Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Computer Engineering

The Evolution Of Gendered Software: Products, Scientific Reasoning, Criticism, And Tools, Victoria A. E. Kratel Dec 2022

The Evolution Of Gendered Software: Products, Scientific Reasoning, Criticism, And Tools, Victoria A. E. Kratel

Human-Machine Communication

Over the past 7 decades, gendered software has become globally established. In this theoretical distribution, I outline the evolution of gendered software. The journey of gendered software started with the raw idea fueled by Alan Turing’s imitation game in the 1950s. And only shortly thereafter, in the 1960s and 1970s, the first gendered software products like Joseph Weizenbaum’s ELIZA were developed. Thus, academia took its time to not only explore technological aspects, but to further investigate the matter of gender in the 1990s CASA-paradigm (Nass et al., 1994) and Media Equation (Reeves & Nass, 1996). As these theories reasoned the …


Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico De Luca Dec 2022

Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico De Luca

Human-Machine Communication

Mainly, the scholarly debate on Alexa has focused on sexist/anti-woman gender representations in the everyday life of many families, on a cluster of themes such as privacy, insecurity, and trust, and on the world of education and health. This paper takes another stance and explores via online survey methodology how university student respondents in two countries (the United States, n = 333; and Italy, n = 322) perceive Alexa’s image and gender, what they expect from this voice-based assistant, and how they would like Alexa to be. Results of a free association exercise showed that Alexa’s image was scarcely embodied …


An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir Oct 2022

An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir

Journal of Digital Forensics, Security and Law

The boom of digital cameras, photography, and social media has drastically changed how humans live their day-to-day, but this normalization is accompanied by malicious agents finding new ways to forge and tamper with images for unlawful monetary (or other) gains. Disinformation in the photographic media realm is an urgent threat. The availability of a myriad of image editing tools renders it almost impossible to differentiate between photo-realistic and original images. The tools available for image forensics require a standard framework against which they can be evaluated. Such a standard framework can aid in evaluating the suitability of an image forensics …


Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami Jul 2022

Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami

Future Computing and Informatics Journal

This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary …


Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn May 2022

Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn

Military Cyber Affairs

Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …


Enter The Battleverse: China's Metaverse War, Josh Baughman May 2022

Enter The Battleverse: China's Metaverse War, Josh Baughman

Military Cyber Affairs

No abstract provided.


Novel 360-Degree Camera, Ian Gauger, Andrew Kurtz, Zakariya Niazi Apr 2022

Novel 360-Degree Camera, Ian Gauger, Andrew Kurtz, Zakariya Niazi

Frameless

Circle Optics is developing novel technology for low-parallax, real time, panoramic image capture using an integrated array of multiple adjacent polygonal-edged cameras. This technology can be optimized and deployed for a variety of markets, including cinematic VR. Circle Optics’ existing prototype, Hydra Alpha, will be demonstrated.


Exploring The Psychological Consequences Of Distances In Virtual Reality, Gary D. Jacobs Apr 2022

Exploring The Psychological Consequences Of Distances In Virtual Reality, Gary D. Jacobs

Frameless

This presentation will examine common concepts of traveling between formalized spaces inside virtual reality (VR) experiences.

The common method for traveling in virtual reality is to click on an area or trigger and be transported to that location. These “teleportations”, however, remove the notion of distances from our virtual worlds. This is akin to a magic wand that eliminates the consequences of travel in VR. Often heralded as a boon for the virtual worlds we can create, wherein we can travel to far away lands without lag in time and without effort on the part of the participant. We posit …


Vr Sound Mapping: Make Sound Accessible For Dhh People In Virtual Reality Environments, Ziming Li, Roshan Peiris Apr 2022

Vr Sound Mapping: Make Sound Accessible For Dhh People In Virtual Reality Environments, Ziming Li, Roshan Peiris

Frameless

In-game audio plays an important role in enhancing the sense of reality and immersion in the gaming experience. In many games, sounds are also used to provide notifications and clues which are essential to the gameplay. However, in this case, the DHH (deaf and hard of hearing) players may fail to access the information conveyed by sounds, which degrades their gaming experience (Jain et al. 2021).


Human-Machine Communication Scholarship Trends: An Examination Of Research From 2011 To 2021 In Communication Journals, Riley J. Richards, Patric R. Spence, Chad Edwards Apr 2022

Human-Machine Communication Scholarship Trends: An Examination Of Research From 2011 To 2021 In Communication Journals, Riley J. Richards, Patric R. Spence, Chad Edwards

Human-Machine Communication

Despite a relatively short history, the modern-day study of communication has grown into multiple subfields. To better understand the relationship between Human-Machine Communication (HMC) research and traditional communication science, this study examines the published scholarship in 28 communication-specific journals from 2011–2021 focused on human-machine communication (HMC). Findings suggest limited prior emphasis of HMC research within the 28 reviewed journals; however, more recent trends show a promising future for HMC scholarship. Additionally, HMC appears to be diverse in the specific context areas of research in the communication context. Finally, we offer future directions of research and suggestions for the development of …


Eye-Gaze-Controlled Hmds And Mfd For Military Aircraft, Lrd Murthy, Abhishek Mukhopadhyay, Somnath Arjun, Varshith Yelleti, Peter Thomas, Dilli Babu Mohan, Pradipta Biswas Jan 2022

Eye-Gaze-Controlled Hmds And Mfd For Military Aircraft, Lrd Murthy, Abhishek Mukhopadhyay, Somnath Arjun, Varshith Yelleti, Peter Thomas, Dilli Babu Mohan, Pradipta Biswas

Journal of Aviation Technology and Engineering

Eye-gaze-controlled interfaces allow the direct manipulation of a graphical user interface by looking at it. This technology has great potential in military aviation, in particular, operating different displays in situations where pilots’ hands are occupied with flying the aircraft. This paper reports studies on analyzing the accuracy of eye-gaze-controlled interfaces inside aircraft undertaking representative flying missions. We report that using eye-gaze-controlled interfaces, pilots can undertake representative pointing and selection tasks at less than two seconds on average in a transport aircraft. Further, we analyzed the accuracy of eye-gaze-tracking glasses under various G load factors and analyzed the failure modes. We …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis Jan 2022

Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis

Dickinson Law Review (2017-Present)

For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.

People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …