not?, Bhawnish Sharma

Cybersecurity Undergraduate Research Showcase

With technology growing, there has been an increase in cybercrime. Because of this, private and public sectors face global problems, i.e., phishing, security breaches, and identity theft. With cybersecurity software available on the internet, anyone can access it. As technology advances, cybersecurity experts must answer the tough question of, “is cybersecurity training practical or not”?


A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood Dec 2022

A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood

Cybersecurity Undergraduate Research Showcase

While autonomous vehicles accounted for about 31.4 million vehicles on the road in 2019 (Placek). They have continued to flood the market and have a projected growth to 58 million in just 8 years from now (Placek) As well as a market cap in the billions of dollars. Even the comparatively new AV company Tesla has over 3 times the market cap value of the leading non AV brand Toyota (Market Cap) who are also working toward AVs as well, like their level 2 teammate driver assistance. Following Moore’s Law, as technology continues to improve, their social impact and ethical …


Investigating Privacy Policies Using Policylint Tool, Tricia Camaya Dec 2022

Investigating Privacy Policies Using Policylint Tool, Tricia Camaya

Cybersecurity Undergraduate Research Showcase

Organizations essentially inform clients about data collection and sharing practices through privacy policies. Recent research has proposed tools to help users better comprehend these lengthy and intricate legal documents that summarize collection and sharing. However, these instruments have a significant flaw. They overlook the possibility of contradictions within a particular policy. This paper introduces PolicyLint, a tool for analyzing privacy policies that simultaneously considers negation and varying semantic levels of data objects and entities. PolicyLint accomplishes this by using sentence-level natural language processing to automatically create ontologies from a large corpus of privacy policies and capturing both positive and negative …


Ethical Concerns In Self-Driving Cars, Victoria Shand Dec 2022

Ethical Concerns In Self-Driving Cars, Victoria Shand

Cybersecurity Undergraduate Research Showcase

Automobiles have been in existence since 1672 and only went up from there. Self-driving cars are a fantastic piece of technology; they can self-park, laser ranger finder, and near vision; they can map the road in advance, understand road signs, and, in some cases, handle certain variables on the road.

When talking about any form of technology, the possibilities are endless technology is a continuously evolving idea. When discussing self-driving cars, they have some fantastic and encouraging benefits and ideas. Some ideas would be that vehicles could communicate with each other, we could eliminate the need for traffic lights, and …


A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan Dec 2022

A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan

Cybersecurity Undergraduate Research Showcase

Since the 1980’s and creation of the World Wide Web, Internet utilization is a common and arguably, necessary, part of daily life. The internet is young and still relatively new, but as of 2016, 3.4 billion people were online, and that number has since grown [1]. This is a significant number, but as such a common part of daily life, how elements of the internet or its infrastructure work is complex. The world would very likely be thrown into dark ages if DNS or any other significant aspect of the internet's infrastructure were to succumb to an attack. The Colonial …


Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer Dec 2022

Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer

Symposium of Student Scholars

When navigating in unknown and unstructured environments, Unmanned Arial Vehicles (UAVs) can struggle when attempting to preform Simultaneous Localization and Mapping (SLAM) operations. Particularly challenging circumstance arise when an UAV may need to land or otherwise navigate through treacherous environments. As the primary UAV may be too large and unwieldly to safely investigate in these types of situations, this research effort proposes the use of actively guided CanSats for assisting in localization and mapping of unstructured environments. A complex UAV could carry multiple of these SLAM capable CanSats, and when additional mapping and localization capabilities where required, the CanSat would …


Hydrogen Bonding In Small Model Peptides; The Dft And Mp2 Study, Gracie Smith, Martina Kaledin Dec 2022

Hydrogen Bonding In Small Model Peptides; The Dft And Mp2 Study, Gracie Smith, Martina Kaledin

Symposium of Student Scholars

Formamide is a small model compound for the study of the peptide bond. The peptide bond links amino acids together, specifies rigidity to the protein backbone, and includes the essential docking sites for hydrogen-bond-mediated protein folding and protein aggregation, namely, the C=O acceptor and the N-H donor parts. Therefore, the infrared C=O (amide-I) and N-H (amide-A) vibrations provide sensitive and widely used probes into the structure of peptides. This computational chemistry work, we study hydrogen bonds in formamide dimer isomers. We evaluate the accuracy of the density functional theory (DFT) and many-body perturbation theory to the 2nd order (MP2) …


Software Supply Chain Security Attacks And Analysis Of Defense, Juanjose Rodriguez-Cardenas, Jobair Hossain Faruk, Masura Tansim, Asia Shavers, Corey Brookins, Shamar Lake, Ava Norouzi, Marie Nassif, Kenneth Burke, Miranda Dominguez Dec 2022

Software Supply Chain Security Attacks And Analysis Of Defense, Juanjose Rodriguez-Cardenas, Jobair Hossain Faruk, Masura Tansim, Asia Shavers, Corey Brookins, Shamar Lake, Ava Norouzi, Marie Nassif, Kenneth Burke, Miranda Dominguez

Symposium of Student Scholars

The Software Supply chain or SSC is the backbone of the logistics industry and is crucial to a business's success and operation. The surge of attacks and risks for the SSC has grown in coming years with each attack's impact becoming more significant. These attacks have led to the leaking of both client and company sensitive information, corruption of the data, and having it subject to malware and ransomware installation, despite new practices implemented and investments into SSC security and its branches that have not stopped attackers from developing new vulnerabilities and exploits. In our research, we have investigated Software …


Investigating The Electrochemical Behavior Of Dihydropyrrolopyroles For Use As Anodically Coloring Electrochromes, Perry Skiouris, Ally Kisiel, Valentino Sorto, Julia Mauro, Graham Collier Dec 2022

Investigating The Electrochemical Behavior Of Dihydropyrrolopyroles For Use As Anodically Coloring Electrochromes, Perry Skiouris, Ally Kisiel, Valentino Sorto, Julia Mauro, Graham Collier

Symposium of Student Scholars

Electrochromic materials have found widespread use in consumer electronics, energy saving windows, and military applications. They contain unique electronic properties allowing them to undergo a color change in a redox reaction. One classification of these molecules is known as anodically coloring electrochromes (ACEs). When in solution, these compounds are transmissive in the neutral (ground) state and absorb visible light upon oxidation, by the formation of a radical cation, thus making them colored. The focus of this study is the electronic transitions of this radical cation and how chemical modifications to the structures produce a variable color profile. To design prospective …


Usa Air Quality, Teja S Dec 2022

Usa Air Quality, Teja S

Symposium of Student Scholars

What are the goals or purpose of your maps/poster? The goal is to explain the air quality has been effected by major pollutants and how one person can make a difference. In other words, why are you doing this topic? What are you trying to accomplish or learn? I am trying to learn how to not contribute to pollution. What is the importance? Could help our planet with global warming. Why this map and not another? I feel like this is an urgent matter. What is special/unique about this? Recycling could possibly help to our air quality


Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore Dec 2022

Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore

Symposium of Student Scholars

Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage are the reasons for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …


Designing And Synthesizing A Warhead-Fragment Inhibitory Ligand For Ivyp1 Through Fragment-Based Drug Discovery, Samuel Moore Dec 2022

Designing And Synthesizing A Warhead-Fragment Inhibitory Ligand For Ivyp1 Through Fragment-Based Drug Discovery, Samuel Moore

Symposium of Student Scholars

Fragment-based drug discovery (FBDD) is a powerful tool for developing anticancer and antimicrobial agents. Within this, magnetic resonance spectroscopy (NMR) provides a comprehensive qualitative and quantitative approach to screening and validating weak and robust binders with targeted proteins, making NMR among the most attractive strategies in FBDD. Inhibitor of vertebrate lysozyme (Ivyp1) of P. aeruginosa serves as an excellent target because of its active cellular location and implications in clinical prognosis for cystic fibrosis and immunocompromised patients. This study uses current NMR and biophysical techniques to develop a covalent, fragment-linked warhead inhibitor for Ivyp1 through synthetic methods, warhead linking, and …


Gc-311 Singsingmarketplace.Com: E-Commerce Marketplace For Remote Vendors, Daniel K. Tor, Ebikela Ogegbene-Ise Dec 2022

Gc-311 Singsingmarketplace.Com: E-Commerce Marketplace For Remote Vendors, Daniel K. Tor, Ebikela Ogegbene-Ise

C-Day Computing Showcase

American residents in the (Nigerian, Liberian, Indian, Ghanaian, etc.) Diaspora have strong ties back home and as such support loved ones, back home, on a regular basis, by sending cash remittances through Western Union, MoneyGram, etc. Remittances are expensive. Remitters have no control over how funds are spent once received. Remitters cannot send small amounts because the fees cannot be justified. We built a marketplace platform that allows the Diaspora to remit goods and services, instead of sending money to relatives back home in. The objectives are to remove or greatly reduce the cost of remittances, give more control to …


Uc-275 Network Simulation Software Analysis Of Alternatives, Justin Mccannon, Nidhi Marsonia, Michael Mcinnis, Tiffany Nguyen, Azm Uddin Dec 2022

Uc-275 Network Simulation Software Analysis Of Alternatives, Justin Mccannon, Nidhi Marsonia, Michael Mcinnis, Tiffany Nguyen, Azm Uddin

C-Day Computing Showcase

Data networking is a complex field. Designing networks is a complex task. Simulators have been developed to create hypothetical designs with configuration settings for evaluating architectures and settings. At least 2 simulators are freely available to IT professionals and students. This project involves researching the landscape of free network design simulators to determine how many there are, then downloading, testing, evaluating, and documenting the features of each by designing, on each, a network with multiple routers, switches, and host devices using IPv4 and IPv6, defining features appropriate for classroom use in a university, and finally determining which solution fits the …


Uc-249 Hemorrhage, Daniel M. Respess, Antonio S. Brewer, Kenny Tran, Sandy Li, Rick B. Watson Dec 2022

Uc-249 Hemorrhage, Daniel M. Respess, Antonio S. Brewer, Kenny Tran, Sandy Li, Rick B. Watson

C-Day Computing Showcase

Hemorrhage is a fast-paced FPS action game with a focus on risky gameplay and dodging enemy attacks. Fight your way through hordes of grotesque creatures and make it to the end! The player starts with limited health but can steal more from killing enemies. Then, you can unleash this stored-up health to deal massive damage to your foes! Will you choose to be an unkillable tank? Or a brutal glass cannon?


Uc-278 Cyber Security In Blockchain, Eric C. Weese, Eric G. Cooper, Alex Fortson Dec 2022

Uc-278 Cyber Security In Blockchain, Eric C. Weese, Eric G. Cooper, Alex Fortson

C-Day Computing Showcase

Blockchain is a growing technology that utilizes a decentralized public record of transactions. It is not only used for cryptocurrency, but also IoT, financial systems, healthcare, supply chain, etc. Although blockchain is quite robust, it is not invulnerable. This project will explain and demonstrate several weaknesses of blockchain and how to prevent them. We will demonstrate the following attacks and how to prevent them using Solidity: Transaction Order Dependence, Denial of Service, Replay Attack, Writing of Arbitrary Storage Address Attack, Weak Randomness, and Honeypot Attack.


Uc-276 Akwaaba Web Server Security Project, Jayland Vann, Ty G. Rogers, Cody Reese, Ronald W. Southern, Taiyeb Choudhury Dec 2022

Uc-276 Akwaaba Web Server Security Project, Jayland Vann, Ty G. Rogers, Cody Reese, Ronald W. Southern, Taiyeb Choudhury

C-Day Computing Showcase

Our team engaged in a mock cybersecurity drill. Our objective was to take on the roll of cybersecurity consultants and to secure a mock business website. Afterwards, we were to engage in the active defense of the site from another team, while perpetuating attacks on another team's site. Goals: -Secure a business website and then engage in it's active defense. -Perform a successful attack(s) on another team's website. Outcomes: -Developed a comprehensive security policy -Documented site risk and vulnerabilities -Implemented security and configuration changes


Gc-312 Gtri It Service Desk System, Koranna Nwago, Venkata Emani, Venkata Naga Rishita Gopi, Bhavishya Chatrathi, Siphiwindoda Msimanga Dec 2022

Gc-312 Gtri It Service Desk System, Koranna Nwago, Venkata Emani, Venkata Naga Rishita Gopi, Bhavishya Chatrathi, Siphiwindoda Msimanga

C-Day Computing Showcase

This overarching project would be web development, which would entail coding both the back end and the front end. The use of libraries is encouraged, but we must be cautious about licensing and ensure that this project remains as open-source as possible (a good open-source license ensures people can use, modify, redistribute, and sell without worry). This is a free and open-source project.


Uc-248 Gtri: It Management Web Application, Joshua D. Oliver, Teryn Bryant, Renate M. Hamrick, Kendra Hansford-Bellamy, Terrell B. Mcgilberry Dec 2022

Uc-248 Gtri: It Management Web Application, Joshua D. Oliver, Teryn Bryant, Renate M. Hamrick, Kendra Hansford-Bellamy, Terrell B. Mcgilberry

C-Day Computing Showcase

This application was part of an industry Capstone project with Georgia Tech Research Institute, with Mr. Matthew Pinkston as the industry sponsor, Ms. Allison Boyle as the industry Capstone coordinator, and Mr. Donald Privitera as the Capstone professor. Our team worked on creating the framework for an opensource, web-based IT management application that future developers can add various features and sub-applications onto for purposes such as asset and budget management. The application is PHP-based with its backend, utilizing the Laravel framework and several of its built-in features for routing, database management, login authentication with bcrypt hash security, and session tracking. …


Uc-268 Buggy - Price Scraper Application, David W. Fitzgerald, John Blake, Anderson F. Guse, Jessica Zardoya, Paul Allen Dec 2022

Uc-268 Buggy - Price Scraper Application, David W. Fitzgerald, John Blake, Anderson F. Guse, Jessica Zardoya, Paul Allen

C-Day Computing Showcase

Buggy is a desktop price scraper application that finds the best deals for users across several major retailers. Retailers include Amazon, Costco, Target, Walmart, and eBay. It simplifies bargain hunting by condensing product information from multiple websites into one, convenient place. Users can save products for future access, track search history, and compare search results with tabs for navigation. When they are ready to buy, they can simply click on the buy button and are directed to the vendor's page to check out.


Gr-303 Dempster-Shafer Theory Of Computation, Dhanunjai Bandi, Sandeep Eadara, Sri Manju Nannapaneni, Jayanth Kumar Rayavarapu, Taraka Vishnu Yarlagadda Dec 2022

Gr-303 Dempster-Shafer Theory Of Computation, Dhanunjai Bandi, Sandeep Eadara, Sri Manju Nannapaneni, Jayanth Kumar Rayavarapu, Taraka Vishnu Yarlagadda

C-Day Computing Showcase

To implement the Dempster-Shafer Theory algorithm as well as check the prediction accuracy using this mentioned algorithm in the iris dataset. The actual aim of this paper is to understand and implement the Dempster-Shafer Theory using the python programming language. To reflect doubt and inaccuracies in the evidence, one might use a belief structure that is defined as a set function m that satisfies. The conjecture of this report is to get the closable prediction accuracy that can help to understand future improvement as well as the gap of the applied implementation techniques


Gc-243 - Analysis Of Alternatives Of Workstation Deployment Solutions, Mohammed S. Alam, Rahima Daino, Brittany Davis Dec 2022

Gc-243 - Analysis Of Alternatives Of Workstation Deployment Solutions, Mohammed S. Alam, Rahima Daino, Brittany Davis

C-Day Computing Showcase

Best suited for IT students who are able to use on-site (@ KSU) testing environment Perform a market survey of the best reviewed and used workstation deployment solutions Determine a set of requirements the business needs the solution to meet Determine metrics based off the requirements to measure the tools against each other Test the top 3 tools and provide a recommendation to the organization for which tool and its instructions for its basic initial setup


Gc-279 Geometry Matching Task For Improving The Cognitive Ability In Rehabilitation Process, Samuel Owoade, Ravi Teja Chamarthi, Jeevana Kalipindi, Ghislain Dongbou Temgoua Dec 2022

Gc-279 Geometry Matching Task For Improving The Cognitive Ability In Rehabilitation Process, Samuel Owoade, Ravi Teja Chamarthi, Jeevana Kalipindi, Ghislain Dongbou Temgoua

C-Day Computing Showcase

According to Taylor & Francis Group, LLC (2015), in the National Library of Medicine“Traumatic brain injury (TBI) impacts the lives of 1.5 to 2 million new individuals each year; 75,000 to 100,000 of these are classified as severe and will suffer enduring severe spasticity in addition to cognitive”. This game follows and respect basic and fundamental rules of brain and muscles recovery process and will help patients in their process of rehabilitation and by extension will improve their cognitive abilities.


Gr-267 Churn Prediction, Manoj Kumar Dasari, Nikhil Thota, Dinesh Kumar Thota, Rishi Sai Basava, Prudhvi Kalyan Sai Sugguna Dec 2022

Gr-267 Churn Prediction, Manoj Kumar Dasari, Nikhil Thota, Dinesh Kumar Thota, Rishi Sai Basava, Prudhvi Kalyan Sai Sugguna

C-Day Computing Showcase

Employee churn is a situation where people leave the organization voluntarily or involuntarily. This has become a serious problem in recent times. We have also seen that attrition rates in several industries are going high. So, it is very much required to understand and analyze the reason behind attrition and why this is happening. We must conduct an analysis to know what the factors affecting employee churn are. It will create a huge impact on the organization if the attrition rate goes high. In order to resolve this issue, we are trying to take up this issue and find the …


Uc-240 Gone Fishin' Vr, Donovan E. Lott, Richard Halbert, Tanner M. Peters, Joseph B. Hancock, Anthony L. Polidura Dec 2022

Uc-240 Gone Fishin' Vr, Donovan E. Lott, Richard Halbert, Tanner M. Peters, Joseph B. Hancock, Anthony L. Polidura

C-Day Computing Showcase

Gone Fishing is a VR game that allows the player to fish from the comfort of their own home. This take on a fishing simulator has creative and playful designs that are sure to surprise the players. With this game, we intend to invoke different comedic aspects found in other games such as designs, descriptions, and possible voiceovers in order to give the players a good time. This isn’t the average fishing simulator.


Uc-247 Wild Fire: Friend Or Foe, Christian R. Henderson, Revian C. Jennings, Kwentin Shelton Dec 2022

Uc-247 Wild Fire: Friend Or Foe, Christian R. Henderson, Revian C. Jennings, Kwentin Shelton

C-Day Computing Showcase

The U.S. Army Corp of Engineers in Carters Lake required a game that attempts to educate on the principles of both prescribed and non-prescribed fires. They request that the game be playable on an android device housed in a HOLOFIL holographic display. Additionally, it needed to be created in the mirrored format as the projection flips everything. We decided to use Unity Real-Time Development Platform to complete the game’s development. Unity is a set of tools to give content creators an all-in-one development environment that helps content creators develop games and applications. “Unity is royalty-free and does not charge on …


Uc-253 Sp12 - Studio Buddy - Mobile Application, Alejandro Zicavo, Tubatsi Moloi, Elmiche Kinmakon Dec 2022

Uc-253 Sp12 - Studio Buddy - Mobile Application, Alejandro Zicavo, Tubatsi Moloi, Elmiche Kinmakon

C-Day Computing Showcase

This application is a collaboration between the Computer Science department and the Music department. The Music department has a use case for a Mobile Application and we will be able to use the capstone project to build this solution. Studio Buddy is a mobile application that will allow teachers and students to connect for coaching sessions. Teachers will be able to post practice material [hands-on and musical in nature] and assign the material to students. Teachers will be able to track progress for their students and better tailor each students practice exercises. This is not a replacement for any existing …


Uc-270 Red Pepper It: It Web Management Application And Content Management System, Eun Kim, Bukky Adekunle, Caitlin Washington, Neha Dedani, Ivana George Dec 2022

Uc-270 Red Pepper It: It Web Management Application And Content Management System, Eun Kim, Bukky Adekunle, Caitlin Washington, Neha Dedani, Ivana George

C-Day Computing Showcase

Red Pepper IT is an application developed for Georgia Tech Research Institute. The conception of this project arose from the lack of IT management tools that can address all the needs of an IT department. Furthermore, with the currently available tools, they are either poorly designed or have a high licensing cost. This project seeks to solve the need for such applications by building an open-source application that can be deployed internally by any business seeking a management tool for its IT department.


Uc-277 Cosmic Cookoff, Milo D. Wilson, Aidan Fushimi, Wade G. Parham, Miller Anderson, Kosi M. Chima Dec 2022

Uc-277 Cosmic Cookoff, Milo D. Wilson, Aidan Fushimi, Wade G. Parham, Miller Anderson, Kosi M. Chima

C-Day Computing Showcase

A cooking rogue-like game where you cook the weapons you fight with.