Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

MS Powerpoint

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 142

Full-Text Articles in Entire DC Network

The Classification Of Internet Memes Through Supervised And Unsupervised Machine Learning Algorithms, William H. Little May 2024

The Classification Of Internet Memes Through Supervised And Unsupervised Machine Learning Algorithms, William H. Little

Symposium of Student Scholars

Memes, those captivating internet phenomena, effortlessly deliver online entertainment. By leveraging time-series data from Google Trends, we can vividly illustrate and dissect the dynamic trends in meme popularity. Previous studies have discerned four distinct post-peak popularity patterns— "smoothly decaying," "spikey decaying," "leveling off," and "long-term growth"—and elegantly modeled these using ordinary differential equations.

This research introduces a programmatic approach that harnesses both supervised and unsupervised machine learning algorithms. The dataset, now expanded to over 2000 elements, becomes the canvas for exploration. The K-means algorithm identifies clusters, which then serve as labels for the supervised SVC algorithm. The overarching goal is …


Exploring Neural Networks For Breast Cancer Tissue Classification, Stephen Jacobs, Md Abdullah Al Hafiz Khan May 2024

Exploring Neural Networks For Breast Cancer Tissue Classification, Stephen Jacobs, Md Abdullah Al Hafiz Khan

Symposium of Student Scholars

Last year, more than 240 thousand women in the United States were diagnosed with breast cancer. These patients are benefitting from decades of data that have been collected by cancer research institutions around the world. Tissue samples are analyzed and cataloged by these institutions, and several facilities like the University of Wisconsin are sharing this historical data to promote the advancement of new cancer treatments. Deep learning and neural network models are being built for this data to help doctors diagnose faster and design treatment options for patients by comparing their tissue samples with these historical datasets. We will use …


Requiring Students To Integrate Chatgptinto Course Assignments, Mark Small, Venera Balidemaj Jan 2024

Requiring Students To Integrate Chatgptinto Course Assignments, Mark Small, Venera Balidemaj

Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI

No abstract provided.


Toxic Comment Classification Project, Brandon Solon Nov 2023

Toxic Comment Classification Project, Brandon Solon

Symposium of Student Scholars

The digital landscape has blossomed thanks to the surge of online platforms, boosting the variety and volume of user-created content. But it's not without its shadows; cyberbullying and hate speech have also proliferated, making web spaces less safe. At our project centerstage, we work on creating a machine learning model skilled at spotting toxic comments with precision - this way contributing towards an internet society free from fear or discomfort. We put well-documented datasets to good use along with careful preprocessing maneuvers while trialing diverse machina-learning protocols as part of constructing solid classification architecture for usages beyond current limitations within …


Artificial Intelligence History, And Libraries: History And Legacy Of Library Contributions To Machine Learning, Wilhelmina Randtke Oct 2023

Artificial Intelligence History, And Libraries: History And Legacy Of Library Contributions To Machine Learning, Wilhelmina Randtke

Library Faculty Presentations

Machine learning seems to be newly everywhere. It's not new, so much as faster processing makes it newly useful. Imagine an automated cataloging program that takes 300 years to run, versus one that takes a week to run. Increased processing speed is a substantive change. This presentation overviews the history of libraries and artificial intelligence. First, teasing out past applications of machine learning in libraries. High quality results and concrete applications of artificial intelligence in libraries have been explored and published for decades. Over time, faster processing allows use at scale. Second, how library and metadata work contributes to machine …


Sentiment Analysis Before And During The Covid-19 Pandemic, Emily Musgrove Jul 2023

Sentiment Analysis Before And During The Covid-19 Pandemic, Emily Musgrove

Mathematics Summer Fellows

This study examines the change in connotative language use before and during the Covid-19 pandemic. By analyzing news articles from several major US newspapers, we found that there is a statistically significant correlation between the sentiment of the text and the publication period. Specifically, we document a large, systematic, and statistically significant decline in the overall sentiment of articles published in major news outlets. While our results do not directly gauge the sentiment of the population, our findings have important implications regarding the social responsibility of journalists and media outlets especially in times of crisis.


Blind Fighter – A Video Game For The Visually Impaired, Avery Wayne Harrah Apr 2023

Blind Fighter – A Video Game For The Visually Impaired, Avery Wayne Harrah

ATU Research Symposium

Blind Fighter is a video game made to be playable by anyone, regardless of any visual impairments the player may have. The game relies on auditory queues to allow players to understand what is happening in the game without ever having to see the screen. The project’s goal is to serve as a proof of concept that video games can be made inclusive with a few additions during development, without sacrificing overall quality. To do this, the game features full graphics in addition to testing many strategies for visually impaired players, including direction-based audio, unique sound effects for each game …


Crime Prediction Using Machine Learning: The Case Of The City Of Little Rock, Zurab Sabakhtarishvili, Sijan Panday, Clayton Jensen Apr 2023

Crime Prediction Using Machine Learning: The Case Of The City Of Little Rock, Zurab Sabakhtarishvili, Sijan Panday, Clayton Jensen

ATU Research Symposium

Crime is a severe problem in the city of Little Rock, Arkansas. In this study, we aim to develop a machine-learning model to predict criminal activities in the city and provide insights into crime patterns. We will analyze publicly available crime datasets from Little Rock Police Department from January 2017 to March 2023 to identify trends and patterns in crime occurrence. We used data cleaning and exploratory data analysis techniques, such as figured-based visualizations, to prepare the data for machine learning. We will employ the Neural Prophet, a time-series machine learning model, to predict daily crime counts. The model will …


Reworking Of The Arkansas Tech Human Resources Employee Records Software, Dalton J. George, Brayan Bonilla-Chavez, John Modica, Angelina Das Apr 2023

Reworking Of The Arkansas Tech Human Resources Employee Records Software, Dalton J. George, Brayan Bonilla-Chavez, John Modica, Angelina Das

ATU Research Symposium

Evisions Argos is a real-time reporting tool used by Arkansas Tech in many record-keeping departments. Reworking HR's software using this tool, security and database access concerns were negated, as Argos is already connected to the University's backend. Using Argos, we have made ATU HR's employee records software more user friendly and built a system that can be pushed to production for use by the university. As a secondary portion to this final project, we developed a proof-of-concept web application using the MEAN (Mongo, Express, Angular, Node) stack. This gave us the opportunity to produce a full-stack application from scratch as …


The Ozark Getaway, Houston Barber, Marcus Gasca, Evan Reece Matlock, Avery Wayne Harrah Apr 2023

The Ozark Getaway, Houston Barber, Marcus Gasca, Evan Reece Matlock, Avery Wayne Harrah

ATU Research Symposium

Website designed for usage of renting AirBnb houses outside of the original website under the specific owner.


Arkavalley Liquor: Simplifying Restaurant Alcohol Orders, Isaiah A. Kitts, Dayton Drilling, Bradlee Treece, Cameron Lumpkin Apr 2023

Arkavalley Liquor: Simplifying Restaurant Alcohol Orders, Isaiah A. Kitts, Dayton Drilling, Bradlee Treece, Cameron Lumpkin

ATU Research Symposium

The ArkaValley Liquor system is a web-based ordering platform designed to simplify the process of ordering alcohol for local restaurants. Currently, restaurants place orders by emailing the store, which makes it difficult to maintain a paper trail and track order details. With the ArkaValley Liquor system, the ordering process is automated, and all order details are saved in one central location. Each restaurant will have a login, ensuring only authorized individuals can place orders. The system will also provide a record of each restaurant's most recent order, making it easy to reorder if necessary. By using the ArkaValley Liquor system, …


Premium Wireless, Dakota Burkhart, Andrew Clark, Garrett Kenney, Brandon Monroe Apr 2023

Premium Wireless, Dakota Burkhart, Andrew Clark, Garrett Kenney, Brandon Monroe

ATU Research Symposium

Our work implements an inventory system and appointment system for the Premium Wireless phone company. It includes separate views for employees to manage inventory and view appointments for the day and the near future and allows customers to view all current inventory and set an appointment.


Nviz: Unraveling Neural Networks Through Visualization, Kevin Hoffman Apr 2023

Nviz: Unraveling Neural Networks Through Visualization, Kevin Hoffman

Mathematics and Computer Science Presentations

The growing utility of artificial intelligence (AI) is attributed to the development of neural networks. These networks are a class of models that make predictions based on previously observed data. While the inferential power of neural networks is great, the ability to explain their results is difficult because the underlying model is automatically generated. The AI community commonly refers to neural networks as black boxes because the patterns they learn from the data are not easily understood. This project aims to improve the visibility of patterns that neural networks identify in data. Through an interactive web application, NVIZ affords the …


R Text Analysis For Adam Smith Cie Selected Works, Charlotte Grahame Apr 2023

R Text Analysis For Adam Smith Cie Selected Works, Charlotte Grahame

Mathematics and Computer Science Presentations

Text mining and text analysis is a way of understanding text documents using r coding that is more frequently used for numbered data. It helps with understanding portions of the text and drawing conclusions from there. This research looks specifically at the Adam Smith required documents that are used in the CIE course designated for freshmen. It looks at sentiments of the documents, including word sentiment, sentence sentiment, page and overall document sentiment as well. It provides visuals of word clouds to portray word frequency, tf-idf (which is explained in the presentation) and bigram analysis.


Cie Text Analysis: Narrative Of The Life Of Frederick Douglass, The Declaration Of Independence, And The Declaration Of Sentiments, Arianna Knipe Apr 2023

Cie Text Analysis: Narrative Of The Life Of Frederick Douglass, The Declaration Of Independence, And The Declaration Of Sentiments, Arianna Knipe

Mathematics and Computer Science Presentations

Our STAT-451 class has worked with analyzing the words from CIE texts and assigning them to a sentiment or feeling and comparing them with one another using RStudio. This project analyzes texts from three sources: The Narrative of the Life of Frederick Douglass, The Declaration of Independence and the Declaration of Sentiments.


Generation Z Cybersecurity Learners: The Identification Of Cybersecurity Instructor Strategies And Attributes That Maximize Student Engagement, Jeffrey Rice Apr 2023

Generation Z Cybersecurity Learners: The Identification Of Cybersecurity Instructor Strategies And Attributes That Maximize Student Engagement, Jeffrey Rice

Scholar Week 2016 - present

There exists a significant shortage of cybersecurity specialists in the workforce. Universities should endeavor to keep cybersecurity students engaged if they desire to be competitive and contribute graduates to the remediation efforts of this cybersecurity deficit. Instructors significantly contribute to student engagement and there is a correlation between student engagement and student retention. The purpose of this regional qualitative exploratory study was to identify attributes that Generation Z collegiate cybersecurity learners felt kept them engaged in their cybersecurity courses. The sample comprised 10 individuals identified as GenZ and used purposeful and snowball sampling to select participants. A semi-structured interview strategy …


Temporal Tensor Factorization For Multidimensional Forecasting, Jackson Cates, Karissa Scipke, Randy Hoover, Kyle Caudle Feb 2023

Temporal Tensor Factorization For Multidimensional Forecasting, Jackson Cates, Karissa Scipke, Randy Hoover, Kyle Caudle

SDSU Data Science Symposium

In the era of big data, there is a need for forecasting high-dimensional time series that might be incomplete, sparse, and/or nonstationary. The current research aims to solve this problem for two-dimensional data through a combination of temporal matrix factorization (TMF) and low-rank tensor factorization. From this method, we propose an expansion of TMF to two-dimensional data: temporal tensor factorization (TTF). The current research aims to interpolate missing values via low-rank tensor factorization, which produces a latent space of the original multilinear time series. We then can perform forecasting in the latent space. We present experimental results of the proposed …


From Computer Curriculum That Works For The Use Of Computer Intellignece Computer Science, Malachi B. Bacchus Dec 2022

From Computer Curriculum That Works For The Use Of Computer Intellignece Computer Science, Malachi B. Bacchus

Publications and Research

Computer interconnection can link different networks by using electrical artificial flow ways that can travel through different connections. these are called data network which travels through different sectors of the network simulation of service computer network using artificial intelligence to enhanced further understanding the computations, I've also demonstrated knowing by using the network to get better understanding of how ethical computing can be learned through universities and collegiate that can help established knowledge and healthy computer information. The main tools for the research are using data networking, ethical learning and translation towards different computer systems.


Simulating Salience: Developing A Model Of Choice In The Visual Coordination Game, Adib Sedig Aug 2022

Simulating Salience: Developing A Model Of Choice In The Visual Coordination Game, Adib Sedig

Undergraduate Student Research Internships Conference

This project is primarily inspired by three papers: Colin Camerer and Xiaomin Li’s (2019 working paper)—Using Visual Salience in Empirical Game Theory, Ryan Oprea’s (2020)—What Makes a Rule Complex?, and Caplin et. al.’s (2011)—Search and Satisficing. Over the summer, I worked towards constructing a model of choice for the visual coordination game that can model player behavior more accurately than traditional game theoretic predictions. It attempts to do so by incorporating a degree of bias towards salience into a cellular automaton search algorithm and utilizing it alongside a sequential search mechanism of satisficing. This …


Code Cyber: A Curated Collection Of Cybersecurity Career Learning And Preparation Resources, Kazi Tasin, Ethan Pruzhansky, Jason Lin, Tanvir Rahman, Patrick J. Slattery Jul 2022

Code Cyber: A Curated Collection Of Cybersecurity Career Learning And Preparation Resources, Kazi Tasin, Ethan Pruzhansky, Jason Lin, Tanvir Rahman, Patrick J. Slattery

Publications and Research

Since we are living in a digital age, the need to protect ourselves and those who are vulnerable to cyber-attacks is paramount to prevent cyber attacks that steal information such as banking accounts and important sensitive information.

Our research team extensively investigated the five aspects of cybersecurity such as identity, protection, detection, and response. By conducting various interviews with cybersecurity professionals, we gathered information about these five aspects for example security intelligence or security operations and response, (thread hunting, response orchestration) identity access management, (identity management, and data protection), and risks (risk perspective). Our main goal is to look into …


Phishing For Fun, Madeline Moran Apr 2022

Phishing For Fun, Madeline Moran

Computer Science Research Seminars and Symposia

The process of a phishing experiment that will be used to investigate a possible correlation between a person thinking style and their susceptibility to phishing scams.


Rotoscoping Image Processing, David J. Blackstone Apr 2022

Rotoscoping Image Processing, David J. Blackstone

Student Scholar Showcase

I wrote a program to perform rotoscoping image processing. Rotoscoping is an animation technique that is used to turn real images into cartoon images. This is a lengthy process to do by hand, taking hundreds of hours. To make this job easier, I have written a program to do automated rotoscoping. This program uses many algorithms and techniques such as edge detection, blurring, directional detection, and edge tracking. What once would take hours by hand, takes seconds!


Seizure Prediction In Epilepsy Patients, Gary Dean Cravens Feb 2022

Seizure Prediction In Epilepsy Patients, Gary Dean Cravens

NSU REACH and IPE Day

Purpose/Objective: Characterize rigorously the preictal period in epilepsy patients to improve the development of seizure prediction techniques. Background/Rationale: 30% of epilepsy patients are not well-controlled on medications and would benefit immensely from reliable seizure prediction. Methods/Methodology: Computational model consisting of in-silico Hodgkin-Huxley neurons arranged in a small-world topology using the Watts-Strogatz algorithm is used to generate synthetic electrocorticographic (ECoG) signals. ECoG data from 18 epilepsy patients is used to validate the model. Unsupervised machine learning is used with both patient and synthetic data to identify potential electrophysiologic biomarkers of the preictal period. Results/Findings: The model has shown states corresponding to …


Analyze And Examine Wildfire Events In California, Aleena Hoodith, Sakim Zaman, Safoan Hossain, Jiehao Huang Dec 2021

Analyze And Examine Wildfire Events In California, Aleena Hoodith, Sakim Zaman, Safoan Hossain, Jiehao Huang

Publications and Research

•A wildfire is an unplanned, unwanted, uncontrolled fire in an area of combustible vegetation starting in rural areas and urban areas. •Recent studies have shown that the effect of anthropogenic climate change has fueled the wildfire events, leading to an increase in the annual burned areas and number of events. •California is one of the places having the most deadliest and destructive wildfire seasons. With the global warming effect of 1°C since 1850, the 20 largest wildfires events that have occurred in California, 8 of them were in 2017. (Center For Climate And Energy Solutions) •Climate change is primarily caused …


Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin Nov 2021

Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

Cybersecurity breaches can occur when one uses an easily hacked password. Prior research has investigated 1) possible steps to encourage users to use strong passwords and 2) how personality is related to users using strong passwords.

We investigated whether personality-based nudging messages based on Big Five traits could nudge people to create stronger passwords (c.f., Jones et al., 2021). We also examined how personal characteristics, such as gender, age, personality traits, password knowledge, attitudes, and behavior, and need for cognition, were related to password strength.

We tested the hypothesis that passwords created following messages matching participants’ personality would be stronger …


Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison Nov 2021

Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison

Computer Science: Faculty Publications and Other Works

The research investigated the suggestion from prior research that language and emojis use on Twitter and other social media platforms can predict users’ personality and gender (Adali et al., 2014; Golbeck et al., 2011; Li et al., 2019; Moreno et al., 2019; Raess, 2018). Some studies have also analyzed Twitter language to identify individuals with specific health conditions (e.g., alcohol recovery, Golbeck, 2012; sleep problems, Suarez et al., 2018).

If strategies to predict Twitter users’ characteristics prove to be successful, future efforts to direct persuasive messages related to recommended practices in public health and/or cybersecurity will be possible. Commercial applications …


Student Academic Conference, Caitlin Brooks Apr 2021

Student Academic Conference, Caitlin Brooks

Student Academic Conference

No abstract provided.


The Origin & Evolution Of The Chinese Language, Charity Bullis, Yan Xie Apr 2021

The Origin & Evolution Of The Chinese Language, Charity Bullis, Yan Xie

Liberty University Research Week

Undergraduate

Textual or Investigative


Sector: A Web-Based Data Management And Sharing System Secured By Blockchain, Matthew Grohotolski Jan 2021

Sector: A Web-Based Data Management And Sharing System Secured By Blockchain, Matthew Grohotolski

Summer Scholarship, Creative Arts and Research Projects (SCARP)

Since the advent of technology, securely transferring data between two computers over the internet has been a difficult task. This is especially true for organizations and universities who want to take advantage of technology to securely transfer or share data. Although many file transfer services exist, none have achieved secure transfers while also offering a friendly and easy-to-use user interface. SECTOR uses an existing secure transfer service called Globus to conduct secure file transfers and has built a safe and secure user permissions system on top of their functionality. All data used by SECTOR is stored on a distributed ledger …


Responsive Web Design, Ashley Varon, David Karlins Dec 2020

Responsive Web Design, Ashley Varon, David Karlins

Publications and Research

Responsive web design is one of the most important topics in web. It can be one of the main reasons a website can be costing a business clients, and creating an effect on a business. The rise in popularity of mobile phones and tablets makes it crucial for a website to be designed to respond and adjust to different viewports. This project will research how important responsive web design is in 2020 and the positive or negative impacts it may have on the users, customers, and businesses. Companies must consider text size, layout, navigation, image sizes, and testing when designing …