Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (18)
- University of Nebraska - Lincoln (13)
- University of New Haven (8)
- Stony Brook University (7)
- Old Dominion University (6)
-
- Chapman University (4)
- University of Arkansas, Fayetteville (3)
- City University of New York (CUNY) (2)
- Embry-Riddle Aeronautical University (2)
- Northern Illinois University (2)
- Purdue University (2)
- Selected Works (2)
- Singapore Management University (2)
- Kennesaw State University (1)
- Michigan Technological University (1)
- Missouri University of Science and Technology (1)
- Notre Dame Law School (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- Southern Methodist University (1)
- University at Albany, State University of New York (1)
- University of Georgia School of Law (1)
- University of New Mexico (1)
- University of Pennsylvania Carey Law School (1)
- University of South Florida (1)
- Xavier University of Louisiana (1)
- Keyword
-
- Internet (8)
- Machine learning (6)
- Music (6)
- Telematic (6)
- Artificial intelligence (5)
-
- Arts (5)
- Network (5)
- Virtual reality (4)
- Accessibility (3)
- Algorithms (3)
- Digital forensics (3)
- Machine Learning (3)
- Service learning (3)
- Technology (3)
- AI (2)
- Assistive technology (2)
- Attacks (2)
- Bibliometric Analysis (2)
- Big data (2)
- Cryptocurrency (2)
- Distributed storage attacks (2)
- Frameup (2)
- Human computer interaction (2)
- Inclusion (2)
- Internet of Things (2)
- Neurodiversity (2)
- Regulation (2)
- Security (2)
- Sensory processing (2)
- ToC (2)
- Publication
-
- Journal of International Technology and Information Management (18)
- Library Philosophy and Practice (e-journal) (9)
- Electrical & Computer Engineering and Computer Science Faculty Publications (8)
- Journal of Network Music and Arts (7)
- Computer Science and Computer Engineering Undergraduate Honors Theses (3)
-
- Copyright, Fair Use, Scholarly Communication, etc. (2)
- David Dampier (2)
- Engineering Faculty Articles and Research (2)
- Graduate Research Theses & Dissertations (2)
- All Faculty Scholarship (1)
- Communication Faculty Articles and Research (1)
- Computational Modeling & Simulation Engineering Theses & Dissertations (1)
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Engineering Management & Systems Engineering Theses & Dissertations (1)
- Engineering Technology Faculty Publications (1)
- Faculty and Staff Publications (1)
- Georgia Library Quarterly (1)
- Independent Study Project (ISP) Collection (1)
- Journal of Legislation (1)
- Journal of Pre-College Engineering Education Research (J-PEER) (1)
- Legacy Theses & Dissertations (2009 - 2024) (1)
- MFA Thesis Exhibit Catalogs (1)
- Masters Theses (1)
- Military Cyber Affairs (1)
- Presentations (1)
- Psychology Theses & Dissertations (1)
- Publications (1)
- Publications and Research (1)
- Publication Type
Articles 61 - 83 of 83
Full-Text Articles in Computer Engineering
Hp Brazil: Journey Towards Industrial Internet Of Things Within Industry 4.0 Context, Rebecca Angeles
Hp Brazil: Journey Towards Industrial Internet Of Things Within Industry 4.0 Context, Rebecca Angeles
Journal of International Technology and Information Management
This paper features a case study of Hewlett Packard Brazil’s deployment of radio frequency identification-enabled Exceler8 platform to support its product assembly using Flextronics in Sorocaba, Sao Paulo and distribution by DHL. The study also identifies the stage HP Brazil belongs to in its journey to being a full smart factory using the framework of Odwazny et al. (2018). The case study and content analysis methods are used in analyzing the concepts prescribed by the Industry 4.0, smart factory, and Industrial Internet of Things (IIOT) frameworks to HP Brazil’s RFID system. The Odwazny et al. (2018) framework identifies HP Brazil …
A Practitioner Survey Exploring The Value Of Forensic Tools, Ai, Filtering, & Safer Presentation For Investigating Child Sexual Abuse Material, Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, Cory Hall
A Practitioner Survey Exploring The Value Of Forensic Tools, Ai, Filtering, & Safer Presentation For Investigating Child Sexual Abuse Material, Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, Cory Hall
Electrical & Computer Engineering and Computer Science Faculty Publications
For those investigating cases of Child Sexual Abuse Material (CSAM), there is the potential harm of experiencing trauma after illicit content exposure over a period of time. Research has shown that those working on such cases can experience psychological distress. As a result, there has been a greater effort to create and implement technologies that reduce exposure to CSAM. However, not much work has explored gathering insight regarding the functionality, effectiveness, accuracy, and importance of digital forensic tools and data science technologies from practitioners who use them. This study focused specifically on examining the value practitioners give to the tools …
Evaluation Of Suas Education And Training Tools, Brent Terwilliger, Scott Burgess, James Solti, Kristine Kiernan, Christian Janke, Andrew Shepherd
Evaluation Of Suas Education And Training Tools, Brent Terwilliger, Scott Burgess, James Solti, Kristine Kiernan, Christian Janke, Andrew Shepherd
Publications
The wide distribution and demographic composition of students seeking small unmanned aircraft system (sUAS) education presents a need to fully understand the capabilities, limitations, and dependencies of effective training tools. Concepts, practices, and technologies associated with modeling and simulation, immersive gaming, augmented and mixed-reality, and remote operation have demonstrated efficacy to support engaged student learning and objective satisfaction. Identification and comparison of key attributes critical to an aviation educational framework, such as competency-based training, enables educational designers to identify those tools with the highest potential to support successful learning. A series of factors, such as system performance, regulatory compliance, environmental …
The Adoption Of Collaborative Robots Toward Ubiquitous Diffusion: A Research Agenda, Yuhua (Jake) Liang, Seungcheol Austin Lee
The Adoption Of Collaborative Robots Toward Ubiquitous Diffusion: A Research Agenda, Yuhua (Jake) Liang, Seungcheol Austin Lee
Communication Faculty Articles and Research
This paper proposes a framework to study the adoption of collaborative robots (co-robots or cobots) as an innovation and their diffusion into the larger population. Collaborative robots are only starting to appear in our society, yet challenges such as fear and distrust may impede their further adoption. This paper discusses the foundational work necessary to understand collaborative robot adoption and the core elements to achieve ubiquitous diffusion, with a focus on human users and the communication processes.
Small Non-Profit Website And Social Media Efficacy, Juliana Maria Leprich
Small Non-Profit Website And Social Media Efficacy, Juliana Maria Leprich
Graduate Research Theses & Dissertations
This thesis examines the website design and social media platform usage of small non-profit organizations (defined as less than $1M operating budget and less than ten staff). This research will be completed by first reviewing other studies that have been done on marketing in the non-profit sector, then by exploring marketing challenges firsthand through a mini-ethnographic case study as described in the mini-ethnographic case study approach, and finally through the examination of tax and financial data provided by Guidestar. The researcher was involved in website collaboration with The Gracie Center in a volunteer capacity and was employed with the two …
Big Data Investment And Knowledge Integration In Academic Libraries, Saher Manaseer, Afnan R. Alawneh, Dua Asoudi
Big Data Investment And Knowledge Integration In Academic Libraries, Saher Manaseer, Afnan R. Alawneh, Dua Asoudi
Copyright, Fair Use, Scholarly Communication, etc.
Recently, big data investment has become important for organizations, especially with the fast growth of data following the huge expansion in the usage of social media applications, and websites. Many organizations depend on extracting and reaching the needed reports and statistics. As the investments on big data and its storage have become major challenges for organizations, many technologies and methods have been developed to tackle those challenges.
One of such technologies is Hadoop, a framework that is used to divide big data into packages and distribute those packages through nodes to be processed, consuming less cost than the traditional storage …
Mobile Iot Adoption As Antecedent To Care-Service Efficiency And Improvement: Empirical Study In Healthcare-Context, Samyadip Chakraborty, Vaidik Bhatt
Mobile Iot Adoption As Antecedent To Care-Service Efficiency And Improvement: Empirical Study In Healthcare-Context, Samyadip Chakraborty, Vaidik Bhatt
Journal of International Technology and Information Management
Internet of things (IoT) is the buzzword and pioneering breakthrough approach highlighted in today’s industry 4.0, where the devices are seamlessly integrated with each other, sharing vital information in real-time sync. With the wearable IoT devices, the diagnostic readings and physical measurements of the patients can be shared with the physician on the go and suitable diagnosis can as well be shared with patient in the real-time on their own mobile devices through IoT applications. This study empirically examines the importance of m-IoT adoption on the information pervasiveness across the network and patient stakeholders and in turn investigating how efficiency …
A Network Agent-Based Model Of Ethnocentrism And Intergroup Cooperation, Carlos M. Lemos, Ross J. Gore, Laurence Lessard-Phillips, F. Leron Shults
A Network Agent-Based Model Of Ethnocentrism And Intergroup Cooperation, Carlos M. Lemos, Ross J. Gore, Laurence Lessard-Phillips, F. Leron Shults
VMASC Publications
We present a network agent-based model of ethnocentrism and intergroup cooperation in which agents from two groups (majority and minority) change their communality (feeling of group solidarity), cooperation strategy and social ties, depending on a barrier of “likeness” (affinity). Our purpose was to study the model’s capability for describing how the mechanisms of preexisting markers (or “tags”) that can work as cues for inducing in-group bias, imitation, and reaction to non-cooperating agents, lead to ethnocentrism or intergroup cooperation and influence the formation of the network of mixed ties between agents of different groups. We explored the model’s behavior via four …
Transparency And Algorithmic Governance, Cary Coglianese, David Lehr
Transparency And Algorithmic Governance, Cary Coglianese, David Lehr
All Faculty Scholarship
Machine-learning algorithms are improving and automating important functions in medicine, transportation, and business. Government officials have also started to take notice of the accuracy and speed that such algorithms provide, increasingly relying on them to aid with consequential public-sector functions, including tax administration, regulatory oversight, and benefits administration. Despite machine-learning algorithms’ superior predictive power over conventional analytic tools, algorithmic forecasts are difficult to understand and explain. Machine learning’s “black-box” nature has thus raised concern: Can algorithmic governance be squared with legal principles of governmental transparency? We analyze this question and conclude that machine-learning algorithms’ relative inscrutability does not pose a …
Emotion Forecasting In Dyadic Conversation : Characterizing And Predicting Future Emotion With Audio-Visual Information Using Deep Learning, Sadat Shahriar
Emotion Forecasting In Dyadic Conversation : Characterizing And Predicting Future Emotion With Audio-Visual Information Using Deep Learning, Sadat Shahriar
Legacy Theses & Dissertations (2009 - 2024)
Emotion forecasting is the task of predicting the future emotion of a speaker, i.e., the emotion label of the future speaking turn–based on the speaker’s past and current audio-visual cues. Emotion forecasting systems require new problem formulations that differ from traditional emotion recognition systems. In this thesis, we first explore two types of forecasting windows(i.e., analysis windows for which the speaker’s emotion is being forecasted): utterance forecasting and time forecasting. Utterance forecasting is based on speaking turns and forecasts what the speaker’s emotion will be after one, two, or three speaking turns. Time forecasting forecasts what the speaker’s emotion will …
Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger
Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
Virtual Reality (VR) has become a reality. With the technology's increased use cases, comes its misuse. Malware affecting the Virtual Environment (VE) may prevent an investigator from ascertaining virtual information from a physical scene, or from traditional “dead” analysis. Following the trend of antiforensics, evidence of an attack may only be found in memory, along with many other volatile data points. Our work provides the primary account for the memory forensics of Immersive VR systems, and in specific the HTC Vive. Our approach is capable of reconstituting artifacts from memory that are relevant to the VE, and is also capable …
News - Screven-Jenkins Regional Library, Sharon Blank
News - Screven-Jenkins Regional Library, Sharon Blank
Georgia Library Quarterly
No abstract provided.
A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng
A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng
Journal of International Technology and Information Management
The lack of descriptive language and security guidelines poses a big challenge to implementing security in Representational State Transfer (REST) architecture. There is over reliance on Secure Socket Layer/Transport Layer Security (SSL/TLS), which in recent times has proven to be fallible. Some recent attacks against SSL/TLS include: POODLE, BREACH, CRIME, BEAST, FREAK etc. A secure messaging protocol is implemented in this work. The protocol is further compiled into a reusable library which can be called by other REST services. Using Feature Driven Development (FDD) software methodology, a two layer security protocol was developed. The first layer is a well hardened …
Hometracker: A Household Information Feedback System For Food/Energy/Water Metabolism, Nichole Mackey
Hometracker: A Household Information Feedback System For Food/Energy/Water Metabolism, Nichole Mackey
Dissertations, Master's Theses and Master's Reports
The Food, Energy and Water Conscious (FEWCON) project seeks to understand how food, energy and water (FEW) as independent resources within households are connected. In the main study of the project, intervention messages that link household FEW consumption to equivalent climate consequences are pushed to the households. The goal of the FEWCON study is to determine potential intervention messages that influence household FEW consumption behavior.
A key component of the FEWCON study is a web application named HomeTracker (Household Metabolism Tracker) which collects FEW consumption data within households, then uses this data to select consumption-specific feedback to the homeowners. To …
Table Of Contents Jitim Vol 27 Issue 4, 2018-2019
Table Of Contents Jitim Vol 27 Issue 4, 2018-2019
Journal of International Technology and Information Management
ToC JITIM - Special Issue on ICT4D
The Social Presence Of Jibo, Parisa Farhadi
The Social Presence Of Jibo, Parisa Farhadi
Graduate Research Theses & Dissertations
This research is an attempt to investigate how a social robot is perceived by users at the first encounter. And to find out whether a social robot like Jibo is understood merely as a kind of a technological object or a social entity. Previous studies in Human-Robot Interaction have considered social presence as a mediator in users’ social responses toward robots; however, the focus of this study is the social presence itself and investigates whether Jibo produces a sense of presence during initial encounters. To this end, the current study examines individuals’ perceptions of and responses to Jibo. Participants (N=8) …
A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye
A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye
Journal of International Technology and Information Management
This systematic review work investigates current literature and methods that are related to the application of process mining and modelling in real-time particularly as it concerns personalisation of learning systems, or yet still, e-content development. The work compares available studies based on the domain area of study, the scope of the study, methods used, and the scientific contribution of the papers and results. Consequently, the findings of the identified papers were systematically evaluated in order to point out potential confounding variables or flaws that might have been overlooked or missing in the current literature. In turn, a critical structured analysis …
Table Of Contents Jitim Vol 28 Issue 1, 2019
Table Of Contents Jitim Vol 28 Issue 1, 2019
Journal of International Technology and Information Management
Table of contents
Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che
Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che
Journal of International Technology and Information Management
The development of best practices that deliver quality STEM education to all students, while minimizing achievement gaps, have been solicited by several national agencies. ABMS is a feasible approach to provide insight into global behavior based upon the interactions amongst agents and environments. In this review, we systematically surveyed several modeling and simulation approaches and discussed their applications to the evaluation of relevant theories in STEM education. It was found that ABMS is optimal to simulate STEM education hypotheses, as ABMS will sensibly present emergent theories and causation in STEM education phenomena if the model is properly validated and calibrated.
Table Of Contents Jitim Vol 28 Issue 4, 2019
Table Of Contents Jitim Vol 28 Issue 4, 2019
Journal of International Technology and Information Management
Table of Contents
Accessibility And Decay Of Web Citations In Computer Science Journals, Mohsen Jalali
Accessibility And Decay Of Web Citations In Computer Science Journals, Mohsen Jalali
Library Philosophy and Practice (e-journal)
The aim of this research is to scrutiny the accessibility and decay of web citations (URLs) used in refereed articles published by 27 Computer Science open access journals as indexed by Scopus. To do this, at first, we downloaded 1000 articles of Computer Science open access journals from 2009 to 2018. After acquiring articles, their web citations are extracted and analyzed from the accessibility and decay point of view. Moreover, for initially missed web citations complementary pathways such as using Google search engine are employed. Then, data collected are analyzed using descriptive statistical methods. Research findings indicated that 80.7% of …
Less Is More: Beating The Market With Recurrent Reinforcement Learning, Louis Kurt Bernhard Steinmeister
Less Is More: Beating The Market With Recurrent Reinforcement Learning, Louis Kurt Bernhard Steinmeister
Masters Theses
"Multiple recurrent reinforcement learners were implemented to make trading decisions based on real and freely available macro-economic data. The learning algorithm and different reinforcement functions (the Differential Sharpe Ratio, Differential Downside Deviation Ratio and Returns) were revised and the performances were compared while transaction costs were taken into account. (This is important for practical implementations even though many publications ignore this consideration.) It was assumed that the traders make long-short decisions in the S&P500 with complementary 3-month treasury bill investments. Leveraged positions in the S&P500 were disallowed. Notably, the Differential Sharpe Ratio and the Differential Downside Deviation Ratio are risk …
The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard
The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard
Copyright, Fair Use, Scholarly Communication, etc.
Executive Summary
Over the past three years, we have monitored the global organization of social media manipulation by governments and political parties. Our 2019 report analyses the trends of computational propaganda and the evolving tools, capacities, strategies, and resources.
1. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.
2.Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda …