Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

2018

Conference

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 39

Full-Text Articles in Social and Behavioral Sciences

Consumption Profiles Of Illicit And Neuropsychiatric Drugs In Urban And Rural Communities In Kentucky Using Sewage Epidemiology, Tara Croft, Katelyn Foppe, Rhiannon Huffines, Bikram Subedi Nov 2018

Consumption Profiles Of Illicit And Neuropsychiatric Drugs In Urban And Rural Communities In Kentucky Using Sewage Epidemiology, Tara Croft, Katelyn Foppe, Rhiannon Huffines, Bikram Subedi

Posters-at-the-Capitol

The drug overdose deaths in the USA increased by ~20% from 2015 to 2016 to the total >63,600 drug overdose deaths in 2016. Kentucky is among the highest rate of drug overdose death states in the USA. The current estimates of the prevalence of substance abuse are based on the self-reported surveys, overdose/toxicological reports, and drug-related crime statistics. Survey-based conventional approaches are not only cost and time-intensive but also underestimate the actual consumption of drugs. As “wastewater never lie,” the drug residues in raw wastewater collected from the centralized wastewater treatment plants were utilized to determine the consumption rate of …


Climate Futures, Design And The Just Transition Schedule, Liberal Arts Division Nov 2018

Climate Futures, Design And The Just Transition Schedule, Liberal Arts Division

Climate Futures Symposium

Schedule of events distributed at the Symposium.


Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros Oct 2018

Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros

KSU Proceedings on Cybersecurity Education, Research and Practice

Internet of things (IoT) offer new opportunities for advancement in many domains including healthcare, home automation, manufacturing and transportation. In recent years, the number of IoT devices have exponentially risen and this meteoric rise is poised to continue according to the industry. Advances in the IoT integrated with ambient intelligence are intended to make our lives easier. Yet for all these advancements, IoT also has a dark side. Privacy and security were already priorities when personal computers, devices and work stations were the only point of vulnerability to personal information, however, with the ubiquitous nature of smart technologies has increased …


The Regressive Burden Of Water-Related Infections On Income Disparity In Ecuador, Cesar Montalvo Oct 2018

The Regressive Burden Of Water-Related Infections On Income Disparity In Ecuador, Cesar Montalvo

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Dynamics Of Social Interactions And Agent Spreading In Ant Colonies: Effects Of Environmental Events And Spatial Heterogeneity, Yun Kang Oct 2018

Dynamics Of Social Interactions And Agent Spreading In Ant Colonies: Effects Of Environmental Events And Spatial Heterogeneity, Yun Kang

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Some Results From A Two Population Model Of Capitalism, Juan Renova Oct 2018

Some Results From A Two Population Model Of Capitalism, Juan Renova

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Discrete Information Object Analysis Of Primary Flight Display Clutter, Kenneth Ward Aug 2018

Discrete Information Object Analysis Of Primary Flight Display Clutter, Kenneth Ward

National Training Aircraft Symposium (NTAS)

Modern aircraft utilize digital display screens to provide critical flight and system status information to pilots. As computing power has increased, the number of data sources and information presented has also increased, with the goal of increasing situational awareness. However, the display can become cluttered with extraneous or irrelevant information, to the detriment of pilot cognitive workload. Pilot perceptions of clutter vary with flight experience, introducing unique considerations in the flight training environment, given the experience difference between instructors and students. Researchers have studied the problem, identifying both the number of visual objects and information density as predictors of perception …


Using Eeg-Validated Music Emotion Recognition Techniques To Classify Multi-Genre Popular Music For Therapeutic Purposes, Dejoy Shastikk Kumaran Jun 2018

Using Eeg-Validated Music Emotion Recognition Techniques To Classify Multi-Genre Popular Music For Therapeutic Purposes, Dejoy Shastikk Kumaran

The International Student Science Fair 2018

Music is observed to possess significant beneficial effects to human mental health, especially for patients undergoing therapy and older adults. Prior research focusing on machine recognition of the emotion music induces by classifying low-level music features has utilized subjective annotation to label data for classification. We validate this approach by using an electroencephalography-based approach to cross-check the predictions of music emotion made with the predictions from low-level music feature data as well as collected subjective annotation data. Collecting 8-channel EEG data from 10 participants listening to segments of 40 songs from 5 different genres, we obtain a subject-independent classification accuracy …


Removal Of Pb2+ Ions From Consuming Water Using A Fabricated Water Filter For Home Use, Pantaree Sodkhoksoong, Papidchaya Chanpong, Thunyarus Rodsawatchuchoke Jun 2018

Removal Of Pb2+ Ions From Consuming Water Using A Fabricated Water Filter For Home Use, Pantaree Sodkhoksoong, Papidchaya Chanpong, Thunyarus Rodsawatchuchoke

The International Student Science Fair 2018

Lead contamination in water is one of the worldwide concerned environmental problems. For example, lead leaking from pipe corrosion and solder has been found contaminated in consuming water in many U.S. areas. The uncontrolled release of effluents containing lead from various industries has also caused lead-contaminated water in Thailand. Exposing to lead-contaminated water can lead to serious symptoms (e.g. fatigue, headaches, abdominal pain, irritability, depression, and seizures) or even death. Therefore, the elimination of lead ions (Pb2+) from consuming water or from effluents before releasing into the environment is necessary. The selection of adsorbents and the fabrication of …


Using Eeg-Validated Music Emotion Recognition Techniques To Classify Multi-Genre Popular Music For Therapeutic Purposes, Dejoy Shastikk Kumaran Jun 2018

Using Eeg-Validated Music Emotion Recognition Techniques To Classify Multi-Genre Popular Music For Therapeutic Purposes, Dejoy Shastikk Kumaran

The International Student Science Fair 2018

Music is observed to possess significant beneficial effects to human mental health, especially for patients undergoing therapy and older adults. Prior research focusing on machine recognition of the emotion music induces by classifying low-level music features has utilized subjective annotation to label data for classification. We validate this approach by using an electroencephalography-based approach to cross-check the predictions of music emotion made with the predictions from low-level music feature data as well as collected subjective annotation data. Collecting 8-channel EEG data from 10 participants listening to segments of 40 songs from 5 different genres, we obtain a subject-independent classification accuracy …


Contents, Adfsl May 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl May 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Questioning - Fundamental 21st Century Comptence, Teresa Lucas, Gerardo Lucas May 2018

Questioning - Fundamental 21st Century Comptence, Teresa Lucas, Gerardo Lucas

ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens

With the advent of the 21st Century, scholars, politicians, scientists, educators, entrepreneurs, religious leaders, and parents have looked at the increasing rapidity of change and complexity in the world, and wondered what capabilities are necessary to embrace the challenges facing us. The P21 Partnership cites four basic “C” skills: creativity and innovation; critical thinking and problem-solving; communication; and, collaboration. However, developing the “4 Cs” relies on another attribute – curiosity, the hallmark of which is the ability to formulate good questions. This workshop proposes to engage participants in a lively exercise of asking questions. A brief introduction reviews various …


Self-Coaching With Ai: Developing Thinking Skills, Thinking Dispositions, And Well-Being, Olivier Malafronte, Isla Reddin, Roy Van Den Brink-Budgen May 2018

Self-Coaching With Ai: Developing Thinking Skills, Thinking Dispositions, And Well-Being, Olivier Malafronte, Isla Reddin, Roy Van Den Brink-Budgen

ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens

Being motivated by the need to address the challenges of our Volatile Uncertain Complex Ambiguous world, we strive to create tools to improve people’s lives and help them become more resilient, resourceful, self-confidant, and successful.

In a digital world, we must understand how to efficiently connect to digital systems. Connecting “with AI” doesn’t mean spending more time on digital devices, but spending time in a deliberate way with purpose and intentional learning outcomes.

As a society, we want to see graduates with emotional intelligence and reflective skills in order to address global economic and social issues. As for jobs …


Trash To Treasure, Kim Rizio, Brooke Fatima Yubero, Defne Timurkan, Corey Gildersleeve May 2018

Trash To Treasure, Kim Rizio, Brooke Fatima Yubero, Defne Timurkan, Corey Gildersleeve

ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens

Based on research of the “Children Are Citizens” initiative from Project Zero at Harvard University, the Trash to Treasure project will engage and capacitate our preschoolers and lower elementary students to be agents of change in our local community. This interdisciplinary project will bring attention to an important environmental issue within our community. Plastic pollution will be transformed into an interactive exhibit and lead our students from bystanders to advocates. Community-wide beach clean-ups will provide students with the trash to create an original multi-media piece that incorporates movement to engage and communicate our message. The installation of the piece in …


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth May 2018

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang May 2018

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle May 2018

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba May 2018

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …


Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta May 2018

Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta

Annual ADFSL Conference on Digital Forensics, Security and Law

Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity …


Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D May 2018

Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D

Annual ADFSL Conference on Digital Forensics, Security and Law

Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues …


Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy May 2018

Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy

Annual ADFSL Conference on Digital Forensics, Security and Law

Although keeping some basic concepts inherited from FAT32, the exFAT file system introduces many differences, such as the new mapping scheme of directory entries. The combination of exFAT mapping scheme with the allocation of bitmap files and the use of FAT leads to new forensic possibilities. The recovery of deleted files, including fragmented ones and carving becomes more accurate compared with former forensic processes. Nowadays, the accurate and sound forensic analysis is more than ever needed, as there is a high risk of erroneous interpretation. Indeed, most of the related work in the literature on exFAT structure and forensics, is …


Measuring Symmetry In Real-World Scenes Using Derivatives Of The Medial Axis Radius Function, Morteza Rezanejad, John D. Wilder, Kaleem Siddiqi, Sven Dickinson, Allan Jepson, Dirk B. Walther May 2018

Measuring Symmetry In Real-World Scenes Using Derivatives Of The Medial Axis Radius Function, Morteza Rezanejad, John D. Wilder, Kaleem Siddiqi, Sven Dickinson, Allan Jepson, Dirk B. Walther

MODVIS Workshop

Symmetry has been shown to be an important principle that guides the grouping of scene information. Previously, we have described a method for measuring the local, ribbon symmetry content of line-drawings of real-world scenes (Rezanejad, et al., MODVIS 2017), and we demonstrated that this information has important behavioral consequences (Wilder, et al., MODIVS 2017). Here, we describe a continuous, local version of the symmetry measure, that allows for both ribbon and taper symmetry to be captured. Our original method looked at the difference in the radius between successive maximal discs along a symmetric axis. The number of radii differences in …


Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang May 2018

Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

The purpose of this research is to apply a graphics processing unit (GPU) forensics method to recover video artifacts from NVIDIA GPU. The tested video specs are 512 x 512 in resolution for video 1 and 800 x 600 in resolution for video 2. Both videos are mpeg4 video codec. A VLC player was used in the experiment. A special program has been developed using OpenCL to recover 1) patterns that are frames consist of pixel values and 2) dump data from the GPU global memory. The dump data that represent the video frame were located using simple steps. The …


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac May 2018

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …


Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik May 2018

Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence …


Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh Apr 2018

Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh

Digital Initiatives Symposium

Over the course of two years, a team of librarians and programmers from LSU Libraries migrated the 186 collections of the Louisiana Digital Library from OCLC's CONTENTdm platform over to the open-source Islandora platform.

Early in the process, the team understood the value of creating a reproducible metadata transformation pipeline, because there were so many unknowns at the beginning of the process along with the certainty that mistakes would be made. This presentation will describe how the team used innovative and collaborative tools, such as Trello, Ansible, Vagrant, VirtualBox, git and GitHub to accomplish the task.


Identifying Influentials In Directed Networks, Guillermo Gutierrez Apr 2018

Identifying Influentials In Directed Networks, Guillermo Gutierrez

Student Symposium

Research into the identification of influential nodes specifically with regards to weighted, directed networks has been lacking throughout the lifetime of Network Theory as a whole. This research project seeks to propel the field forward through by devising an algorithm aimed at identifying influential nodes through the use of probability propagation models of information transfer through various real-world networks. The networks discussed are a developed test-network using the Price Model of citation network growth, the neuronal connectivity network of the flatworm C. elegans, and Congressional co-sponsorship networks of the USA’s 110th House and Senate. Rankings of influence of each node, …


Structural And Compositional Investigation Of Pottery Samples From Guatemala, Pressley S. Nicholson Apr 2018

Structural And Compositional Investigation Of Pottery Samples From Guatemala, Pressley S. Nicholson

Undergraduate Research Conference

Purpose of investigation: The composition and characteristics of Mayan pottery samples from Guatemala was investigated.


Reconstructing Late Holocene Paleofloods Along The Middle Tennessee River And Exploring Links With Climate And Land Use, Lance Stewart Apr 2018

Reconstructing Late Holocene Paleofloods Along The Middle Tennessee River And Exploring Links With Climate And Land Use, Lance Stewart

Scholars Week

Sediment stored in floodplains and low alluvial terraces along the middle Tennessee River reflects flood frequency and magnitude during the past ca. 2800 years. This study uses the stratigraphy, sedimentology, and geochronology of three alluvial terraces to infer past flooding and explore links with climate change and anthropogenic land-use practices. Four sites located on different geomorphic landforms adjacent to the Tennessee River preserve records of at least 11 major flood events from 2780 ± 185 BP to 100 ± 10 BP. Buried soils at three sites are older than ca. 1380 BP and suggest a relatively recent period of landscape …