Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Computer Science (2)
- Automated workflows (1)
- Brown University (1)
- Chemistry (1)
- Clutter (1)
-
- Collaboration (1)
- Critical Design-Critical Fututres (1)
- Digital libraries (1)
- GAC (1)
- Gestalt (1)
- Glass cockpit (1)
- Global Arts and Cultures (1)
- Innovation (1)
- Institute at Brown for Environment and Scoiety (1)
- Lecture (1)
- Liberal Arts Division (1)
- Medial Axis Transform (1)
- Metadata transformation (1)
- NCSS (1)
- Nature-Culture-Sustainability Studies (1)
- PFD (1)
- Perception (1)
- Physics; Politics; Computer-Science; Congress; Network Theory; Directed Networks; Influence (1)
- Pilot (1)
- Poster (1)
- Project management (1)
- Providence College (1)
- Scene Perception (1)
- Symmetry (1)
- Symposium (1)
- Publication
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (15)
- Annual Symposium on Biomathematics and Ecology Education and Research (3)
- ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens (3)
- The International Student Science Fair 2018 (3)
- Student Scholar Showcase (2)
-
- Climate Futures Symposium (1)
- Digital Initiatives Symposium (1)
- KSU Proceedings on Cybersecurity Education, Research and Practice (1)
- Lesley University Community of Scholars Day (1)
- MODVIS Workshop (1)
- National Training Aircraft Symposium (NTAS) (1)
- Posters-at-the-Capitol (1)
- Purdue Road School (1)
- Scholars Week (1)
- Student Symposium (1)
- Sustainability Seminar Series (1)
- Undergraduate Research Conference (1)
- Undergraduate Research Symposium (1)
- File Type
Articles 1 - 30 of 39
Full-Text Articles in Social and Behavioral Sciences
Consumption Profiles Of Illicit And Neuropsychiatric Drugs In Urban And Rural Communities In Kentucky Using Sewage Epidemiology, Tara Croft, Katelyn Foppe, Rhiannon Huffines, Bikram Subedi
Consumption Profiles Of Illicit And Neuropsychiatric Drugs In Urban And Rural Communities In Kentucky Using Sewage Epidemiology, Tara Croft, Katelyn Foppe, Rhiannon Huffines, Bikram Subedi
Posters-at-the-Capitol
The drug overdose deaths in the USA increased by ~20% from 2015 to 2016 to the total >63,600 drug overdose deaths in 2016. Kentucky is among the highest rate of drug overdose death states in the USA. The current estimates of the prevalence of substance abuse are based on the self-reported surveys, overdose/toxicological reports, and drug-related crime statistics. Survey-based conventional approaches are not only cost and time-intensive but also underestimate the actual consumption of drugs. As “wastewater never lie,” the drug residues in raw wastewater collected from the centralized wastewater treatment plants were utilized to determine the consumption rate of …
Climate Futures, Design And The Just Transition Schedule, Liberal Arts Division
Climate Futures, Design And The Just Transition Schedule, Liberal Arts Division
Climate Futures Symposium
Schedule of events distributed at the Symposium.
Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros
Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros
KSU Proceedings on Cybersecurity Education, Research and Practice
Internet of things (IoT) offer new opportunities for advancement in many domains including healthcare, home automation, manufacturing and transportation. In recent years, the number of IoT devices have exponentially risen and this meteoric rise is poised to continue according to the industry. Advances in the IoT integrated with ambient intelligence are intended to make our lives easier. Yet for all these advancements, IoT also has a dark side. Privacy and security were already priorities when personal computers, devices and work stations were the only point of vulnerability to personal information, however, with the ubiquitous nature of smart technologies has increased …
The Regressive Burden Of Water-Related Infections On Income Disparity In Ecuador, Cesar Montalvo
The Regressive Burden Of Water-Related Infections On Income Disparity In Ecuador, Cesar Montalvo
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
Dynamics Of Social Interactions And Agent Spreading In Ant Colonies: Effects Of Environmental Events And Spatial Heterogeneity, Yun Kang
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
Some Results From A Two Population Model Of Capitalism, Juan Renova
Some Results From A Two Population Model Of Capitalism, Juan Renova
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
Discrete Information Object Analysis Of Primary Flight Display Clutter, Kenneth Ward
Discrete Information Object Analysis Of Primary Flight Display Clutter, Kenneth Ward
National Training Aircraft Symposium (NTAS)
Modern aircraft utilize digital display screens to provide critical flight and system status information to pilots. As computing power has increased, the number of data sources and information presented has also increased, with the goal of increasing situational awareness. However, the display can become cluttered with extraneous or irrelevant information, to the detriment of pilot cognitive workload. Pilot perceptions of clutter vary with flight experience, introducing unique considerations in the flight training environment, given the experience difference between instructors and students. Researchers have studied the problem, identifying both the number of visual objects and information density as predictors of perception …
Using Eeg-Validated Music Emotion Recognition Techniques To Classify Multi-Genre Popular Music For Therapeutic Purposes, Dejoy Shastikk Kumaran
Using Eeg-Validated Music Emotion Recognition Techniques To Classify Multi-Genre Popular Music For Therapeutic Purposes, Dejoy Shastikk Kumaran
The International Student Science Fair 2018
Music is observed to possess significant beneficial effects to human mental health, especially for patients undergoing therapy and older adults. Prior research focusing on machine recognition of the emotion music induces by classifying low-level music features has utilized subjective annotation to label data for classification. We validate this approach by using an electroencephalography-based approach to cross-check the predictions of music emotion made with the predictions from low-level music feature data as well as collected subjective annotation data. Collecting 8-channel EEG data from 10 participants listening to segments of 40 songs from 5 different genres, we obtain a subject-independent classification accuracy …
Removal Of Pb2+ Ions From Consuming Water Using A Fabricated Water Filter For Home Use, Pantaree Sodkhoksoong, Papidchaya Chanpong, Thunyarus Rodsawatchuchoke
Removal Of Pb2+ Ions From Consuming Water Using A Fabricated Water Filter For Home Use, Pantaree Sodkhoksoong, Papidchaya Chanpong, Thunyarus Rodsawatchuchoke
The International Student Science Fair 2018
Lead contamination in water is one of the worldwide concerned environmental problems. For example, lead leaking from pipe corrosion and solder has been found contaminated in consuming water in many U.S. areas. The uncontrolled release of effluents containing lead from various industries has also caused lead-contaminated water in Thailand. Exposing to lead-contaminated water can lead to serious symptoms (e.g. fatigue, headaches, abdominal pain, irritability, depression, and seizures) or even death. Therefore, the elimination of lead ions (Pb2+) from consuming water or from effluents before releasing into the environment is necessary. The selection of adsorbents and the fabrication of …
Using Eeg-Validated Music Emotion Recognition Techniques To Classify Multi-Genre Popular Music For Therapeutic Purposes, Dejoy Shastikk Kumaran
Using Eeg-Validated Music Emotion Recognition Techniques To Classify Multi-Genre Popular Music For Therapeutic Purposes, Dejoy Shastikk Kumaran
The International Student Science Fair 2018
Music is observed to possess significant beneficial effects to human mental health, especially for patients undergoing therapy and older adults. Prior research focusing on machine recognition of the emotion music induces by classifying low-level music features has utilized subjective annotation to label data for classification. We validate this approach by using an electroencephalography-based approach to cross-check the predictions of music emotion made with the predictions from low-level music feature data as well as collected subjective annotation data. Collecting 8-channel EEG data from 10 participants listening to segments of 40 songs from 5 different genres, we obtain a subject-independent classification accuracy …
Contents, Adfsl
Contents, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Front Matter, Adfsl
Front Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Questioning - Fundamental 21st Century Comptence, Teresa Lucas, Gerardo Lucas
Questioning - Fundamental 21st Century Comptence, Teresa Lucas, Gerardo Lucas
ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens
With the advent of the 21st Century, scholars, politicians, scientists, educators, entrepreneurs, religious leaders, and parents have looked at the increasing rapidity of change and complexity in the world, and wondered what capabilities are necessary to embrace the challenges facing us. The P21 Partnership cites four basic “C” skills: creativity and innovation; critical thinking and problem-solving; communication; and, collaboration. However, developing the “4 Cs” relies on another attribute – curiosity, the hallmark of which is the ability to formulate good questions. This workshop proposes to engage participants in a lively exercise of asking questions. A brief introduction reviews various …
Self-Coaching With Ai: Developing Thinking Skills, Thinking Dispositions, And Well-Being, Olivier Malafronte, Isla Reddin, Roy Van Den Brink-Budgen
Self-Coaching With Ai: Developing Thinking Skills, Thinking Dispositions, And Well-Being, Olivier Malafronte, Isla Reddin, Roy Van Den Brink-Budgen
ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens
Being motivated by the need to address the challenges of our Volatile Uncertain Complex Ambiguous world, we strive to create tools to improve people’s lives and help them become more resilient, resourceful, self-confidant, and successful.
In a digital world, we must understand how to efficiently connect to digital systems. Connecting “with AI” doesn’t mean spending more time on digital devices, but spending time in a deliberate way with purpose and intentional learning outcomes.
As a society, we want to see graduates with emotional intelligence and reflective skills in order to address global economic and social issues. As for jobs …
Trash To Treasure, Kim Rizio, Brooke Fatima Yubero, Defne Timurkan, Corey Gildersleeve
Trash To Treasure, Kim Rizio, Brooke Fatima Yubero, Defne Timurkan, Corey Gildersleeve
ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens
Based on research of the “Children Are Citizens” initiative from Project Zero at Harvard University, the Trash to Treasure project will engage and capacitate our preschoolers and lower elementary students to be agents of change in our local community. This interdisciplinary project will bring attention to an important environmental issue within our community. Plastic pollution will be transformed into an interactive exhibit and lead our students from bystanders to advocates. Community-wide beach clean-ups will provide students with the trash to create an original multi-media piece that incorporates movement to engage and communicate our message. The installation of the piece in …
Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth
Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth
Annual ADFSL Conference on Digital Forensics, Security and Law
Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.
Knowledge Expiration In Security Awareness Training, Tianjian Zhang
Knowledge Expiration In Security Awareness Training, Tianjian Zhang
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle
Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …
Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba
Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba
Annual ADFSL Conference on Digital Forensics, Security and Law
Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …
Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta
Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta
Annual ADFSL Conference on Digital Forensics, Security and Law
Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity …
Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D
Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D
Annual ADFSL Conference on Digital Forensics, Security and Law
Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues …
Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy
Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy
Annual ADFSL Conference on Digital Forensics, Security and Law
Although keeping some basic concepts inherited from FAT32, the exFAT file system introduces many differences, such as the new mapping scheme of directory entries. The combination of exFAT mapping scheme with the allocation of bitmap files and the use of FAT leads to new forensic possibilities. The recovery of deleted files, including fragmented ones and carving becomes more accurate compared with former forensic processes. Nowadays, the accurate and sound forensic analysis is more than ever needed, as there is a high risk of erroneous interpretation. Indeed, most of the related work in the literature on exFAT structure and forensics, is …
Measuring Symmetry In Real-World Scenes Using Derivatives Of The Medial Axis Radius Function, Morteza Rezanejad, John D. Wilder, Kaleem Siddiqi, Sven Dickinson, Allan Jepson, Dirk B. Walther
Measuring Symmetry In Real-World Scenes Using Derivatives Of The Medial Axis Radius Function, Morteza Rezanejad, John D. Wilder, Kaleem Siddiqi, Sven Dickinson, Allan Jepson, Dirk B. Walther
MODVIS Workshop
Symmetry has been shown to be an important principle that guides the grouping of scene information. Previously, we have described a method for measuring the local, ribbon symmetry content of line-drawings of real-world scenes (Rezanejad, et al., MODVIS 2017), and we demonstrated that this information has important behavioral consequences (Wilder, et al., MODIVS 2017). Here, we describe a continuous, local version of the symmetry measure, that allows for both ribbon and taper symmetry to be captured. Our original method looked at the difference in the radius between successive maximal discs along a symmetric axis. The number of radii differences in …
Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang
Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang
Annual ADFSL Conference on Digital Forensics, Security and Law
The purpose of this research is to apply a graphics processing unit (GPU) forensics method to recover video artifacts from NVIDIA GPU. The tested video specs are 512 x 512 in resolution for video 1 and 800 x 600 in resolution for video 2. Both videos are mpeg4 video codec. A VLC player was used in the experiment. A special program has been developed using OpenCL to recover 1) patterns that are frames consist of pixel values and 2) dump data from the GPU global memory. The dump data that represent the video frame were located using simple steps. The …
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac
Annual ADFSL Conference on Digital Forensics, Security and Law
Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …
Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik
Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence …
Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh
Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh
Digital Initiatives Symposium
Over the course of two years, a team of librarians and programmers from LSU Libraries migrated the 186 collections of the Louisiana Digital Library from OCLC's CONTENTdm platform over to the open-source Islandora platform.
Early in the process, the team understood the value of creating a reproducible metadata transformation pipeline, because there were so many unknowns at the beginning of the process along with the certainty that mistakes would be made. This presentation will describe how the team used innovative and collaborative tools, such as Trello, Ansible, Vagrant, VirtualBox, git and GitHub to accomplish the task.
Identifying Influentials In Directed Networks, Guillermo Gutierrez
Identifying Influentials In Directed Networks, Guillermo Gutierrez
Student Symposium
Research into the identification of influential nodes specifically with regards to weighted, directed networks has been lacking throughout the lifetime of Network Theory as a whole. This research project seeks to propel the field forward through by devising an algorithm aimed at identifying influential nodes through the use of probability propagation models of information transfer through various real-world networks. The networks discussed are a developed test-network using the Price Model of citation network growth, the neuronal connectivity network of the flatworm C. elegans, and Congressional co-sponsorship networks of the USA’s 110th House and Senate. Rankings of influence of each node, …
Structural And Compositional Investigation Of Pottery Samples From Guatemala, Pressley S. Nicholson
Structural And Compositional Investigation Of Pottery Samples From Guatemala, Pressley S. Nicholson
Undergraduate Research Conference
Purpose of investigation: The composition and characteristics of Mayan pottery samples from Guatemala was investigated.
Reconstructing Late Holocene Paleofloods Along The Middle Tennessee River And Exploring Links With Climate And Land Use, Lance Stewart
Reconstructing Late Holocene Paleofloods Along The Middle Tennessee River And Exploring Links With Climate And Land Use, Lance Stewart
Scholars Week
Sediment stored in floodplains and low alluvial terraces along the middle Tennessee River reflects flood frequency and magnitude during the past ca. 2800 years. This study uses the stratigraphy, sedimentology, and geochronology of three alluvial terraces to infer past flooding and explore links with climate change and anthropogenic land-use practices. Four sites located on different geomorphic landforms adjacent to the Tennessee River preserve records of at least 11 major flood events from 2780 ± 185 BP to 100 ± 10 BP. Buried soils at three sites are older than ca. 1380 BP and suggest a relatively recent period of landscape …