Page 680«..1020..679680681682..690700..»

What are the ethical considerations of WhatsApp’s encryption in … – TickerTV News

What are the ethical considerations of WhatsApps encryption in criminal investigations?

In recent years, the use of encrypted messaging apps has skyrocketed, with WhatsApp being one of the most popular choices worldwide. While encryption provides users with a sense of security and privacy, it has also raised concerns among law enforcement agencies and policymakers. The debate surrounding the ethical considerations of WhatsApps encryption in criminal investigations has become increasingly complex.

What is encryption?Encryption is the process of encoding information in a way that only authorized parties can access it. In the case of messaging apps like WhatsApp, end-to-end encryption ensures that only the sender and recipient can read the messages, preventing anyone else, including the app provider, from intercepting or deciphering the content.

The benefits of encryption:Encryption plays a crucial role in protecting individuals privacy and sensitive information. It safeguards personal conversations, financial transactions, and other confidential data from unauthorized access, hacking, and surveillance. It empowers users to communicate freely without fear of their conversations being intercepted or misused.

The challenges for law enforcement:While encryption provides significant benefits, it also poses challenges for law enforcement agencies. The inability to access encrypted messages hampers criminal investigations, making it difficult to gather evidence and prevent potential threats to public safety. This has led to a growing concern that encryption may be aiding criminals in hiding their activities and planning illegal acts.

The ethical considerations:The ethical considerations of WhatsApps encryption in criminal investigations revolve around the balance between privacy and security. On one hand, individuals have the right to privacy and the expectation that their conversations will remain confidential. On the other hand, society expects law enforcement agencies to protect public safety and prevent criminal activities.

FAQ:Q: Can WhatsApp decrypt messages for law enforcement?A: No, WhatsApps end-to-end encryption ensures that only the sender and recipient can access the messages. WhatsApp does not have the ability to decrypt or provide access to the content.

Q: Should encryption be weakened for law enforcement purposes?A: This is a highly debated topic. Weakening encryption for law enforcement purposes could potentially compromise the privacy and security of millions of users. It is essential to find a balance that respects both privacy and public safety.

Q: Are there alternative solutions?A: Some argue that alternative solutions, such as improved collaboration between tech companies and law enforcement agencies, could help address the challenges posed encryption. However, finding a solution that satisfies all parties involved remains a complex task.

In conclusion, the ethical considerations surrounding WhatsApps encryption in criminal investigations highlight the delicate balance between privacy and security. While encryption provides individuals with essential privacy protections, it also presents challenges for law enforcement agencies. Striking the right balance between these competing interests is crucial to ensure both privacy and public safety are upheld in the digital age.

Excerpt from:
What are the ethical considerations of WhatsApp's encryption in ... - TickerTV News

Read More..

Ph.D. Student Realized His Zeal for Mechanical Engineering as … – University of Toledo

The University of Toledo has been part of Pete Roccos life for quite a while.

Now a Ph.D. candidate in mechanical engineering, Pete Rocco began his Rocket journey as a student at Toledo Early College High School and then went on to earn his bachelors degree in bioengineering.

A first-generation college student, Rocco initially planned to pursue a career as a medical doctor. Then he discovered engineering, specifically mechanical engineering.

Pete Rocco spent spring semester at NASA Glenn Research Center as a safety mission and assurance intern.

Toward the last part of my bachelors degree, I realized my true passion was geared more toward mechanical engineering fatigue of materials, shape memory alloys to be specific after doing a co-op under my advisor, Dr. Mohammad Elahinia, Rocco said. I decided to stay on for my masters degree and focus on mechanical engineering.

My passion for fatigue of materials comes from the real-life fatigue failures that have happened aerospace, airplanes, buildings, bridges and other mechanical components that have failed and have caused tragic situations, including the loss of human life, he added. If we can understand the fatigue of materials and the mechanisms that lead to eventual failure, we can then create better materials for the future in real-world applications, in the best effort to prevent or correct serious failures from occurring.

Rocco spent the spring semester at NASA Glenn Research Center as a safety mission and assurance intern.

This NASA experience is thanks to the invaluable training I received at UT in the Department of Mechanical Engineering, he said. The academic and research programs at The University of Toledo are top-notch and truly set up students for a bright future. Without the guidance I received in academia and research at UT, my achievements would not be possible.

Rocco is scheduled to graduate with his Ph.D. in spring 2025.

Scheduled to graduate with his Ph.D. in spring 2025, Rocco said his career plans are flexible.

He may seek out an industrial research-based position, but he is also open to post-doctoral positions or teaching positions.

UToledo, including the College of Engineering, truly prepares students for success in the world, he said. The lessons you learn and the guidance you receive from your mentors are paramount, and UToledo and the College of Engineering are among the best regarding this.

Elahinia, Distinguished University Professor and chair of the Mechanical, Industrial and Manufacturing Engineering Department, has been Roccos mentor.

I admire Pete for his kind heart, dedication and eagerness to learn and collaborate, he said. He is always ready to take on a new challenge. He is equally ready to cooperate with others and to mentor. He has been a very successful instructor for both the Mechanical Engineering as well as Engineering Technology Department.

As an example of his passion for community engagement and mentoring, Pete recently participated in Manufacturing Day at the Toledo Technology Academy of Engineering, where he advised students on the possibilities and benefits of studying engineering at UToledo.

As a longtime Rocket, Rocco offered this advice for students who are thinking about their own journey in UToledos College of Engineering: Engineering is such a broad field that the options and possibilities are truly endless he said. One must identify what they are passionate about, and then go for it. The best part is that at The University of Toledo College of Engineering, this is truly possible.

Go here to see the original:

Ph.D. Student Realized His Zeal for Mechanical Engineering as ... - University of Toledo

Read More..

Fruit flies could hold the key to building resiliency in autonomous … – University of Nevada, Reno

Mechanical Engineering Assistant Professor Floris van Breugel has been awarded a $2 million National Science Foundation (NSF) grant to adapt autonomous robots to be as resilient as fruit flies.

Resiliency in autonomous robotic systems is crucial, especially for robotics systems that are used in disaster response and surveillance, such as drones monitoring wildfires. Unfortunately, modern robots have difficulty responding to new environments or damage to their bodies that might occur during disaster response, van Breugel wrote in his grant application. In contrast, living systems are remarkably adept at quickly adjusting their behavior to new situations thanks to redundancy and flexibility within their sensory and muscle control systems.

Scientific discoveries in fruit flies have helped shed light on how these insects achieve resiliency in flight, according to van Breugel. His project will translate that emerging knowledge on insect neuroscience to develop more resilient robotic systems.

This is a highly competitive award on a topic with tremendous potential impact, which also speaks of the research excellence of the investigator and Mechanical Engineering at UNR, Petros Voulgaris, Mechanical Engineering department chair, said.

This research aligns with the College of Engineerings Unmanned Vehicles research pillar.

The intersection of engineering and flies long has been an interest to van Breugel.

As an undergrad I did research where my main project was designing a flying, hovering thing that was vaguely inspired by birds or insects, he said. Throughout that project, I realized that the hard part, which was more interesting to me, is once you have this mechanical thing that can fly, how do you control it? How do you make it go where you want it to go? If it gets broken, how do you adapt to that?

Van Breugel says he is examining the way animals can repurpose or reprogram their sensorimotor systems on the fly to quickly compensate for internal damage or external perturbations.

Working with van Breugel on the grant are experts in insect neuroscience, including Michael Dickinson, professor of bioengineering and aeronautics at the California Institute of Technology (and van Breugels Ph.D. advisor) as well as Yvette Fisher, assistant professor of neurobiology at U.C. Berkeley. Both have pioneered aspects of brain imaging in flies in regards to the discoveries and technology in the field that van Breugel is utilizing in this research project. Also on the project: Bing Bruton, associate professor of biology at the University of Washington, who brings her expertise in computational neuroscience.

The importance of flies in the realm of both engineering and neuroscience stems from the combination of their sophisticated behavior together with brains that are numerically simple enough that they can be studied in detail. This goldilocks combination, van Bruegel said, makes it feasible to distill properties of their neural processing into fundamental engineering principles that can be applied to robotics systems.

As part of the grant, research experiences will be offered to middle school, high school and undergraduate students to participate in both neuroscience and robotics research. Van Breugel and his team also will develop open-source content to help bring neuroscience fluency to engineering students. This aligns with the College of Engineerings Student Engagement operational pillar.

Go here to read the rest:

Fruit flies could hold the key to building resiliency in autonomous ... - University of Nevada, Reno

Read More..

Zero hour for Zero Trust: How data tagging can speed implementation – C4ISRNET

Its zero hour for zero trust.

While the concept has been around for years, the clock is now ticking for the federal government to implement it. Championed as a solution for securely delivering mission-critical data at the speed of battle, a Biden administration memorandum requires federal agencies to achieve specific zero trust security goals by the end of Fiscal Year 2024. Further, the Department of Defense is working toward implementing its zero trust cybersecurity framework by FY 2027.

The good news? In the face of escalating cyber threats, data shows 72% of government agencies are already deploying zero trust security initiatives. Yet theres a remaining roadblock on the horizon that could pose dire national security implications: data tagging standardization.

Data lives in various formats, including structured, unstructured, and differing file types and classification levels. Currently, agencies take their own unique approaches to the data discovery process, building a pipeline to classify and determine tags the metadata tags assigned to data for organizational and access purposes. Many still rely on manual tagging which is cumbersome, while others are moving toward leveraging AI and ML software that allow for adaptive data tagging.

While there has been some movement toward a standard enterprise data header tagging method among members of the intelligence community, the complexity of differing data type collection paired with siloed processes continues to result in an inefficient and insecure mode of data sharing. Across agencies, sensitivity tags appear in different fields and formats, making them difficult to classify and creating challenges when enforcing policy between agencies. The fact that there is no consistent approach to tagging and classifying data especially sensitive data is a significant obstacle to zero trust models.

For example, this lack of standardization makes it challenging for the DOD to address data rights management around mission partner interactions with other Five Eyes nations. Establishing set marking methods around sensitivity tags at a minimum so agencies know where to look, and then how to proceed would reduce risk and advance data-centric decision making.

Data is the foundation of U.S. intelligence. Amid ever-increasing numbers of communication channels, devices, and open-source intelligence, the data deluge presents common opportunities and risks across the federal government. Among those risks is the notion that data is a valuable resource for nation-state threat actors who are seeking to steal or disrupt access to the data.

In the face of evolving cyber threats, the legacy, siloed approach to data tagging can be problematic. If the public sector had more consistent tagging of sensitive information, then automated encryption mechanisms could be deployed to reduce risk. The outcome would be a reliable and risk-based encryption approach that would target encryption for most sensitive data, not all data, in the enterprise.

Defense agencies must work together to develop a unified standard of data tagging that ensures data access to those that need it while protecting against those that dont. A data-centric security approach is critical to accelerate mission outcomes, and a whole-of-government approach to data tagging formats and meta-data standardization must be seen as an essential next step in the federal governments zero trust journey.

Suggestions for eliminating this roadblock and embracing a zero trust mindset include:

Learn from pilot programs. The Office of the Director of National Intelligence (ODNI), Cybersecurity and Infrastructure Security Agency (CISA), and DOD are already pursuing improvements to data tagging like establishing clear marking requirements to make it easier to train AI/ML algorithms. We can benefit from those already investing in this work and apply those learnings to other agencies.

Implement working sessions. To ensure a unified approach, CISA and the DOD Chief Information Officer should help broker a conversation across all federal agencies, DOD components, and the Intelligence Community by working with each agency and components chief data officer. For zero trust to be effective, we must initiate all-government working sessions on this topic.

Prioritize what should be standardized. Its not about boiling the ocean, as agencies will continue to have mission-specific data so prioritizing a unified approach to headers and sensitivity tagging is a great place to start. The main concern should be focusing on format standardization with the ability to customize tags based on unique mission and agency requirements.

Leverage tech for good. AI/ML tools can help eliminate human error by catching misclassifications or suggesting a change to a sensitivity level or tag based on what AI has analyzed within the document. But these tools are only as powerful as the data tags they can decipher. Therefore, this all-government approach must also apply to standardizing how these tools read and act on data tagging. Once that is established, it is this technology that will accelerate progress toward the nations zero trust implementation goals.

Existing network, data, and communication standards such as TCP/IP, XML, 802.11, and ODNIs Trusted Data Format demonstrate there is a precedent for setting unified standards. By establishing such standards for data tagging, the federal government can take a significant step toward achieving its zero trust goals.

Now is the time to act.

Ryan Zacha is a Principal Solutions Architect and Michael Lundberg is a Vice President at Booz Allen Hamilton focusing on defensive cyber solutions and zero trust architecture.

Read more from the original source:
Zero hour for Zero Trust: How data tagging can speed implementation - C4ISRNET

Read More..

What are the implications of Telegram’s move towards encrypted … – TickerTV News

What are the implications of Telegrams move towards encrypted voice calls?

Telegram, the popular messaging app known for its strong focus on privacy and security, recently announced its plans to introduce end-to-end encrypted voice calls. This move has significant implications for both Telegram users and the broader landscape of secure communication platforms.

What is end-to-end encryption?End-to-end encryption is a security measure that ensures only the sender and recipient can access the content of a message. It prevents any intermediaries, including service providers or hackers, from intercepting or deciphering the communication.

Why is Telegrams move significant?Telegrams decision to implement end-to-end encryption for voice calls is significant because it enhances the overall privacy and security of its users. Voice calls have traditionally been more vulnerable to interception, making this move a crucial step towards protecting sensitive conversations.

What are the benefits for Telegram users?The introduction of encrypted voice calls on Telegram provides users with an additional layer of security. It means that conversations will be protected from unauthorized access, ensuring that private discussions remain private. This feature will be particularly valuable for individuals and organizations that handle sensitive information or have a need for secure communication.

What are the broader implications?Telegrams move towards encrypted voice calls sets a precedent for other messaging platforms to prioritize user privacy. As more users become aware of the importance of secure communication, the demand for encrypted services is likely to increase. This could lead to a shift in the industry, with other platforms following suit and implementing similar security measures.

ConclusionTelegrams decision to introduce end-to-end encrypted voice calls is a significant development in the realm of secure communication. By prioritizing user privacy, Telegram is setting a standard for other platforms to follow. This move not only benefits Telegram users providing them with enhanced security, but it also highlights the growing demand for encrypted services in todays digital landscape. As technology continues to evolve, it is crucial for communication platforms to adapt and prioritize the protection of user data.

See more here:
What are the implications of Telegram's move towards encrypted ... - TickerTV News

Read More..

UCLA Engineers Find AI-Based Solution to Communicate … – UCLA Samueli School of Engineering Newsroom

Traditional wireless communications have relied on long-wave electromagnetic microwave and radio frequencies, but the growing need for faster data transfer rates has presented performance challenges. Shorter wavelengths, such as the ultraviolet and infrared, provide much wider bandwidths than radio waves or microwaves, but they still require a clear line of sight to transmit information and fail to perform when nontransparent obstruction blocks the light path.

A UCLA research team led by Aydogan Ozcan, the Volgenau Chair for Engineering Innovation and an electrical and computer engineering professor at the UCLA Samueli School of Engineering, has developed a new process to address this problem. The researchers leverage artificial intelligence (AI) to encode messages that can be received by a material-based optical decoder without needing a line of sight, opening new frontiers for non-line-of-sight (NLOS) imaging and communication.

Published in Nature Communications, the UCLA study details a new framework combining active AI-based encoding and passive optical decoding that can mitigate signal degradation caused by opaque obstacles in the transmission path. The encoder makes use of a neural network that allows it to bypass obstacles when transmitting data to a paired material-based decoder. Meanwhile, the decoder material makes use of optical-diffractive decoding a process in which the received signal passes through a smart material composed of a series of spatially engineered surfaces that passively decode and assemble the information carried in the signal as it passes through at the speed of light.

By integrating AI into a combined encoding and decoding apparatus, we can expand our capacity for information transfer at optimal speed even when undesired opaque structures obstruct the direct communication channel between the transmitter and the receiver, said Aydogan Ozcan.

The wavelengths we rely on today can only accommodate so much speed and data throughput, Ozcan said. By integrating AI into a combined encoding and decoding apparatus, we can expand our capacity for information transfer at optimal speed even when undesired opaque structures obstruct the direct communication channel between the transmitter and the receiver.

Using a 3D-printed diffractive decoder that operates at the terahertz spectrum, the UCLA team demonstrated that its combination of electronic encoding and all-optical decoding method is capable of direct optical communication between the transmitter and the receiver even when the opaque hindrance blocks the transmitters field-of-view entirely. Prior NLOS systems were vulnerable to turbulence, causing data transfer to work slowly and consume significant energy. The new scheme can be configured to be misalignment-resilient and highly power-efficient, reaching diffraction efficiencies of greater than 50% at its output. Moreover, the encoder-decoder framework can be jointly trained to accommodate changes in the size and shape of the obstacles without requiring modifications to the structures of either the encoder or decoder.

The process can be scaled for operation in different wavelengths and has the capacity for high-rate data transfer in a wide range of applications, including detecting items hidden inside walls or between metal plates.

Funded by the U.S. Department of Energys Office of Basic Energy Sciences and The Institution of Engineering and Technology, the study was conducted in collaboration with Mona Jarrahi, a professor of electrical and computer engineer and holder of UCLAs Northrop Grumman Endowed Chair in Electrical and Computer Engineering. Both Jarrahi and Ozcan are members of the California NanoSystems Institute at UCLA, where Ozcan is the associate director of entrepreneurship, industry and academic exchange. Ozcan also holds faculty appointments in the Department of Bioengineering and the David Geffen School of Medicine at UCLA.

Other authors of the paper are UCLA Samueli graduate students Md Sadman Sakib Rahman, Tianyi Gan, Emir Arda Deger and aatay Il, as well as undergraduate student Emir Arda Deger all members of Ozcans and Jarrahis research labs at UCLA.

Excerpt from:

UCLA Engineers Find AI-Based Solution to Communicate ... - UCLA Samueli School of Engineering Newsroom

Read More..

Rice VP for research addresses energy demand at international … – Rice News

Rice Universitys Executive Vice President for Research Ramamoorthy Ramesh recently presented the Robert Henry Thurston Lecture, Energy: The True Final Frontier, at the International Mechanical Engineering Congress and Exposition in New Orleans.

The Robert Henry Thurston Lecture, established in 1925 in honor of the American Society of Mechanical Engineers first president, provides an opportunity for a leader in pure and/or applied science or engineering to present a lecture on a subject of broad interest to engineers.

Ramesh used energy as an example of where scientists and engineers need to rise up to meet the challenges facing this generation, with energy and water usage being the most pressing. He began with global energy economics and ended with what fundamental materials physics can do to help solve the key problems in energy-efficient electronics.

Ramesh served as the founding director of the Department of Energy SunShot Initiative, which was designed to lower the cost of solar energy and make it more competitive with other forms of energy without using government subsidies. More recently, he helped shape the departments Earthshots Initiative aimed at solving the biggest problems in energy and climate change.

Here is the original post:

Rice VP for research addresses energy demand at international ... - Rice News

Read More..

Dam good engineering! Beaver dams the blueprint for conservation – Susquehanna University

November 07, 2023

Matt Wilson, director of Susquehanna's Center for Environmental Education and Research and Freshwater Research Institute, constructing a beaver dam.Susquehanna University is looking to the animal kingdom for innovative solutions to stream management beaver dams.

Matt Wilson, director of Susquehannas Center for Environmental Education and Research and Freshwater Research Institute, conceived the project, which is the first of its kind in Pennsylvania.

Weve got a lot of stormwater runoff that comes in at the edge of Susquehannas property upstream, and we wanted to better capture that, Wilson said. These dams will slow flow down, and because theyre made of sticks and stones, they will let water pass through the middle during a big storm.

Students, faculty and staff from various local and statewide partners built and installed eight, three-foot dams in a stream that runs between the Freshwater Research Institute and Susquehannas solar array. Volunteers collected natural materials, including sticks, small trees and invasive plants such as Bradford pear and honeysuckle, that were woven between wooden stakes to construct the dams.

We get to be involved with something that directly benefits our ecosystem that were living in here at Susquehanna, said Bryanna Schienholz 25, an earth & environmental sciences and German studies double major from Nazareth, Pennsylvania, who also has a minor in sustainability management.

Known as beaver dam analogs, the manmade beaver dams are used to slow water flow and trap sediment. The hope is that the dams will help to prevent erosion and the flow of sediment downstream to the Susquehanna River and ultimately the Chesapeake Bay. A stabilized streambank, Wilson said, should also improve groundwater infiltration and lead the once perennial stream to flow year-round again.

The project is the first of its kind to be permitted by the state Department of Environmental Protection. If successful, Wilson hopes the dams will become approved restoration structures across the state, opening the door for other conservationists to employ the methods being piloted at Susquehanna.

Deanna Phillips 23, who interned with DEP this past summer in the permitting department, remarked, Actually seeing a permit come to life at my own school is really cool. Phillips is an earth & environmental sciences major from East Earl, Pennsylvania, who also minors in environmental studies and the Honors Program.

Partners on site for the work were the Chesapeake Conservancy, the Merrill W. Linn Land & Waterways Conservancy, the state Department of Environmental Protection and Fish and Boat Commission, and nearby conservation districts.

Visit link:

Dam good engineering! Beaver dams the blueprint for conservation - Susquehanna University

Read More..

PS5 slim teardown shows the clever engineering of its detachable … – The Verge

The new PlayStation 5 hasnt come out yet it doesnt even have a specific release date but a few YouTubers have gotten their hands on it, including Dave Lee from the Dave2D channel. Lee posted his teardown of the console yesterday, and if youve been curious about how that detachable disc drive works, this is the best look youll get at it without buying the $499.99 PS5 yourself later this month.

After Lee pries off the PS5s plastic side cover, you can see the drive sitting there with three screws staring back at you. I thought they were pentalobe screws at first, but a later zoomed-in shot shows theyre just standard crosshead screws. Phillips head, if you like. Okay, no surprises there. Good.

It cant be that easy. But it is! Clip: Dave2D / GIF: The Verge

But then it just pops right out. The screws were a red herring! Such sleek modularity!

The PS5 disc drive connector. Screenshot: The Verge

When Lee pulls the drive aside, it reveals a port framed within an oblong hexagon where the drives connecter settles. This is what I loved about so much of the design of machines like the Power Mac G5. You see the part, you grab it, and you take it out theres no hard, angular plastic connector to stab your sweaty fingers as you wriggle it free. Very tasteful.

The drive aside, the new PS5 is a nice-looking system if youre into the pointy Dracula collar look of the first one. And when Lee puts it next to the original, the size disparity is more drastic than past comparisons have made it seem, even if theyre really not that differently sized; its still larger than the Xbox Series X, after all. Lee says it feels significantly lighter, too great for when you take your PS5 out for its afternoon walk (or over to your friends house).

Heres the full video, if youd like to check out the rest of the teardown.

Continued here:

PS5 slim teardown shows the clever engineering of its detachable ... - The Verge

Read More..

Engineering student selected as ‘future leader’ by national building … – Pennsylvania State University

UNIVERSITY PARK, Pa. Zahra Ghorbani, a doctoral candidate in architectural engineering at Penn State, was selected to receive the 2023 Future Leaders Award from the National Institute of Building Sciences (NIBS).

The award recognizes an individual under the age of 35 whose innovative talent is driving the architecture, engineering, construction and operations industry into the future, according to NIBS. Ghorbani accepted the award in September at the NIBS Building Innovation Conference.

Ghorbani was recognized for her contributions to national building information management (BIM) and digital twin standards and real-world implementation. Supported by various tools and software, BIM and digital twins in the building industry comprise the digital representation of buildings and infrastructure used by engineers and construction experts to efficiently manage their physical and functional characteristics.

Zahra has been a strong advocate for digital transformation by leveraging digital information throughout the entire building lifecycle, especially focused on the operation phases of a facility, said John Messner, the Charles and Elinor Matts Professor of Architectural Engineering, who nominated Ghorbani for the award. She has performed an extensive review of background information on digital twins from across multiple industries and compiled a unique approach to defining and categorizing digital twin uses in the operations phase. I am excited to see how her work progresses, and Im confident that her foundational research will lead to a lasting impact in the development and adoption of digital twins in operations.

In addition to studying as a doctoral student, Ghorbani is the BIM manager for Penn States Office of the Physical Plant, where she oversees and administers the BIM requirements for construction projects on all Penn State campuses.

Ghorbani serves as the BIM execution planning workgroup secretary and a project committee member for the National BIM Standard-United States, where she develops and reviews standards content and performs test implementations of the workgroup products. She also serves as a vice chair of the digital twin integration subcommittee of the NIBS BIM Council, where she leads the effort to establish the relationship between BIM and digital twins. She is a member of the visualization and information modeling committee and data sensing and analysis committee for the computing division at the American Society of Civil Engineers. Previously, she served on the Asset Management for Hospitals workgroup for the Open BIM and FM project at buildingSMART International.

Ghorbani received a bachelor's degree in architectural engineering from Shahid Beheshti University, Iran, and a masters degree in construction management from Texas A&M University. She came to Penn State in 2020 and joined the Computer Integrated Construction research group, under the direction and supervision of Messner.

Originally posted here:

Engineering student selected as 'future leader' by national building ... - Pennsylvania State University

Read More..