Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (27)
- California State University, San Bernardino (8)
- Selected Works (5)
- University of New Haven (4)
- City University of New York (CUNY) (3)
-
- Old Dominion University (3)
- San Jose State University (3)
- University of Connecticut (3)
- University of Pennsylvania Carey Law School (3)
- Purdue University (2)
- Singapore Management University (2)
- University of Denver (2)
- University of Nebraska - Lincoln (2)
- University of Texas at El Paso (2)
- Binghamton University (1)
- Bowling Green State University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Claremont Colleges (1)
- Edith Cowan University (1)
- Montclair State University (1)
- Portland State University (1)
- SelectedWorks (1)
- University of Nevada, Las Vegas (1)
- University of South Florida (1)
- Wayne State University (1)
- World Maritime University (1)
- Yale University (1)
- Keyword
-
- Digital Forensics (5)
- Technology (5)
- Data management (4)
- Digital forensics (4)
- Editor (4)
-
- Table (4)
- Contents (3)
- 3D modeling (2)
- Android forensics (2)
- Computer Forensics (2)
- Cretan Hieroglyph (2)
- Cybersecurity (2)
- Data (2)
- Data preservation (2)
- Evolution (2)
- Information (2)
- International (2)
- Internet (2)
- Journal (2)
- Linear A (2)
- Linear B (2)
- Machine learning (2)
- Management (2)
- Marketing (2)
- Mobile forensics (2)
- Network forensics (2)
- PhotoScan (2)
- Photogrammetry (2)
- Policies (2)
- Robotics (2)
- Publication
-
- Journal of Digital Forensics, Security and Law (27)
- Journal of International Technology and Information Management (8)
- Electrical & Computer Engineering and Computer Science Faculty Publications (4)
- All Faculty Scholarship (3)
- Inaugural CSU IR Conference, 2015 (3)
-
- Jerry C Schnepp (3)
- CSE Conference and Workshop Papers (2)
- MODVIS Workshop (2)
- Open Access Theses & Dissertations (2)
- Publications and Research (2)
- Research Collection School Of Computing and Information Systems (2)
- Capstone Projects 2015-Present (1)
- Capstones (1)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computer Science Theses & Dissertations (1)
- Dissertations and Theses (1)
- Electrical and Computer Engineering: Graduate Student Scholarship (1)
- Electronic Theses and Dissertations (1)
- Honors Scholar Theses (1)
- Jan Kallberg (1)
- January 23, 2015: Storm Surge Modeling Tools for Planning and Response (1)
- Journal of Humanistic Mathematics (1)
- Liberal Arts and Engineering Studies (1)
- Library Faculty Publications (1)
- Maritime Safety & Environment Management Dissertations (Dalian) (1)
- Matt Schultz (1)
- Military Cyber Affairs (1)
- Published Works (1)
- Robert Hoppe (1)
- Scholars Cooperative Brown Bag Series (1)
Articles 31 - 60 of 82
Full-Text Articles in Computer Engineering
Automated Technique For Real-Time Production Of Lifelike Animations Of American Sign Language, John Mcdonald, Rosalee Wolfe, Jerry C. Schnepp, Julie Hochgesang, Diana Gorman Jamrozik, Marie Stumbo, Larwan Berke, Melissa Bialek, Farah Thomas
Automated Technique For Real-Time Production Of Lifelike Animations Of American Sign Language, John Mcdonald, Rosalee Wolfe, Jerry C. Schnepp, Julie Hochgesang, Diana Gorman Jamrozik, Marie Stumbo, Larwan Berke, Melissa Bialek, Farah Thomas
Jerry C Schnepp
Generating sentences from a library of signs implemented through a sparse set of key frames derived from the segmental structure of a phonetic model of ASL has the advantage of flexibility and efficiency, but lacks the lifelike detail of motion capture. These difficulties are compounded when faced with real-time generation and display. This paper describes a technique for automatically adding realism without the expense of manually animating the requisite detail. The new technique layers transparently over and modifies the primary motions dictated by the segmental model, and does so with very little computational cost, enabling real-time production and display. The …
Synthetic Corpora: A Synergy Of Linguistics And Computer Animation, Jerry C. Schnepp, Rosalee Wolfe, John Mcdonald
Synthetic Corpora: A Synergy Of Linguistics And Computer Animation, Jerry C. Schnepp, Rosalee Wolfe, John Mcdonald
Jerry C Schnepp
Synthetic corpora enable the creation of computer-generated animations depicting sign language and are the complement of corpora containing videotaped exemplars. Any design for a synthetic corpus needs to accommodate linguistic processes as well as support the generation of believable, acceptable synthesized utterances. This paper explores one possibility for representing linguistic and extralinguistic processes that involve the face and reports on the outcomes of a user test evaluating the clarity of utterances synthesized by this approach.
Avatar To Depict Sign Language: Building From Reusable Hand Animation, Rosalee Wolfe, John Mcdonald, Jerry C. Schnepp
Avatar To Depict Sign Language: Building From Reusable Hand Animation, Rosalee Wolfe, John Mcdonald, Jerry C. Schnepp
Jerry C Schnepp
No abstract provided.
Using Support Vector Machine Ensembles For Target Audience Classification On Twitter, Siaw Ling Lo, Raymond Chiong, David Cornforth
Using Support Vector Machine Ensembles For Target Audience Classification On Twitter, Siaw Ling Lo, Raymond Chiong, David Cornforth
Research Collection School Of Computing and Information Systems
The vast amount and diversity of the content shared on social media can pose a challenge for any business wanting to use it to identify potential customers. In this paper, our aim is to investigate the use of both unsupervised and supervised learning methods for target audience classification on Twitter with minimal annotation efforts. Topic domains were automatically discovered from contents shared by followers of an account owner using Twitter Latent Dirichlet Allocation (LDA). A Support Vector Machine (SVM) ensemble was then trained using contents from different account owners of the various topic domains identified by Twitter LDA. Experimental results …
Institutional Maximization And Path Dependency – The Delay Of Implementation Of The Eu Public Sector Information Directive In Sweden, Jan Kallberg, Erik Lakomaa
Institutional Maximization And Path Dependency – The Delay Of Implementation Of The Eu Public Sector Information Directive In Sweden, Jan Kallberg, Erik Lakomaa
Jan Kallberg
The implementation of the EU public sector information (PSI) directive was expected to open up European governmental data sources for commercialization and create, conservatively estimated, a € 32 billion European public information market. Institutional arrangements and governmental path dependency has delayed the directive’s implementation in several countries, most notably Poland and Sweden. In this paper we use the Swedish case to examine how bureaucratic inertia and path dependence can stall the implementation of EU directives that conflicts with the member state’s internal bureaucratic agenda. Sweden usually implements EU directives rapidly and extensively. In the case of the PSI-directive however, the …
Agenda, Hr Adaptation Forum
Agenda, Hr Adaptation Forum
January 23, 2015: Storm Surge Modeling Tools for Planning and Response
No abstract provided.
Automated Technique For Real-Time Production Of Lifelike Animations Of American Sign Language, John Mcdonald, Rosalee Wolfe, Jerry C. Schnepp, Julie Hochgesang, Diana Gorman Jamrozik, Marie Stumbo, Larwan Berke, Melissa Bialek, Farah Thomas
Automated Technique For Real-Time Production Of Lifelike Animations Of American Sign Language, John Mcdonald, Rosalee Wolfe, Jerry C. Schnepp, Julie Hochgesang, Diana Gorman Jamrozik, Marie Stumbo, Larwan Berke, Melissa Bialek, Farah Thomas
Visual Communications and Technology Education Faculty Publications
Generating sentences from a library of signs implemented through a sparse set of key frames derived from the segmental structure of a phonetic model of ASL has the advantage of flexibility and efficiency, but lacks the lifelike detail of motion capture. These difficulties are compounded when faced with real-time generation and display. This paper describes a technique for automatically adding realism without the expense of manually animating the requisite detail. The new technique layers transparently over and modifies the primary motions dictated by the segmental model, and does so with very little computational cost, enabling real-time production and display. The …
From The Editor-In-Chief, Ibrahim Baggili
From The Editor-In-Chief, Ibrahim Baggili
Journal of Digital Forensics, Security and Law
Welcome to JDFSL’s first issue for 2015! First, I would like to thank our editorial board, reviewers, and the JDFSL team for bringing this issue to life. It has been a big year for JDFSL as the journal continues to progress. We are continuing our indexing efforts for the journal and we are getting closer with some of the major databases.
Data Loss Prevention Management And Control: Inside Activity Incident Monitoring, Identification, And Tracking In Healthcare Enterprise Environments, Manghui Tu, Kimberly Spoa-Harty, Liangliang Xiao
Data Loss Prevention Management And Control: Inside Activity Incident Monitoring, Identification, And Tracking In Healthcare Enterprise Environments, Manghui Tu, Kimberly Spoa-Harty, Liangliang Xiao
Journal of Digital Forensics, Security and Law
As healthcare data are pushed online, consumers have raised big concerns on the breach of their personal information. Law and regulations have placed businesses and public organizations under obligations to take actions to prevent data breach. Among various threats, insider threats have been identified to be a major threat on data loss. Thus, effective mechanisms to control insider threats on data loss are urgently needed. The objective of this research is to address data loss prevention challenges in healthcare enterprise environment. First, a novel approach is provided to model internal threat, specifically inside activities. With inside activities modeling, data …
On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis
On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis
Journal of Digital Forensics, Security and Law
While cybercrime proliferates – becoming more complex and surreptitious on the Internet – the tools and techniques used in performing digital investigations are still largely lagging behind, effectively slowing down law enforcement agencies at large. Real-time remote acquisition of digital evidence over the Internet is still an elusive ideal in the combat against cybercrime. In this paper we briefly describe the architecture of a comprehensive proactive digital investigation system that is termed as the Live Evidence Information Aggregator (LEIA). This system aims at collecting digital evidence from potentially any device in real time over the Internet. Particular focus is made …
A 3-D Stability Analysis Of Lee Harvey Oswald In The Backyard Photo, Srivamshi Pittala, Emily Whiting, Hany Farid
A 3-D Stability Analysis Of Lee Harvey Oswald In The Backyard Photo, Srivamshi Pittala, Emily Whiting, Hany Farid
Journal of Digital Forensics, Security and Law
Fifty years have passed since the assassination of U.S. President Kennedy. Despite the long passage of time, it is still argued that the famous backyard photo of Oswald, holding the same type of rifle used to assassinate the President, is a fake. These claims include, among others, that Oswald’s pose in the photo is physically implausible. We describe a detailed 3-D stability analysis to determine if this claim is warranted.
Open Forensic Devices, Lee Tobin, Pavel Gladyshev
Open Forensic Devices, Lee Tobin, Pavel Gladyshev
Journal of Digital Forensics, Security and Law
Cybercrime has been a growing concern for the past two decades. What used to be the responsibility of specialist national police has become routine work for regional and district police. Unfortunately, funding for law enforcement agencies is not growing as fast as the amount of digital evidence. In this paper, we present a forensic platform that is tailored for cost effectiveness, extensibility, and ease of use. The software for this platform is open source and can be deployed on practically all commercially available hardware devices such as standard desktop motherboards or embedded systems such as Raspberry Pi and Gizmosphere’s Gizmo …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Merging Two Worlds: Agent-Based Simulation Methods For Autonomous Systems, Andreas Tolk
Merging Two Worlds: Agent-Based Simulation Methods For Autonomous Systems, Andreas Tolk
Computational Modeling & Simulation Engineering Faculty Publications
This chapter recommends the increased use of agent-based simulation methods to support the design, development, testing, and operational use of autonomous systems. This recommendation is motivated by deriving taxonomies for intelligent software agents and autonomous robotic systems from the public literature, which shows their similarity: intelligent software agents can be interpreted as the virtual counterparts of autonomous robotic systems. This leads to examples of how simulation can be used to significantly improve autonomous system research and development in selected use cases. The chapter closes with observations on the operational effects of possible emergent behaviour and the need to align the …
Neighbor Discovery In Mobile Ad Hoc Networks, Esau Enrique Ruiz-Gaistardo
Neighbor Discovery In Mobile Ad Hoc Networks, Esau Enrique Ruiz-Gaistardo
Open Access Theses & Dissertations
Neighbor Discovery (ND) is the process that initializes a reliable communication between one-hop neighbors in mobile ad hoc networks (MANETs). This process consists of scheduled exchanges of control messages, called â??Hello Messagesâ?? (HMs) between one-hop neighbors. HMs build bidirectional links that are used to announce the topology information. Each node uses ND and the topology information to populate its routing tables and to communicate with every other node in the network. In MANETs, ND process is a permanent process to discover one-hop neighbors. It is based on two parameters: 1) ND message interval (the period of time in between sending …
Data Extraction On Mtk-Based Android Mobile Phone Forensics, Joe Kong
Data Extraction On Mtk-Based Android Mobile Phone Forensics, Joe Kong
Journal of Digital Forensics, Security and Law
In conducting criminal investigations it is quite common that forensic examiners need to recover evidentiary data from smartphones used by offenders. However, examiners encountered difficulties in acquiring complete memory dump from MTK Android phones, a popular brand of smartphones, due to a lack of technical knowledge on the phone architecture and that system manuals are not always available. This research will perform tests to capture data from MTK Android phone by applying selected forensic tools and compare their effectiveness by analyzing the extracted results. It is anticipated that a generic extraction tool, once identified, can be used on different brands …
Using Robots As Therapeutic Agents To Teach Children With Autism Recognize Facial Expression, Seyedmohammad Mavadati, Huanghao Feng, Peyten B. Sanger, S. Silver, Anibal Gutierrez, Mohammad H. Mahoor
Using Robots As Therapeutic Agents To Teach Children With Autism Recognize Facial Expression, Seyedmohammad Mavadati, Huanghao Feng, Peyten B. Sanger, S. Silver, Anibal Gutierrez, Mohammad H. Mahoor
Electrical and Computer Engineering: Graduate Student Scholarship
Background: Recognizing and mimicking facial expressions are important cues for building great rapport and relationship in human-human communication. Individuals with Autism Spectrum Disorder (ASD) have often deficits in recognizing and mimicking social cues, such as facial expressions. In the last decade several studies have shown that individuals with ASD have superior engagement toward objects and particularly robots (i.e. humanoid and non-humanoid). However, majority of the studies have focused on investigating robot’s appearances and the engineering design concepts and very few research have been done on the effectiveness of robots in therapeutic and treatment applications. In fact, the critical question that …
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice E. Fischer
An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice E. Fischer
Electrical & Computer Engineering and Computer Science Faculty Publications
Hash functions are widespread in computer sciences and have a wide range of applications such as ensuring integrity in cryptographic protocols, structuring database entries (hash tables) or identifying known files in forensic investigations. Besides their cryptographic requirements, a fundamental property of hash functions is efficient and easy computation which is especially important in digital forensics due to the large amount of data that needs to be processed when working on cases. In this paper, we correlate the runtime efficiency of common hashing algorithms (MD5, SHA-family) and their implementation. Our empirical comparison focuses on C-OpenSSL, Python, Ruby, Java on Windows and …
Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger
Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
In this research we forensically acquire and analyze the device-stored data and network traffic of 20 popular instant messaging applications for Android. We were able to reconstruct some or the entire message content from 16 of the 20 applications tested, which reflects poorly on the security and privacy measures employed by these applications but may be construed positively for evidence collection purposes by digital forensic practitioners. This work shows which features of these instant messaging applications leave evidentiary traces allowing for suspect data to be reconstructed or partially reconstructed, and whether network forensics or device forensics permits the reconstruction of …
Mobile Apps In Collection Development: Supporting A Mobile Learning Environment, Stefanie Havelka, Rebecca Arzola
Mobile Apps In Collection Development: Supporting A Mobile Learning Environment, Stefanie Havelka, Rebecca Arzola
Publications and Research
We will discuss our rationale and thoughts on why we believe mobile apps should be part of a library’s collection development policy. An updated policy with apps encourages a mobile learning environment that is technologically diverse while being holistically supportive of its users and research.
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …