Rebecca Zulli Lowe, Adrienne Smith, Christie Prout, G. Maresch, Christopher Bacot, Lura Sapp, Bill Eustace
{"title":"Taking STEM Enrichment Camps Virtual: Strategies & Reflections from Quick Pivot due to COVID-19","authors":"Rebecca Zulli Lowe, Adrienne Smith, Christie Prout, G. Maresch, Christopher Bacot, Lura Sapp, Bill Eustace","doi":"10.1109/ISEC52395.2021.9763948","DOIUrl":"https://doi.org/10.1109/ISEC52395.2021.9763948","url":null,"abstract":"Since COVID-19 began spreading in the US and quickly established as a global pandemic in March of 2020, the NSF-funded STEM SEALS team at North Florida College faced the touch decision to either cancel their inaugural hands-on STEM enrichment camp planned for Summer 2020 or rushing at full speed to take it virtual. The biggest concern in making the decision to go virtual was a passionate belief in the importance of not losing the hands-on focus that had been planned. After all, the STEM SEALs effort at NFC was designed to expand access to high quality STEM experiences for historically underserved students in a high poverty, rural area. Changing from the in-person delivery to distance learning with minimal preparation presented a daunting challenge and also a unique opportunity; the opportunity to study the process and provide guidance to other STEM providers who are considering a move to a virtual platform. This exploratory study aimed to (1) identify the barriers to moving STEM enrichment programming in a rural environment from in-person to virtual activities during the COVID-19 pandemic, (2) describe key decisions that were made in transitioning to the virtual format along with the rationale behind those decisions, and (3) disseminate best practices that emerged from the inaugural effort.","PeriodicalId":329844,"journal":{"name":"2021 IEEE Integrated STEM Education Conference (ISEC)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130982256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Desalination and Purification of Water using a Solar Powered Hydrogel Multistage","authors":"Kevin Murphy","doi":"10.1109/ISEC52395.2021.9763983","DOIUrl":"https://doi.org/10.1109/ISEC52395.2021.9763983","url":null,"abstract":"The United Nations has a goal to supply clean water and sanitation for all. This goal sprouts from the fact that one in three people do not have access to clean drinking water. Clean water is an essential resource for our survival, yet we waste and pollute it. 2.5% of the Earth’s water is fresh yet only 0.5% is drinkable. As well as this, our already meager water resources are being threatened by climate change as weather patterns change and sea levels rise. An example of this is San Diego’s water supply which comes directly from the Colorado River but, due to a change in weather patterns, the Colorado river level is falling forcing San Diego to look elsewhere for clean water (2). Another example is Melbourne’s, and many other Australian cities’, water supply that took a heavy hit during the Millennium Drought. To fix problems like this desalination plants are being built. However, the processing of water in these plants is expensive ranging from 1,000 to 2,000 US dollars per acre-foot (of water), 10’s to 100’s of millions per year in maintenance (3) and billions to build the plants in the first place. The construction of these plants also require infrastructure that developing countries, countries that need clean water the most, simply do not have. The current and mainly used methods of desalination are reverse osmosis and thermal evaporation (2). Thermal desalination isn’t commercially viable due to its intensive energy requirement so reverse osmosis plants have become the favored design. However, these plants have many consequences such as toxic waste pollution and killing of local wildlife (2). This industry is crucial to humanity’s survival, yet it has so much room for improvement. Despite humanity’s access to a large supply of salt water and polluted fresh water, we are without an efficient and versatile means of making it safe to drink. This study aims to change that. This study aims to design, build and test an easy to use, highly efficient, solar powered and portable water purification method that can be used across the globe. This design will produce water via highly efficient evaporation which will cleanse it of contaminants, including microplastics. In this study a water vaporization enthalpy decreasing chitosan and PVA hydrogel was synthesized and freeze dried repeatedly at -80C to stimulate the expansion of pores within the hydrogel. Additionally, a multistage of these hydrogels was designed and is undergoing construction and testing in tandem with a solar tracking nested paraboloidal solar concentrator. It is hypothesized that this design will have a purification rate of 10L per hour. The testing of the purification rate will depend on the quality of the prototype and the prototype’s heat capacity. This design will also undergo field trials that will test its ease of use and its resistance to damage. The results of this study will determine the feasibility of this design in the real world and whether it can realistically be of bene","PeriodicalId":329844,"journal":{"name":"2021 IEEE Integrated STEM Education Conference (ISEC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114309592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TEDxEdisonHighSchool: A Template for Virtual TEDx Conferences","authors":"Sunrit Panda, Neoma A Chowdhury, Aditi Deshmukh","doi":"10.1109/ISEC52395.2021.9764070","DOIUrl":"https://doi.org/10.1109/ISEC52395.2021.9764070","url":null,"abstract":"Going Beyond The TEDx Guidelines: TEDx talks are brief and powerful. Limited to eighteen minutes, these talks are a concise glimpse into the speaker’s background and topic. Adding to the rigorous TEDx speaker guidelines (TED Conferences LLC), the TEDxEdisonHighSchool curation teams have devised three techniques for curating TEDx talks in a virtual world. Number one: the throughline is a pithy, memorable statement that encapsulates the point of the talk. In particular, Amy Cuddy’s and Melissa Marshall’s TED talks inspired this idea (Marshall, 2012, Cuddy 2012). The impactful throughline stimulates attendees’ interest, especially as ’Zoom fatigue’ reduces attention span for virtual events. Number two: a three-meeting curation timeline allows for the efficient curation of high-quality talks. This small time commitment appeals to busy professionals and academics who have limited time for speaking appointments. Employing this timeline, three independent curation teams have planned and executed an eighteenspeaker TEDxEdisonHighSchool conference in only two months, with a three hour per week time commitment. Number three: collaborative technology such as Google Documents, Calendly, and Miro facilitates efficient, on-time meetings. Calendly allows multiple teams to centrally schedule speaker meetings. Finally, a series of templates streamlines the speaker invitation and talk outlining process. Taking Advantage Of The Virtual Climate: Hosting a virtual TEDx conference lowers costs and expands reach. Normally, TEDx conferences are immense ordeals involving caterers, venues, stage designers, sponsors, and more (TED Conferences LLC). Additionally, TEDx limits most organizers to one conference in a twelve-month period with a maximum of one hundred attendees. However, a virtual conference only requires an online meeting platform and allows for multiple conferences in a single twelvemonth period without the one hundred attendee limit. For example, in addition to the one conference per year afforded by a TEDx license, TEDCountdown and TEDWomen allowed TEDx licensees to host their own offshoot conferences. Finally, there are no geographic limits to speakers. Next, the Zoom video conferencing service allows for further enhancements of TEDx events. Zoom is unique in having one of the most seamless, high-quality screen sharing features. Hence, live speakers can be supplemented by showing pre-recorded talks on the TED website. Furthermore, small-group discussions, called TEDxCircles, can be incorporated through Zoom breakout rooms. These allow for intimate conversations that delve deeper into the speakers’ background and topic. Finally, Zoom’s attendee limits can be bypassed by streaming live to Facebook or Youtube, further increasing the event’s reach. Impact On Online Learning: A virtual TEDx conference addresses the need for “diversity in [a student’s] learning experience” (Gillett-Swan, 2017). TEDx talks break up the monotony of lectures with its unique, fast-pac","PeriodicalId":329844,"journal":{"name":"2021 IEEE Integrated STEM Education Conference (ISEC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128399241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Technology as a Means for Musical Outreach to Nursing Home Residents","authors":"John Tewolde, Joshua Tewolde, G. Tewolde","doi":"10.1109/ISEC52395.2021.9763957","DOIUrl":"https://doi.org/10.1109/ISEC52395.2021.9763957","url":null,"abstract":"On March 15th, 2020, the coronavirus was declared a pandemic by the WHO. This marked the beginning of the disease which wreaked havoc on our social and economic livelihoods, and continues to do so today. However, the pandemic hasn’t hit everyone equally. Unsettlingly, it is our most vulnerable population – the elderly – that are most at risk. As of today, nearly 40% of Covid-19 deaths have occurred in Nursing Homes, while they amount to less than 6% of our population. Unfortunately, that is not the only epidemic sweeping our nursing homes. Loneliness, Alzheimer’s, and Dementia are rampant as many live for an extended period of time away from loved ones. In the spring, as my brother and I were isolated at home, our school held a contest in conjunction with the Positivity Project to exemplify character traits in the community by pursuing a project of choice. Our goal for this project was to partner with nursing homes so that we could play music for the seniors and frontline workers over Zoom. At last, on a warm April afternoon, I logged on to Zoom as my brother stood over my shoulder. Over the following summer months and into the fall, we did more than 2 dozen live musical meetups to diverse audiences. In fact, we got so much demand that we ended up releasing a YouTube video in addition to the live streams because of increased demand for the music and social experience, and the video ended up getting nearly 700 views in a matter of months. From Mainers to Texans to Alaskans and Hawaiians, we had the opportunity to perform for frontline workers in nursing homes and our seniors across the States, playing genres from classical to jazz to soothing church hymns. The presence of music alone can help wonders, not to mention the live human interaction associated with our project. Music can do a very special thing to stimulate the brain. Music first enters through the ears in the form of sound waves, which vibrate after striking the eardrum. After a series of steps, the vibrations reach the cochlea (the key hearing organ), which is filled with a fluid that reacts to the vibrations. As the fluid moves in accordance with the music, thousands of cells translate the fluid’s movement to electrical currents, and send the currents to the auditory cortex in the temporal lobe of the brain. At that point, information goes out to different parts of the brain, stimulating different areas for different components of music. This cross-brain stimulation is crucial in combating mental conditions such as Alzheimer’s or dementia. This is an issue of utmost importance, especially now, when thousands more seniors have died of mental conditions due to the isolation brought by the pandemic. Note: To evaluate the effectiveness of our outreach, we conducted a preliminary survey and found that we garnered an average of 9.3 on a scale of 10 for level of satisfaction.","PeriodicalId":329844,"journal":{"name":"2021 IEEE Integrated STEM Education Conference (ISEC)","volume":"81 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129620068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Covid-19 Case Prediction using Nesting Fitting","authors":"Bomin Wei","doi":"10.1109/ISEC52395.2021.9764022","DOIUrl":"https://doi.org/10.1109/ISEC52395.2021.9764022","url":null,"abstract":"In this project, a new method of predicting COVID-19 cases is built based on the Logistic model. The new method combined different fitting methods and build a new method that can predict the cases of COVID-19 in a short period. The Nesting Fitting Method is focusing on a temporal series dataset for the virus cases, and it is much better than logistic and sliding windows methods. This model considers more parameters such as region and secondary outbreak. We also compared the prediction of total confirmed cases of COVID-19 in the world with three other methods. The results showed that the prediction using the Nesting Fitting Method is precise and should be suitable for the region where a second outbreak has happened.","PeriodicalId":329844,"journal":{"name":"2021 IEEE Integrated STEM Education Conference (ISEC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127291472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of Protein Concentration in Fish Feed on Physical and Chemical Water Pollution","authors":"Indeever Madireddy","doi":"10.1109/ISEC52395.2021.9764086","DOIUrl":"https://doi.org/10.1109/ISEC52395.2021.9764086","url":null,"abstract":"One of the seven characteristics of life is the ability to produce waste. Waste is the excess material an organism excretes after carrying out metabolic processes. Aquatic organisms like fish produce not only physical waste but also chemical wastes such as ammonia. Ammonia is excreted through fish gills and through their feces. In open aquatic environments, like oceans, rivers, and gulfs, this ammonia follows a nitrogenous pathway but is quickly eliminated from the system by plants, bacteria, and other microorganisms. In closed aquatic environments like aquaria and ornamental ponds, this ammonia also follows a nitrogenous pathway. As ammonia levels build-up from fish waste, a specific kind of bacteria called Nitrosomonas begins to grow. Nitrosomonas oxidizes this ammonia to produce nitrite. As nitrite levels build up, another bacteria called Nitrobacter begins to grow. Nitrobacter oxidizes this nitrite into nitrate. There is no bacteria in aquaria that can eliminate this nitrate, and thus, nitrate can only be removed by replacing the water. Ammonia and nitrite are incredibly toxic to aquatic life while nitrate is less toxic, but can get unhealthy at high concentrations. As long as ammonia is being produced, and the necessary bacteria are present, ammonia will be continually oxidized and nitrate will build up. This research project determined three things. 1. How protein concentration in fish feed affected the build-up of nitrates 2. How protein concentration in fish feed affected the physical water clarity. 3. What concentration of protein ended up in the feces. Three different fish foods with a minimum protein concentration of 42%, 36%, and 28% were fed to three different species of fish: Pterophyllum Scalare (freshwater angelfish), Cyprinus rubrofuscus (Koi), and Carassius auratus (Tamasaba Goldfish). Each kind of food was fed to each species of fish for five days. At the end of this period, nitrate readings were taken to analyze the chemical pollution of the water. To analyze the physical pollution of the water, the turbidity of the water was measured. To do this, a sample of fecal matter from each fish species from each type of food was diluted and mixed in water. After the feces settled out, the supernatant was analysed in a spectrophotometer. To sum everything up, This research experiment determined how the protein concentration of fish food affected both the chemical (nitrate and protein) and physical pollution (turbidity) of aquariaand ponds.","PeriodicalId":329844,"journal":{"name":"2021 IEEE Integrated STEM Education Conference (ISEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129957375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeffrey S. Chavis, Malcom Doster, Michelle Feng, Syed Zeeshan, Samantha Fu, Elizabeth Aguirre, Antonio Davila, K. Nyarko, Aaron Kunz, Tracy Herriotts, Daniel P. Syed, Lanier A Watkins, A. Buczak, A. Rubin
{"title":"A Voice Assistant for IoT Cybersecurity","authors":"Jeffrey S. Chavis, Malcom Doster, Michelle Feng, Syed Zeeshan, Samantha Fu, Elizabeth Aguirre, Antonio Davila, K. Nyarko, Aaron Kunz, Tracy Herriotts, Daniel P. Syed, Lanier A Watkins, A. Buczak, A. Rubin","doi":"10.1109/ISEC52395.2021.9764005","DOIUrl":"https://doi.org/10.1109/ISEC52395.2021.9764005","url":null,"abstract":"The Internet of Things (IoT) is becoming more pervasive in the home, office, hospital, and many other userfacing environments (UFEs) as more devices are networked to improve functionality. However, this explosion of networked devices in UFEs necessitates that security systems become easier to help users remain aware of the security of the devices on their network. Users may not have the skills or the time needed to continuously monitor networks of increasing complexity using common open-source tools. Specifically, they are not likely to fully comprehend the data that those tools present, nor are they likely to have a working knowledge of the tools needed to monitor and protect their IoT-enabled network environments. This paper explores development of a system that uses ambient computing to facilitate network security monitoring and administration. Our system is designed to combine machine-learning–enriched device awareness and dynamic visualization of IoT networks with a natural language query interface enabled by voice assistants to greatly simplify the process of providing awareness of the security state of the network. The voice assistant integrates knowledge of devices on the network to communicate status and concerns in a manner that is easily comprehensible. These capabilities will help to improve the security of UFEs while lowering the associated cognitive load on the users. This paper outlines continued work in progress toward building this capability as well as initial results on the efficacy of the system.","PeriodicalId":329844,"journal":{"name":"2021 IEEE Integrated STEM Education Conference (ISEC)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132069536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Exploration Into Electromagnetic Generation","authors":"Kritika R Ravichander","doi":"10.1109/ISEC52395.2021.9764012","DOIUrl":"https://doi.org/10.1109/ISEC52395.2021.9764012","url":null,"abstract":"I feel discouraged whenever my power goes out, but my struggles are nothing compared to my relatives in India who sometimes have to walk miles to get power. I feel that exploring how to generate electricity with motion would help them one day by allowing them to simply pedal their legs in order to gain power.Electricity and magnetism relate to each other, given that both the magnetic and electric fields depend on the movement of electrons. Changes in an electric field create a magnetic field, and vise versa. This means that if you generate a magnetic field, you will be able to generate current, which is known as induction. This is shown by Ampere’s Law, ”for any closed loop path, the sum of the length elements times the magnetic field in the direction of the length element is equal to the permeability times the electric current enclosed in the loop” It is also important to note Ohm’s Law, or the observation that voltage is the product of current and resistance. Since the strength of the magnetic field is directly related to the current in the wire, the magnitude of the magnetic field would increase with an increase in voltage in the circuit.Attaching more magnets to an apparatus should increase the strength of the magnetic field, which should increase the amount of current. One can change factors such as the number of magnets, and measure the products such as the amount of current. In order to produce a change in the magnetic field, one can attach the magnets to a spinning device, such as a salad spinner, which would be above the electromagnet attached to a surface. That electromagnet would be attached to wires which would then be attached to a voltage meter to measure the voltage. It is important to keep the material and brand of magnets constant, as well as the electromagnet, materials used to set up the apparatus, and materials for the electric field. This is important, so we can best see the relationship between the number of magnets attached to the salad spinner and current measured.Teachers in school would be able to make their own generator in the classroom using every day household objects. This would put into perspective how electricity is a part of objects around us. They can modify the apparatus as needed to show what factors affect electromagnetic fields and generation. This project is exploring generators and electromagnetic fields on a small scale. This could be easily applied to a larger scale, including being able to power a house or a whole city. There is also flexibility with materials, meaning that new resources for generators can be explored. There are various materials to be used, including different brands of wires and magnets, and even other various spinning items like fidget spinners. Understanding how to develop generators will help shed more insight as to what we should do when the power goes out.","PeriodicalId":329844,"journal":{"name":"2021 IEEE Integrated STEM Education Conference (ISEC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124969594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Complex Malware","authors":"Daniel Edis, Taylor Hayman, A. Vatsa","doi":"10.1109/ISEC52395.2021.9763932","DOIUrl":"https://doi.org/10.1109/ISEC52395.2021.9763932","url":null,"abstract":"With the surge of cybercrime and contribution of malware (malicious software) attacks in cybercrime, there is need to design a smart and deep engine-based Intrusion Detection Systems (IDS). The malware could be virous, worm, trojan, etc. and their behaviors are dynamic and static in nature. IDS may monitor events and activity of malware and classify them in order that prediction of potential attacks can be made for users’ sensitive data and associated computational resources. Moreover, the false positive rate alarming of IDS systems is high. Therefore, there is need to reconsider the design of IDS systems, increase its detection accuracy, and elevate prediction of vulnerable attacks. Further, new IDS must capable to deal with nonlinear behavior of malware datasets and model must have better fitting ability. Therefore, in order to protect and avoid vulnerable attacks, we would like to contribute an implementation of a deep learning algorithm - Extreme Gradient Boosting (XGBoost) and Recurrent Neural Network (RNN) - on Microsoft Malware Classification Dataset (BIG 2015) datasets. Also, BIG 2015 raw datasets will be preprocessed and resized to make the data compatible to these algorithms. Moreover, the performance of these algorithms will be measures and compared using these parameters - Accuracy, Precision, Recall, F1 score, Loss, True Positives, True Negatives, False Positives, and False Negatives, and receiver operating characteristic (ROC) curve by calculating the AUC (the area under the ROC curve).","PeriodicalId":329844,"journal":{"name":"2021 IEEE Integrated STEM Education Conference (ISEC)","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121346920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Hashing to Improve Efficiency in Cross-image Duplicate Detection in Research Publications","authors":"Tong-suo Lu","doi":"10.1109/ISEC52395.2021.9763956","DOIUrl":"https://doi.org/10.1109/ISEC52395.2021.9763956","url":null,"abstract":"Cases of research misconduct had increasingly exhibited themselvesthrough the duplicate figures that they contain; Bik et al. [1] examined over 20 thousand biomedical published papers and found that 3.8% had inappropriate duplicate figures, with this percentage on the rise in recent years. Currently, the identification of Figure duplicates is mainly carried out by human reviewers; the process is slow and requires specialized training. There have been attempts to develop large-scale screening tools for image duplicates, but they are either unpublished [2] or do not perform very well. There exists prior research in the field of copy-move forgery detection. These deal with duplicate regions on a single image, but the methods could be modified and applied to cross-image matching, as we intend to. However, cross-image matching implies a much larger feature set to match between, and feature matching is currently the slowest step in the process [3]. Currently, there are two directions to address this problem. One is to use keypoint-based features, such as SIFT, to decrease the size of the feature set. The other is to apply hashing to the features and use hash lookup to quickly eliminate those features that definitely don’t match; Bayram et al. [4] demonstrates that using bloom filters in place of traditional methods increased the matching speed at some loss of result accuracy. We plan to devise a method that applies hashing to matching SIFT features in order to reliably perform faster than prior methods on cross-image matching in large biomedical image sets. We expect the resulting method to perform faster than current methods with little to no loss of accuracy.","PeriodicalId":329844,"journal":{"name":"2021 IEEE Integrated STEM Education Conference (ISEC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131550182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}