In this study, the authors develop an architecture to implement in a cloud-based database used by law firms to ensure confidentiality, availability, and integrity of attorney documents while maintaining greater efficiency than traditional encryption algorithms. They assessed whether the architecture satisfies necessary criteria and tested the overall file sizes the architecture could process. The authors found that their system was able to handle larger file sizes and fit engineering criteria. This study presents a valuable new tool that can be used to ensure law firms have adequate security as they shift to using cloud-based storage systems for their files.
Read More...Browse Articles
Reading recall: A comparison of reading comprehension
Researchers query whether reading comprehension is the same, worse, or better when using e-books as compared with standard paper texts. This study evaluated this question in the elementary school population. Our hypothesis was that information would be retained equally whether read from paper or from an electronic device. Each participant read four stories, alternating between electronic and paper media types. After each reading, the participants completed a five-question test covering the information read. The study participants correctly answered 167 out of 200 comprehension questions when reading from an electronic device. These same participants correctly answered 145 out of 200 comprehension questions when reading from paper. At a significance level of p < 0.05, the results showed that there was a statistically significant difference in reading comprehension between the two media, demonstrating better comprehension when using electronic media. The unexpected results of this study demonstrate a shift in children’s performance and desirability of using electronic media as a reading source.
Read More...The Effect of Interactive Electronics Use on Psychological Well Being and Interpersonal Relationship Quality in Adults
In recent years, usage of interactive electronic devices such as computers, smartphones, and tablets has increased dramatically. Many studies have examined the potential adverse effects of excessive usage of such devices on children and adolescents, but the effects on adults are not well understood. In this study, the authors examined the relationship between adult usage of interactive electronic devices and a variety of clinical measures of psychological well-being. They found that according to some metrics, higher usage of interactive electronic devices is associated with several adverse psychological outcomes, suggesting a need for more careful consideration of such usage patterns in clinical settings.
Read More...Do elders care about eHealth? A correlational study between eHealth consumption and literacy
As digital tools become more prevalent in medicine, the ability for individuals to understand and take actions based on what they read on the internet is crucial. eHealth literacy is defined as as the ability to seek, find, understand, and evaluate health information from electronic sources and apply the knowledge gained to addressing or solving a health problem. In general, Americans have low eHealth literacy rates. However, limited research has been conducted to understand the eHealth literacy level among older Chinese adult immigrants in the U.S. To determine the eHealth literacy of elderly Chinese immigrants, we sent out an eHealth survey and relevant computer skills survey using a modified version of the eHEALS (eHealth Literacy Scale) health literacy test. We hypothesized that elders who consumed more electronic health content would have a higher eHealth literacy score. The results of this survey showed that there was a positive correlation between the frequency of electronic health information consumption and the participant's eHealth literacy rate. In addition, the results of our computer literacy test show that the frequency of consumption and computer literacy are positively correlated as well. There is a strong positive correlation between the level of computer skills and eHealth literacy of participants. These results reveal possible steps individuals can take to reduce health misinformation and improve their own health by attaining, understanding, and taking action on health material on the internet.
Read More...Error mitigation of quantum teleportation on IBM quantum computers
Quantum computers can perform computational tasks beyond the capability of classical computers, such as simulating quantum systems in materials science and chemistry. Quantum teleportation is the transfer of quantum information across distances, relying on entangled states generated by quantum computing. We sought to mitigate the error of quantum teleportation which was simulated on IBM cloud quantum computers.
Read More...The Effect of Varying Training on Neural Network Weights and Visualizations
Neural networks are used throughout modern society to solve many problems commonly thought of as impossible for computers. Fountain and Rasmus designed a convolutional neural network and ran it with varying levels of training to see if consistent, accurate, and precise changes or patterns could be observed. They found that training introduced and strengthened patterns in the weights and visualizations, the patterns observed may not be consistent between all neural networks.
Read More...A meta-analysis on NIST post-quantum cryptographic primitive finalists
The advent of quantum computing will pose a substantial threat to the security of classical cryptographic methods, which could become vulnerable to quantum-based attacks. In response to this impending challenge, the field of post-quantum cryptography has emerged, aiming to develop algorithms that can withstand the computational power of quantum computers. This study addressed the pressing concern of classical cryptographic methods becoming vulnerable to quantum-based attacks due to the rise of quantum computing. The emergence of post-quantum cryptography has led to the development of new resistant algorithms. Our research focused on four quantum-resistant algorithms endorsed by America’s National Institute of Standards and Technology (NIST) in 2022: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. This study evaluated the security, performance, and comparative attributes of the four algorithms, considering factors such as key size, encryption/decryption speed, and complexity. Comparative analyses against each other and existing quantum-resistant algorithms provided insights into the strengths and weaknesses of each program. This research explored potential applications and future directions in the realm of quantum-resistant cryptography. Our findings concluded that the NIST algorithms were substantially more effective and efficient compared to classical cryptographic algorithms. Ultimately, this work underscored the need to adapt cryptographic techniques in the face of advancing quantum computing capabilities, offering valuable insights for researchers and practitioners in the field. Implementing NIST-endorsed quantum-resistant algorithms substantially reduced the vulnerability of cryptographic systems to quantum-based attacks compared to classical cryptographic methods.
Read More...Large Language Models are Good Translators
Machine translation remains a challenging area in artificial intelligence, with neural machine translation (NMT) making significant strides over the past decade but still facing hurdles, particularly in translation quality due to the reliance on expensive bilingual training data. This study explores whether large language models (LLMs), like GPT-4, can be effectively adapted for translation tasks and outperform traditional NMT systems.
Read More...Transfer Learning for Small and Different Datasets: Fine-Tuning A Pre-Trained Model Affects Performance
In this study, the authors seek to improve a machine learning algorithm used for image classification: identifying male and female images. In addition to fine-tuning the classification model, they investigate how accuracy is affected by their changes (an important task when developing and updating algorithms). To determine accuracy, a set of images is used to train the model and then a separate set of images is used for validation. They found that the validation accuracy was close to the training accuracy. This study contributes to the expanding areas of machine learning and its applications to image identification.
Read More...The study of technology and the use of individual cognitive effort
A trial study was performed in 2021 to investigate the link between technology and transactive memory. Transactive memory is shared knowledge in which members share the responsibility to encode, store, and retrieve certain tasks or assignments, leading to a successful and collective performance. We hypothesize that a participants’ expected access to an external source affects the recall rate and retrieval of information.
Read More...