Experts Matter. Find Yours.

Connect for media, speaking, professional opportunities & more.

AI-powered model predicts post-concussion injury risk in college athletes

Athletes who suffer a concussion have a serious risk of reinjury after returning to play, but identifying which athletes are most vulnerable has always been a bit of a mystery, until now. Using artificial intelligence (AI), University of Delaware researchers have developed a novel machine learning model that predicts an athlete’s risk of lower-extremity musculoskeletal (MKS) injury after concussion with 95% accuracy. A recent study published in Sports Medicine details the development of the AI model, which builds on previously published research showing that the risk of post-concussion injury doubles, regardless of the sport. The most common post-concussive injuries include sprains, strains, or even broken bones or torn ACLs. “This is due to brain changes we see post-concussion,” said Thomas Buckley, professor of kinesiology and applied physiology at the College of Health Sciences. These brain changes affect athletes’ balance, cognition, and reaction times and can be difficult to detect in standard clinical testing. “Even a minuscule difference in balance, reaction time, or cognitive processing of what’s happening around you can make the difference between getting hurt and not,” Buckley said. How AI is changing injury risk assessment Recognizing the need for enhanced injury reduction risk tools, Buckley collaborated with colleagues in UD’s College of Engineering, Austin Brockmeier, assistant professor of electrical and computer engineering, and César Claros, a fourth-year doctoral student; Wei Qian, associate professor of statistics in the College of Agriculture and Natural Resources; and former KAAP postdoctoral fellow Melissa Anderson, who’s now an assistant professor at Ohio University. To assess injury risk, Brockmeier and Claros developed a comprehensive AI model that analyzes more than 100 variables, including sports and medical histories, concussion type, and pre- and post-concussion cognitive data. “Every athlete is unique, especially across various sports,” said Brockmeier. “Tracking an athlete’s performance over time, rather than relying on absolute values, helps identify disturbances, deviations, or deficits that, when compared to their baseline, may signal an increased risk of injury.” While some sports, such as football, carry higher injury risk, the model revealed that individual factors are just as important as the sport played. “We tested a version of the model that doesn’t have access to the athlete’s sport, and it still accurately predicted injury risk,” Brockmeier said. “This highlights how unique characteristics—not just the inherent risks of a sport—play a critical role in determining the likelihood of future injury,” said Brockmeier. The research, which tracked athletes over two years, also found that the risk of MSK injury post-concussion extends well into the athlete’s return to play. “Common sense would suggest that injuries would occur early in an athlete’s return to play, but that’s simply not true,” said Buckley. “Our research shows that the risk of future injury increases over time as athletes compensate and adapt to small deficits they may not even be aware of.” The next step for Buckey’s Concussion Research Lab is to further collaborate with UD Athletics’ strength and conditioning staff to design real-time interventions that could reduce injury risk. Beyond sports: AI’s potential in aging research The implications of the UD-developed machine-learning model extend far beyond sports. Brockmeier believes the algorithm could be used to predict fall risk in patients with Parkinson’s disease. Claros is also exploring how the injury risk reduction model can be applied to aging research with the Delaware Center for Cognitive Aging. “We want to use brain measurements to investigate whether baseline lifestyle measurements such as weight, BMI, and smoking history are predictive of future mild cognitive impairment or Alzheimer’s disease,” said Claros. To arrange an interview with Buckley, email UD's media relations team at MediaRelations@udel.edu

3 min. read

Protect yourself: Scammed by a QR Code? It didn’t have to happen

QR codes are used everywhere nowadays – to pay for metered parking, to read menus at restaurants, to win a free cup of coffee. Cybercriminals are using them, too – redirecting users to harmful websites that harvest their data. The practice is known as “quishing,” derived from QR code phishing, and it is a fast-growing cybercrime. But it doesn’t have to be. University of Rochester engineers Gaurav Sharma and Irving Barron have devised a new form of QR code – called a self-authenticating dual-modulated QR (SDMQR) – that protects smartphone users from quishing attacks by signaling when users are being directed to a safe link or a potential scam. Gaurav is a professor of electrical and computer engineering, computer science, and biostatistics and computational biology. Barron is an assistant professor of instruction in electrical computer engineering. Their creation involves allowing companies to register their websites and embed a cryptographic signature in a QR code. When the code is scanned, the user is notified that the code is from an official source and safe. Gaurav and Barron recently wrote about their technology in the journal IEEE Security and Privacy, and spoke about their work on the National Science Foundation's Discovery Files podcast. They can be reached by email at gaurav.sharma@rochester.edu and ibarron@ur.rochester.edu.

1 min. read

How old is your brain?

University of Delaware researchers have found that measuring brain stiffness is a reliable way to predict brain age. This information could be used to identify structural differences that indicate departure from the normal aging process, potentially identifying and addressing disorders such as Alzheimer’s disease and Parkinson’s disease. In recent findings, Curtis Johnson, associate professor of biomedical engineering, and Austin Brockmeier, assistant professor of electrical and computer engineering, show that measuring both brain stiffness and brain volume produces the most accurate predictions of chronological age. Their findings were published in a recent edition of the journal Biology Methods and Protocols. The pair worked with three current and former UD students to reach their conclusions. “Brain volume is a common measure that we use to study the brain,” Johnson said. “But something has to be happening to cause a brain to shrink. Something is happening at the microscale that causes it to shrink — changes in the tissue that also cause stiffness to change. And that precedes whatever happens when the volume changes.” “The stiffness maps all seem kind of random — until we see a large number of images and the randomness fades away and we start to see common patterns in stiffness,” Johnson said. “We sort of knew there was more [information] in there than what we were extracting." A cutting-edge magnetic resonance imaging (MRI) scanner at UD’s Center for Biomedical and Brain Imaging handled the brain scanning. On the artificial intelligence side, the brain maps were analyzed by three-dimensional “convolutional neural networks,” which — as the name suggests — are convoluted and complicated, incorporating many layers and dimensions. To arrange and interview with Johnson or Brockmeier, send an email to mediarelations@udel.edu

2 min. read

Secretary Buttigeg makes one of his final DOT stops at CMU's Safety 21

U.S. Secretary of Transportation Pete Buttigieg visited Carnegie Mellon University in one of his final stops as Transportation Secretary. Raj Rajkumar, director of Safety21 and George Westinghouse Professor in the Department of Electrical and Computer Engineering, with Ph.D. candidates Nishad Sahu and Gregory Su, demonstrated research on the safe navigation of autonomous driving systems in designated work zones, leveraging high-definition mapping, computer perception and vehicle connectivity. “The sophistication of the safety work that’s going on goes well beyond any commercially available automated or advanced driver assistance system is really inspiring,” Buttigieg said. “We’ve got to make sure it develops the right way, we’ve got to be cautious about how it’s deployed, but you can tell a lot of thought and, of course, a lot of incredibly sophisticated research is going into that.”

Raj Rajkumar
1 min. read

Villanova Professor at the Forefront of Work to Tackle Quantum Threats

Securing Our Future Against Quantum Threats Security and privacy are values that everyone cherishes. No tech user wants their personal information getting into the wrong hands, which is why we have security measures in place to protect our private data: face ID to unlock our phones, two-factor authentication to log into banking apps and fingerprint technology to securely enter any system—from a computer to your front door. Encryption codes are used on each of these platforms to encode private data and allow only authorized users to access it. These measures are put in place to protect us, but new advancements in technology could soon challenge these secure systems that we have come to know and trust. Quantum computers are extraordinary machines capable of solving problems far beyond the scope of today’s standard computers. Although these computers are not commercially available, scientists harness their power for experimentation and data storage. Quantum computers excel in scientific development, but they may also prove to be a threat to existing technology that we use in our daily lives. Experts predict that by 2035, quantum computers could crack the very encryption codes that secure everyday transactions and data. Jiafeng Xie, PhD, associate professor of Electrical and Computer Engineering at Villanova University, is at the forefront of this battle, using his Security and Cryptography Lab to strengthen security measures against the threat of quantum computers. The Rise of Post-Quantum Cryptography Since quantum computer advancements are accelerating at an unprecedented pace, post-quantum cryptography (PQC) has emerged as a critical area of research and development. Scientists who study PQC are working to come up with new algorithms to encode our sensitive data, with a goal of being installed after quantum computers crack our current encryption systems. Without these new algorithms, once quantum computers break our current codes, sensitive data—whether personal, corporate or governmental—could be left vulnerable to malicious actors. The core problem of our current encryption system lies in the foundation of public-key cryptosystems. Public-key cryptography is a method of encryption where the user logs into a system using their own private “key”, and the back end of the system has a “key” as well. A “key” is a large numerical value that scrambles data so that it appears random. When a user logs in, their “key” can decrypt private information held by the public “key” in the system to ensure a secure login. This security method is safe right now, but these systems rely on mathematical principles that, while secure against classical computing attacks, are vulnerable to the immense processing power of quantum computers. At the heart of the vulnerability is Shor's algorithm, developed by MIT computer scientist Peter Shor in 1994. As Dr. Xie explained, “Shor invented an algorithm to solve prime factors of an integer that can supposedly run on a quantum computer. This algorithm, if run on a large-scale mature quantum computer, can easily solve all these existing cryptosystems' mathematical formulation, which is a problem." The realization of this potential threat has spurred an increased focus on the development of post-quantum cryptography over the past decade. The goal is clear: "We want to have some sort of cryptosystem that is resistant to quantum computer attacks," says Dr. Xie. In 2016, the National Institute of Standards and Technology (NIST) began the process of standardizing post-quantum cryptography. In July 2022, NIST selected four algorithms to continue on to the standardization process, where they are currently being tested for safety and security against quantum computers. The standardization process for these new algorithms is intensive, and two of the candidates that were announced for testing have already been broken during the process. Scientists are in a race against time to increase the diversity of their algorithms and come up with alternate options for standardization. The urgency of this shift to post-quantum cryptography is underscored by recent government action. The White House released a national security memo in 2022 stating that the U.S. government must transition to quantum-resistant algorithms by 2035. This directive emphasizes the critical nature of post-quantum cryptography in maintaining not just personal but national security. Villanova’s Security and Cryptography Lab Once a new algorithm is selected by NIST, it will need to be embedded into various platforms that need to be secured—this is where Dr. Xie’s Security and Cryptography Lab comes in. This lab is actively conducting research into how the newly selected algorithm can be implemented in the most effective and resourceful way. The lab team is working on developing techniques for this new algorithm so that it can be embedded into many different types of platforms, including credit cards and fingerprint technology. However, there are significant challenges in this process. As Dr. Xie explains, "Different platforms have different constraints. A chip-based credit card, for example, has limited space for embedding new encryption systems. If the implementation technique is too large, it simply won’t work.” Another arising issue from this research is security. During the application of this new algorithm, there's a risk of information or security leakage, so Dr. Xie is always on the lookout for developing security issues that could cause problems down the road. The Future of Post-Quantum Cryptography The implications of PQC are widespread and extend far beyond academic research. As Dr. Xie points out, "All existing cryptosystems, as long as they have some sort of function—for example, signing in or entering a password for login—all of these systems are vulnerable to quantum attacks." This vulnerability affects everything from banking systems to small-scale security measures like fingerprint door locks. The scope of this transition is massive, requiring updates to encrypted systems across all sectors of technology. His goal is to ensure that these new cryptographic systems are flexible enough to be applied to everything from small devices like credit cards and drones to large-scale infrastructure like data centers and military equipment. Although researchers are hard at work now, the future of post-quantum cryptography is not without uncertainties. Dr. Xie raises an important question: "When quantum computers become available, will the algorithms we develop today be broken?" While the newly developed algorithms will theoretically be secure, vulnerabilities can emerge when implementing any kind of new security system. These potential vulnerabilities highlight the importance of conducting this research now so that the new algorithms can go through intensive testing prior to being implemented. Despite these challenges, Dr. Xie emphasizes the importance of being prepared for this new reality. "Society as a whole needs to be prepared with this kind of knowledge,” he says. “A new era is coming. With our current security systems, we need to have revolutionized change. On the other hand, we should not be panicked. We just need continued support to do more related research in this field.” More extensive research is required to ensure that our privacy is protected as we enter a new era of quantum computing, but labs like the Security and Cryptography Lab at Villanova are a step in the right direction. Although the “years to quantum” clock is ticking down, researchers like Dr. Xie are well on their way to ensuring that our digital infrastructure remains secure in the face of evolving technological threats.

5 min. read

How Vulnerable Are America’s Water Systems to Outside Attack? | Media Advisory

The security of America's water systems is an issue of national importance, touching on the well-being and safety of millions. This topic gains urgency as it ties into broader concerns about infrastructure vulnerability, cyber-terrorism, and the readiness of public utilities to handle emerging threats. In light of recent breaches and heightened geopolitical tensions, the resilience of these essential systems is not just a matter of public safety but also of national security. Exploring this issue offers insights into: Cybersecurity measures for water supply systems The impact of climate change on water system resilience Federal and state responses to infrastructure threats Public health implications of water system breaches The role of technology in safeguarding against attacks Connect with an Expert about the Security of America's Water Systems For journalists seeking research or insights for their coverage about the Security of America's Water Systems, here is a select list of experts from our database. To search our full list of experts, visit www.expertfile.com Seth Hamman Director, Center for the Advancement of Cybersecurity and Associate Professor of Cyber Operations and Computer Science - Cedarville University David Bader Distinguished Professor, Data Science · New Jersey Institute of Technology Vladlena Benson Professor of Cybersecurity Management · Aston University William Hatcher Chair of the Department of Social Sciences · Augusta University TJ O’Connor, LTC (Ret.) Assistant Professor, Cybersecurity Program Chair | Computer Engineering and Sciences · Florida Tech                                                                                                                                                             Photo by: Adi Goldstein

1 min. read

Georgia Southern cuts the ribbon on a new $60 million facility that will be the epicenter for engineering excellence and innovation

Last Friday, Georgia Southern officially opened its new Engineering and Research Building for students and researchers, a facility that will serve as the epicenter for engineering excellence and innovation in southeast Georgia. The building is designed to facilitate academic and institutional partnerships, inspire creative engineering and accelerate academic success for students in the College of Engineering and Computing. Through the instructional research labs and academic spaces that bridge theory and practice, students will be prepared to solve today’s challenges and to make tomorrow’s discoveries. “Today marks the culmination of years of forethought and investment from a number of state leaders, industry leaders and local advocates, who paved the way for us to be here,” said Georgia Southern President Kyle Marrero. “Leaders who, dating back to the 90s, could see the future of a growing industry, a state on the precipice of being a national leader in technology and innovation, and a critical need to develop talent in applied engineering across south Georgia.” The Engineering and Research Building’s sleek, contemporary environment defined by glass and natural light, soaring high-bay ceilings and modern, industrial feel is strengthened by new, industry-relevant equipment, instrumentation and technology that encourage active learning and sustainability. The highly efficient facility includes sustainable features that complements existing spaces on campus. The three-story building houses applied research spaces with a strong focus on manufacturing engineering, civil engineering, electrical and computer engineering, and mechanical engineering. The workspaces can be easily reconfigured for various uses, projects and applications and provide students with access to industry-grade equipment as well as expanded opportunities for undergraduate research. “The investment of the Engineering and Research Building solidifies Georgia Southern University’s commitment to students in providing a world-class education in the engineering field, while providing the space and resources necessary to facilitate such,” said student Kristifer Bell. “I am enthusiastic to continue my research work and look forward to the interdepartmental collaboration that will be encouraged through the housing of new student and faculty labs under one roof.” The full media release about this historic occasion is attached – and if you are a journalist looking to know more about this facility or Southern Georgia University -- simply reach out to Georgia Southern Director of Communications Jennifer Wise at jwise@georgiasouthern.edu to set and time and date.

2 min. read

How Blockchain Can Help Medical Facilities Control the Spread of Coronavirus

In the United States at least 12,000 people have tested positive for COVID-19, and 194 people have died as of Friday, March 20. Villanova College of Engineering professor Hasshi Sudler explains there are two critical areas where blockchain can help control the spread of coronavirus.  "As individuals travel across borders, medical facilities need immutable, trustworthy medical data quickly and electronically. A critical requirement to contain coronavirus is to track any individual having tested positive and to track the health of anyone who has come in contact with that individual, even if those encounters were across borders," says Prof. Sudler, an expert on electrical and computer engineering.  "The blockchain can be a common source of data that allows medical facilities to share immutable information internationally." Sudler cautions that, with the potential for people to provide false information about symptoms and travel history, medical facilities need a method to share trustworthy data with one another in real-time about individuals tested, their test results and test kits used (as some kits have proven faulty). Another requirement for controlling the spread of the virus is to validate quality medical advice while also identifying misinformation that could be circulating in society. "In the event of a pandemic, misinformation can be extremely dangerous. The public needs a way to confirm official statements made by reputable sources," says Prof. Sudler. While social media may be a popular source of information, it can also be a means of spreading myths, conspiracies and opinions often presented as facts.  "The blockchain can serve as a means to verify quality advice the public should follow versus false claims the public should disregard," says Prof. Sudler.

2 min. read

5G Wireless Coming in 2020

2020 is the goal for launching 5G, a collection of technologies that is expected to increase cellular technology worldwide by 1,000 times the capacity, 100 times more devices and 10 times less delay. “5G is about connecting everything everywhere, anything you can imagine,” says Mojtaba Vaezi, PhD, assistant professor of electrical and computer engineering at Villanova’s College of Engineering, whose area of expertise is wireless communication, signal processing and information and communication technology. Partly because of our changing habits there are applications that will need higher speed, and 5G will increase their capacity. “We’re consuming more and more data these days, so we need higher volume of data. The new generation watches TV online and plays games online. They want to select whatever they like and download it when they want it,” says Dr. Vaezi. “The speed of communication is going to increase about 10 to 20 times, so if it takes one minute to download a movie in your cell phone today, in a few years we’ll be able to download a movie in three to six seconds.” 4G technology has mostly been about connecting cell phones, but 5G will be about connecting all kinds of devices: Cars will be able to connect to other cars, traffic lights and cell phones; customers ordering online will be able to track their package as it travels across the ocean; trucks will connect to each other, sharing information such as if a route needs to be changed. There are many applications, from driverless cars to surgeries on a patient in one country done remotely by a doctor in another country, connecting thousands of miles away in just a fraction of seconds. There are always challenges associated with new technology, however. In particular, 5G researchers worldwide have been working for a decade to increase the capacity and number of connections foreseen for 5G networks. In 4G and previous generations, each cell phone would transmit in distance frequencies, otherwise they’d interfere with each other. In 5G and beyond, cell phones may share their frequencies with other cell phones or devices, or we wouldn’t be able to accommodate the exploding number of new devices. This will introduce inter-device interference which is a challenge. Now, we have two or four antennas packed inside the phone. Soon, mobile towers and cell phones will have tens of antennas, further increasing capacity.

2 min. read