skip to main content


Search for: All records

Creators/Authors contains: "Tu, M"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. null (Ed.)
    Humans understand videos from both the visual and audio aspects of the data. In this work, we present a self supervised cross modal representation approach for learning audio visual correspondence (AVC) for videos in the wild. After the learning stage, we explore retrieval in both cross modal and intra modal manner with the learned representations. We verify our experimental results on the VGGSound dataset and our approach achieves promising results. 
    more » « less
  2. Cybersecurity workforce development is the key to protecting information and information systems, and yet more than 30% of companies are short on security expertise. To address this need, the current authors have developed four cybersecurity education games to teach social engineering, secure online behavior, cyber defense methods, and cybersecurity first principles. These games are intended to recruit the next generation cybersecurity workforce by developing an innovative cybersecurity curriculum and pedagogical methods to provide high school students with hands-on activities in a game-based learning environment. Purdue University Northwest (PNW) offered high school summer camps for 181 high school students in June of 2016 and June of 2017. Out of 181 high school participants, 107 were underrepresented minority students, including African Americans, Hispanics, Asians, and Native Americans. To evaluate the effectiveness of the cybersecurity education games, post-camp surveys were conducted with 154 camp participants. The survey results indicated that the games were very effective in cybersecurity awareness training. Furthermore, the cybersecurity education games were more effective for male students than female students in raising student interest in computer science and cybersecurity. 
    more » « less
  3. null (Ed.)
  4. null (Ed.)
    Elementary processes associated with ionization of liquid water provide a framework for understanding radiation-matter interactions in chemistry and biology. Although numerous studies have been conducted on the dynamics of the hydrated electron, its partner arising from ionization of liquid water, H 2 O + , remains elusive. We used tunable femtosecond soft x-ray pulses from an x-ray free electron laser to reveal the dynamics of the valence hole created by strong-field ionization and to track the primary proton transfer reaction giving rise to the formation of OH. The isolated resonance associated with the valence hole (H 2 O + /OH) enabled straightforward detection. Molecular dynamics simulations revealed that the x-ray spectra are sensitive to structural dynamics at the ionization site. We found signatures of hydrated-electron dynamics in the x-ray spectrum. 
    more » « less