PROGRAM
Friday, November 12th
View this program: with abstractssession overviewtalk overview
09:15-10:35 Session 2A
Professional Speakers - Session Chair: Mir Hasan
Location: Highlander II
09:15 | The Hackable Clock Project (abstract) |
09:35 | Can deep learning hit a moving target? A closer look at deep learning for TBI research (abstract) |
09:55 | doqmnt: Lowering Barriers for Better Documentation (abstract) |
10:15 | Teaching Data Representation using Real-World Applications (abstract) |
09:15-10:35 Session 2B
Graduate Speakers - Session Chair: James Church
Location: Azalea
09:15 | Clustering Theses and Dissertations by Relevance (abstract) |
09:35 | Tracking Encounters while Respecting Privacy (abstract) |
09:55 | Distributed Smart Embedded Vision for IoT Applications (abstract) |
10:15 | Protected Spreadsheet Containers for Smart Manufacturing (abstract) |
09:15-10:35 Session 2C
Undergraduate Speakers - David R. Luginbuhl
Location: Dogwood I
09:15 | COVID19 Chest Xray Classification Through Deep Learning in Google Colab (abstract) |
09:35 | Robot-ouille: The In-Home Cooking Assistant that Serves Independence with Food (abstract) |
09:55 | Self-driving Car Using Finch 2 Robot (abstract) |
10:15 | Aerial Crane Operation Using Drone Swarming Technology (abstract) |
09:15-10:35 Session 2D
Undergraduate Speakers - Session Chair: Ziwei Ma
Location: Dogwood II
09:15 | Performance Profiling and Load Balancing in Bioinformatics Clouds (abstract) |
09:35 | Investigation of the Performance of Machine and Deep Learning Techniques on Kentucky Motorcycle Crash Data (abstract) |
09:55 | Can We Trust Neural Networks? An Analysis of Neural Network Uncertainty by the Learned Feature Space (abstract) |
10:40-12:00 Session 3A
Professional Speakers - Session Chair: Saeid Samadidana
Location: Highlander II
10:40 | Does ABET Accreditation Matter for a Computer Science Program? (abstract) |
11:00 | Brushing the Dust Off: A Modern Approach to Technique Re-evaluation (abstract) |
11:20 | Language Choice for First Programming Course, Theory and Anecdotal Experiences (abstract) |
11:40 | Supervisory Control and Data Protection in Cyber-Physical Systems (abstract) |
10:40-12:00 Session 3B
Graduate Speakers - Session Chair: Shamin Khan
Location: Azalea
10:40 | Creating Direct Sensing Data to Enable Flood System Land-Cover (abstract) |
11:00 | We Are Peace Keepers! In Cyber Spaceā¦ (abstract) |
11:20 | An Implementation of Extended Reality Technology for Field-specific, Manufacturing Education and Training (abstract) |
11:40 | Improving Anomaly Detection on Smart Grid with Dynamic Time Warping (abstract) |
10:40-12:00 Session 3C
Undergraduate Speakers - Session Chair: Saman Sargolzaei
Location: Dogwood I
10:40 | Campus Mania (abstract) |
11:00 | Mark the Mighty (abstract) |
11:20 | A COVID-19 Analysis (abstract) |
11:40 | Learning Algorithms on the Web (abstract) |
10:40-12:00 Session 3D
Undergraduate Speakers - Session Chair: Greg Kawell
Location: Dogwood II
10:40 | Smart UAV Low-Cost LiDAR Obstacle Detection Systems Through the Implementation of 3-D Point Clouds (abstract) |
11:00 | Facial Recognition Through Deep Learning with Colab (abstract) |
11:20 | Artificial Intelligence in Gaming (abstract) |
11:40 | Language Choice of Program Assignments in Introductory Computer Programming Courses and the Effects on Female Student Retention (abstract) |
13:00-14:20 Session 4A
Professional Speakers - Session Chair: Bob Bradley
Location: Highlander II
13:00 | A Collaborative Partnership between CS and Math Faculty to Develop Lessons that Teach Generalization through Writing Python Programs (abstract) |
13:20 | Designing CS Materials for Out-of-field Middle School Teachers (abstract) |
13:40 | A Brief History of the Web (abstract) |
14:00 | Developing Firebase Apps with Angular (abstract) |
13:00-14:20 Session 4B
Graduate Speakers - Session Chair: Melissa Wiggins
Location: Azalea
13:00 | Anomaly Detection in Smart Farming using Machine Learning (abstract) |
13:20 | A Taxonomy of Data Poisoning Attacks: Domain, Approach and Target (abstract) |
13:40 | A Vision for Activity Control Security Models for Smart Ecosystems (abstract) |
13:00-14:20 Session 4C
Undergraduate Speakers - Session Chair: Masoud Naghedolfeizi
Location: Dogwood I
13:00 | Detection of Stepping-Stone Participation using Identical Packet Sequencing with Differing Encryption Algorithms (abstract) |
13:20 | Search and Rescue with Rover Robot (abstract) |
13:40 | Stepping-stone Intrusion Upstream Detection Using Network Traffic Round-trip Time Distribution (abstract) |
14:00 | Detecting Stepping Stone Intrusion Using Packet Crossover (abstract) |
13:00-14:20 Session 4D
Peer-Reviewed Speakers - Session Chair: Karen G. Carter
Location: Dogwood II
13:00 | An Introductory Guide To Autograders and Their Features (abstract) |
13:20 | Towards a Comprehensive Ontology for Electronic and Physical Evidence in Cybercrime (abstract) |
13:40 | Teaching and Retaining the Computer Science Appalachian Student (abstract) |
14:00 | CyberHero: A serious game to teach cybersecurity (abstract) |
14:35-15:55 Session 5A
Professional Speakers - Session Chair: Robert Lowe
Location: Highlander II
14:35 | Procedural Walking Animation for a Top-Down 2D RPG Character (abstract) |
14:55 | Teaching OS via Collaboration, Research and Presentations (abstract) |
15:15 | Using Chat and Teletyping for Productive Office Hours and Virtual Labs in Computer Science Education (abstract) |
15:35 | The Search for the Ideal Sparse Tensor Storage Format (abstract) |
14:35-15:55 Session 5B
Poster Session
Location: Dogwood II
Developing a Mobile Application for Professor/Student Profile Matching (abstract) |
Gamification in a Robotic Training Virtual Reality Program (abstract) |
The Connection of STEM and Art & Design: A Visual Study of the Importance of Digital Arts in the Traditional Gallery Space (abstract) |