Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Engineering

Matthew Gaber: Peekaboo, Matthew Gaber, Mohiuddin Ahmed, Helge Janicke Jan 2024

Matthew Gaber: Peekaboo, Matthew Gaber, Mohiuddin Ahmed, Helge Janicke

Research Datasets

Cyber-attacks continue to evolve, increasing in frequency and sophistication where Artificial Intelligence (AI) is becoming essential in detecting modern malware. However, the accuracy of AI in malware detection is dependent on the quality of the features it is trained with. Static and dynamic analysis of malware is limited by the widespread use of obfuscation and anti-analysis techniques employed by malware authors, where if an analysis environment is detected the malware will hide its malicious behavior. However, Dynamic Binary Instrumentation (DBI) allows deep and precise control of the malware sample, thereby facilitating the extraction of authentic features from sophisticated and evasive …


Using Satellite Images Datasets For Road Intersection Detection In Route Planning, Fatmaelzahraa Eltaher, Susan Mckeever, Ayman Taha, Jane Courtney Jan 2022

Using Satellite Images Datasets For Road Intersection Detection In Route Planning, Fatmaelzahraa Eltaher, Susan Mckeever, Ayman Taha, Jane Courtney

Datasets

Understanding road networks plays an important role in navigation applications such as self-driving vehicles and route planning for individual journeys. Intersections of roads are essential components of road networks. Understanding the features of an intersection, from a simple T-junction to larger multi-road junctions is critical to decisions such as crossing roads or selecting safest routes. The identification and profiling of intersections from satellite images is a challenging task. While deep learning approaches offer state-of-the-art in image classification and detection, the availability of training datasets is a bottleneck in this approach. In this paper, a labelled satellite image dataset for the …


Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom Dec 2019

Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom

Library Philosophy and Practice (e-journal)

Management audit is very important for assessment of their information technology management to gain efficient and effective business running process. Information technology security as an effort of internal controlling for risk and threat security minimization, is mainly considered due to all learning and lecturing administration activities use information technology. Allso, the implementation of a number of computer labs to facilitate learning processes and access to information in order to support the lectures and personal development of students To find out how secure technology information is, it is then requiring an audit to make sure everything run based on procedure. Management …


Combining Virtual Reality And Machine Learning For Enhancing The Resiliency Of Transportation Infrastructure In Extreme Events, Supratik Mukhopadhyay, Yimin Zhu, Ravindra Gudishala Sep 2019

Combining Virtual Reality And Machine Learning For Enhancing The Resiliency Of Transportation Infrastructure In Extreme Events, Supratik Mukhopadhyay, Yimin Zhu, Ravindra Gudishala

Data

Corresponding data set for Tran-SET Project No. 18ITSLSU09. Abstract of the final report is stated below for reference:

"Traffic management models that include route choice form the basis of traffic management systems. High-fidelity models that are based on rapidly evolving contextual conditions can have significant impact on smart and energy efficient transportation. Existing traffic/route choice models are generic and are calibrated on static contextual conditions. These models do not consider dynamic contextual conditions such as the location, failure of certain portions of the road network, the social network structure of population inhabiting the region, route choices made by other drivers, …


Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey May 2019

Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey

Open Educational Resources

User-friendly Geographic Information Systems (GIS) is the common thread of this collection of presentations, and activities with full lesson plans. The first section of the site contains an overview of cartography, the art of creating maps, and then looks at historical mapping platforms like Hypercities and Donald Rumsey Historical Mapping Project. In the next section Google Earth Desktop Pro is introduced, with lessons and activities on the basics of GE such as pins, paths, and kml files, as well as a more complex activity on "georeferencing" an historic map over Google Earth imagery. The final section deals with ARCGIS Online …


Ghosts Of The Horseshoe, Heidi Rae Cooley, Richard Walker, Duncan Buell Jan 2014

Ghosts Of The Horseshoe, Heidi Rae Cooley, Richard Walker, Duncan Buell

Digital Projects

Ghosts of the Horseshoe (Ghosts) is a mobile interactive application that endeavors to bring into view--literally, on mobile micro screens (iPads and iPhones at present)--the largely unknown history of slavery at South Carolina College. It deploys game mechanics (i.e., ludic methods), as well as Augmented Reality (AR) and GPS functionality to generate awareness of and questioning about what otherwise seems ordinary: a grassy space at the center of a university campus. It organizes content into distinct but overlapping themes: (1) architectural ghosts (e.g., razed outbuildings); (2) human ghosts (e.g., un/named enslaved persons); and (3) the historic Wall delimiting the Horseshoe …


Independent Study On Infinite Graph Theory, Martin Zimmermann Jul 2008

Independent Study On Infinite Graph Theory, Martin Zimmermann

Technical Reports

In this paper we will prove some results about infinite graphs. We show that for every linear order there is a graph with a distinguished vertex such that the edges adjacent to that vertex have the given order in any plane drawing. The other results are concerned with connectivity. We prove a generalization of a characterization of 2-­connected graphs and prove that k-­connectedness does not imply the existence of finite k­connected subgraphs for k > 2.


Post-Training Support For Learning Technology, Sam Snoddy Jr., David G. Novick Jan 2004

Post-Training Support For Learning Technology, Sam Snoddy Jr., David G. Novick

Departmental Papers (CS)

To examine the effects of post-training support, we studied the introduction of new gradebook software in a public high school. The school's 108 faculty members received training on the software, and approximately half of the faculty received posttraining support for eight weeks. The study measured the faculty's current computer usage, usage of earlier versions of the software, and their perceived skill levels in using the software. The data suggest that the faculty members who received post-training support maintained and raised their skill levels, while unsupported faculty had their skill levels decline.


Assessing Effectiveness Of Personality Style In Documentation, Kenneth Sayles, David G. Novick Jan 2004

Assessing Effectiveness Of Personality Style In Documentation, Kenneth Sayles, David G. Novick

Departmental Papers (CS)

This paper extends previous work by other researchers that indicated that users of computers preferred a computer with a personality that was similar to theirs. We conducted a similar experiment, but looking beyond preference to see if the personality of documentation would make a difference in the user’s performance. Our data suggest did not indicate that personality match affects performance; and if such a relationship exists it is likely to be weak. We discuss the related research, describe our methodology, present our results, and describe their implications and limitations.


Hands-Free Documentation, Karen Ward, David G. Novick Jan 2003

Hands-Free Documentation, Karen Ward, David G. Novick

Departmental Papers (CS)

In this paper, we introduce an analysis of the requirements and design choices for hands-free documentation. Hands-busy tasks such as cooking or car repair may require substantial interruption of the task: moving the pan off the burner and wiping hands, or crawling out from underneath the car. We review the need for hands-free documentation and explore the role of task in the use of documentation. Our central analysis examines the roles and characteristics of input and output modalities of hands-free documentation. In particular, we review the use of speech as an input modality, and then visual means and speech as …


An Interaction Initiative Model For Documentation, David G. Novick, Karen Ward Jan 2003

An Interaction Initiative Model For Documentation, David G. Novick, Karen Ward

Departmental Papers (CS)

In this paper we propose a model of creation and use of documentation based on the concept of mixed-initiative interaction. In our model, successful single-initiative interaction is characterized by grounding of contributions, and successful mixed-initiative interaction is characterized by both grounding and agreement. Just as in spoken conversation, achievement of actual agreement depends on the intentions of both parties; agreement is achieved when the reader follows the documentation’s instructions. In fact, readers are not obligated to—and often do not—act according to the author’s intentions. By making these dynamics explicit, the model can aid authors in developing effective documentation. The paper …


Extending Direct Manipulation In A Text Editor, David G. Novick, Francisco Romero, Edgar Rene Saenz, Armando Sandoval Jan 2002

Extending Direct Manipulation In A Text Editor, David G. Novick, Francisco Romero, Edgar Rene Saenz, Armando Sandoval

Departmental Papers (CS)

This paper describes the implementation of a prototype text editor that incorporates conversation-like features through the direct-manipulation modality. In this way, traditional direct-manipulation interaction techniques such as direct reference via pointing can be extended to include techniques more commonly associated with human conversation, such as negotiation of reference. The paper illustrates the use of the prototype with an extended example, and discusses research issues raised by the implementation.


"Conversational" Dialogues In Direct-Manipulation Interfaces, David G. Novick Jan 2001

"Conversational" Dialogues In Direct-Manipulation Interfaces, David G. Novick

Departmental Papers (CS)

This paper reports ongoing research in extending direct-manipulation interfaces by incorporating, via the direct-manipulation modality itself, interaction techniques that add kinds of language features associated with spoken conversation. The paper proposes means of implementing ways for a user of a direct-manipulation system to define new kinds of relations among objects in the interface.


Users And Uses Of Synchronous Business Communications Software, David G. Novick, Eleanor Wynn Jan 2001

Users And Uses Of Synchronous Business Communications Software, David G. Novick, Eleanor Wynn

Departmental Papers (CS)

To help designers and authors understand users' intentions and work practices for synchronous business communications in a systematic way, we used ethnographic and task-analytic techniques to collect, analyze and classify evidence of the activities of potential users as they conducted their work lives. The interactions we observed among our users took place through a variety of modalities. We found eight categories of tasks for the collaborative or interactive work in which our subjects engaged. Based on these data, we were able to classify roles of potential users of synchronous business communications software into a set of "archetypes" that characterize their …


Accounting For Domain Context In Evaluation, Meriem Chater, David G. Novick Jan 2001

Accounting For Domain Context In Evaluation, Meriem Chater, David G. Novick

Departmental Papers (CS)

Work is situated activity. Taking into account human factors in evaluation involves considering not only users but also their contexts of use. Consequently, the evaluation of systems — from video-games to safetycritical interfaces — requires analysis of context to understand not only the effect of context on usability but also the impact of artifacts' usability on users' environments. In the case of safety-critical systems (SCS), errors (by users or designers) may threaten human lives.
To assess the degree to which interface evaluation methods currently account for context, we have used the research strategy taxonomy of McGrath as a framework for …