Software Jimenae Allows Efficient Dynamic Simulations Of Boolean Networks, Centrality And System State Analysis,
2023
Biozentrum der Universität Würzburg
Software Jimenae Allows Efficient Dynamic Simulations Of Boolean Networks, Centrality And System State Analysis, Martin Kaltdorf, Tim Breitenbach, Stefan Karl, Maximilian Fuchs, David Komla Kessie, Eric Psota, Martina Prelog, Edita Sarukhanyan, Regina Ebert, Franz Jakob, Gudrun Dandekar, Muhammad Naseem, Chunguang Liang, Thomas Dandekar
All Works
The signal modelling framework JimenaE simulates dynamically Boolean networks. In contrast to SQUAD, there is systematic and not just heuristic calculation of all system states. These specific features are not present in CellNetAnalyzer and BoolNet. JimenaE is an expert extension of Jimena, with new optimized code, network conversion into different formats, rapid convergence both for system state calculation as well as for all three network centralities. It allows higher accuracy in determining network states and allows to dissect networks and identification of network control type and amount for each protein with high accuracy. Biological examples demonstrate this: (i) High plasticity …
Predicting New Crescent Moon Visibility Applying Machine Learning Algorithms,
2023
Abu Dhabi University
Predicting New Crescent Moon Visibility Applying Machine Learning Algorithms, Murad Al-Rajab, Samia Loucif, Yazan Al Risheh
All Works
The world's population is projected to grow 32% in the coming years, and the number of Muslims is expected to grow by 70%—from 1.8 billion in 2015 to about 3 billion in 2060. Hijri is the Islamic calendar, also known as the lunar Hijri calendar, which consists of 12 lunar months, and it is tied to the Moon phases where a new crescent Moon marks the beginning of each month. Muslims use the Hijri calendar to determine important dates and religious events such as Ramadan, Haj, Muharram, etc. Till today, there is no consensus on deciding on the beginning of …
Key Communication Technologies, Applications, Protocols And Future Guides For Iot-Assisted Smart Grid Systems: A Review,
2023
Edith Cowan University
Key Communication Technologies, Applications, Protocols And Future Guides For Iot-Assisted Smart Grid Systems: A Review, Md Ohirul Qays, Iftekhar Ahmad, Ahmed Abu-Siada, Md Liton Hossain, Farhana Yasmin
Research outputs 2022 to 2026
Towards addressing the concerns of conventional power systems including reliability and security, establishing modern Smart Grids (SGs) has been given much attention by the global electric utility applications during the last few years. One of the key advantageous of SGs is its ability for two-way communication and bi-directional power flow that facilitates the inclusion of distributed energy resources, real time monitoring and self-healing systems. As such, the SG employs a large number of digital devices that are installed at various locations to enrich the observability and controllability of the system. This calls for the necessity of employing Internet of Things …
Form Auto Generation: An Analysis Of Gui Generation,
2023
University of Nebraska at Omaha
Form Auto Generation: An Analysis Of Gui Generation, Jedadiah Mcfarland
Theses/Capstones/Creative Projects
Graphical User Interfaces (GUIs) have transformed how we interact with computers, offering visually appealing and intuitive systems. This paper explores the origins and evolution of GUIs, explicitly focusing on form auto-generation in modern GUI-driven environments. Form auto-generation has emerged as a prominent practice, enabling automatic form creation based on predefined models. To better understand form auto-generation, I investigate SurveyJS, an open-source form auto-generation library known for its active development and support. This investigation aims to understand how SurveyJS recognizes and renders objects from a JSON model. The methodology involves a trial and error examination of the library, exploring its live …
Constrained Route Optimization With Fleet Considerations For Electrified Heavy-Duty Freight Vehicles,
2023
Utah State University
Constrained Route Optimization With Fleet Considerations For Electrified Heavy-Duty Freight Vehicles, Zarin Subah Shamma
All Graduate Theses and Dissertations
Almost 75% of traffic-related emissions are caused by heavy-duty freight trucks and significantly impact neighborhoods, schools, and communities around shipping and distribution lines. With poor air quality and respiratory health, many children in at-risk and disadvantaged communities experience high rates of asthma, lower attendance in school, and lower concentration. This research creates to improve the impacts of heavy-duty electric freight by improving the route efficiency (in terms of energy, time, or route distance) of EV trucks. Our software and algorithms are tested in a simulation environment using data from several thousand fleet trucks operating in the Salt Lake City area. …
Cyber Attack Surface Mapping For Offensive Security Testing,
2023
Clemson University
Cyber Attack Surface Mapping For Offensive Security Testing, Douglas Everson
All Dissertations
Security testing consists of automated processes, like Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST), as well as manual offensive security testing, like Penetration Testing and Red Teaming. This nonautomated testing is frequently time-constrained and difficult to scale. Previous literature suggests that most research is spent in support of improving fully automated processes or in finding specific vulnerabilities, with little time spent improving the interpretation of the scanned attack surface critical to nonautomated testing. In this work, agglomerative hierarchical clustering is used to compress the Internet-facing hosts of 13 representative companies as collected by the Shodan search …
Towards Intelligent Runtime Framework For Distributed Heterogeneous Systems,
2023
Old Dominion University
Towards Intelligent Runtime Framework For Distributed Heterogeneous Systems, Polykarpos Thomadakis
Computer Science Theses & Dissertations
Scientific applications strive for increased memory and computing performance, requiring massive amounts of data and time to produce results. Applications utilize large-scale, parallel computing platforms with advanced architectures to accommodate their needs. However, developing performance-portable applications for modern, heterogeneous platforms requires lots of effort and expertise in both the application and systems domains. This is more relevant for unstructured applications whose workflow is not statically predictable due to their heavily data-dependent nature. One possible solution for this problem is the introduction of an intelligent Domain-Specific Language (iDSL) that transparently helps to maintain correctness, hides the idiosyncrasies of lowlevel hardware, and …
How Do Pedestrians Perceive The Safety, Comfort, And Usefulness Of A Walking Space? An Exploratory Study Of Pedestrian Perception,
2023
Master Program of Urban and Regional Planning, Faculty of Engineering, Universitas Indonesia
How Do Pedestrians Perceive The Safety, Comfort, And Usefulness Of A Walking Space? An Exploratory Study Of Pedestrian Perception, Amanda Rifqa Marisa, Achmad Hery Fuad
Smart City
Car-oriented development has brought several negative impacts on human quality of life. Therefore, it is necessary to pay more attention to walkability as one of the essential aspects of it, especially in the urban area. In the meantime, most research on walking and walkability still overlooks the role of the pedestrian's perspective in examining walkability. Hence, this research tries to fill the gap in walkability research by exploring the pedestrian perspectives on the safety, comfort, and usefulness of walking space as the three overlapping aspects between walkability and walking needs. This research took context in Suryakencana, Bogor City, Indonesia. To …
Urban Memory Becomes An Idea In The Concept Of Spatial Planning (Study Case: Restoration Area Of Tambora District, West Jakarta),
2023
Master Program of Urban and Regional Planning, Faculty of Engineering, Universitas Indonesia
Urban Memory Becomes An Idea In The Concept Of Spatial Planning (Study Case: Restoration Area Of Tambora District, West Jakarta), Riska Phillia, Antony Sihombing
Smart City
Urban heritage is a small part of the past of the city that holds the roots of the city's identity and culture, which are the city's identity. The strong identity of the historic area must be maintained, but this has a dilemma because of the need for change today. Therefore efforts are needed to create adaptive urban heritage areas. City spaces have a deep relationship with the people who inhabit them, with the most memorable or most memorable experiences and memories for them. This research contributes to exploring urban memory to develop conceptual spatial plans in restoration areas, using qualitative …
Major Paths Changes In 2013-2022 To Walkability (Case Study: Dukuh Atas Tod),
2023
Master Program of Urban and Regional Planning, Faculty of Engineering, Universitas Indonesia
Major Paths Changes In 2013-2022 To Walkability (Case Study: Dukuh Atas Tod), Daniel Harvey Tulis, Antony Sihombing
Smart City
Development area with the concept of Transit Oriented Development (TOD) occurs so rapidly in big cities, which aims to create an integrated transportation system and is supported by the surrounding area. TOD area must have good road access for vehicles and space for pedestrians. Dukuh Atas TOD is one of the transit-oriented areas planned to be the largest TOD area in Jakarta so that developments are felt every year, including visuals and the road traffic system and pedestrian space. This research is using qualitative method by answering specific and actual variables. Time series analysis to see changes every year combined …
Future Trends And Directions For Secure Infrastructure Architecture In The Education Sector: A Systematic Review Of Recent Evidence,
2023
Kwame Nkrumah University of Science and Technology
Future Trends And Directions For Secure Infrastructure Architecture In The Education Sector: A Systematic Review Of Recent Evidence, Isaac Atta Senior Ampofo, Isaac Atta Junior Ampofo
Journal of Research Initiatives
The most efficient approach to giving large numbers of students’ access to computational resources is through a data center. A contemporary method for building the data center's computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher examines potential directions and trends for a secured infrastructure design in this article. Additionally, interoperable, highly reusable modules that can include the newest trends in the education industry are made possible by cloud-based educational software. The Reference Architecture for University Education System Using AWS Services is presented …
A Systematic Mapping Study On Gamification Applications For Undergraduate Cybersecurity Education,
2023
University of Nebraska at Kearney
A Systematic Mapping Study On Gamification Applications For Undergraduate Cybersecurity Education, Sherri Weitl-Harms, Adam Spanier, John Hastings, Matthew Rokusek
Journal of Cybersecurity Education, Research and Practice
Gamification in education presents a number of benefits that can theoretically facilitate higher engagement and motivation among students when learning complex, technical concepts. As an innovative, high-potential educational tool, many educators and researchers are attempting to implement more effective gamification into undergraduate coursework. Cyber Security Operations (CSO) education is no exception. CSO education traditionally requires comprehension of complex concepts requiring a high level of technical and abstract thinking. By properly applying gamification to complex CSO concepts, engagement in students should see an increase. While an increase is expected, no comprehensive study of CSO gamification applications (GA) has yet been undertaken …
Compete To Learn: Toward Cybersecurity As A Sport,
2023
Florida Tech
Compete To Learn: Toward Cybersecurity As A Sport, Tj Oconnor, Dane Brown, Jasmine Jackson, Bryson Payne, Suzanna Schmeelk
Journal of Cybersecurity Education, Research and Practice
To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches for teaching cybersecurity have exponentially grown over the last two decades. During this same period, e-sports developed into a multi-billion dollar industry and became a staple on college campuses. In this work, we explore the opportunity to integrate e-sports and gamified cybersecurity approaches into the inaugural US Cyber Games Team. During this tenure, we learned many lessons about recruiting, assessing, and training cybersecurity teams. We share our approach, materials, and lessons learned to serve as a model for fielding amateur cybersecurity teams for future competition.
Anonymity And Gender Effects On Online Trolling And Cybervictimization,
2023
Kennesaw State University
Anonymity And Gender Effects On Online Trolling And Cybervictimization, Gang Lee, Annalyssia Soonah
Journal of Cybersecurity Education, Research and Practice
The purpose of this study was to investigate the effects of the anonymity of the internet and gender differences in online trolling and cybervictimization. A sample of 151 college students attending a southeastern university completed a survey to assess their internet activities and online trolling and cybervictimization. Multivariate analyses of logistic regression and ordinary least squares regression were used to analyze online trolling and cybervictimization. The results indicated that the anonymity measure was not a significant predictor of online trolling and cybervictimization. Female students were less likely than male students to engage in online trolling, but there was no gender …
How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training,
2023
Pittsburg State University
How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training, David Sikolia, David Biros, Tianjian Zhang
Journal of Cybersecurity Education, Research and Practice
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Specifically, with a broad range of cybersecurity knowledge crammed into in a single SETA session, it is unclear how effective different types of knowledge are in mitigating human errors in a longitudinal setting. his study investigates how knowledge gained through SETA programs affects human errors in cybersecurity to fill the longitudinal void. In a baseline experiment, we establish that SETA programs reduce …
Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces,
2023
Robert Morris University
Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak
Journal of Cybersecurity Education, Research and Practice
A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a semi-structured interview with a panel of experts as well as small workgroups of professionals answering seven scenario-based questions. Data was thematically analyzed, with major findings emerging about the need to refocus cybersecurity STEM at the middle school level with problem-based learning, the disconnects between workforce operations and cybersecurity operators, the …
Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity,
2023
Marymount University
Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu
Journal of Cybersecurity Education, Research and Practice
The participation of women in Science, Technology, Engineering, and Mathematics (STEM) workforces is overwhelmingly low as compared to their male counterparts. The low uptake of cybersecurity careers has been documented in the previous studies conducted in the contexts of the West and Eastern worlds. However, most of the past studies mainly covered the Western world leaving more knowledge gaps in the context of Middle Eastern countries such as Saudi Arabia. Thus, to fill the existing knowledge gaps, the current study focused on women in Saudi Arabia. The aim of the study was to investigate the factors behind the underrepresentation of …
Rethinking Education In The Age Of Ai: The Importance Of Developing Durable Skills In The Industry 4.0,
2023
Lindenwood University
Rethinking Education In The Age Of Ai: The Importance Of Developing Durable Skills In The Industry 4.0, James Hutson, Jason Ceballos
Faculty Scholarship
This article discusses the pressing need to integrate artificial intelligence (AI) into education to facilitate customizable, individualized, and on-demand learning pathways. At the same time, while AI has the potential to expand the learner base and improve learning outcomes, the development of NACE Competencies and durable skills – communication, critical thinking, creativity, leadership, adaptability, and emotional intelligence - must be purposefully integrated in curriculum design now more than ever. Recent studies have shown that AI-driven learning pathways can achieve outcomes more quickly, but this comes at the cost of the development of durable skills. Therefore, traditional student-to-student and student-to-teacher interactions …
The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward,
2023
Edith Cowan University
The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh
Research outputs 2022 to 2026
Recent improvements in the Internet of Things (IoT) have allowed healthcare to evolve rapidly. This article summarizes previous studies on IoT applications in healthcare. A comprehensive review and a bibliometric analysis were performed to objectively summarize the growth of IoT research in healthcare. To begin, 2,990 journal articles were carefully selected for further investigation. These publications were analyzed based on various bibliometric metrics, including publication year, journals, authors, institutions, and countries. Keyword co-occurrence and co-citation networks were generated to unravel significant research hotspots. The findings show that IoT research has received considerable interest from the healthcare community. Based on the …
Theme Park Visitors Prefer Human-Like Robots In Customer Service Interactions,
2023
University of Central Florida
Theme Park Visitors Prefer Human-Like Robots In Customer Service Interactions, Ady Milman, Asli D.A. Tasci
Rosen Research Review
Service robots are becoming increasingly popular in many industries and social settings, including education, childcare, elderly therapy centers, and even theme parks. Tourism and hospitality industries are adopting robots enthusiastically and are being closely studied to observe guest engagement and reaction to robotic services. Service robots are becoming increasingly popular in many industries and social settings, including education, childcare, elderly therapy centers, and even theme parks. Tourism and hospitality industries are adopting robots enthusiastically and are being closely studied to observe guest engagement and reaction to robotic services. UCF Rosen College of Hospitality Management researchers, Dr. Ady Milman and Dr. …
