- Information and Cyber Security
- Advanced Malware Detection Techniques
- Innovative Teaching and Learning Methods
- Infrared Target Detection Methodologies
- Robotic Path Planning Algorithms
- Teaching and Learning Programming
- Online Learning and Analytics
- Experimental Learning in Engineering
- Gaussian Processes and Bayesian Inference
- Adult and Continuing Education Topics
- AI-based Problem Solving and Planning
- Statistical Methods and Inference
- Bayesian Modeling and Causal Inference
- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- Guidance and Control Systems
- Underwater Acoustics Research
- Web Application Security Vulnerabilities
- Reflective Practices in Education
- Education and Critical Thinking Development
- Advanced Measurement and Detection Methods
- Digital Games and Media
- Software Engineering Research
- Radiation Effects in Electronics
- Maritime Navigation and Safety
University of Florida
2019-2024
Johns Hopkins University Applied Physics Laboratory
2009-2024
Jaypee University of Engineering and Technology
2024
Johns Hopkins University
1990-2024
Florida Department of Education
2023-2024
We have been developing path planning techniques to look for paths that balance the utility and risk associated with different routes through a minefield. Such methods will allow battlegroup commander evaluate alternative route options while searching low paths. A management framework can be used describe relative values of factors such as versus time objective, giving capability safety against other mission objectives. our recent investigations two related problems in this framework....
Abstract Answering reflection prompts has been shown to aid students in learning problem solving skills. The use of the computer science curriculum is nascent but growing. However, there limited empirical evidence on effectiveness reflective practice courses. To fill this gap, we evaluate guided with programming assignments an undergraduate Data Structures course. 219 completed two and were asked respond after each. 'What did you learn?', was hardest part?' change from your initial design?'....
Abstract Cyber attacks are a common feature of current news and many them the result easy to avoid vulnerabilities in software. It is imperative that students graduating from an undergraduate Computer Science (CS) curriculum have knowledge understand consequences vulnerable code. The introductory programming courses often full schedule topics, so it cover software security content briefly early more extensively later courses. would be useful know if with only brief introduction carry into...
Abstract This research paper explores whether requiring students to answer reflection prompts immediately before an exam affects their performance. Reflective practice encourages critical thinking and answering can aid in integrating ideas developing a holistic view of the material they are studying. In our study, 365 Computer Organization course answered about module choice (e.g. ARM programming or pipelining). Half first exam, other half second exam. We found that most who performed...
Abstract Buffer overflow is one of the most common vulnerabilities reported by Common Vulnerabilities and Exposures (CVE) program. Giving students a mental model how buffer works dangerous these are may instill in them commitment to avoiding future. stack frames known be difficult concept for understand. This experience report describes assignment which use free open-source emulator debugger exploit view effect on memory. The steps through assembling C program vulnerable emulator, running...
Cyber attacks are a common feature of current news and many them the result easy to avoid vulnerabilities in software. It is imperative that students graduating from an undergraduate Computer Science (CS) curriculum understand consequences vulnerable code. When developing lessons assignments, it would be useful have sense students’ attitude toward cybersecurity appreciation need write secure This paper describes analysis results survey core CS courses at our large public university, which...
In today's digital world, it is imperative that the next generation of workers prepared to be successful working online. Students graduating from a technology curriculum may for secure work due nature their coursework, but students in non-technical fields will also require strong cybersecurity awareness as all professions continue move more Adding education assist this endeavor, unclear degree which knowledge correlates with realized behavior. This paper describes an analysis results survey...
We present a statistical footprint-based method to characterize several symmetric cryptographic primitives as they are used in lightweight digital image encryption. In particular, using spatial-domain histogram and frequency-domain analysis techniques, we identify number of metrics from the encrypted images use them contrast security performance different primitives. For each metrics, best performing primitive is identified. Complementary then combined result product cipher with better performance.
The ability to discriminate a reentry vehicle (RV) from booster parts and other debris is critical theater ballistic missile defense (TBMD). As it travels along its trajectory, threat separates into clutter. latter consists of several tanks, separation fragments hot fuel. Interception the RV requires discrimination required must be performed no later than 30 seconds before intercept. A time-delay neural network (TDNN) proposed for debris. rate change IR signature over used as discriminant....
In response to a threat missile, an interceptor missile with kinetic warhead (KW) is launched the intention of intercepting and killing lethal reentry vehicle (RV) in exo-atmosphere before it reaches its target. Data from IR sensor on-board KW be used discriminate RV other pieces field view. A time-delay neural network (TDNN) proposed for discrimination. TDNN was trained using simulated data, tested flight data. The data includes signatures RVs, boosters, thrust termination debris. able...
Previous chapter Next Full AccessProceedings Proceedings of the 2003 SIAM International Conference on Data Mining (SDM)Field-theoretic methods for intractable probabilistic modelsDennis Lucarelli, Cheryl Resch, I-Jeng Wang, and Fernando J. PinedaDennis Pinedapp.294 - 298Chapter DOI:https://doi.org/10.1137/1.9781611972733.33PDFBibTexSections ToolsAdd to favoritesExport CitationTrack CitationsEmail SectionsAboutAbstract We describe a general technique estimating quantities that occur in wide...
We have developed path-planning techniques and tools to look for paths through minefields. Our seek balance the length risk associated with different routes a minefield. methods are intended provide battlegroup commanders powerful new evaluate alternative while searching low paths. It is well known how find path of shortest distance, least risk. However, optimize both criteria at once challenging problem. compared two multi-criteria planning. found that better method uses linear combination...
A successful model of the aerodynamic heat transfer to nose-mounted IR domes on hypersonic missile interceptors is presented. This paper describes a transitional flow heating algorithm, and presents for predicting onset boundary layer transition hemispherical forebody. In addition, this discusses results temperature predictions domes, including description analytical models favorable comparisons with experimental data taken at Mach 4.6.
Encouraging Reflection in Support of Learning Data Structures Cheryl Resch, University Florida Christina Gardner-McCune, Contact: [email protected] Our research looks at using reflection teaching and Algorithms (DSA) to promote meaningful learning. This poster examines the differences reflections produced by two different programming assignments DSA Florida. In first assignment, students were asked implement a line editor linked list prompt reflect on use assigned data structure what they...