434 research outputs found
Recommended from our members
My Student, My Teacher: A Polytechnic Approach to Information Assurance
A polytechnic education involves the practical application of knowledge, including hands-on learning, senior projects, class projects, club activities, professional association activities, and internships. In 1824, the first polytechnic institution in the United States was the Rensselaer School in Troy, New York and today there are approximately 100 polytechnic universities. Several polytechnic institutions are leaders in teaching information assurance. Information assurance educators develop and depend on students to provide leadership in information assurance through active, engaged learning. The goal of this paper is to describe how a polytechnic approach supports information assurance education
Recommended from our members
A League of Our Own: The Future of Cyber Defense Competitions
Numerous cyber defense competitions exist today for individuals and teams to test their cyber security skills where each team has to “win or go home.” What is missing from these competitions is a league allowing head to head competitions over the course of a season, much like a sport. Teams playing several hours every week during a ten-week season have the opportunity to improve their cyber security skills. This paper provides an overview of cyber security competitions, and how a National Cyber League can greatly expand the number of and participants in these competitions at a much lower cost leveraging virtual technologies
Nothing to Write Home About: Aphorisms Against Actuality
We ask the reader to consider what the claiming of home and home-ness means. For you, for each of us, for our nation. We jump between different documents and documentations of what it means to be, to make, to keep, to establish, to live at home. We look, particularly, to the aphorisms that collect around the sense and feeling of home, and home-ness. We posit counter-documents from historical archives to these structures of feeling which function to make (some of) us feel “at home,” or at least a certain way, while pushing out those who are marked as unwanted, who are unwelcome
Using Grid Cells for Navigation
SummaryMammals are able to navigate to hidden goal locations by direct routes that may traverse previously unvisited terrain. Empirical evidence suggests that this “vector navigation” relies on an internal representation of space provided by the hippocampal formation. The periodic spatial firing patterns of grid cells in the hippocampal formation offer a compact combinatorial code for location within large-scale space. Here, we consider the computational problem of how to determine the vector between start and goal locations encoded by the firing of grid cells when this vector may be much longer than the largest grid scale. First, we present an algorithmic solution to the problem, inspired by the Fourier shift theorem. Second, we describe several potential neural network implementations of this solution that combine efficiency of search and biological plausibility. Finally, we discuss the empirical predictions of these implementations and their relationship to the anatomy and electrophysiology of the hippocampal formation
Recommended from our members
CyberPatriot: Exploring University-High School Partnerships
Since its inception in 2008, the CyberPatriot competition has been held annually with the goal of increasing the number of technologically skilled individuals working in the field of cybersecurity. The competition is designed to address the shortage of U.S. citizens with degrees in science, technology, engineering, and math (STEM) disciplines by encouraging talented high school students to pursue post-secondary study leading to careers in cybersecurity. This paper describes how one university successfully partnered with a large metropolitan high school district to better reach out to talented students in both traditional and underrepresented groups
Recommended from our members
To Catch A Thief II: Computer Forensics in the Classroom
The subject of computer forensics is still new and both challenging and intriguing for students. Cal Poly Pomona has offered this course since September of 2004. The course involves both the technical and legal aspects of investigative procedures as applied to digital evidence. For the instructor, it can involve challenges not found in other areas of information systems. This paper discusses some of the triumphs and pitfalls of including computer forensics as part of an undergraduate information assurance curriculum
Recommended from our members
A Framework for Improving Information Assurance Education
As a field of growing importance, information assurance is dedicated to protecting our information systems and related assets. In order for this field to deliver on its promise, effective information assurance education, both in the classroom and beyond, is essential. However, relatively little empirical research has been done on the effectiveness of information assurance education in the classroom. Faculty developing and teaching information assurance curricula can choose from differing industry and government standards as well as a range of methods for delivering this education. As a first step toward building a research framework for better assessing the effectiveness of information assurance education, this paper describes an initial research study of information assurance curricula and related teaching methods. Surveys and interviews of faculty teaching information assurance were conducted to determine their assessment of existing standards and the best means for improving the educational experience for students. The results obtained provide the beginning of a framework for further research in this area
Spatial analysis of ecosystem service relationships to improve targeting of payments for hydrological services
Payment for hydrological services (PHS) are popular tools for conserving ecosystems and their water-related services. However, improving the spatial targeting and impacts of PHS, as well as their ability to foster synergies with other ecosystem services (ES), remain challenging. We aimed at using spatial analyses to evaluate the targeting performance of Mexico\u27s National PHS program in central Veracruz. We quantified the effectiveness of areas targeted for PHS in actually covering areas of high HS provision and social priority during 2003-2013. First, we quantified provisioning and spatial distributions of two target (water yield and soil retention), and one non-target ES (carbon storage) using InVEST. Subsequently, pairwise relationships among ES were quantified by using spatial correlation and overlap analyses. Finally, we evaluated targeting by: (i) prioritizing areas of individual and overlapping ES; (ii) quantifying spatial co-occurrences of these priority areas with those targeted by PHS; (iii) evaluating the extent to which PHS directly contribute to HS delivery; and (iv), testing if PHS targeted areas disproportionately covered areas with high ecological and social priority. We found that modelled priority areas exhibited non-random distributions and distinct spatial patterns. Our results show significant pairwise correlations between all ES suggesting synergistic relationships. However, our analysis showed a significantly lower overlap than expected and thus significant mismatches between PHS targeted areas and all types of priority areas. These findings suggest that the targeting of areas with high HS provisioning and social priority by Mexico\u27s PHS program could be improved significantly. This study underscores: (1) the importance of using maps of HS provisioning as main targeting criteria in PHS design to channel payments towards areas that require future conservation, and (2) the need for future research that helps balance ecological and socioeconomic targeting criteria
Simulating tidal and storm surge hydraulics with a simple 2D inertia based model, in the Humber Estuary, U.K
The hydraulic modelling of tidal estuarine environments has been largely limited to complex 3D models that are computationally expensive. This makes them unsuitable for applications which make use of live data to make real/near time forecasts, such as the modelling of storm surge propagation and associated flood inundation risks. To address this requirement for a computationally efficient method a reduced complexity, depth-integrated 2D storage cell model (Lisflood-FP) has been applied to the Humber Estuary, UK. The capability of Lisflood-FP to reproduce the tidal heights of the Humber Estuary has been shown by comparing modelled and observed tidal stage heights over a period of a week. The feasibility of using the Lisflood-FP model to forecast flood inundation risk from a storm surge is demonstrated by reproducing the major storm surge that struck the UK East Coast and Humber Estuary on 5 December 2013. Results show that even for this 2013 extreme event the model is capable of reproducing the hydraulics and tidal levels of the estuary. Using present day flood defences and observed flooding extents, the modelled flood inundation areas produced by the model were compared, showing agreement in most areas and illustrating the model's potential as a now-casting early warning system when driven by publically available data, and in near real-time. The Lisflood-FP model used was incorporated into the CAESAR-Lisflood GUI, with the calibration and verification of the estuarine hydraulics reported herein being a key step in creating an estuary evolution model, capable of operating in the decadal to century timescales that are presently underrepresented in estuarine predictive capability, and ultimately developing a model to predict the evolution of flood risk over the longer term
Grid cells form a global representation of connected environments
The firing patterns of grid cells in medial entorhinal cortex (mEC) and associated brain areas form triangular arrays that tessellate the environment [1, 2] and maintain constant spatial offsets to each other between environments [3, 4]. These cells are thought to provide an efficient metric for navigation in large-scale space [5, 6, 7, 8]. However, an accurate and universal metric requires grid cell firing patterns to uniformly cover the space to be navigated, in contrast to recent demonstrations that environmental features such as boundaries can distort [9, 10, 11] and fragment [12] grid patterns. To establish whether grid firing is determined by local environmental cues, or provides a coherent global representation, we recorded mEC grid cells in rats foraging in an environment containing two perceptually identical compartments connected via a corridor. During initial exposures to the multicompartment environment, grid firing patterns were dominated by local environmental cues, replicating between the two compartments. However, with prolonged experience, grid cell firing patterns formed a single, continuous representation that spanned both compartments. Thus, we provide the first evidence that in a complex environment, grid cell firing can form the coherent global pattern necessary for them to act as a metric capable of supporting large-scale spatial navigation
- …