Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 116

Full-Text Articles in Entire DC Network

Machine Learning Projects With Python - Nba Finals Live Stream, Wilder Vs Breazeale Dec 2018

Machine Learning Projects With Python - Nba Finals Live Stream, Wilder Vs Breazeale

NBA Finals Live Stream

This is, obviously, prompting a huge unforeseen of individuals who trust the Warriors are in reality happier without Durant. This sounds insane, and somehow or another I trust it is. Durant improves them toward the finish of shot clock and especially protectively and from an unadulterated profundity point of view.


Durant as it were, is the best protection arrangement in NBA history. He makes it so Curry doesn't need to be Superman for the Warriors to win titles. Be that as it may, when Curry IS Superman? All things considered, in the event …


Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook Nov 2018

Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook

Dr. David M Cook

Despite the variety of global research on the identification and proliferation of ransomware and other online scams, there is still a relative vacuum of research with respect to the problem of digitally and socially engineered deception in the form of ransomware on an individual. This is particularly problematic for older cohorts, where life experience in many endeavours sits alongside novice understanding and experience in the use of online technology. This paper examines the indicators that characterize authenticity and deception within ransomware and phishing. A survey of older Australian people over the age of 65 reveals markers and patterns that assist …


Cse: U: Mixed-Initiative Personal Assistant Agents, Joshua W. Buck, Saverio Perugini, Tam Nguyen Nov 2018

Cse: U: Mixed-Initiative Personal Assistant Agents, Joshua W. Buck, Saverio Perugini, Tam Nguyen

Saverio Perugini

Specification and implementation of flexible human-computer dialogs is challenging because of the complexity involved in rendering the dialog responsive to a vast number of varied paths through which users might desire to complete the dialog. To address this problem, we developed a toolkit for modeling and implementing task-based, mixed-initiative dialogs based on metaphors from lambda calculus. Our toolkit can automatically operationalize a dialog that involves multiple prompts and/or sub-dialogs, given a high-level dialog specification of it. The use of natural language with the resulting dialogs makes the flexibility in communicating user utterances commensurate with that in dialog completion paths—an aspect …


Intro To Command Line Coding (Fastqe & Fastp), Ray A. Enke Oct 2018

Intro To Command Line Coding (Fastqe & Fastp), Ray A. Enke

Ray Enke Ph.D.

This in class activity is designed for novices as an introduction to command line coding. The activity uses the programs FASTQE and FASTP to analyze the quality and trim Illumina FASTQ sequencing data.


Cross-Referencing Social Media And Public Surveillance Camera Data For Disaster Response, Chittayong Surakitbanharn,, Calvin Yau, Guizhen Wang, Aniesh Chawla, Yinuo Pan, Zhaoya Sun, Sam Yellin, David Ebert, Yung-Hsiang Lu, George K. Thiruvathukal Oct 2018

Cross-Referencing Social Media And Public Surveillance Camera Data For Disaster Response, Chittayong Surakitbanharn,, Calvin Yau, Guizhen Wang, Aniesh Chawla, Yinuo Pan, Zhaoya Sun, Sam Yellin, David Ebert, Yung-Hsiang Lu, George K. Thiruvathukal

George K. Thiruvathukal

Physical media (like surveillance cameras) and social media (like Instagram and Twitter) may both be useful in attaining on-the-ground information during an emergency or disaster situation. However, the intersection and reliability of both surveillance cameras and social media during a natural disaster are not fully understood. To address this gap, we tested whether social media is of utility when physical surveillance cameras went off-line during Hurricane Irma in 2017. Specifically, we collected and compared geo-tagged Instagram and Twitter posts in the state of Florida during times and in areas where public surveillance cameras went off-line. We report social media content …


Signal Flow Graph Approach To Efficient Dst I-Iv Algorithms, Sirani M. Perera Oct 2018

Signal Flow Graph Approach To Efficient Dst I-Iv Algorithms, Sirani M. Perera

Sirani Mututhanthrige Perera

In this paper, fast and efficient discrete sine transformation (DST) algorithms are presented based on the factorization of sparse, scaled orthogonal, rotation, rotation-reflection, and butterfly matrices. These algorithms are completely recursive and solely based on DST I-IV. The presented algorithms have low arithmetic cost compared to the known fast DST algorithms. Furthermore, the language of signal flow graph representation of digital structures is used to describe these efficient and recursive DST algorithms having (n􀀀1) points signal flow graph for DST-I and n points signal flow graphs for DST II-IV.


Setting Up A Low-Cost Lab Management System For A Multi-Purpose Computing Laboratory Using Virtualisation Technology, Heng Ngee Mok, Wee Kiat Tan Oct 2018

Setting Up A Low-Cost Lab Management System For A Multi-Purpose Computing Laboratory Using Virtualisation Technology, Heng Ngee Mok, Wee Kiat Tan

Heng Ngee MOK

This paper describes how a generic computer laboratory equipped with 52 workstations is set up for teaching IT-related courses and other general purpose usage. The authors have successfully constructed a lab management system based on decentralised, client-side software virtualisation technology using Linux and free software tools from VMware that fulfils the requirements of fast "switch over" time between consecutive lab sessions, the ability to support a wide range of IT courses and usage scenarios, low cost, easy maintenance, and a sandboxed environment for potentially disruptive IT security lab exercises. Sufficient implementation details are provided so that readers can build a …


Teaching Tip: The Flipped Classroom, Heng Ngee Mok Oct 2018

Teaching Tip: The Flipped Classroom, Heng Ngee Mok

Heng Ngee MOK

The flipped classroom has been gaining popularity in recent years. In theory, flipping the classroom appears sound: passive learning activities such as unidirectional lectures are pushed to outside class hours in the form of videos, and precious class time is spent on active learning activities. Yet the courses for information systems (IS) undergraduates at the university that the author is teaching at are still conducted in the traditional lecture-in-class, homework-after-class style. In order to increase students’ engagement with the course content and to improve their experience with the course, the author implemented a trial of the flipped classroom model for …


Separating Markup From Text, Ronald I. Greenberg, George K. Thiruvathukal Oct 2018

Separating Markup From Text, Ronald I. Greenberg, George K. Thiruvathukal

George K. Thiruvathukal

As more and more online versions of Humanities texts are created, it is becoming commonplace to embed elaborate formatting, for example, through the use of HTML. But this can interfere with computerized analyses of the original text. While it may seem, at first, straightforward to simply strip markup from text, this is not the reality. Many digital texts add things that appear to be legitimate content according to the markup syntax, for example, line numbers, and even apart from this issue, existing tools for stripping markup produce inconsistent results. Apart from adopting and enforcing strict conventions for adding markup to …


Chameleon: A Customizable Language For Teaching Programming Languages, Saverio Perugini, Jack L. Watkin Oct 2018

Chameleon: A Customizable Language For Teaching Programming Languages, Saverio Perugini, Jack L. Watkin

Saverio Perugini

ChAmElEoN is a programming language for teaching students the concepts and implementation of computer languages. We describe its syntax and semantics, the educational aspects involved in the implementation of a variety of interpreters for it, its malleability, and student feedback to inspire its use for teaching languages.


Natural Language, Mixed-Initiative Personal Assistant Agents, Joshua W. Buck, Saverio Perugini, Tam W. Nguyen Oct 2018

Natural Language, Mixed-Initiative Personal Assistant Agents, Joshua W. Buck, Saverio Perugini, Tam W. Nguyen

Saverio Perugini

The increasing popularity and use of personal voice assistant technologies, such as Siri and Google Now, is driving and expanding progress toward the long-term and lofty goal of using artificial intelligence to build human-computer dialog systems capable of understanding natural language. While dialog-based systems such as Siri support utterances communicated through natural language, they are limited in the flexibility they afford to the user in interacting with the system and, thus, support primarily action-requesting and information-seeking tasks. Mixed-initiative interaction, on the other hand, is a flexible interaction technique where the user and the system act as equal participants in an …


An Application Of The Actor Model Of Concurrency In Python: A Euclidean Rhythm Music Sequencer, Daniel P. Prince, Saverio Perugini Oct 2018

An Application Of The Actor Model Of Concurrency In Python: A Euclidean Rhythm Music Sequencer, Daniel P. Prince, Saverio Perugini

Saverio Perugini

We present a real-time sequencer, implementing the Euclidean rhythm algorithm, for creative generation of drum sequences by musicians or producers. We use the Actor model of concurrency to simplify the communication required for interactivity and musical timing, and generator comprehensions and higher-order functions to simplify the implementation of the Euclidean rhythm algorithm. The resulting application sends Musical Instrument Digital Interface (MIDI) data interactively to another application for sound generation.


Developing A Contemporary Operating Systems Course, Saverio Perugini, David J. Wright Oct 2018

Developing A Contemporary Operating Systems Course, Saverio Perugini, David J. Wright

Saverio Perugini

The objective of this tutorial presentation is to foster innovation in the teaching of operating systems (os) at the undergraduate level as part of a three-year NSF-funded IUSE (Improving Undergraduate STEM Education) project titled “Engaged Student Learning: Reconceptualizing and Evaluating a Core Computer Science Course for Active Learning and STEM Student Success” (2017–2020).


Research-Based Web Design & Usability Guidelines [2006 Edition], Michael O. Leavitt, Ben Shneiderman, Robert W. Bailey, Carol Barnum, John Bosley, Barbara Chaparro, Joseph Dumas, Melody Y. Ivory, Bonnie John, Hal Miller-Jacobs, Sanjay J. Koyani, James R. Lewis, Stanley Page, Judith Ramey, Janice (Ginny) Redish, Jean Scholtz, Steve Wigginton, Cari A. Wolfson, Larry E. Wood, Don Zimmerman Oct 2018

Research-Based Web Design & Usability Guidelines [2006 Edition], Michael O. Leavitt, Ben Shneiderman, Robert W. Bailey, Carol Barnum, John Bosley, Barbara Chaparro, Joseph Dumas, Melody Y. Ivory, Bonnie John, Hal Miller-Jacobs, Sanjay J. Koyani, James R. Lewis, Stanley Page, Judith Ramey, Janice (Ginny) Redish, Jean Scholtz, Steve Wigginton, Cari A. Wolfson, Larry E. Wood, Don Zimmerman

Barbara S. Chaparro

The new edition of the U.S. Department of Health and Human Services’ (HHS) Research-Based Web Design and Usability Guidelines. These guidelines reflect HHS’ commitment to identifying innovative, research-based approaches that result in highly responsive and easy-to-use Web sites for the public.

These guidelines help move us in that direction by providing practical, yet authoritative, guidance on a broad range of Web design and communication issues. Having access to the best available research helps to ensure we make the right decisions the first time around and reduces the possibility of errors and costly mistakes.


The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2017, Buenaventura "Ven" Basco Oct 2018

The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2017, Buenaventura "Ven" Basco

Buenaventura "Ven" Basco

No abstract provided.


The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2016, Ven Basco Oct 2018

The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2016, Ven Basco

Buenaventura "Ven" Basco

No abstract provided.


The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2016, Buenaventura "Ven" Basco Oct 2018

The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2016, Buenaventura "Ven" Basco

Buenaventura "Ven" Basco

No abstract provided.


The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2015, Ven Basco Oct 2018

The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2015, Ven Basco

Buenaventura "Ven" Basco

No abstract provided.


Smt-Based Constraint Answer Set Solver Ezsmt+ For Non-Tight Programs, Da Shen, Yuliya Lierler Sep 2018

Smt-Based Constraint Answer Set Solver Ezsmt+ For Non-Tight Programs, Da Shen, Yuliya Lierler

Yuliya Lierler

Constraint answer set programming integrates answer set programming with constraint processing. System Ezsmt+ is a constraint answer set programming tool that utilizes satisfiability modulo theory solvers for search. The truly unique feature of ezsmt+ is its capability to process linear as well as nonlinear constraints simultaneously containing integer and real variables.


Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie M. Wissel, Lisa Deluca Sep 2018

Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie M. Wissel, Lisa Deluca

Kathryn Wissel, MBA, MI

In May 2017, The Economist ran a cover story titled “The world’s most valuable resource is no longer oil, but data.” Given the continued growth in the sourcing, curating, and storing of data for academic research, it seems the academy would agree. In response to this growing need at Seton Hall, a midsized research university, the Seton Hall University (SHU) Libraries conducted an assessment of the current and emerging data requirements of the researchers and students on campus.


Smt-Based Constraint Answer Set Solver Ezsmt, Yuliya Lierler Sep 2018

Smt-Based Constraint Answer Set Solver Ezsmt, Yuliya Lierler

Yuliya Lierler

No abstract provided.


Strong Equivalence And Conservative Extensions Hand In Hand For Arguing Correctness Of New Action Language C Formalization, Yuliya Lierler Aug 2018

Strong Equivalence And Conservative Extensions Hand In Hand For Arguing Correctness Of New Action Language C Formalization, Yuliya Lierler

Yuliya Lierler

Answer set programming  is a  declarative programming paradigm used in formulating combinatorial search problems and implementing distinct knowledge representation and reasoning formalisms. It is common that several related and yet substantially different answer set programs exist for a given problem. Uncovering precise formal links between these programs is often of value. This paper develops a methodology for establishing such links. This methodology relies on the notions of strong equivalence and conservative extensions and a body of earlier theoretical work related to these concepts. We use distinct answer set programming formalizations  of an action language C and a syntactically restricted action …


Mathchat: Computational Mathematics Via A Social Machine, Manfred Minimair Aug 2018

Mathchat: Computational Mathematics Via A Social Machine, Manfred Minimair

Manfred Minimair

The main question of this research is: How does a social machine discover algorithmic mathematical knowledge? A social machine is a system of humans and computers engaged in some purposeful activity. To address the main question question, an empiric and theoretical framework for algorithmic mathematical knowledge discovered by the social machine is proposed. The framework is derived from findings in Distributed Cognition documenting how collaborators evolve a mathematical algorithm. By combining Distributed  Cognition with the standard Message Passing Model of Distributed Computing, a formalism is introduced to specify the activities of the social machine and its algorithmic knowledge. Furthermore, the …


Knowledge Extraction From Metacognitive Reading Strategies Data Using Induction Trees, Christopher Taylor, Arun D. Kulkarni, Kouider Mokhtari Aug 2018

Knowledge Extraction From Metacognitive Reading Strategies Data Using Induction Trees, Christopher Taylor, Arun D. Kulkarni, Kouider Mokhtari

Kouider Mokhtari

The assessment of students’ metacognitive knowledge and skills about reading is critical in determining their ability to read academic texts and do so with comprehension. In this paper, we used induction trees to extract metacognitive knowledge about reading from a reading strategies dataset obtained from a group of 1636 undergraduate college students. Using a C4.5 algorithm, we constructed decision trees, which helped us classify participants into three groups based on their metacognitive strategy awareness levels consisting of global, problem-solving and support reading strategies. We extracted rules from these decision trees, and in order to evaluate accuracy of the extracted rules, …


Assessing Metacognitive Skills Using Adaptive Neural Networks, Anderson Justin, Kouider Mokhtari, Arun Kulkarni Aug 2018

Assessing Metacognitive Skills Using Adaptive Neural Networks, Anderson Justin, Kouider Mokhtari, Arun Kulkarni

Kouider Mokhtari

The assessment of student's levels of metacognitive knowledge and skills is critical in determining their ability to effectively perform complex cognitive tasks such as solving mathematics or reading comprehension problems. In this paper, we use an adaptive multiplayer perceptron model to categorize participants based on their metacognitive awareness and perceived use of reading strategies while reading. Eight hundred and sixty-five middle school students participated in the study. All participants completed a 30-item instrument- the Metacognitive Awareness-of-Reading Strategies Inventory (MARSI). We used adaptive multi-layer perceptron models to classify participants into three groups based on their metacognitive strategy awareness levels using thirteen …


Haptic Alternatives For Mobile Device Authentication By Older Technology Users, David M. Cook, Kulwinder Kaur Jul 2018

Haptic Alternatives For Mobile Device Authentication By Older Technology Users, David M. Cook, Kulwinder Kaur

Dr. David M Cook

Turing tests are used to secure the human interaction on the Internet. Tests such as CAPTCHA are based on visual or auditory recognition of symbols and are difficult to distinguish by elderly people. A study examining the consistency of a tactile feedback-based Turing test identified an alternative to mainstream tests. This approach examines the vibration-based sensitivity which is detectable through skin surfaces when used to touch the screen of a mobile device. The study concentrated on a range of rough, smooth, sticky and coarse textures as possible differentiators for swipe-based tactile authentication using mobile devices. This study examined the vibration-based …


The Efficacy Of Using Virtual Reality For Job Interviews And Its Effects On Mitigating Discrimination, David M. Cook, Rico Beti, Faris Al-Khatib Jul 2018

The Efficacy Of Using Virtual Reality For Job Interviews And Its Effects On Mitigating Discrimination, David M. Cook, Rico Beti, Faris Al-Khatib

Dr. David M Cook

Virtual reality (VR) is an emerging technology that has already found successful application in a variety of different fields, including simulation, training, education, and gaming. While VR technologies have been considered for use in recruitment practices, available research on the topic is limited. In all stages of the recruitment process, social categorization of job applicants based on ethnicity, skin color, and gender, as well as other forms of discrimination are contemporary issues. This study examined the efficacy of using virtual reality technology as part of job interview strategies and evaluated its potential to mitigate personal bias towards job applicants. The …


Smt-Based Answer Set Solver Cmodels-Diff (System Description), Da Shen, Yuliya Lierler Jun 2018

Smt-Based Answer Set Solver Cmodels-Diff (System Description), Da Shen, Yuliya Lierler

Yuliya Lierler

Many answer set solvers utilize Satisfiability solvers for search. SMT solvers extend Satisfiability solvers. This paper presents the CMODELS-DIFF system that uses SMT solvers to find answer sets of a logic program. Its theoretical foundation is based on Niemala's characterization of answer sets of a logic program via so called level rankings. The comparative experimental analysis demonstrates that CMODELS-DIFF is a viable answer set solver.


Developing A Mathematical Social Machine For Computational Network Analysis, Manfred Minimair May 2018

Developing A Mathematical Social Machine For Computational Network Analysis, Manfred Minimair

Manfred Minimair

A social mathematical machine is a networked system integrating humans and software to cooperatively solve mathematical problems. The software system MathChat impelments an instance of a social mathematical machine for collaboratively carrying out mathematical computations by entering instructions in a command shell. The software design of the MathChat system tightly integrates chat with command entry to support user communication and coordination. A theoretical model for the MathChat system is proposed. The theoretical model is based on the psychological theory of Distributed Cognition and the formalism of Message Passing in distributed computation, which allows formalizing the knowledge acquired by the system …


An Investigation Into Trust And Security In The Mandatory And Imposed Use Of Financial Icts Upon Older People, David Michael Cook May 2018

An Investigation Into Trust And Security In The Mandatory And Imposed Use Of Financial Icts Upon Older People, David Michael Cook

Dr. David M Cook

Care needs to be taken to reduce the number of people who are fearful and mistrustful of using ICT where that usage is forced upon them without choice or alternative. The growing incidence of mandatory and imposed online systems can result in confusion, misuse, fear, and rejection by people with only rudimentary ICT skills. A cohort where a high percentage of such people occur is older people, defined in this study as people over the age of 60 Examples of compulsory ICT interactions include some banks limiting bank statement access through online rather than paper-based options. Other examples include the …