Now showing items 1-10 of 10
Recent trends in the U.S. Behavioral and Social Sciences Research (BSSR) workforce
While behavioral and social sciences occupations comprise one of the largest portions of the "STEM" workforce, most studies of diversity in STEM overlook this population, focusing instead on fields such as biomedical or ...
Automated Functional Analysis of Astrocytes from Chronic Time-Lapse Calcium Imaging Data
Recent discoveries that astrocytes exert proactive regulatory effects on neural information processing and that they are deeply involved in normal brain development and disease pathology have stimulated broad interest in ...
Predictive therapeutic planning for irreversible electroporation treatment of spontaneous malignant glioma
Purpose: Irreversible electroporation (IRE) has been developed as a promising minimally invasive treatment to ablate spontaneous brain tumors with pulsed electric fields in canine patients. The purpose of the study is to ...
Temporal Topic Modeling to Assess Associations between News Trends and Infectious Disease Outbreaks
In retrospective assessments, internet news reports have been shown to capture early reports of unknown infectious disease transmission prior to official laboratory confirmation. In general, media interest and reporting ...
Tailoring of surface plasmon resonances in TiN/(Al0.72Sc0.28)N multilayers by dielectric layer thickness variation
Alternative designs of plasmonic metamaterials for applications in solar energy-harvesting devices are necessary due to pure noble metal-based nanostructures’ incompatibility with CMOS technology, limited thermal and ...
Enterprise data breach: causes, challenges, prevention, and future directions
A data breach is the intentional or inadvertent exposure of confidential information to unauthorized parties. In the digital era, data has become one of the most critical components of an enterprise. Data leakage poses ...
Secure Coding Practices in Java: Challenges and Vulnerabilities
(Virginia Tech, 2017-09-28)
Java platform and third-party libraries provide various security features to facilitate secure coding. However, misusing these features can cost tremendous time and effort of developers or cause security vulnerabilities ...
Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation
(De Gruyter Open, 2017)
Group signature schemes enable anonymous-yetaccountable communications. Such a capability is extremely useful for applications, such as smartphone-based crowdsensing and citizen science. However, the performance of modern ...
Terrain classification using intelligent tire
A Stakeholder Analysis of Infant Mortality in Ohio: Key Behaviors and Their Formulations
This document reports stakeholder behaviors considered for modeling the impact of progesterone therapy on infant mortality in the state of Ohio and describes the formula used in the model. In part I, we present seven classes ...