• Home
  • Search
  • Browse Collections
  • My Account
  • About
  • DC Network Digital Commons Network™
Skip to main content
JagWorks@USA University of South Alabama
  • Home
  • About
  • FAQ
  • My Account
University of South Alabama Institutional Repository

Home > GRADSCHOOL > Shelby Hall Graduate Research Forum > Posters

Shelby Hall Graduate Research Forum Posters
 

Shelby Hall Graduate Research Forum Posters

Printing is not supported at the primary Gallery Thumbnail page. Please first navigate to a specific Image before printing.

Follow

Switch View to Grid View Slideshow
 
  • End-to-End (E2E) MBSE Framework by Joshua Adelabu and Bhushan Lohar

    End-to-End (E2E) MBSE Framework

    Joshua Adelabu and Bhushan Lohar

    2025

  • Security Vulnerabilities of a Field Programmable Gate Array by Kylie Arnett

    Security Vulnerabilities of a Field Programmable Gate Array

    Kylie Arnett

    2025

  • Edge AI-Based Cognitive Engagement Detection and Multimodal Exploration by Isaac Arnold, Eva Burch, Shenghua Zha, and John Shelley-Tremblay

    Edge AI-Based Cognitive Engagement Detection and Multimodal Exploration

    Isaac Arnold, Eva Burch, Shenghua Zha, and John Shelley-Tremblay

    2025

  • False Narratives, Real Consequences by Russell W. Cantrell and Matt Campbell

    False Narratives, Real Consequences

    Russell W. Cantrell and Matt Campbell

    2025

  • Computational Study of the Separation of Aromatic/Aliphatic Mixtures using Ionic Liquids by Brian Seth Christa and Brooks D. Rabideau

    Computational Study of the Separation of Aromatic/Aliphatic Mixtures using Ionic Liquids

    Brian Seth Christa and Brooks D. Rabideau

    2025

  • Application of Graph Neural Networks with Phase Space Graphs by Parker H. Cole, Ryan Benton, Ralf Riedel, and David Bourrie

    Application of Graph Neural Networks with Phase Space Graphs

    Parker H. Cole, Ryan Benton, Ralf Riedel, and David Bourrie

    2025

  • A Framework for Design Recovery by Eric Diep

    A Framework for Design Recovery

    Eric Diep

    2025

  • Development of an Algorithm to Identify the Presence of LUKS-Encrypted Volumes on a Forensic Image of a Drive by Nicholas Flynn and Michael Black

    Development of an Algorithm to Identify the Presence of LUKS-Encrypted Volumes on a Forensic Image of a Drive

    Nicholas Flynn and Michael Black

    2025

  • Learning Without Labels: A Self-Supervised Learning Approach for Anomaly Detection in Control Systmes by Barbara Gladney

    Learning Without Labels: A Self-Supervised Learning Approach for Anomaly Detection in Control Systmes

    Barbara Gladney

    2025

  • Detecting Sensor Data Manipulation by Ricky Green and Michael Black

    Detecting Sensor Data Manipulation

    Ricky Green and Michael Black

    2025

  • Low-Cost Memory Design for Data Privacy by Safa Haq, Kyle Mooney, Mario Renteria-Pinon, Hritom Das, Jianqing Liu, and Na Gong

    Low-Cost Memory Design for Data Privacy

    Safa Haq, Kyle Mooney, Mario Renteria-Pinon, Hritom Das, Jianqing Liu, and Na Gong

    2025

  • API and FPGA-Based Methodology for Memory Chip Testing by Hasibur Rahman Hemel, Jinhui Wang, and Na Gong

    API and FPGA-Based Methodology for Memory Chip Testing

    Hasibur Rahman Hemel, Jinhui Wang, and Na Gong

    2025

  • Out-of-band Anomaly Detection for Real Time Operating Systems by Jeff K. Holifield

    Out-of-band Anomaly Detection for Real Time Operating Systems

    Jeff K. Holifield

    2025

  • Flexible Bit-Truncation Memory for Low-Power Quality-Adaptive Video and Deep Learning Storage by Md. Sajjad Hossain, William Oswald, Kyle Mooney, Mario Renteria-Pinon, Md. Bipul Hossain, Mohamed Shaban, Jinhui Wang, and Na Gong

    Flexible Bit-Truncation Memory for Low-Power Quality-Adaptive Video and Deep Learning Storage

    Md. Sajjad Hossain, William Oswald, Kyle Mooney, Mario Renteria-Pinon, Md. Bipul Hossain, Mohamed Shaban, Jinhui Wang, and Na Gong

    2025

  • Dynamic Control of ReRam by Mohammed Rafeeq Khan and Jinhui Wang

    Dynamic Control of ReRam

    Mohammed Rafeeq Khan and Jinhui Wang

    2025

  • Heterogenous Gross Device Deep Learning Power Analysis Attack by Berk Kivilcim

    Heterogenous Gross Device Deep Learning Power Analysis Attack

    Berk Kivilcim

    2025

  • Dual-Band Metamaterial Unit Cell for 5G and 6G Applications by Palash Kundu and Saeed I. Latif

    Dual-Band Metamaterial Unit Cell for 5G and 6G Applications

    Palash Kundu and Saeed I. Latif

    2025

  • Effect of Pre-adsorbed Species on High-Pressure Adsorption of Methane in Zeolite 5A Using Grand Canonical Monte Carlo (GCMC) Simulations by Kanhamardi Lao and Brooks D. Rabideau

    Effect of Pre-adsorbed Species on High-Pressure Adsorption of Methane in Zeolite 5A Using Grand Canonical Monte Carlo (GCMC) Simulations

    Kanhamardi Lao and Brooks D. Rabideau

    2025

  • Using Machine Learning Models to Improve the Cyber Physical Security of Drones by Sean Lee and Aviv Segev

    Using Machine Learning Models to Improve the Cyber Physical Security of Drones

    Sean Lee and Aviv Segev

    2025

  • Modelled Flooding Impacts on Lower Fish River Watershed by Sebastian Loschner

    Modelled Flooding Impacts on Lower Fish River Watershed

    Sebastian Loschner

    2025

  • Topical Text Segmentation for Stream of Consciousness Writing by Yuwei Lu and Ryan Benton

    Topical Text Segmentation for Stream of Consciousness Writing

    Yuwei Lu and Ryan Benton

    2025

  • Analysis of Forensic Techniques for Additive Manufacturing Devices by Daniel B. Miller, Brad Glisson, Mark Yampolskiy, and J Todd McDonald

    Analysis of Forensic Techniques for Additive Manufacturing Devices

    Daniel B. Miller, Brad Glisson, Mark Yampolskiy, and J Todd McDonald

    2025

  • Low-Power Differential Privacy Memory for Edge Devices by Kyle Mooney, Mario Renteria-Pinon, Safa Haq, Hritom Das, Jianqing Liu, and Na Gong

    Low-Power Differential Privacy Memory for Edge Devices

    Kyle Mooney, Mario Renteria-Pinon, Safa Haq, Hritom Das, Jianqing Liu, and Na Gong

    2025

  • Directing Sophisticated Cyberattacks on Public Water Infrastructure by Ayrton C. Purdy and Jordan Shropshire

    Directing Sophisticated Cyberattacks on Public Water Infrastructure

    Ayrton C. Purdy and Jordan Shropshire

    2025

  • Turbulence Prediction Using Non-Linear Phase Space Analysis by Jeremy Quijano

    Turbulence Prediction Using Non-Linear Phase Space Analysis

    Jeremy Quijano

    2025

 
  • 1
  • 2
 
 

Browse

  • Collections
  • Disciplines
  • Authors

Search

Advanced Search

  • Notify me via email or RSS

Author Corner

  • Author FAQ

Links

  • Contact Us
  • Teaching Commons
 
Elsevier - Digital Commons

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright