搜索条件
筛选:
学
Education, Criminal Justice, and Human Services
删除限定条件 学: Education, Criminal Justice, and Human Services
语言
English
删除限定条件 语言: English
« 上一页 |
1 - 10 共 40
|
下一页 »
每页显示结果数
搜索结果
-
- Type:
- Document
- 摘抄:
- In this paper, we focus on how Black students matter, from their perspective, in Ohio higher education. To better support Black students, policymakers, college leaders, and organizers must understand what is happening on the ground from students themselves. The words of the essayist and thinker, James Baldwin, are pertinent here: “Not everything that is faced can be changed, but nothing can be changed until it is faced.” This Ohio Black Student Equity Report is our contribution to ensuring that Ohioans face the state of racial (in)equity in higher education as it relates to Black students.
- 作者:
- Tichavakunda, Antar and Smith, Everrett
- 提交者:
- Everrett Smith
- 上传日期:
- 01/24/2024
- 更改日期:
- 03/25/2024
- 创建:
- 2023
- 证书:
- All rights reserved
-
- Type:
- Document
- 摘抄:
- As technology permeates day-to-day life, people have more and more ways to communicate. These forms of communication create a challenge for Public Safety Answering Points (PSAP). Research has shown people are posting on social media for medical help, but PSAPs do not have a way to receive these messages. This research aims to determine if using keywords and filter words can be used to find the actionable calls for help in the midst of the millions of posts made. Actionable is defined as containing enough information to determine the nature of a medical emergency and if is currently occurring or is recent enough that the poster needs help. To determine if this was true, the most prevalent types of voice medical calls to the Cincinnati Fire Department were determined for 2021. A set of keywords and filter words was created for each call type. Then tweets were captured over a period of seventeen hours and filtered using the word lists. The filtering showed there was a valid way to find actionable tweets, and that people were posting such things. By varying the word lists, the signal-to-noise ratio can be adjusted depending on the desires of the agency. as filtering became more strict, the number of missed actionable tweets increased, while the number of incorrectly labeled as actionable decreased.
- 作者:
- Langdon, Theodore
- 提交者:
- Theodore Langdon
- 上传日期:
- 08/19/2023
- 更改日期:
- 08/19/2023
- 创建:
- 2022-07-06
- 证书:
- All rights reserved
-
- Type:
- Dataset
- 摘抄:
- Theme Coded Literature Review - Does China's One-China Policy Shape China's Foreign Policy?
- 作者:
- Turner, Grant
- 提交者:
- Grant Turner
- 上传日期:
- 07/23/2021
- 更改日期:
- 07/23/2021
- 创建:
- 2019
- 证书:
- Open Data Commons Attribution License (ODC-By)
-
- Type:
- Article
- 摘抄:
- The UK has created one of the best tools for mitigating Huawei’s risks. Whether or not the UK Huawei ban stands, its Huawei Cyber Security Evaluation Centre should receive increased funding and support to protect and enhance its interests at home and abroad.
- 作者:
- Huang, Russell and Turner, Grant
- 提交者:
- Grant Turner
- 上传日期:
- 08/14/2020
- 更改日期:
- 08/14/2020
- 创建:
- 2020-08-14
- 证书:
- Attribution-NonCommercial-ShareAlike 4.0 International
-
- Type:
- Document
- 摘抄:
- The current debates revolving around 5G, Huawei, and how they are resolved, are highly visible indicators of the technology based shifts in the global order which are setting the tone for the 21st century. Currently, it seems that many in the US and the PRC are using Cold War and Thucydides Trap paradigms, with a zero-sum mentality. At least in the case of 5G technology, the UK seems to have taken a more nuanced approach. This article comes as the UK prepares its new National Cyber Security Strategy, reviewing the 5G and cyber security debates surrounding Huawei in a highly interdisciplinary manner, and directing readers to a rich variety of resources. In addition to its analysis of issues and solutions often absent from the discourse, this article’s feature contribution is the argument that the UK can be more than an example of a middle way. Specifically, if the UK scales up and internationalizes its Huawei Cyber Security Evaluation Center, perhaps by creating an International Cyber Security Evaluation Center, it can lead its allies and the world in 5G, 6G, cybersecurity, and international relations, filling a vital leadership vacuum.
- 作者:
- Huang, Russell and Turner, Grant
- 提交者:
- Grant Turner
- 上传日期:
- 07/08/2020
- 更改日期:
- 07/08/2020
- 创建:
- June 30, 2020
- 证书:
- Attribution-ShareAlike 4.0 International
-
- Type:
- Article
- 摘抄:
- This analytical paper asks, does the One-China policy shape the People’s Republic of China’s foreign policy? This paper begins by briefly defining the One-China policy and situating it in the respective histories of China and its current incarnation as the People’s Republic of China (PRC). Then, after untangling the often muddled classifications of soft, sharp, and hard power, the question is interrogated in the context of each class of power (Nye, 2004; Nye, 2011; Nye, 2018; Raby, 2019; Walker & Ludwig, 2017). This analytical essay concludes that the PRC does employ predominantly sharp and hard power strategies that are heavily influenced by the One-China policy.
- 作者:
- Turner, Grant
- 提交者:
- Grant Turner
- 上传日期:
- 07/07/2020
- 更改日期:
- 07/08/2020
- 创建:
- August 11, 2019
- 证书:
- Attribution-NonCommercial-ShareAlike 4.0 International
-
- Type:
- Student Work
- 摘抄:
- Abstract This study is the first of a series of studies, collectively embodying a multiphase mixed methods design. The overall objective of these studies is to explore and address a variety of issues and features of the discipline of economics, particularly as they relate to and represent past present and future factors of globalization, education, citizenship, and society. This is done by collecting and analyzing data on numerous aspects of the undergraduate economics curriculum, economics as a discipline, and economics as applied in the real world. The overall purpose of these studies is to inform ongoing debates concerning the future of the discipline of economics and how it is taught, by examining and creating paradigms and methods that may be of aide. Additionally these studies collectively aim to outline, and in small ways develop, potential technological and organizational solutions for detailed longitudinal curriculum tracking. The frameworks employed and developed in these studies may eventually be scaled and adapted for all sorts of curricula. Ideally, the completion of this study’s overall objective yields practical insights and tools that empower faculty and departments, in economics and eventually in general, to better understand and design their own curriculum. This immediate study fills gaps in and updates data on the curriculum of undergraduate economics majors in U.S. institutions, while also establishing a baseline data set for future studies to build on. A qualitative census methodology is adapted and employed to explore how various institutional and program factors relate to certain types of major program requirements. Descriptive statistics are used for analysis, primarily to allow for comparisons to previous studies. In sum, the purpose of the data collected and analyzed in this census is to give a glimpse into the current state of the undergraduate economics curriculum in the U.S., and to inform the qualitative, quantitative, and transformative studies that are to follow in this multiphase series.
- 作者:
- Turner, Grant
- 提交者:
- Grant Turner
- 上传日期:
- 06/18/2020
- 更改日期:
- 06/18/2020
- 创建:
- 2018-05-19
- 证书:
- Attribution-NonCommercial-ShareAlike 4.0 International
-
- Type:
- Article
- 摘抄:
- In a world where technology continues to vastly grow and improve, IoT devices have increasingly become more and more a part of people’s everyday lives. Although that is the case there is a need to understand how to better use these devices for threat detection. This paper presents early work to understand gaps in this regard using a review of previously used techniques to identify known threats to households. Through the use of smart home device clusters we seek to effectively reduce the amount of false alarms and create a more reliable resource for home residents.
- 作者:
- Tresenwriter, Isaac
- 提交者:
- Jess Kropczynski
- 上传日期:
- 05/15/2020
- 更改日期:
- 05/15/2020
- 创建:
- 2020-04-14
- 证书:
- All rights reserved
-
- Type:
- Article
- 摘抄:
- Small office home office networks have become a target for many threat actors, hackers and cyber attackers and hence there is an urgent need to secure the network from such attackers. Most small office home office network users do not see the need to provide enough security to their networks because they assume no one is going to hack them forgetting that the biggest threat of our small home networks today comes from the outside. The challenge of misconfiguration of routers, firewalls and default configurations in our small home networks renders the network vulnerable to attacks such as DDos , phishing attacks , virus and other network attacks hence the need to implement a detection algorithm to help identify flaws in the pattern of the small office network. It turns out that about 75% of existing approaches focused on intrusion detection in 802.11 wireless networks of a SOHO and not the entire network. These approaches do not efficiently secure the network entirely leaving the rest prone to attacks can occur with or without the internet. This paper proposes to add another layer of security to the other preventive measures in a SOHO network by designing, implementing and testing a supervised neural network algorithm to identify attacks on the small home network and also to send a notification to users to keep them informed of the activities on their network. The supervised neural network algorithm will have a dataset representing both attacks and non-attacks which will be used in the training phase. The system should be able to detect and identify the various attacks and anomalies when they occur on the network and help keep the users informed.
- 作者:
- Azumah, Sylvia Worlali and Li, Chengcheng
- 提交者:
- Jess Kropczynski
- 上传日期:
- 05/15/2020
- 更改日期:
- 05/15/2020
- 创建:
- 2020-04-14
- 证书:
- All rights reserved
-
- Type:
- Article
- 摘抄:
- The current rapid growth in the computer and internet development has ushered in numerous cybersecurity challenges which are constantly evolving with time. The current cybersecurity solutions are no longer optimal in tackling these emerging cyber threats and attacks. This paper proposes the creation of a cybersecurity dataset to be used for a hybrid machine learning (ML) approach of supervised and unsupervised learning for an effective intrusion detection system. The proposed model entails a five-stage process which starts at the setup of a simulated network environment of network attacks to generate a dataset which feeds into the data normalization stage and then to data dimension reduction stage using the principal component analysis as a feature extraction method after which the data of reduced dimension is clustered using the k-Means method to bring about a new data set with fewer features. This new dataset is afterward classified using the enhanced support vector machine (ESVM). The proposed model is expected to provide a high-quality dataset and an efficient intrusion detection system in terms of intrusion detection accuracy of 99.5%, short train time of 3seconds and a low false-positive rate of 0.4%.
- 作者:
- Eichie, Maxwell
- 提交者:
- Jess Kropczynski
- 上传日期:
- 05/15/2020
- 更改日期:
- 05/15/2020
- 创建:
- 2020-04-14
- 证书:
- All rights reserved
