11 research outputs found

    Abstracts 2016: Highlights of Student Research and Creative Endeavors

    Get PDF
    What follows is a collection of abstracts summarizing the scholarship conducted by undergraduates at Columbus State University during the 2015-2016 academic year. These projects highlight undergraduate research conducted in a wide variety of disciplines, ranging from literary analysis to laboratory based sciences. The abstracts represent many ongoing projects on our campus and catalog those that have been published or presented. This volume begins with projects that have been selected for presentations at national, regional, and statewide disciplinary conferences. Among them are several that have garnered awards for outstanding undergraduate scholarship. Projects that have received competitive research grants, including our campus Student Research and Creative Endeavors (S-RACE) Grants, are also featured. Many undergraduates have presented their work with our local community, either through the dissemination of best practices in nursing to regional hospitals, colloquium presentations of lecture-recitals at the RiverCenter for the Performing Arts, or at Columbus State University\u27s Tower Day held in April 2016. Together these abstracts demonstrate the commitment of our faculty to engage students in their disciplines and represent outstanding mentorship that occurs on and off our campus throughout the year. Our students have amassed an impressive collection of projects that contributes to both academia and our local community, and these abstracts will hopefully inspire others to delve into scientific and creative inquiry.https://csuepress.columbusstate.edu/abstracts/1010/thumbnail.jp

    Secure and Efficient Comparisons between Untrusted Parties

    Get PDF
    A vast number of online services is based on users contributing their personal information. Examples are manifold, including social networks, electronic commerce, sharing websites, lodging platforms, and genealogy. In all cases user privacy depends on a collective trust upon all involved intermediaries, like service providers, operators, administrators or even help desk staff. A single adversarial party in the whole chain of trust voids user privacy. Even more, the number of intermediaries is ever growing. Thus, user privacy must be preserved at every time and stage, independent of the intrinsic goals any involved party. Furthermore, next to these new services, traditional offline analytic systems are replaced by online services run in large data centers. Centralized processing of electronic medical records, genomic data or other health-related information is anticipated due to advances in medical research, better analytic results based on large amounts of medical information and lowered costs. In these scenarios privacy is of utmost concern due to the large amount of personal information contained within the centralized data. We focus on the challenge of privacy-preserving processing on genomic data, specifically comparing genomic sequences. The problem that arises is how to efficiently compare private sequences of two parties while preserving confidentiality of the compared data. It follows that the privacy of the data owner must be preserved, which means that as little information as possible must be leaked to any party participating in the comparison. Leakage can happen at several points during a comparison. The secured inputs for the comparing party might leak some information about the original input, or the output might leak information about the inputs. In the latter case, results of several comparisons can be combined to infer information about the confidential input of the party under observation. Genomic sequences serve as a use-case, but the proposed solutions are more general and can be applied to the generic field of privacy-preserving comparison of sequences. The solution should be efficient such that performing a comparison yields runtimes linear in the length of the input sequences and thus producing acceptable costs for a typical use-case. To tackle the problem of efficient, privacy-preserving sequence comparisons, we propose a framework consisting of three main parts. a) The basic protocol presents an efficient sequence comparison algorithm, which transforms a sequence into a set representation, allowing to approximate distance measures over input sequences using distance measures over sets. The sets are then represented by an efficient data structure - the Bloom filter -, which allows evaluation of certain set operations without storing the actual elements of the possibly large set. This representation yields low distortion for comparing similar sequences. Operations upon the set representation are carried out using efficient, partially homomorphic cryptographic systems for data confidentiality of the inputs. The output can be adjusted to either return the actual approximated distance or the result of an in-range check of the approximated distance. b) Building upon this efficient basic protocol we introduce the first mechanism to reduce the success of inference attacks by detecting and rejecting similar queries in a privacy-preserving way. This is achieved by generating generalized commitments for inputs. This generalization is done by treating inputs as messages received from a noise channel, upon which error-correction from coding theory is applied. This way similar inputs are defined as inputs having a hamming distance of their generalized inputs below a certain predefined threshold. We present a protocol to perform a zero-knowledge proof to assess if the generalized input is indeed a generalization of the actual input. Furthermore, we generalize a very efficient inference attack on privacy-preserving sequence comparison protocols and use it to evaluate our inference-control mechanism. c) The third part of the framework lightens the computational load of the client taking part in the comparison protocol by presenting a compression mechanism for partially homomorphic cryptographic schemes. It reduces the transmission and storage overhead induced by the semantically secure homomorphic encryption schemes, as well as encryption latency. The compression is achieved by constructing an asymmetric stream cipher such that the generated ciphertext can be converted into a ciphertext of an associated homomorphic encryption scheme without revealing any information about the plaintext. This is the first compression scheme available for partially homomorphic encryption schemes. Compression of ciphertexts of fully homomorphic encryption schemes are several orders of magnitude slower at the conversion from the transmission ciphertext to the homomorphically encrypted ciphertext. Indeed our compression scheme achieves optimal conversion performance. It further allows to generate keystreams offline and thus supports offloading to trusted devices. This way transmission-, storage- and power-efficiency is improved. We give security proofs for all relevant parts of the proposed protocols and algorithms to evaluate their security. A performance evaluation of the core components demonstrates the practicability of our proposed solutions including a theoretical analysis and practical experiments to show the accuracy as well as efficiency of approximations and probabilistic algorithms. Several variations and configurations to detect similar inputs are studied during an in-depth discussion of the inference-control mechanism. A human mitochondrial genome database is used for the practical evaluation to compare genomic sequences and detect similar inputs as described by the use-case. In summary we show that it is indeed possible to construct an efficient and privacy-preserving (genomic) sequences comparison, while being able to control the amount of information that leaves the comparison. To the best of our knowledge we also contribute to the field by proposing the first efficient privacy-preserving inference detection and control mechanism, as well as the first ciphertext compression system for partially homomorphic cryptographic systems

    Mustang Daily, October 15, 2008

    Get PDF
    Student newspaper of California Polytechnic State University, San Luis Obispo, CA.https://digitalcommons.calpoly.edu/studentnewspaper/7811/thumbnail.jp

    The Livingston Tomato Report 2016: The Philosophical Environmentalist?s Guide To Justice In The Global Food System

    Get PDF
    This research paper sets the groundwork for an explanation of the global food system using complexity science as the theoretical framework to recount the story of the tomato (Solanum lycopersicum), its origin (Solanum pimpinellifolium), its role in popular culture how the tomato enters and exits the global food system and our digestive systems. By arguing in defense of the right of every person to eat a healthy tomato this study focuses upon the benefits and risks of herbicides, specifically N-(phosphonomethyl) glycine. I approach solutions from an environmental justice standpoint. I focus on the role of access to information as a leverage point. Methodologically, a detailed media survey led to the creation of a database that produced a timeline. Critical analysis of this timeline, actors and institutions allowed for focus on specific touchstones by which to ground my account. A review of the literature including environmental novels frames this timeline starting in the mid-to late 1800’s, through the age of industrialization incorporating the aftermath of Breton-Woods to 1971, Nixon, the Club of Rome, the year of my birth and Neil Armstrong walking on the moon. The next pivotal time is my coming of age working as an agent for CIDA in the rain forest of Guyana, The Rio Summit, and my reading of the Brundtland Commission Report, “Our Common Future” in 1992. This brings us to the present day of 2016 where the world's agriculture, chemical, and pesticide and pharmaceutical companies can be counted on one hand plus a finger. 2050 is a touchstone for a future that is just around the corner in historical scale. Influential authors and thinkers include Swift, Malthus, Thoreau, Geisel, Georgescu-Roegen, Carson, Meadows, Holling, Daly, Brundtland, and Atwood taking us into possible futures. This paper’s interest in neo-liberalism is rooted in deep-satire. This paper is completed with the philosophy of Plato allowing for further exploration of theories of Justice and Human Rights as they relate to everyone’s access to fresh healthy food

    Emerging gateways for Italian high tech companies to the Silicon Valley entrepreneurial ecosystem

    Get PDF
    Italian high tech firms are currently undergoing a second revolution, incorporating economic development and searching for global expansion. Emerging realities as gateways, deal flow organizations and startups incubators allows Italian technology based SMEs to get access to the huge US market. Therefore Italian brain drain to the USA can be reversed as brain gain for Italy, through a technology – bridge between these two countries. Different forms of gateways and this new strategy are analyzed in this thesi

    Personality Identification from Social Media Using Deep Learning: A Review

    Get PDF
    Social media helps in sharing of ideas and information among people scattered around the world and thus helps in creating communities, groups, and virtual networks. Identification of personality is significant in many types of applications such as in detecting the mental state or character of a person, predicting job satisfaction, professional and personal relationship success, in recommendation systems. Personality is also an important factor to determine individual variation in thoughts, feelings, and conduct systems. According to the survey of Global social media research in 2018, approximately 3.196 billion social media users are in worldwide. The numbers are estimated to grow rapidly further with the use of mobile smart devices and advancement in technology. Support vector machine (SVM), Naive Bayes (NB), Multilayer perceptron neural network, and convolutional neural network (CNN) are some of the machine learning techniques used for personality identification in the literature review. This paper presents various studies conducted in identifying the personality of social media users with the help of machine learning approaches and the recent studies that targeted to predict the personality of online social media (OSM) users are reviewed

    Symmetry in Graph Theory

    Get PDF
    This book contains the successful invited submissions to a Special Issue of Symmetry on the subject of ""Graph Theory"". Although symmetry has always played an important role in Graph Theory, in recent years, this role has increased significantly in several branches of this field, including but not limited to Gromov hyperbolic graphs, the metric dimension of graphs, domination theory, and topological indices. This Special Issue includes contributions addressing new results on these topics, both from a theoretical and an applied point of view

    Towards Practical Privacy-Preserving Protocols

    Get PDF
    Protecting users' privacy in digital systems becomes more complex and challenging over time, as the amount of stored and exchanged data grows steadily and systems become increasingly involved and connected. Two techniques that try to approach this issue are Secure Multi-Party Computation (MPC) and Private Information Retrieval (PIR), which aim to enable practical computation while simultaneously keeping sensitive data private. In this thesis we present results showing how real-world applications can be executed in a privacy-preserving way. This is not only desired by users of such applications, but since 2018 also based on a strong legal foundation with the General Data Protection Regulation (GDPR) in the European Union, that forces companies to protect the privacy of user data by design. This thesis' contributions are split into three parts and can be summarized as follows: MPC Tools Generic MPC requires in-depth background knowledge about a complex research field. To approach this, we provide tools that are efficient and usable at the same time, and serve as a foundation for follow-up work as they allow cryptographers, researchers and developers to implement, test and deploy MPC applications. We provide an implementation framework that abstracts from the underlying protocols, optimized building blocks generated from hardware synthesis tools, and allow the direct processing of Hardware Definition Languages (HDLs). Finally, we present an automated compiler for efficient hybrid protocols from ANSI C. MPC Applications MPC was for a long time deemed too expensive to be used in practice. We show several use cases of real-world applications that can operate in a privacy-preserving, yet practical way when engineered properly and built on top of suitable MPC protocols. Use cases presented in this thesis are from the domain of route computation using BGP on the Internet or at Internet Exchange Points (IXPs). In both cases our protocols protect sensitive business information that is used to determine routing decisions. Another use case focuses on genomics, which is particularly critical as the human genome is connected to everyone during their entire lifespan and cannot be altered. Our system enables federated genomic databases, where several institutions can privately outsource their genome data and where research institutes can query this data in a privacy-preserving manner. PIR and Applications Privately retrieving data from a database is a crucial requirement for user privacy and metadata protection, and is enabled amongst others by a technique called Private Information Retrieval (PIR). We present improvements and a generalization of a well-known multi-server PIR scheme of Chor et al., and an implementation and evaluation thereof. We also design and implement an efficient anonymous messaging system built on top of PIR. Furthermore we provide a scalable solution for private contact discovery that utilizes ideas from efficient two-server PIR built from Distributed Point Functions (DPFs) in combination with Private Set Intersection (PSI)
    corecore