Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine learning (91)
- Deep learning (59)
- Algorithms (36)
- Artificial intelligence (35)
- Digital libraries (34)
-
- Neural networks (31)
- Web archiving (29)
- Cybersecurity (26)
- Web archives (26)
- Security (25)
- Digital preservation (22)
- Simulation (22)
- Internet of things (18)
- Blockchain (17)
- Computer science (16)
- Big data (14)
- Information retrieval (14)
- Computer simulation (13)
- Metadata (13)
- Classification (12)
- Computer vision (12)
- Feature extraction (12)
- Memento (12)
- Natural language processing (12)
- Data modeling (11)
- Modeling and simulation (11)
- Sensors (11)
- Cloud computing (10)
- Mesh generation (10)
- Modeling (10)
- Publication Year
- Publication
-
- Computer Science Faculty Publications (271)
- Computer Science Theses & Dissertations (168)
- Electrical & Computer Engineering Faculty Publications (92)
- Cybersecurity Undergraduate Research Showcase (89)
- Computational Modeling & Simulation Engineering Theses & Dissertations (51)
-
- VMASC Publications (46)
- Electrical & Computer Engineering Theses & Dissertations (45)
- Engineering Management & Systems Engineering Theses & Dissertations (35)
- Engineering Management & Systems Engineering Faculty Publications (34)
- Computational Modeling & Simulation Engineering Faculty Publications (29)
- Mathematics & Statistics Faculty Publications (28)
- Information Technology & Decision Sciences Faculty Publications (27)
- Engineering Technology Faculty Publications (25)
- College of Sciences Posters (21)
- Computer Science Presentations (17)
- Modeling, Simulation and Visualization Student Capstone Conference (16)
- Virginia Journal of Science (15)
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (13)
- Mechanical & Aerospace Engineering Faculty Publications (11)
- Mechanical & Aerospace Engineering Theses & Dissertations (11)
- Physics Faculty Publications (9)
- STEMPS Faculty Publications (9)
- Civil & Environmental Engineering Theses & Dissertations (8)
- Computer & Information Science: Research Experiences for Undergraduates in Disinformation Detection and Analytics (8)
- Developing Technology Foresight: Case Study of AI in InsurTech (8)
- Psychology Theses & Dissertations (7)
- Undergraduate Research Symposium (7)
- Graduate Program in International Studies Theses & Dissertations (5)
- Mathematics & Statistics Theses & Dissertations (5)
- OUR Journal: ODU Undergraduate Research Journal (5)
- Publication Type
- File Type
Articles 1 - 30 of 1188
Full-Text Articles in Physical Sciences and Mathematics
The Vulnerabilities Of Artificial Intelligence Models And Potential Defenses, Felix Iov
The Vulnerabilities Of Artificial Intelligence Models And Potential Defenses, Felix Iov
Cybersecurity Undergraduate Research Showcase
The rapid integration of artificial intelligence (AI) into various commercial products has raised concerns about the security risks posed by adversarial attacks. These attacks manipulate input data to disrupt the functioning of AI models, potentially leading to severe consequences such as self-driving car crashes, financial losses, or data breaches. We will explore neural networks, their weaknesses, and potential defenses. We will discuss adversarial attacks including data poisoning, backdoor attacks, evasion attacks, and prompt injection. Then, we will explore defense strategies such as data protection, input sanitization, and adversarial training. By understanding how adversarial attacks work and the defenses against them, …
A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector
A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector
Cybersecurity Undergraduate Research Showcase
CRASHOVERRIDE is a modular malware tailor-made for electric grid Industrial Control System (ICS) equipment and was deployed by a group named ELECTRUM in a Ukrainian substation. The malware would launch a protocol exploit to flip breakers and would then wipe the system of ICS files. Finally, it would execute a Denial Of Service (DOS) attack on protective relays. In effect, months of damage and thousands out of power. However, due to oversights the malware only caused a brief power outage. Though the implications of the malware are cause for researching and implementing countermeasures against others to come. The CISA recommends …
High-Resolution And Quality Settings With Latent Consistency Models, Steven Chen, Junrui Zhang, Rui Ning
High-Resolution And Quality Settings With Latent Consistency Models, Steven Chen, Junrui Zhang, Rui Ning
Cybersecurity Undergraduate Research Showcase
Diffusion Models have become powerful generative models which is capable of synthesizing high-quality images across various domains. This paper explores Stable Diffusion and mostly focuses on Latent Diffusion Models. Latent Consistency Models can enhance the inference with minimal iterations. It demonstrates the performance in image in-painting and class-conditional synthesis tasks. Throughout the experiment different datasets and parameter configurations, the paper highlights the image quality, processing time, and parameter. It also discussed the future directions including adding trigger-based implementation and emotional-based themes to replace the prompt.
Data Profits Vs. Privacy Rights: Ethical Concerns In Data Commerce, Amiah Armstrong
Data Profits Vs. Privacy Rights: Ethical Concerns In Data Commerce, Amiah Armstrong
Cybersecurity Undergraduate Research Showcase
In today’s digital age, the collection and sale of customer data for advertising is gaining a growing number of ethical concerns. The act of amassing extensive datasets encompassing customer preferences, behaviors, and personal information raises questions of its true purpose. It is widely acknowledged that companies track and store their customer’s digital activities under the pretext of benefiting the customer, but at what cost? Are users aware of how much of their data is being collected? Do they understand the trade-off between personalized services and the potential invasion of their privacy? This paper aims to show the advantages and disadvantages …
What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi
What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi
Cybersecurity Undergraduate Research Showcase
The literature on data privacy in terms of educational technology is a growing area of study. The perspective of educators has been captured extensively. However, the literature on students’ perspectives is missing, which is what we explore in this paper. We use a pragmatic qualitative approach with an experiential lens to capture students’ attitudes towards data privacy in terms of educational technology. We identified preliminary, common themes that appeared in the survey responses. The paper concludes by calling for more research on how students perceive data privacy in terms of educational technology.
Investigating Vulnerabilities In The Bluetooth Host Layer In Linux, Jack Dibari
Investigating Vulnerabilities In The Bluetooth Host Layer In Linux, Jack Dibari
Cybersecurity Undergraduate Research Showcase
This paper investigates vulnerabilities within the Bluetooth host layer in Linux systems. It examines the Bluetooth protocol's evolution, focusing on its implementation in Linux, particularly through the BlueZ host software. Various vulnerabilities, including BleedingTooth, BLESA, and SweynTooth, are analyzed.
The Security Of Deep Neural Networks, Jalaya Allen
The Security Of Deep Neural Networks, Jalaya Allen
Cybersecurity Undergraduate Research Showcase
Our society has transitioned from our primitive lifestyle to soon, an increasingly automatic one. That idea is further exemplified as we shift into an AI era, better known as Artificial intelligence. Artificial Intelligence is classified as computer systems that can perform tasks that typically require human intelligence. However, a common thought or question that most might have is, how is this done? How does AI process information the way we want it to and have access to so much information? AI is trained by systems called AI models. These modeling programs are trained on data to recognize patterns or make …
Auditory Vigilance Decrement In Drivers Of A Partially Automated Vehicle: A Pilot Study Using A High-Fidelity Driving Simulator, Luca Brooks, Jeffrey Glassman, Yusuke Yamani
Auditory Vigilance Decrement In Drivers Of A Partially Automated Vehicle: A Pilot Study Using A High-Fidelity Driving Simulator, Luca Brooks, Jeffrey Glassman, Yusuke Yamani
Undergraduate Research Symposium
Vigilance decrement is the decline in the ability to monitor and detect behaviorally important signals over time, a phenomenon that can arise even after 30 minutes of watch (Mackworth, 1948). Recently, McCarley & Yamani (2021) found bias shifts, sensitivity losses, and attentional lapses contribute to vigilance decrement, but when each effect is isolated, there was little evidence that sensitivity loss affected vigilance decrement. With the introduction of partially autonomous vehicles, vigilance decrement may be problematic for drivers who must monitor the autonomous system for failures and takeover requests. Thus, this pilot study aims to extend McCarley and Yamani (2021) and …
Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami
Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami
Undergraduate Research Symposium
Students in juvenile detention centers have the greatest need to receive improvements in educational delivery and content; however, they are one of the “truly disadvantaged” populations in terms of receiving those improvements. This work presents a qualitative data analysis based on a focus group meeting with stakeholders at a local Juvenile Detention Center. The current educational system in juvenile detention centers is based on paper worksheets, single-room style teaching methods, outdated technology, and a shortage of textbooks and teachers. In addition, detained students typically have behavioral challenges that are deemed "undesired" in society. As a result, many students miss classes …
Machine Learning As A Tool For Early Detection: A Focus On Late-Stage Colorectal Cancer Across Socioeconomic Spectrums, Hadiza Galadima, Rexford Anson-Dwamena, Ashley Johnson, Ghalib Bello, Georges Adunlin, James Blando
Machine Learning As A Tool For Early Detection: A Focus On Late-Stage Colorectal Cancer Across Socioeconomic Spectrums, Hadiza Galadima, Rexford Anson-Dwamena, Ashley Johnson, Ghalib Bello, Georges Adunlin, James Blando
Community & Environmental Health Faculty Publications
Purpose: To assess the efficacy of various machine learning (ML) algorithms in predicting late-stage colorectal cancer (CRC) diagnoses against the backdrop of socio-economic and regional healthcare disparities. Methods: An innovative theoretical framework was developed to integrate individual- and census tract-level social determinants of health (SDOH) with sociodemographic factors. A comparative analysis of the ML models was conducted using key performance metrics such as AUC-ROC to evaluate their predictive accuracy. Spatio-temporal analysis was used to identify disparities in late-stage CRC diagnosis probabilities. Results: Gradient boosting emerged as the superior model, with the top predictors for late-stage CRC diagnosis being anatomic site, …
Identifying Patterns For Neurological Disabilities By Integrating Discrete Wavelet Transform And Visualization, Soo Yeon Ji, Sampath Jayarathna, Anne M. Perrotti, Katrina Kardiasmenos, Dong Hyun Jeong
Identifying Patterns For Neurological Disabilities By Integrating Discrete Wavelet Transform And Visualization, Soo Yeon Ji, Sampath Jayarathna, Anne M. Perrotti, Katrina Kardiasmenos, Dong Hyun Jeong
Computer Science Faculty Publications
Neurological disabilities cause diverse health and mental challenges, impacting quality of life and imposing financial burdens on both the individuals diagnosed with these conditions and their caregivers. Abnormal brain activity, stemming from malfunctions in the human nervous system, characterizes neurological disorders. Therefore, the early identification of these abnormalities is crucial for devising suitable treatments and interventions aimed at promoting and sustaining quality of life. Electroencephalogram (EEG), a non-invasive method for monitoring brain activity, is frequently employed to detect abnormal brain activity in neurological and mental disorders. This study introduces an approach that extends the understanding and identification of neurological disabilities …
Effect Of Resin Bleed Out On Compaction Behavior Of The Fiber Tow Gap Region During Automated Fiber Placement Manufacturing, Von Clyde Jamora, Virginia Rauch, Sergii G. Kravchenko, Oleksandr G. Kravchenko
Effect Of Resin Bleed Out On Compaction Behavior Of The Fiber Tow Gap Region During Automated Fiber Placement Manufacturing, Von Clyde Jamora, Virginia Rauch, Sergii G. Kravchenko, Oleksandr G. Kravchenko
Mechanical & Aerospace Engineering Faculty Publications
Automated fiber placement is a state-of-the-art manufacturing method which allows for precise control over layup design. However, AFP results in irregular morphology due to fiber tow deposition induced features such as tow gaps and overlaps. Factors such as the squeeze flow and resin bleed out, combined with large non-linear deformation, lead to morphological variability. To understand these complex interacting phenomena, a coupled multiphysics finite element framework was developed to simulate the compaction behavior around fiber tow gap regions, which consists of coupled chemo-rheological and flow-compaction analysis. The compaction analysis incorporated a visco-hyperelastic constitutive model with anisotropic tensorial prepreg viscosity, which …
The Feasibility Of Motion Tracking Camera System For Magnetic Suspension Wind Tunnel Tests, Hisham M. Shehata, David Cox, Mark Schoenenberger, Colin Britcher, Eli Shellabarger, Timothy Schott, Brendan Mcgovern
The Feasibility Of Motion Tracking Camera System For Magnetic Suspension Wind Tunnel Tests, Hisham M. Shehata, David Cox, Mark Schoenenberger, Colin Britcher, Eli Shellabarger, Timothy Schott, Brendan Mcgovern
Mechanical & Aerospace Engineering Faculty Publications
The Entry Systems Modeling (ESM) Program at NASA has actively participated in the re-development of the Magnetic Suspension Balance System (MSBS) at the six-inch subsonic wind tunnel at NASA Langley Research Center. This initiative aims to enhance the MSBS system's capabilities, enabling the testing of stingless entry vehicle models at supersonic speeds. To achieve this, control algorithms are required to ensure magnetic levitation control and stability for models during free-oscillation dynamic responses. Currently, the system relies on electromagnetic position sensors to provide real-time 3 degrees of freedom control of a rigid body. While this approach has proven successful for subsonic …
Abmscore: A Heuristic Algorithm For Forming Strategic Coalitions In Agent-Based Simulation, Andrew J. Collins, Gayane Grigoryan
Abmscore: A Heuristic Algorithm For Forming Strategic Coalitions In Agent-Based Simulation, Andrew J. Collins, Gayane Grigoryan
Engineering Management & Systems Engineering Faculty Publications
Integrating human behavior into agent-based models has been challenging due to its diversity. An example is strategic coalition formation, which occurs when an individual decides to collaborate with others because it strategically benefits them, thereby increasing the expected utility of the situation. An algorithm called ABMSCORE was developed to help model strategic coalition formation in agent-based models. The ABMSCORE algorithm employs hedonic games from cooperative game theory and has been applied to various situations, including refugee egress and smallholder farming cooperatives. This paper discusses ABMSCORE, including its mechanism, requirements, limitations, and application. To demonstrate the potential of ABMSCORE, a new …
Automatic Classification Of Activities In Classroom Videos, Jonathan K. Foster, Matthew Korban, Peter Youngs, Ginger S. Watson, Scott T. Acton
Automatic Classification Of Activities In Classroom Videos, Jonathan K. Foster, Matthew Korban, Peter Youngs, Ginger S. Watson, Scott T. Acton
VMASC Publications
Classroom videos are a common source of data for educational researchers studying classroom interactions as well as a resource for teacher education and professional development. Over the last several decades emerging technologies have been applied to classroom videos to record, transcribe, and analyze classroom interactions. With the rise of machine learning, we report on the development and validation of neural networks to classify instructional activities using video signals, without analyzing speech or audio features, from a large corpus of nearly 250 h of classroom videos from elementary mathematics and English language arts instruction. Results indicated that the neural networks performed …
Infusing Machine Learning And Computational Linguistics Into Clinical Notes, Funke V. Alabi, Onyeka Omose, Omotomilola Jegede
Infusing Machine Learning And Computational Linguistics Into Clinical Notes, Funke V. Alabi, Onyeka Omose, Omotomilola Jegede
Mathematics & Statistics Faculty Publications
Entering free-form text notes into Electronic Health Records (EHR) systems takes a lot of time from clinicians. A large portion of this paper work is viewed as a burden, which cuts into the amount of time doctors spend with patients and increases the risk of burnout. We will see how machine learning and computational linguistics can be infused in the processing of taking clinical notes. We are presenting a new language modeling task that predicts the content of notes conditioned on historical data from a patient's medical record, such as patient demographics, lab results, medications, and previous notes, with the …
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain
VMASC Publications
Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication. Designated verifier signature, a variant of quantum cryptography, is very useful in applications like the Internet of Things (IoT) and auctions. An identity-based quantum-designated verifier signature (QDVS) scheme is suggested in this work. Our protocol features security attributes like eavesdropping, non-repudiation, designated verification, and hiding sources attacks. Additionally, it is protected from attacks on forgery, inter-resending, and impersonation. The proposed scheme benefits from the traditional designated …
Accelerating Markov Chain Monte Carlo Sampling With Diffusion Models, N. T. Hunt-Smith, W. Melnitchouk, F. Ringer, N. Sato, A. W. Thomas, M. J. White
Accelerating Markov Chain Monte Carlo Sampling With Diffusion Models, N. T. Hunt-Smith, W. Melnitchouk, F. Ringer, N. Sato, A. W. Thomas, M. J. White
Physics Faculty Publications
Global fits of physics models require efficient methods for exploring high-dimensional and/or multimodal posterior functions. We introduce a novel method for accelerating Markov Chain Monte Carlo (MCMC) sampling by pairing a Metropolis-Hastings algorithm with a diffusion model that can draw global samples with the aim of approximating the posterior. We briefly review diffusion models in the context of image synthesis before providing a streamlined diffusion model tailored towards low-dimensional data arrays. We then present our adapted Metropolis-Hastings algorithm which combines local proposals with global proposals taken from a diffusion model that is regularly trained on the samples produced during the …
Age Of Sensing Empowered Holographic Isac Framework For Nextg Wireless Networks: A Vae And Drl Approach, Apurba Adhikary, Avi Deb Raha, Yu Qiao, Md. Shirajum Munir, Monishanker Halder, Choong Seon Hong
Age Of Sensing Empowered Holographic Isac Framework For Nextg Wireless Networks: A Vae And Drl Approach, Apurba Adhikary, Avi Deb Raha, Yu Qiao, Md. Shirajum Munir, Monishanker Halder, Choong Seon Hong
School of Cybersecurity Faculty Publications
This paper proposes an artificial intelligence (AI) framework that leverages integrated sensing and communication (ISAC), aided by the age of sensing (AoS) to ensure the timely location updates of the users for a holographic MIMO (HMIMO)- enabled wireless network. The AI-driven framework guarantees optimal power allocation for efficient beamforming by activating the minimal number of grids from the HMIMO base station. An optimization problem is formulated to maximize the sensing utility function, aiming to maximize the signal-to-interference-plus-noise ratio (SINR) of the received signal, beam-pattern gains to improve the sensing SINR of reflected echo signals and maximizing the evidence lower bound …
The Educational Affordances And Challenges Of Chatgpt: State Of The Field, Helen Crompton, Diane Burke
The Educational Affordances And Challenges Of Chatgpt: State Of The Field, Helen Crompton, Diane Burke
STEMPS Faculty Publications
ChatGPT was released to the public in November 30, 2022. This study examines how ChatGPT can be used by educators and students to promote learning and what are the challenges and limitations. This study is unique in providing one of the first systematic reviews using peer review studies to provide an early examination of the field. Using PRISMA principles, 44 articles were selected for review. Grounded coding was then used to reveal trends in the data. The findings show that educators can use ChatGPT for teaching support, task automation, and professional development. These were further delineated further by axial sub …
Types Of Teacher-Ai Collaboration In K-12 Classroom Instruction: Chinese Teachers' Perspective, Jinhee Kim
Types Of Teacher-Ai Collaboration In K-12 Classroom Instruction: Chinese Teachers' Perspective, Jinhee Kim
STEMPS Faculty Publications
The advancing power and capabilities of artificial intelligence (AI) have expanded the roles of AI in education and have created the possibility for teachers to collaborate with AI in classroom instruction. However, the potential types of teacher-AI collaboration (TAC) in classroom instruction and the benefits and challenges of implementing TAC are still elusive. This study, therefore, aimed to explore different types of TAC and the potential benefits and obstacles of TAC through Focus Group Interviews with 30 Chinese teachers. The study found that teachers anticipated six types of TAC, which are thematized as One Teach, One Observe; One Teach, One …
A Chinese Power Text Classification Algorithm Based On Deep Active Learning, Song Deng, Qianliang Li, Renjie Dai, Siming Wei, Di Wu, Yi He, Xindong Wu
A Chinese Power Text Classification Algorithm Based On Deep Active Learning, Song Deng, Qianliang Li, Renjie Dai, Siming Wei, Di Wu, Yi He, Xindong Wu
Computer Science Faculty Publications
The construction of knowledge graph is beneficial for grid production, electrical safety protection, fault diagnosis and traceability in an observable and controllable way. Highly-precision text classification algorithm is crucial to build a professional knowledge graph in power system. Unfortunately, there are a large number of poorly described and specialized texts in the power business system, and the amount of data containing valid labels in these texts is low. This will bring great challenges to improve the precision of text classification models. To offset the gap, we propose a classification algorithm for Chinese text in the power system based on deep …
Dilf: Differentiable Rendering-Based Multi-View Image-Language Fusion For Zero-Shot 3d Shape Understanding, Xin Ning, Zaiyang Yu, Lusi Li, Weijun Li, Prayag Tiwari
Dilf: Differentiable Rendering-Based Multi-View Image-Language Fusion For Zero-Shot 3d Shape Understanding, Xin Ning, Zaiyang Yu, Lusi Li, Weijun Li, Prayag Tiwari
Computer Science Faculty Publications
Zero-shot 3D shape understanding aims to recognize “unseen” 3D categories that are not present in training data. Recently, Contrastive Language–Image Pre-training (CLIP) has shown promising open-world performance in zero-shot 3D shape understanding tasks by information fusion among language and 3D modality. It first renders 3D objects into multiple 2D image views and then learns to understand the semantic relationships between the textual descriptions and images, enabling the model to generalize to new and unseen categories. However, existing studies in zero-shot 3D shape understanding rely on predefined rendering parameters, resulting in repetitive, redundant, and low-quality views. This limitation hinders the model’s …
A Survey On Few-Shot Class-Incremental Learning, Songsong Tian, Lusi Li, Weijun Li, Hang Ran, Xin Ning, Prayag Tiwari
A Survey On Few-Shot Class-Incremental Learning, Songsong Tian, Lusi Li, Weijun Li, Hang Ran, Xin Ning, Prayag Tiwari
Computer Science Faculty Publications
Large deep learning models are impressive, but they struggle when real-time data is not available. Few-shot class-incremental learning (FSCIL) poses a significant challenge for deep neural networks to learn new tasks from just a few labeled samples without forgetting the previously learned ones. This setup can easily leads to catastrophic forgetting and overfitting problems, severely affecting model performance. Studying FSCIL helps overcome deep learning model limitations on data volume and acquisition time, while improving practicality and adaptability of machine learning models. This paper provides a comprehensive survey on FSCIL. Unlike previous surveys, we aim to synthesize few-shot learning and incremental …
Learning Optimal Inter-Class Margin Adaptively For Few-Shot Class-Incremental Learning Via Neural Collapse-Based Meta-Learning, Hang Ran, Weijun Li, Lusi Li, Songsong Tian, Xin Ning, Prayag Tiwari
Learning Optimal Inter-Class Margin Adaptively For Few-Shot Class-Incremental Learning Via Neural Collapse-Based Meta-Learning, Hang Ran, Weijun Li, Lusi Li, Songsong Tian, Xin Ning, Prayag Tiwari
Computer Science Faculty Publications
Few-Shot Class-Incremental Learning (FSCIL) aims to learn new classes incrementally with a limited number of samples per class. It faces issues of forgetting previously learned classes and overfitting on few-shot classes. An efficient strategy is to learn features that are discriminative in both base and incremental sessions. Current methods improve discriminability by manually designing inter-class margins based on empirical observations, which can be suboptimal. The emerging Neural Collapse (NC) theory provides a theoretically optimal inter-class margin for classification, serving as a basis for adaptively computing the margin. Yet, it is designed for closed, balanced data, not for sequential or few-shot …
Robots Still Outnumber Humans In Web Archives In 2019, But Less Than In 2015 And 2012, Himarsha R. Jayanetti, Kritika Garg, Sawood Alam, Michael L. Nelson, Michele C. Weigle
Robots Still Outnumber Humans In Web Archives In 2019, But Less Than In 2015 And 2012, Himarsha R. Jayanetti, Kritika Garg, Sawood Alam, Michael L. Nelson, Michele C. Weigle
Computer Science Faculty Publications
The significance of the web and the crucial role of web archives in its preservation highlight the necessity of understanding how users, both human and robot, access web archive content, and how best to satisfy this disparate needs of both types of users. To identify robots and humans in web archives and analyze their respective access patterns, we used the Internet Archive’s (IA) Wayback Machine access logs from 2012, 2015, and 2019, as well as Arquivo.pt’s (Portuguese Web Archive) access logs from 2019. We identified user sessions in the access logs and classified those sessions as human or robot based …
Quantifying Potential Marine Debris Sources And Potential Threats To Penguins On The West Antarctic Peninsula, Katherine L. Gallagher, Megan A. Cimino, Michael S. Dinniman, Heather J. Lynch
Quantifying Potential Marine Debris Sources And Potential Threats To Penguins On The West Antarctic Peninsula, Katherine L. Gallagher, Megan A. Cimino, Michael S. Dinniman, Heather J. Lynch
OES Faculty Publications
Marine pollution is becoming ubiquitous in the environment. Observations of pollution on beaches, in the coastal ocean, and in organisms in the Antarctic are becoming distressingly common. Increasing human activity, growing tourism, and an expanding krill fishing industry along the West Antarctic Peninsula all represent potential sources of plastic pollution and other debris (collectively referred to as debris) to the region. However, the sources of these pollutants from point (pollutants released from discrete sources) versus non-point (pollutants from a large area rather than a specific source) sources are poorly understood. We used buoyant simulated particles released in a high-resolution physical …
Urban Flood Extent Segmentation And Evaluation From Real-World Surveillance Camera Images Using Deep Convolutional Neural Network, Yidi Wang, Yawen Shen, Behrouz Salahshour, Mecit Cetin, Khan Iftekharuddin, Navid Tahvildari, Guoping Huang, Devin K. Harris, Kwame Ampofo, Jonathan L. Goodall
Urban Flood Extent Segmentation And Evaluation From Real-World Surveillance Camera Images Using Deep Convolutional Neural Network, Yidi Wang, Yawen Shen, Behrouz Salahshour, Mecit Cetin, Khan Iftekharuddin, Navid Tahvildari, Guoping Huang, Devin K. Harris, Kwame Ampofo, Jonathan L. Goodall
Civil & Environmental Engineering Faculty Publications
This study explores the use of Deep Convolutional Neural Network (DCNN) for semantic segmentation of flood images. Imagery datasets of urban flooding were used to train two DCNN-based models, and camera images were used to test the application of the models with real-world data. Validation results show that both models extracted flood extent with a mean F1-score over 0.9. The factors that affected the performance included still water surface with specular reflection, wet road surface, and low illumination. In testing, reduced visibility during a storm and raindrops on surveillance cameras were major problems that affected the segmentation of flood extent. …
The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati
Cybersecurity Undergraduate Research Showcase
This paper explores the transformative potential of integrating Artificial Intelligence (AI) with established cybersecurity frameworks such as the Cybersecurity Maturity Model Certification (CMMC) and the National Institute of Standards and Technology (NIST) Special Publication 800-171. The thesis argues that the relationship between AI and these frameworks has the capacity to transform risk management in cybersecurity, where it could serve as a critical element in threat mitigation. In addition to addressing AI’s capabilities, this paper acknowledges the risks and limitations of these systems, highlighting the need for extensive research and monitoring when relying on AI. One must understand boundaries when integrating …
The Vulnerabilities To The Rsa Algorithm And Future Alternative Algorithms To Improve Security, James Johnson
The Vulnerabilities To The Rsa Algorithm And Future Alternative Algorithms To Improve Security, James Johnson
Cybersecurity Undergraduate Research Showcase
The RSA encryption algorithm has secured many large systems, including bank systems, data encryption in emails, several online transactions, etc. Benefiting from the use of asymmetric cryptography and properties of number theory, RSA was widely regarded as one of most difficult algorithms to decrypt without a key, especially since by brute force, breaking the algorithm would take thousands of years. However, in recent times, research has shown that RSA is getting closer to being efficiently decrypted classically, using algebraic methods, (fully cracked through limited bits) in which elliptic-curve cryptography has been thought of as the alternative that is stronger than …