Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Communication

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 54

Full-Text Articles in Physical Sciences and Mathematics

Ai-Powered Learning: Blending Ai With Active Learning In The Information Literacy Classroom, Kevin J. Reagan, Wilhelmina Randtke Apr 2024

Ai-Powered Learning: Blending Ai With Active Learning In The Information Literacy Classroom, Kevin J. Reagan, Wilhelmina Randtke

Georgia International Conference on Information Literacy

In 2016, the ACRL Framework for Information Literacy in Higher Education launched in response to more voluminous, less-vetted online information, including misinformation and content farms. Subsequently, the ACRL Framework has been widely adopted, and numerous high-quality lesson plans and resources for teaching the frames already exist, including published lesson plans and textbooks. Now, generative AI tools, such as ChatGPT and other chat bots present new challenges for information literacy educators. For instance, in addition to teaching students how to identify issues such as fake news, the information literacy professional has to address topics such as ethical AI use, AI hallucination …


Hgs-3 The Influence Of A Tandem Cycling Program In The Community On Physical And Functional Health, Therapeutic Bonds, And Quality Of Life For Individuals And Care Partners Coping With Parkinson’S Disease, Leila Djerdjour, Jennifer L. Trilk Apr 2024

Hgs-3 The Influence Of A Tandem Cycling Program In The Community On Physical And Functional Health, Therapeutic Bonds, And Quality Of Life For Individuals And Care Partners Coping With Parkinson’S Disease, Leila Djerdjour, Jennifer L. Trilk

SC Upstate Research Symposium

Purpose Statement: Several studies have shown that aerobic exercise can have a positive impact on alleviating symptoms experienced by individuals with Parkinson's disease (PD). Despite this evidence, the potential benefits of exercise for both PD patients and their care partners (PD dyad) remain unexplored. This research project investigates the effectiveness, therapeutic collaborations, and physical outcomes of a virtual reality (VR) tandem cycling program specifically designed for PD dyads.

Methods: Following approval from the Prisma Health Institutional Review Board, individuals with PD were identified and screened by clinical neurologists. The pre-testing measures for PD dyads (N=9) included emotional and cognitive status …


Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins Nov 2023

Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins

Cybersecurity Undergraduate Research Showcase

This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.


Extracting Information From Twitter Screenshots, Tarannum Zaki, Michael L. Nelson, Michele C. Weigle Apr 2023

Extracting Information From Twitter Screenshots, Tarannum Zaki, Michael L. Nelson, Michele C. Weigle

Modeling, Simulation and Visualization Student Capstone Conference

Screenshots are prevalent on social media as a common approach for information sharing. Users rarely verify before sharing screenshots whether they are fake or real. Information sharing through fake screenshots can be highly responsible for misinformation and disinformation spread on social media. There are services of the live web and web archives that could be used to validate the content of a screenshot. We are going to develop a tool that would automatically provide a probability whether a screenshot is fake by using the services of the live web and web archives.


Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund Apr 2023

Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund

Modeling, Simulation and Visualization Student Capstone Conference

The sudden arrival of many migrants can present new challenges for host communities and create negative attitudes that reflect that tension. In the case of Colombia, with the influx of over 2.5 million Venezuelan migrants, such tensions arose. Our research objective is to investigate how those sentiments arise in social media. We focused on monitoring derogatory terms for Venezuelans, specifically veneco and veneca. Using a dataset of 5.7 million tweets from Colombian users between 2015 and 2021, we determined the proportion of tweets containing those terms. We observed a high prevalence of xenophobic and defamatory language correlated with the …


The Impact Of Prc Language Policies On Minority Languages Of China, Margaret Shoop Apr 2023

The Impact Of Prc Language Policies On Minority Languages Of China, Margaret Shoop

Undergraduate Research Competition

While language is often used as a tool to bring people together and celebrate differences, language can also be weaponized and used to suppress minority groups of people. There are over three hundred unique languages and dialects spoken in Mainland China, with Mandarin Chinese being the most widely spoken of the languages. Mandarin is the official state language of the People’s Republic of China (PRC), and it is also the primary language taught in schools across the country. Despite official Chinese policy of teaching Mandarin Chinese alongside local dialects, Mandarin is favored over minority languages. The unequal emphasis on Mandarin …


Factors That Influence The Implementation Of Information And Communication Technology Inclusive Design Practices In Organisations, Faizel Ebrahim, Salah Kabanda, Guidance Mthwazi Aug 2022

Factors That Influence The Implementation Of Information And Communication Technology Inclusive Design Practices In Organisations, Faizel Ebrahim, Salah Kabanda, Guidance Mthwazi

African Conference on Information Systems and Technology

Inclusive design in information and communication technology (ICT) is the development of information and communication technology artifacts that are accessible and easy to use for as many people as possible. Human diversities must be considered when producing these inclusive design artifacts. It is not only important for abled people but also extends to people with disabilities, the elderly and anybody challenged with using these artifacts. Yet, few designers and developers adopt inclusive design methodologies in their practice. This study seeks to identify and understand the factors that influence the implementation of inclusive design practices in organisations. The methodology was based …


How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson Apr 2022

How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson

Cybersecurity Undergraduate Research Showcase

As technology has evolved greatly in the twenty-first century alone, younger generations have had an opportunity to grow up with devices at their fingertips none have ever before. This accessibility has strengthened their ability of quick use, skill, and a strong feeling of comfort with using and having access to technology. There seems to be more children with access to the internet than there are without, but there is also an ongoing issue behind the screens.


Deepfakes: Ai Technology Of The Future, Hosanna Root Jan 2022

Deepfakes: Ai Technology Of The Future, Hosanna Root

Cybersecurity Undergraduate Research Showcase

Deepfakes technology’s danger stems from its ability to create realistic but fake synthesized media that people often identify as something that is real. With this powerful technology in the wrong hands, deepfakes can cause devastating havoc through information warfare, election campaign disruptions, and more, creating distrust in society. Disinformation is already rampant today, even without wide deployments of deepfakes, which is concerning given the fact that deepfakes’ nefarious full potentials are yet to be reached.


The Right To Repair: (Re)Building A Better Future, Jumana Labib Aug 2021

The Right To Repair: (Re)Building A Better Future, Jumana Labib

Undergraduate Student Research Internships Conference

The goal of this research project was to take a multi-faceted, interdisciplinary approach to research and examine the Right to Repair movement’s progress, current repair practices, impediments, and imperatives, and the various large-scale implications (environmental, economic, social, etc.) stemming from diminished consumer freedom as a result of increased corporate greed and lack of governmental regulations with regards to repair and the environment. This poster exhibits the highlights of my general research project on the Right to Repair movement over the course of this four month internship, and aims to disseminate information about the movement to the wider public in an …


How Risk-Related Statistics, As Reported In News And Social Media, Are Linked To The Use Of The Public Transit System, Prashiddhi Pokhrel Apr 2021

How Risk-Related Statistics, As Reported In News And Social Media, Are Linked To The Use Of The Public Transit System, Prashiddhi Pokhrel

Thinking Matters Symposium

Due to the pandemic, people have started relying more on televisions, news, social media, and other news outlets for guidance. Moreover, with the increasing amount of news, data, and information there is also an increase in the amount of misleading statistics. People’s opinions and decisions significantly depend on the data, statistics, and information that they are exposed to, as well as their sources. For this project, we want to look at how information and its sources are affecting the decision made by the general public for the usage of the Portland Transit System. It is very important to know why …


From Ai With Love: Reading Big Data Poetry Through Gilbert Simondon’S Theory Of Transduction, Andrew Klobucar Jul 2020

From Ai With Love: Reading Big Data Poetry Through Gilbert Simondon’S Theory Of Transduction, Andrew Klobucar

Electronic Literature Organization Conference 2020

Computation initiated a far-reaching re-imagination of language, not just as an information tool, but as a social, bio-physical activity in general. Modern lexicology provides an important overview of the ongoing development of textual documentation and its applications in relation to language and linguistics. At the same time, the evolution of lexical tools from the first dictionaries and graphs to algorithmically generated scatter plots of live online interaction patterns has been surprisingly swift. Modern communication and information studies from Norbert Weiner to the present-day support direct parallels between coding and linguistic systems. However, most theories of computation as a model of …


Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson Jul 2020

Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson

Cybersecurity Undergraduate Research Showcase

Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data …


Mind The Gap: Understanding Stakeholder Reactions To Different Types Of Data Security, Audra Diers-Lawson, Amelia Symons Jan 2020

Mind The Gap: Understanding Stakeholder Reactions To Different Types Of Data Security, Audra Diers-Lawson, Amelia Symons

International Crisis and Risk Communication Conference

Data security breaches are an increasingly common problem for organizations, yet there are critical gaps in our understanding of how different stakeholders understand and evaluate organizations that have experienced these kinds of security breaches. While organizations have developed relatively standard approaches to responding to security breaches that: (1) acknowledge the situation; (2) highlight how much they value their stakeholders’ privacy and private information; and (3) focus on correcting and preventing the problem in the future, the effectiveness of this response strategy and factors influencing it have not been adequately explored. This experiment focuses on a 2 (type of organization) x …


Accessibility Of Deepfakes, Andrew L. Collings Jan 2020

Accessibility Of Deepfakes, Andrew L. Collings

Cybersecurity Undergraduate Research Showcase

The danger posed by falsified media, commonly referred to as deepfakes, has been well researched and documented. The software Faceswap to was used to swap the faces of two politician (Joe Biden and Donald Trump). The testing was performed using an affordable consumer GPU (an AMD Radeon RX 570) over 100,000 iterations. The process and results for the two attempts with the best results (and largest differences) were recorded. The result was ultimately unconvincing, while the software was able to recreate the facial structure the lighting and skin tone did not blend at all.


Health Risk Tolerance As A Key Determinant Of (Un)Willingness To Behavior Change: Conceptualization And Scale Development, Hyoyeun Jun, Yan Jin Jan 2019

Health Risk Tolerance As A Key Determinant Of (Un)Willingness To Behavior Change: Conceptualization And Scale Development, Hyoyeun Jun, Yan Jin

International Crisis and Risk Communication Conference

After the study of testing determinants of risk tolerance affecting information sharing, this study was conducted as a second step to actually develop the scale for risk tolerance. Firstly, this study followed qualitative steps, such as in-depth interview and focus group, to capture how public describes the situation when they are tolerating the risk, when they knew what the recommended behavior is to relieve the risk. Secondly, this study collected 1000 U.S. public sample for the survey questionnaire that are the items generated from the qualitative steps.


Self-Coaching With Ai: Developing Thinking Skills, Thinking Dispositions, And Well-Being, Olivier Malafronte, Isla Reddin, Roy Van Den Brink-Budgen May 2018

Self-Coaching With Ai: Developing Thinking Skills, Thinking Dispositions, And Well-Being, Olivier Malafronte, Isla Reddin, Roy Van Den Brink-Budgen

ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens

Being motivated by the need to address the challenges of our Volatile Uncertain Complex Ambiguous world, we strive to create tools to improve people’s lives and help them become more resilient, resourceful, self-confidant, and successful.

In a digital world, we must understand how to efficiently connect to digital systems. Connecting “with AI” doesn’t mean spending more time on digital devices, but spending time in a deliberate way with purpose and intentional learning outcomes.

As a society, we want to see graduates with emotional intelligence and reflective skills in order to address global economic and social issues. As for jobs …


An Analysis Of The Efficacy Of Climate Challenge, Nicholas Barnes, Leslie Cook, Brandon Sharpton Feb 2018

An Analysis Of The Efficacy Of Climate Challenge, Nicholas Barnes, Leslie Cook, Brandon Sharpton

Undergraduate Research Symposium

The temperature in our atmosphere is steadily rising; therefore, we need a method of communicating climate risk that educates and motivates people faster than the rising sea level. Our presentation analyzes the communicative effectiveness of Climate Challenge, a game created for this purpose. We will also analyze and utilize prior research of climate change games and serious games. We gathered participants for our research using convenience and snowball sampling. We conducted a pre-test survey and post-test interview, along with a screencast-recorded playthrough of Climate Challenge. After the research session we used grounded theory and inductive thematic analysis to …


Acoustic Signatures Of Habitat Types In The Miombo Woodlands Of Western Tanzania, Sheryl Vanessa Amorocho, Dante Francomano, Kristen M. Bellisario, Ben Gottesman, Bryan C. Pijanowski Aug 2017

Acoustic Signatures Of Habitat Types In The Miombo Woodlands Of Western Tanzania, Sheryl Vanessa Amorocho, Dante Francomano, Kristen M. Bellisario, Ben Gottesman, Bryan C. Pijanowski

The Summer Undergraduate Research Fellowship (SURF) Symposium

The Miombo Woodlands of Tanzania comprise several habitat types that are home to a great number of flora and fauna. Understanding their responses to increasing human disturbance is important for conservation, especially in places where people depend so directly on their local ecosystem services to survive. Soundscapes are a powerful approach to study complex biomes undergoing change. The sounds emitted by soniferous fauna characterize the acoustic profile of the landscapes they inhabit such that habitats with the highest acoustic abundance are considered as the most diverse and possibly more ecologically resilient. However, acoustic variability within similar habitat types may pose …


Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani Oct 2016

Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani

UBT International Conference

The Wireless Body Area Network (WBAN) has gained popularity as a new technology for e-Health, and is considered as one of the key research areas in computer science and healthcare applications. WBAN collects patients’ data, monitors constantly their physiological parameters, using small implantable or wearable sensors, and communicates these data using wireless communication techniques in short range. WBAN is playing a huge role in improving the quality of healthcare. Still, due to sensitive and concurrent nature of e-Heath systems, current research has showed that designers must take into considerations the security and privacy protection of the data collected by a …


Development Of Airships Stratospheric Platform Systems (Sps), Dimov Stojce Ilcev Oct 2016

Development Of Airships Stratospheric Platform Systems (Sps), Dimov Stojce Ilcev

UBT International Conference

In this paper are introduced airships as part of new Stratospheric Platform System (SPS) in function of space communications. Airships are the latest space techniques with advanced technology for fixed and all mobile applications, including military and rural solutions. This SPS employ unmanned or manned, solar or fuel energy airships or aircraft carrying payloads with transponders and antennas. The airship SPS can be considered as a novel solution for providing communication and navigation services. The research and development of airships for putting the system in to practical use is ongoing in some countries. The remote controlled-solar powered airships or aircraft …


Improving Non-Native English Students’ Communicative Competence And Collaboration Skills Through Virtual Simulations, Alisa Sadiku Oct 2016

Improving Non-Native English Students’ Communicative Competence And Collaboration Skills Through Virtual Simulations, Alisa Sadiku

UBT International Conference

Knowing how to communicate in the target language is the main goal of most language learners. Furthermore, it is very challenging for teachers to bring real world communication experiences in classroom settings where English is not the native language. Hence, in this paper I explore the role of virtual simulations in promoting communicational and collaboration opportunities to non-native speakers of English. In my research, I describe how virtual worlds improve communicative and collaborative skills of non-native speakers of English. Moreover, I investigate how virtual worlds can create a learner centered environment where students take control of their own language production. …


Analysis Of The Mobile Market In 2014 In Macedonia, Recommendations For Better Development And Improved Quality Of Mobile Services, Arsov Boris, Trajkovski Vasko Oct 2016

Analysis Of The Mobile Market In 2014 In Macedonia, Recommendations For Better Development And Improved Quality Of Mobile Services, Arsov Boris, Trajkovski Vasko

UBT International Conference

In order to regulate the electronic communications market in a systematic way, the Agency for Electronic Communications, as a regulatory body in the field of electronic communications, has strongly set issues and targets to be achieved. The Agency has guidelines how to achieve the issues of a competitive market where conditions for using the electronic communications services with best quality and best prices are going to be created for the end users.


Descriptive Analysis Of Characteristics: A Case Study Of A Phone Call Network Graph, Orgeta Gjermëni, Miftar Ramosaco Oct 2016

Descriptive Analysis Of Characteristics: A Case Study Of A Phone Call Network Graph, Orgeta Gjermëni, Miftar Ramosaco

UBT International Conference

Nowadays, systematic collection of data has necessitated a detailed statistical analysis as a necessary tool to make a mathematical characterization of them with the purpose of gathering information about the present or the future. Our aim in this paper is to analyze a landline phone call network graph from the perspective of descriptive analysis. We explore the characteristics and structural properties of the network graph constructed using an anonymous collection of data gathered from a Call Data Records of a telecommunication operator center located in south of Albania. The R statistical computing platform is used for network graph analysis.


Circuit Design For Green Communications – Methods, Tools And Examples, Galia Marinova, Zdravka Tchobanova Oct 2016

Circuit Design For Green Communications – Methods, Tools And Examples, Galia Marinova, Zdravka Tchobanova

UBT International Conference

The paper makes an overview of the existing methods applied for circuit design with low power consumption objective. It considers Computer-Aided Design (CAD) tools and modules for power consumption estimation at the design stage. For analog and mixed analog-digital circuit design, the power estimation options in ORCAD Design Suit with PSpice and Analog Filter Wizard are studied. For digital communication systems the study covers the power estimation, analysis and optimization in ISE and Vivado systems, Xilinx Power Estimator (XPE) tool and spreadsheet, the XPower Analyzer, as well as similar tools proposed by ALTERA - PowerPlay Early Power Estimator and QUARTUS …


A Summary Of Classification And Regression Tree With Application, Adem Meta Oct 2016

A Summary Of Classification And Regression Tree With Application, Adem Meta

UBT International Conference

Classification and regression tree (CART) is a non-parametric methodology that was introduced first by Breiman and colleagues in 1984. CART is a technique which divides populations into meaningful subgroups that allows the identification of groups of interest. CART as a classification method constructs decision trees. Depending on information that is available about the dataset, a classification tree or a regression tree can be constructed. The first part of this paper describes the fundamental principles of tree construction, pruning procedure and different splitting algorithms. The second part of the paper answers the questions why or why not the CART method should …


An Overview For Chaos Fractals And Applications, Adem Meta Oct 2016

An Overview For Chaos Fractals And Applications, Adem Meta

UBT International Conference

The goal of this paper is to present, a summary of concepts from the Chaos and Fractals theory and some basic theory to understand how the Chaos and Fractal theory fundamentals work, for more to explain how is related the chaos theory with mathematics application. This paper will provide examples of how this new approach could be applied and how is chaos related to the Statistics. In this paper, I am going to introduce the concept of “fractal” dimension and some examples to calculate the dimensions. At the center of fractals is Mandelbrot set, otherwise is called the hard of …


Introduction To Ships Satellite Tracking Systems, Dimov Stojce Ilcev Oct 2016

Introduction To Ships Satellite Tracking Systems, Dimov Stojce Ilcev

UBT International Conference

This paper introduces the current and new Satellite solutions for local and global tracking of ships for enhanced Ship Traffic Control (STC) and Ship Traffic Management (STM) at sea, in sea passages, approaching to the anchorages and inside of seaports. All transportation systems and especially for maritime applications require far more sophisticated technology solutions and equipment for modern Satellite ship tracking than current standalone the US GPS or Russian GLONAS positioning systems. The existing and forthcoming Global Ship Tracking (GST), Satellite Data Link (SDL) and Local Ship Tracking (LST) systems with Space and Ground Segment infrastructures for all three systems …


Cloud Computing And Enterprise Data Reliability, Luan Gashi Oct 2016

Cloud Computing And Enterprise Data Reliability, Luan Gashi

UBT International Conference

Cloud services offer many benefits from information and communication technology that to be credible must first be secured. To use the potential of cloud computing, data is transferred, processed and stored in the infrastructures of these service providers. This indicates that the owners of data, particularly enterprises, have puzzled when storing their data is done outside the scope of their control.

Research conducted on this topic show how this should be addressed unequivocally. The provided information on the organization of cloud computing models, services and standards, with a focus on security aspects in protecting enterprise data where emphasis shows how …


Generalization Of Strong Convergence Theorem In Cat(0) Spaces, Alba Troci Oct 2016

Generalization Of Strong Convergence Theorem In Cat(0) Spaces, Alba Troci

UBT International Conference

The aim of this paper is to give the generalization condition of T-Ciric quasi contractive mapping. Also to study the generalization of strong convergence theorem of modified S-iteration process for Ciric quasi contractive operator in the framework of CAT(0) spaces based on new generalized condition for T-Ciric quasi contractive mapping. Our results extend and generalize many known results from the previous work given in the existing literature (see [1,6]).