Browse Articles

Blockchain databases: Encrypted for efficient and secure NoSQL key-store

Mehrota et al. | Mar 18, 2023

Blockchain databases: Encrypted for efficient and secure NoSQL key-store
Image credit: Ayushi Mehrota & David Kim

Although commonly associated with cryptocurrency, blockchains offer security that other databases could benefit from. These student authors tested a blockchain database framework, and by tracking runtime of four independent variables, they prove this framework is feasible for application.

Read More...

Statistically Analyzing the Effect of Various Factors on the Absorbency of Paper Towels

Tao et al. | Dec 04, 2020

Statistically Analyzing the Effect of Various Factors on the Absorbency of Paper Towels

In this study, the authors investigate just how effectively paper towels can absorb different types of liquid and whether changing the properties of the towel (such as folding it) affects absorbance. Using variables of either different liquid types or the folded state of the paper towels, they used thorough approaches to make some important and very useful conclusions about optimal ways to use paper towels. This has important implications as we as a society continue to use more and more paper towels.

Read More...

Do Initial Strategies or Choice of Piece Color Lead to Advantages in Chess Games?

Ponnaluri et al. | Feb 07, 2017

Do Initial Strategies or Choice of Piece Color Lead to Advantages in Chess Games?

White pieces make the first move in chess games, and there are several opening strategies and consequent defense strategies that white and black pieces, respectively, can take . The author of this paper investigated whether taking a specific opening and defense strategy, as well as playing as white vs. black, can increase the chances of winning the game, by playing against various human and computer opponents.

Read More...

An explainable model for content moderation

Cao et al. | Aug 16, 2023

An explainable model for content moderation

The authors looked at the ability of machine learning algorithms to interpret language given their increasing use in moderating content on social media. Using an explainable model they were able to achieve 81% accuracy in detecting fake vs. real news based on language of posts alone.

Read More...

An improved video fingerprinting attack on users of the Tor network

Srikanth et al. | Mar 31, 2022

An improved video fingerprinting attack on users of the Tor network

The Tor network allows individuals to secure their online identities by encrypting their traffic, however it is vulnerable to fingerprinting attacks that threaten users' online privacy. In this paper, the authors develop a new video fingerprinting model to explore how well video streaming can be fingerprinted in Tor. They found that their model could distinguish which one of 50 videos a user was hypothetically watching on the Tor network with 85% accuracy, demonstrating that video fingerprinting is a serious threat to the privacy of Tor users.

Read More...