1,054 research outputs found
UMSL Bulletin 2023-2024
The 2023-2024 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1088/thumbnail.jp
Multidisciplinary perspectives on Artificial Intelligence and the law
This open access book presents an interdisciplinary, multi-authored, edited collection of chapters on Artificial Intelligence (‘AI’) and the Law. AI technology has come to play a central role in the modern data economy. Through a combination of increased computing power, the growing availability of data and the advancement of algorithms, AI has now become an umbrella term for some of the most transformational technological breakthroughs of this age. The importance of AI stems from both the opportunities that it offers and the challenges that it entails. While AI applications hold the promise of economic growth and efficiency gains, they also create significant risks and uncertainty. The potential and perils of AI have thus come to dominate modern discussions of technology and ethics – and although AI was initially allowed to largely develop without guidelines or rules, few would deny that the law is set to play a fundamental role in shaping the future of AI. As the debate over AI is far from over, the need for rigorous analysis has never been greater. This book thus brings together contributors from different fields and backgrounds to explore how the law might provide answers to some of the most pressing questions raised by AI. An outcome of the Católica Research Centre for the Future of Law and its interdisciplinary working group on Law and Artificial Intelligence, it includes contributions by leading scholars in the fields of technology, ethics and the law.info:eu-repo/semantics/publishedVersio
UMSL Bulletin 2022-2023
The 2022-2023 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1087/thumbnail.jp
Evaluation of mixed microalgae species biorefinery of Desmodesmus sp. And Scenedesmus sp. For bioproducts synthesis
Microalgae is known to produce numerous bioactive compounds for instance proteins, fatty acid, polysaccharides, enzymes, sterols, and antioxidants. Due to their valuable biochemical composition, microalgae are regarded as a very intriguing source to produce novel food products and can be utilised to improve the nutritional content of traditional foods. Additionally, microalgae are used as animal feed and additives in the cosmetics, pharmaceutical as well as nutraceutical industries. As compared to other terrestrial plants and other microorganisms, microalgae possess few advantages: (1) rapid growth rate; (2) able to grow in non-arable land and harsh cultivation conditions; (3) low nutritional requirements; (4) high productivity; and (5) reduce emission of carbon dioxide. Despite the large number of microalgae species found in nature, only a few species are identified and commercialized such as Chlorella sp., Spirulina sp. Haematococcus pluvialis, Nannochloropsis sp. and Chlamydomonas reinhardtii, which is one of the major obstacles preventing the full utilisation of microalgae-based technology.
This thesis provides information on the overall composition of mixed microalgae species, Desmodesmus sp. and Scenedesmus sp., for instance protein, carbohydrate, lipid, antioxidants, and pigment. This thesis firstly introduces the application of triphasic partitioning (TPP) in the extraction and partitioning of the biomolecules from the microalgae. The latest advancement of technology has evolved from a liquid biphasic flotation (LBF) to TPP. T-butanol and ammonium sulphate are used in TPP to precipitate desired biomolecules from the aqueous solutions with the formation of three layer. TPP is a simple, time- and cost- efficient, as well as scalable process that does not require toxic organic solvents. Lipase is abundantly produced by microbes, bacteria, fungi, yeast, mammals, and plants. Lipase is widely used in the oleochemical, detergent, dairy, leather, cosmetics, paper, cosmetics, and nutraceutical industries. Therefore, this thesis also discusses the possibility of identifying and extracting enzyme lipase from the microalgae using LBF. Several parameters (volume and concentration of solvents, weight of biomass, flotation kinetics and solvent types, etc.) have been investigated to optimize the lipase extraction from LBF.
Chlorophyll is the main pigment present in the microalgae. Thus, this work proposes the digital imaging approach to determine the chlorophyll concentration in the microalgae rapidly because the chlorophyll content has a significant impact on microalgae physiological health status as well as identifies the chlorophyll concentration in the production of by-products. Lastly, microalgae oil can be used as the feedstock for biodiesel as well as nutraceutical, pharmaceutical, and health-care products. The challenge in the lipid extraction is the co-extraction of chlorophyll into the oil, which can have serious consequences for downstream processing. Therefore, the removal of the chlorophyll from the microalgae using activated clay or sodium chlorite in the pre-treatment procedure are examined. The research achievements in these works and future opportunities are highlighted in the last chapter of the thesis
2023-2024 Catalog
The 2023-2024 Governors State University Undergraduate and Graduate Catalog is a comprehensive listing of current information regarding:Degree RequirementsCourse OfferingsUndergraduate and Graduate Rules and Regulation
Exploring Text Mining and Analytics for Applications in Public Security: An in-depth dive into a systematic literature review
Text mining and related analytics emerge as a technological approach to support human activities in extracting useful knowledge through texts in several formats. From a managerial point of view, it can help organizations in planning and decision-making processes, providing information that was not previously evident through textual materials produced internally or even externally. In this context, within the public/governmental scope, public security agencies are great beneficiaries of the tools associated with text mining, in several aspects, from applications in the criminal area to the collection of people's opinions and sentiments about the actions taken to promote their welfare. This article reports details of a systematic literature review focused on identifying the main areas of text mining application in public security, the most recurrent technological tools, and future research directions. The searches covered four major article bases (Scopus, Web of Science, IEEE Xplore, and ACM Digital Library), selecting 194 materials published between 2014 and the first half of 2021, among journals, conferences, and book chapters. There were several findings concerning the targets of the literature review, as presented in the results of this article
Deteção de intrusões de rede baseada em anomalias
Dissertação de mestrado integrado em Eletrónica Industrial e ComputadoresAo longo dos últimos anos, a segurança de hardware e software tornou-se uma grande preocupação. À medida
que a complexidade dos sistemas aumenta, as suas vulnerabilidades a sofisticadas técnicas de ataque têm
proporcionalmente escalado. Frequentemente o problema reside na heterogenidade de dispositivos conectados ao
veÃculo, tornando difÃcil a convergência da monitorização de todos os protocolos num único produto de segurança.
Por esse motivo, o mercado requer ferramentas mais avançadas para a monitorizar ambientes crÃticos à vida
humana, tais como os nossos automóveis.
Considerando que existem várias formas de interagir com os sistemas de entretenimento do automóvel como
o Bluetooth, o Wi-fi ou CDs multimédia, a necessidade de auditar as suas interfaces tornou-se uma prioridade,
uma vez que elas representam um sério meio de aceeso à rede interna do carro. Atualmente, os mecanismos de
segurança de um carro focam-se na monitotização da rede CAN, deixando para trás as tecnologias referidas e não
contemplando os sistemas não crÃticos. Como exemplo disso, o Bluetooth traz desafios diferentes da rede CAN,
uma vez que interage diretamente com o utilizador e está exposto a ataques externos.
Uma abordagem alternativa para tornar o automóvel num sistema mais robusto é manter sob supervisão as
comunicações que com este são estabelecidas. Ao implementar uma detecção de intrusão baseada em anomalias,
esta dissertação visa analisar o protocolo Bluetooth no sentido de identificar interações anormais que possam
alertar para uma situação fora dos padrões de utilização. Em última análise, este produto de software embebido
incorpora uma grande margem de auto-aprendizagem, que é vital para enfrentar quaisquer ameaças desconhecidas
e aumentar os nÃveis de segurança globais. Ao longo deste documento, apresentamos o estudo do problema seguido
de uma metodologia alternativa que implementa um algoritmo baseado numa LSTM para prever a sequência de
comandos HCI correspondentes a tráfego Bluetooth normal. Os resultados mostram a forma como esta abordagem
pode impactar a deteção de intrusões nestes ambientes ao demonstrar uma grande capacidade para identificar padrões anómalos no conjunto de dados considerado.In the last few years, hardware and software security have become a major concern. As the systems’ complexity
increases, its vulnerabilities to several sophisticated attack techniques have escalated likewise. Quite often, the
problem lies in the heterogeneity of the devices connected to the vehicle, making it difficult to converge the monitoring
systems of all existing protocols into one security product. Thereby, the market requires more refined tools to monitor
life-risky environments such as personal vehicles.
Considering that there are several ways to interact with the car’s infotainment system, such as Wi-fi, Bluetooth,
or CD player, the need to audit these interfaces has become a priority as they represent a serious channel to reach
the internal car network. Nowadays, security in car networks focuses on CAN bus monitoring, leaving behind the
aforementioned technologies and not contemplating other non-critical systems. As an example of these concerns,
Bluetooth brings different challenges compared to CAN as it interacts directly with the user, being exposed to external
attacks.
An alternative approach to converting modern vehicles and their set of computers into more robust systems
is to keep track of established communications with them. By enforcing anomaly-based intrusion detection this
dissertation aims to analyze the Bluetooth protocol to identify abnormal user interactions that may alert for a non conforming pattern. Ultimately, such embedded software product incorporates a self-learning edge, which is vital to
face newly developed threats and increasing global security levels. Throughout this document, we present the study
case followed by an alternative methodology that implements an LSTM based algorithm to predict a sequence of
HCI commands corresponding to normal Bluetooth traffic. The results show how this approach can impact intrusion
detection in such environments by expressing a high capability of identifying abnormal patterns in the considered
data
Recommended from our members
An ontology for defining and characterizing demonstration environments
Demonstration Environments (DEs) are essential tools for testing and demonstrating new technologies, products, and services, and reducing uncertainties and risks in the innovation process. However, the terminology used to describe these environments is inconsistent, leading to heterogeneity in defining and characterizing them. This makes it difficult to establish a universal understanding of DEs and to differentiate between the different types of DEs, including testbeds, pilot-plants, and living labs. Moreover, existing literature lacks a holistic view of DEs, with studies focusing on specific types of DEs and not offering an integrated perspective on their characteristics and applicability in different contexts. This study proposes an ontology for knowledge representation related to DEs to address this gap. Using an ontology learning approach analyzing 3621 peer-reviewed journal articles, we develop a standardized framework for defining and characterizing DEs, providing a holistic view of these environments. The resulting ontology allows innovation managers and practitioners to select appropriate DEs for achieving their innovation goals, based on the characteristics and capabilities of the specific type of DE. The contributions of this study are significant in advancing the understanding and application of DEs in innovation processes. The proposed ontology provides a standardized approach for defining and characterizing DEs, reducing inconsistencies in terminology and establishing a common understanding of these environments. This enables innovation managers and practitioners to select appropriate DEs for their specific innovation goals, facilitating more efficient and effective innovation processes. Overall, this study provides a valuable resource for researchers, practitioners, and policymakers interested in the effective use of DEs in innovation
Evaluation Methodologies in Software Protection Research
Man-at-the-end (MATE) attackers have full control over the system on which
the attacked software runs, and try to break the confidentiality or integrity
of assets embedded in the software. Both companies and malware authors want to
prevent such attacks. This has driven an arms race between attackers and
defenders, resulting in a plethora of different protection and analysis
methods. However, it remains difficult to measure the strength of protections
because MATE attackers can reach their goals in many different ways and a
universally accepted evaluation methodology does not exist. This survey
systematically reviews the evaluation methodologies of papers on obfuscation, a
major class of protections against MATE attacks. For 572 papers, we collected
113 aspects of their evaluation methodologies, ranging from sample set types
and sizes, over sample treatment, to performed measurements. We provide
detailed insights into how the academic state of the art evaluates both the
protections and analyses thereon. In summary, there is a clear need for better
evaluation methodologies. We identify nine challenges for software protection
evaluations, which represent threats to the validity, reproducibility, and
interpretation of research results in the context of MATE attacks
Majority Voting Approach to Ransomware Detection
Crypto-ransomware remains a significant threat to governments and companies
alike, with high-profile cyber security incidents regularly making headlines.
Many different detection systems have been proposed as solutions to the
ever-changing dynamic landscape of ransomware detection. In the majority of
cases, these described systems propose a method based on the result of a single
test performed on either the executable code, the process under investigation,
its behaviour, or its output. In a small subset of ransomware detection
systems, the concept of a scorecard is employed where multiple tests are
performed on various aspects of a process under investigation and their results
are then analysed using machine learning. The purpose of this paper is to
propose a new majority voting approach to ransomware detection by developing a
method that uses a cumulative score derived from discrete tests based on
calculations using algorithmic rather than heuristic techniques. The paper
describes 23 candidate tests, as well as 9 Windows API tests which are
validated to determine both their accuracy and viability for use within a
ransomware detection system. Using a cumulative score calculation approach to
ransomware detection has several benefits, such as the immunity to the
occasional inaccuracy of individual tests when making its final classification.
The system can also leverage multiple tests that can be both comprehensive and
complimentary in an attempt to achieve a broader, deeper, and more robust
analysis of the program under investigation. Additionally, the use of multiple
collaborative tests also significantly hinders ransomware from masking or
modifying its behaviour in an attempt to bypass detection.Comment: 17 page
- …