Discovering Ways to Increase Inclusivity for Dyslexic Students in Computing...
The years accompanying entrance into the university system are often characterized by a period of great transformation. These years can also be wrought with difficulties for many students,...
View ArticleAutomated Extraction of Software Names from Vulnerability Reports using LSTM...
Software vulnerabilities are closely monitored by the security community to timely address the security and privacy issues in software systems. Before a vulnerability is published by vulnerability...
View ArticleMulti-Modal Sensor Selection with Genetic Algorithms
We develop Genetic Algorithms based method and the tool to select sensors, which provide the specified quality of data after fusion. In this paper, we concentrate on introducing multi-modal sensor...
View ArticleIntegrating Security with Accuracy Evaluation in Sensors Fusion
This paper presents a novel approach of integrating sensor accuracy and sensor platform security in overall sensor system evaluation and presents a new developed method and a software tool that are...
View ArticleE-Learning Course Recommender System Using Collaborative Filtering Models
e-Learning is a sought-after option for learners during pandemic situations. In e-Learning platforms, there are many courses available, and the user needs to select the best option for them. Thus,...
View ArticleCyRRA: Cyberattack Resilient Robotic Arm
Introduction of the internet-based interconnections among the physical control systems has given rise to more complex process algorithms, and it is necessary to safeguard such systems from cyber...
View ArticleEmpirical Validation of Automated Vulnerability Curation and Characterization
Prior research has shown that public vulnerability systems such as US National Vulnerability Database (NVD) rely on a manual, time-consuming, and error-prone process which has led to inconsistencies...
View ArticleA Hybrid Approach for Interpretable Game Performance Prediction in Basketball
Sports Data Analytics is an emerging field involving analytical tools to help coaches design practical strategies for athletic training and winning games. In this paper, we developed Decision Tree...
View ArticleAlkali Metals (Na, K) Doped ZnO/CuO Composite Films for Real-time Tracking of...
Real-time sweat rate monitoring provides clinically proper directives for preventive medicine and disease diagnosis. This research represents an attempt to develop a semiconductor-based nanostructured...
View ArticleA Survey and Evaluation of Android-Based Malware Evasion Techniques and...
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing...
View ArticleAirbnb Rental Price Prediction Using Machine Learning Models
Founded in 2008, Airbnb has become an attractive alternative within the hospitality industry as an online booking service based in San Francisco, California. It has grown since then and spread...
View ArticleWhen AI Moves Downstream
After computing professionals design, develop, and deploy software, what is their responsibility for subsequent uses of that software “downstream” by others? Furthermore, does it matter ethically if...
View Article"The Inevitability of Playing Politics as Chair: Advantages and Pitfalls" 2019
Politics is a term often frowned upon as it pertains to the role of an academic leader. However as chair for almost 30 years it has become an essential yet sometimes unwanted aspect of the daily...
View ArticleNavigating Leadership in Academia through a Crisis
Academic leadership is a fast-paced ever changing entity. When you add an unexpected global pandemic to the mix, it changes academic life beyond anyone's wildest dreams. In this workshop I hope to...
View ArticleShared Academic Governance : A Historical Perspective
Shared academic governance is a key to ensuring that faculty and administration can work collaboratively to reach strategic planning outcomes, maintain excellence and show continued growth and...
View ArticleThe Chairperson : Faculty, Administrator and Academic and Crisis Leader
For 36 years, I have witnessed the evolution of the role of chair as economic, social and student climates emerge. My workshop will summarize the challenges that chairs must now face in 2023. The...
View ArticleA Framework for Biomechanical Analysis of Jump Landings for Injury Risk...
Competitive sports require rapid and intense movements, such as jump landings, making athletes susceptible to injuries due to altered neuromuscular control and joint mechanics. Biomechanical features...
View ArticleApplication of Machine Learning Models on Individual Household Electric Power...
This paper presents research on the application of various machine learning models to predict power consumption usage within a household. The models used for prediction are Decision Tree Regressor,...
View ArticleAn Epileptic Seizure Detection Technique Using EEG Signals with Mobile...
Epileptic seizure detection classification distinguishes between epileptic and non-epileptic signals and is an important step that can aid doctors in diagnosing and treating epileptic seizures. In...
View ArticleA Survey and Evaluation of Android-Based Malware Evasion Techniques and...
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing...
View Article
More Pages to Explore .....