Connor Bilotta * Steganography Used for centuries , steganography is the practice of hiding information within a digital file , map , video , or audio . The objective of steganography is to hide the existence of the message . Unlike cryptography , which scrambles a message so if intercepted it cannot be read , steganography is hidden in plain sight and is not typically encrypted . This research will look at how steganography has been used in the past , some different types of steganography , a comparison between steganography and cryptography , and how this ancient practice is being used today .
John Danko * Using Algorithms to Save Lives : Emergency Rescue Robots
On February 6 , 2023 , a massive 7.8 earthquake hit Turkey and Syria leaving over 33,000 people dead and injuring tens of thousands . Rescue workers searched frantically for survivors buried under the fallen buildings . Rescues like these pose a threat to both rescue workers and victims . Using artificial intelligence technologies , search and rescue robots could reduce fatalities . In Toyko , fire-fighting robots are used to put out fires and locate victims . With the capability to identify smell , AI robots can be used during accidents involving toxic chemicals . This presentation will discuss Robotic search and rescue machines in the age of artificial intelligence .
Haley Gannon * Web Design and User Experience with Artificial Intelligence This research project examines how artificial intelligence ( AI ) is utilized by web designers to improve user experience ( UX ). Often used interchangeably , web design focuses on creating web content whereas user experience is more concerned with how the user interacts with that web content . By integrating artificial intelligence into a webpage , users are provided with a more personalized experience which in turn can increase traffic and sales . After looking at how AI is integrated into web design through responsive coding and bots , how these technologies work together to provide cutting-edge UX will be discussed .
Ian Gordynskiy * Computer Forensics : RAM Analysis Random Access Memory ( RAM ) is temporary memory intended to be volatile . Volatile memory is supposed to only hold data until the device is powered off . Theoretically , once powered off , data stored in RAM is lost . However , recent research has demonstrated that data stored in RAM is not always lost . By performing a RAM analysis , digital forensics practitioners can retrieve encryption keys , passwords and other information such as network connections , opened files and malware . Certain malware known as resident malware , can reside in RAM and is undetectable by anti-virus software . This research will explore what can be recovered with RAM Analyses .
8