• Are NFL teams getting the most out of their wins? The Efficiency of Year End Revenues of Ten NFL Teams

      Gonzales, Savanna; Thompson, Mark; Hull College of Business; Thompson, Mark; Hull College of Business; Hoffman, Todd; Department of English and Foreign Languages; Hunt, David; Pamplin College; Augusta University (2018-02-12)
      Major sports have taken over many prominent industries in today's world. With the economic impact of athletics comes its evolution from a spectator event into a business. Each team in the major leagues is now not only pressured to produce winsbut as a business, they must also bring in revenue. This means that efficiencyof funds is a vital goal of team managers and financial specialists. Thisresearch projectexaminesthe effects of various factors on year-end revenues for the top ten most valuable teams in the National Football League. Through the use of a DEA model that analyzes such inputs as income, team record and stand out players we areable to determine how efficiently each team is performing based on their revenues, or the output. Of the 10 teams studied, 5 were deemed efficient while 5 were deemed inefficient.Teams that didnot see successful revenue reports were analyzed based on their weaknesses and offered recommendations on which to improve where efficient teams were used a comparison. Ultimately, the goal of this research is to identify factors to improve revenue efficiency across the league as a whole by looking at the top performing teams (or best practices).
    • Deep Learning for the Classification of Malicious Emails

      Daoudi, Ahmad; Yang, He; School of Computer and Cyber Sciences; Department of Mathematics; Yang, He; Department of Mathematics; Augusta University (2018-02-12)
      Deep learning has been widely used in many real world applications, including computer vision, object and image recognition, language translation and computer-aided medical diagnosis. Compared to conventional machine learning methods, deep learning has the advantage of being able to extract the features of raw data automatically, without using hand-tuned feature extractor. In this talk, we will first presenttwo methods of constructing our datasets of malicious emails, by considering the subject line andthe context of the malicious emails, and how to convert these datasets into suitable typeof training and test datasetsfor our numerical simulations. We then present the architecture of our convolutional neural network and classification accuracy for the datasets malicious emails.
    • Encouraging Health Literacy and Adherence to Physical Therapy Programs

      Mondeddu, Sheena; Thulluri, Lakshmi; Dojack, Amanda; Department of Biochemistry and Molecular Biology; Department of Kinesiology and Health Science; Hayward, Pamela; Department of Communication; Harris-Parker, Anna; Department of English and Foreign Languages; Augusta University (2018-02-12)
      Anaspectofhealthcarethatmany professionsdo notconsider is thelack ofattention towardsphysical therapy.Thereis a large amountofimportancegiven tophysical medication, butpatientstendtooverlook theimportanceofstickingtophysical routinestoaid theirprogress. Ourpresentationfocuseson easy and effectivemethodstoincreaseinterestand engagementin thefieldofphysical therapy,using social media marketingcampaign.Webreak down our strategyintothreekey components.First,ourgoal is tomake individuals more familiarwiththe jargon relatedtothefieldbecause theless theyunderstand,themore likely theyare togive up. Second,we intendtoshow themthepossible risks associatedwithnotadhering tophysical therapytonudge themtomake a change in theirlifestyles.Finally,we also came up with differentstrategiesfordifferentage groups in order toefficientlycatertoall possible audiences.
    • The Mathematical Structure of Attack Trees

      Bryant, Aubrey; School of Computer and Cyber Sciences; Eades, Harley; School of Computer and Cyber Sciences; Augusta University (2018-02-12)
      In the kitchen, every cook can start with the same ingredients and end with a different result based on the recipe used. However, without cooking a hundred dishes, how can you tell which recipe is best? This problem of how to compare 'recipes' can be used to imagine the need for testing vulnerabilities in cybersecurity. In the field of cybersecurity, professionals use graphical models called attack trees to determine all the possible attacks on a particular system. These trees are basically recipes, or series of steps to gain a desired result. But they cannot be tested and compared by trial, so instead we need to use more abstract reasoning to weed outduplicates, compare prevention strategies and cost, and many other useful tasks. We are trying to translate the graphical models of attack trees into a mathematical model called POMSETs (partially-ordered multisets), in which each step in the recipe becomes a member of the POMSET. We then use several POMSET operators to build recipes with the proper ordering of steps. In doing this, we hope to be able to use these POMSET tools to better understand and compare the complex recipes that are attack trees.
    • The Uncommon Type: The Journalist Learder

      Johnson, Erin; Cheney, Will; Department of Communication; VanTuyll,Debra; Department of Communication; Augusta University (2018-02-12)
      In today's ever-changing media landscape, the definition of quality journalism can be difficult to define. In an era where audiences want news faster, the responsibility of the 21st century journalist is greater. The current news model not only requires speed, but keeps the need for pinpoint accuracy. The purpose of this research is to define what constitutes excellence injournalism. The Louis Harris Award,is given annually by the Augusta West Rotary Club, beginning in 1979. Anaward presented annually to an Augusta journalist who exhibits excellence and provides a starting point for this study. The methodology involves tracking down and interviewing past recipients who are still living. For those who passed, we will find information from survivors, obituaries, papers left behind, and any other materials we can locate. The next step is building an index of traits the recipients exhibit that made them suitable for the award. To bring it all together, discovering what traits these journalists have in common and identifying a pattern, or essentially a common denominator, and whether this pattern has changed over the past 40 years as the practice of journalism has morphed from the objective, mass-society model to more of a political, niche model.