Browse Articles

Tomato disease identification with shallow convolutional neural networks

Trinh et al. | Mar 03, 2023

Tomato disease identification with shallow convolutional neural networks

Plant diseases can cause up to 50% crop yield loss for the popular tomato plant. A mobile device-based method to identify diseases from photos of symptomatic leaves via computer vision can be more effective due to its convenience and accessibility. To enable a practical mobile solution, a “shallow” convolutional neural networks (CNNs) with few layers, and thus low computational requirement but with high accuracy similar to the deep CNNs is needed. In this work, we explored if such a model was possible.

Read More...

An improved video fingerprinting attack on users of the Tor network

Srikanth et al. | Mar 31, 2022

An improved video fingerprinting attack on users of the Tor network

The Tor network allows individuals to secure their online identities by encrypting their traffic, however it is vulnerable to fingerprinting attacks that threaten users' online privacy. In this paper, the authors develop a new video fingerprinting model to explore how well video streaming can be fingerprinted in Tor. They found that their model could distinguish which one of 50 videos a user was hypothetically watching on the Tor network with 85% accuracy, demonstrating that video fingerprinting is a serious threat to the privacy of Tor users.

Read More...

Correlation of Prominent Intelligence Type & Coworker Relations

Rasmus et al. | Mar 29, 2022

Correlation of Prominent Intelligence Type & Coworker Relations

Ashley Moulton & Joseph Rasmus investigate 9 controversial categories of intelligence as predicted by Multiple Intelligence Theory, originally proposed in the mid-1980s. By collecting data from 56 participants, they record that there may not actually be a correlation between these categorical types when it comes to workplace atmosphere and project efficiency.

Read More...

Reimagize – a digital card-based roleplaying game to improve adolescent girls’ body image

Kumar et al. | Oct 04, 2021

Reimagize – a digital card-based roleplaying game to improve adolescent girls’ body image

Reimagize, a role-playing with decision-making, was conjured, implementing social psychological concepts like counter-stereotyping and perspective-taking. As the game works implicitly to influence body image, it even counters image issues beyond personal body dissatisfaction. This study explored whether a digital role-playing card game, incorporating some of the most common prejudices of body image (like size prejudice, prejudices from the media, etc.) as identified by a digital survey/questionnaire completed by Indian girls aged 11-21, could counter these issues and reduce personal body dissatisfaction.

Read More...

Significance of Tumor Growth Modeling in the Behavior of Homogeneous Cancer Cell Populations: Are Tumor Growth Models Applicable to Both Heterogeneous and Homogeneous Populations?

Reddy et al. | Jun 10, 2021

Significance of Tumor Growth Modeling in the Behavior of Homogeneous Cancer Cell Populations: Are Tumor Growth Models Applicable to Both Heterogeneous and Homogeneous Populations?

This study follows the process of single-cloning and the growth of a homogeneous cell population in a superficial environment over the course of six weeks with the end goal of showing which of five tumor growth models commonly used to predict heterogeneous cancer cell population growth (Exponential, Logistic, Gompertz, Linear, and Bertalanffy) would also best exemplify that of homogeneous cell populations.

Read More...

A Cloud-Enabled Communication Strategy for Wildfire Alerts

Vinaithirthan et al. | Jul 19, 2020

A Cloud-Enabled Communication Strategy for Wildfire Alerts

The traditional alert system in California consists of Wireless Emergency Alerts (WEAs), which lack location specificity, and sign-up-based technology which is limited by the number of sign ups. Those who do not have phones or have a silence option on their devices are most at risk from the current alert system. Here the authors developed cloud-enabled crisis connection for disaster alerts (CRISIS-CONNECT) to mitigate problems associated with the current alert system.

Read More...

Search Articles

Search articles by title, author name, or tags

Clear all filters

Popular Tags

Browse by school level