Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

PDF

2019

Institution
Keyword
Publication
Publication Type

Articles 61 - 83 of 83

Full-Text Articles in Computer Engineering

Hp Brazil: Journey Towards Industrial Internet Of Things Within Industry 4.0 Context, Rebecca Angeles Jan 2019

Hp Brazil: Journey Towards Industrial Internet Of Things Within Industry 4.0 Context, Rebecca Angeles

Journal of International Technology and Information Management

This paper features a case study of Hewlett Packard Brazil’s deployment of radio frequency identification-enabled Exceler8 platform to support its product assembly using Flextronics in Sorocaba, Sao Paulo and distribution by DHL. The study also identifies the stage HP Brazil belongs to in its journey to being a full smart factory using the framework of Odwazny et al. (2018). The case study and content analysis methods are used in analyzing the concepts prescribed by the Industry 4.0, smart factory, and Industrial Internet of Things (IIOT) frameworks to HP Brazil’s RFID system. The Odwazny et al. (2018) framework identifies HP Brazil …


A Practitioner Survey Exploring The Value Of Forensic Tools, Ai, Filtering, & Safer Presentation For Investigating Child Sexual Abuse Material, Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, Cory Hall Jan 2019

A Practitioner Survey Exploring The Value Of Forensic Tools, Ai, Filtering, & Safer Presentation For Investigating Child Sexual Abuse Material, Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, Cory Hall

Electrical & Computer Engineering and Computer Science Faculty Publications

For those investigating cases of Child Sexual Abuse Material (CSAM), there is the potential harm of experiencing trauma after illicit content exposure over a period of time. Research has shown that those working on such cases can experience psychological distress. As a result, there has been a greater effort to create and implement technologies that reduce exposure to CSAM. However, not much work has explored gathering insight regarding the functionality, effectiveness, accuracy, and importance of digital forensic tools and data science technologies from practitioners who use them. This study focused specifically on examining the value practitioners give to the tools …


Evaluation Of Suas Education And Training Tools, Brent Terwilliger, Scott Burgess, James Solti, Kristine Kiernan, Christian Janke, Andrew Shepherd Jan 2019

Evaluation Of Suas Education And Training Tools, Brent Terwilliger, Scott Burgess, James Solti, Kristine Kiernan, Christian Janke, Andrew Shepherd

Publications

The wide distribution and demographic composition of students seeking small unmanned aircraft system (sUAS) education presents a need to fully understand the capabilities, limitations, and dependencies of effective training tools. Concepts, practices, and technologies associated with modeling and simulation, immersive gaming, augmented and mixed-reality, and remote operation have demonstrated efficacy to support engaged student learning and objective satisfaction. Identification and comparison of key attributes critical to an aviation educational framework, such as competency-based training, enables educational designers to identify those tools with the highest potential to support successful learning. A series of factors, such as system performance, regulatory compliance, environmental …


The Adoption Of Collaborative Robots Toward Ubiquitous Diffusion: A Research Agenda, Yuhua (Jake) Liang, Seungcheol Austin Lee Jan 2019

The Adoption Of Collaborative Robots Toward Ubiquitous Diffusion: A Research Agenda, Yuhua (Jake) Liang, Seungcheol Austin Lee

Communication Faculty Articles and Research

This paper proposes a framework to study the adoption of collaborative robots (co-robots or cobots) as an innovation and their diffusion into the larger population. Collaborative robots are only starting to appear in our society, yet challenges such as fear and distrust may impede their further adoption. This paper discusses the foundational work necessary to understand collaborative robot adoption and the core elements to achieve ubiquitous diffusion, with a focus on human users and the communication processes.


Small Non-Profit Website And Social Media Efficacy, Juliana Maria Leprich Jan 2019

Small Non-Profit Website And Social Media Efficacy, Juliana Maria Leprich

Graduate Research Theses & Dissertations

This thesis examines the website design and social media platform usage of small non-profit organizations (defined as less than $1M operating budget and less than ten staff). This research will be completed by first reviewing other studies that have been done on marketing in the non-profit sector, then by exploring marketing challenges firsthand through a mini-ethnographic case study as described in the mini-ethnographic case study approach, and finally through the examination of tax and financial data provided by Guidestar. The researcher was involved in website collaboration with The Gracie Center in a volunteer capacity and was employed with the two …


Big Data Investment And Knowledge Integration In Academic Libraries, Saher Manaseer, Afnan R. Alawneh, Dua Asoudi Jan 2019

Big Data Investment And Knowledge Integration In Academic Libraries, Saher Manaseer, Afnan R. Alawneh, Dua Asoudi

Copyright, Fair Use, Scholarly Communication, etc.

Recently, big data investment has become important for organizations, especially with the fast growth of data following the huge expansion in the usage of social media applications, and websites. Many organizations depend on extracting and reaching the needed reports and statistics. As the investments on big data and its storage have become major challenges for organizations, many technologies and methods have been developed to tackle those challenges.

One of such technologies is Hadoop, a framework that is used to divide big data into packages and distribute those packages through nodes to be processed, consuming less cost than the traditional storage …


Mobile Iot Adoption As Antecedent To Care-Service Efficiency And Improvement: Empirical Study In Healthcare-Context, Samyadip Chakraborty, Vaidik Bhatt Jan 2019

Mobile Iot Adoption As Antecedent To Care-Service Efficiency And Improvement: Empirical Study In Healthcare-Context, Samyadip Chakraborty, Vaidik Bhatt

Journal of International Technology and Information Management

Internet of things (IoT) is the buzzword and pioneering breakthrough approach highlighted in today’s industry 4.0, where the devices are seamlessly integrated with each other, sharing vital information in real-time sync. With the wearable IoT devices, the diagnostic readings and physical measurements of the patients can be shared with the physician on the go and suitable diagnosis can as well be shared with patient in the real-time on their own mobile devices through IoT applications. This study empirically examines the importance of m-IoT adoption on the information pervasiveness across the network and patient stakeholders and in turn investigating how efficiency …


A Network Agent-Based Model Of Ethnocentrism And Intergroup Cooperation, Carlos M. Lemos, Ross J. Gore, Laurence Lessard-Phillips, F. Leron Shults Jan 2019

A Network Agent-Based Model Of Ethnocentrism And Intergroup Cooperation, Carlos M. Lemos, Ross J. Gore, Laurence Lessard-Phillips, F. Leron Shults

VMASC Publications

We present a network agent-based model of ethnocentrism and intergroup cooperation in which agents from two groups (majority and minority) change their communality (feeling of group solidarity), cooperation strategy and social ties, depending on a barrier of “likeness” (affinity). Our purpose was to study the model’s capability for describing how the mechanisms of preexisting markers (or “tags”) that can work as cues for inducing in-group bias, imitation, and reaction to non-cooperating agents, lead to ethnocentrism or intergroup cooperation and influence the formation of the network of mixed ties between agents of different groups. We explored the model’s behavior via four …


Transparency And Algorithmic Governance, Cary Coglianese, David Lehr Jan 2019

Transparency And Algorithmic Governance, Cary Coglianese, David Lehr

All Faculty Scholarship

Machine-learning algorithms are improving and automating important functions in medicine, transportation, and business. Government officials have also started to take notice of the accuracy and speed that such algorithms provide, increasingly relying on them to aid with consequential public-sector functions, including tax administration, regulatory oversight, and benefits administration. Despite machine-learning algorithms’ superior predictive power over conventional analytic tools, algorithmic forecasts are difficult to understand and explain. Machine learning’s “black-box” nature has thus raised concern: Can algorithmic governance be squared with legal principles of governmental transparency? We analyze this question and conclude that machine-learning algorithms’ relative inscrutability does not pose a …


Emotion Forecasting In Dyadic Conversation : Characterizing And Predicting Future Emotion With Audio-Visual Information Using Deep Learning, Sadat Shahriar Jan 2019

Emotion Forecasting In Dyadic Conversation : Characterizing And Predicting Future Emotion With Audio-Visual Information Using Deep Learning, Sadat Shahriar

Legacy Theses & Dissertations (2009 - 2024)

Emotion forecasting is the task of predicting the future emotion of a speaker, i.e., the emotion label of the future speaking turn–based on the speaker’s past and current audio-visual cues. Emotion forecasting systems require new problem formulations that differ from traditional emotion recognition systems. In this thesis, we first explore two types of forecasting windows(i.e., analysis windows for which the speaker’s emotion is being forecasted): utterance forecasting and time forecasting. Utterance forecasting is based on speaking turns and forecasts what the speaker’s emotion will be after one, two, or three speaking turns. Time forecasting forecasts what the speaker’s emotion will …


Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger Jan 2019

Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Virtual Reality (VR) has become a reality. With the technology's increased use cases, comes its misuse. Malware affecting the Virtual Environment (VE) may prevent an investigator from ascertaining virtual information from a physical scene, or from traditional “dead” analysis. Following the trend of antiforensics, evidence of an attack may only be found in memory, along with many other volatile data points. Our work provides the primary account for the memory forensics of Immersive VR systems, and in specific the HTC Vive. Our approach is capable of reconstituting artifacts from memory that are relevant to the VE, and is also capable …


News - Screven-Jenkins Regional Library, Sharon Blank Jan 2019

News - Screven-Jenkins Regional Library, Sharon Blank

Georgia Library Quarterly

No abstract provided.


A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng Jan 2019

A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng

Journal of International Technology and Information Management

The lack of descriptive language and security guidelines poses a big challenge to implementing security in Representational State Transfer (REST) architecture. There is over reliance on Secure Socket Layer/Transport Layer Security (SSL/TLS), which in recent times has proven to be fallible. Some recent attacks against SSL/TLS include: POODLE, BREACH, CRIME, BEAST, FREAK etc. A secure messaging protocol is implemented in this work. The protocol is further compiled into a reusable library which can be called by other REST services. Using Feature Driven Development (FDD) software methodology, a two layer security protocol was developed. The first layer is a well hardened …


Hometracker: A Household Information Feedback System For Food/Energy/Water Metabolism, Nichole Mackey Jan 2019

Hometracker: A Household Information Feedback System For Food/Energy/Water Metabolism, Nichole Mackey

Dissertations, Master's Theses and Master's Reports

The Food, Energy and Water Conscious (FEWCON) project seeks to understand how food, energy and water (FEW) as independent resources within households are connected. In the main study of the project, intervention messages that link household FEW consumption to equivalent climate consequences are pushed to the households. The goal of the FEWCON study is to determine potential intervention messages that influence household FEW consumption behavior.

A key component of the FEWCON study is a web application named HomeTracker (Household Metabolism Tracker) which collects FEW consumption data within households, then uses this data to select consumption-specific feedback to the homeowners. To …


Table Of Contents Jitim Vol 27 Issue 4, 2018-2019 Jan 2019

Table Of Contents Jitim Vol 27 Issue 4, 2018-2019

Journal of International Technology and Information Management

ToC JITIM - Special Issue on ICT4D


The Social Presence Of Jibo, Parisa Farhadi Jan 2019

The Social Presence Of Jibo, Parisa Farhadi

Graduate Research Theses & Dissertations

This research is an attempt to investigate how a social robot is perceived by users at the first encounter. And to find out whether a social robot like Jibo is understood merely as a kind of a technological object or a social entity. Previous studies in Human-Robot Interaction have considered social presence as a mediator in users’ social responses toward robots; however, the focus of this study is the social presence itself and investigates whether Jibo produces a sense of presence during initial encounters. To this end, the current study examines individuals’ perceptions of and responses to Jibo. Participants (N=8) …


A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye Jan 2019

A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye

Journal of International Technology and Information Management

This systematic review work investigates current literature and methods that are related to the application of process mining and modelling in real-time particularly as it concerns personalisation of learning systems, or yet still, e-content development. The work compares available studies based on the domain area of study, the scope of the study, methods used, and the scientific contribution of the papers and results. Consequently, the findings of the identified papers were systematically evaluated in order to point out potential confounding variables or flaws that might have been overlooked or missing in the current literature. In turn, a critical structured analysis …


Table Of Contents Jitim Vol 28 Issue 1, 2019 Jan 2019

Table Of Contents Jitim Vol 28 Issue 1, 2019

Journal of International Technology and Information Management

Table of contents


Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che Jan 2019

Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che

Journal of International Technology and Information Management

The development of best practices that deliver quality STEM education to all students, while minimizing achievement gaps, have been solicited by several national agencies. ABMS is a feasible approach to provide insight into global behavior based upon the interactions amongst agents and environments. In this review, we systematically surveyed several modeling and simulation approaches and discussed their applications to the evaluation of relevant theories in STEM education. It was found that ABMS is optimal to simulate STEM education hypotheses, as ABMS will sensibly present emergent theories and causation in STEM education phenomena if the model is properly validated and calibrated.


Table Of Contents Jitim Vol 28 Issue 4, 2019 Jan 2019

Table Of Contents Jitim Vol 28 Issue 4, 2019

Journal of International Technology and Information Management

Table of Contents


Accessibility And Decay Of Web Citations In Computer Science Journals, Mohsen Jalali Jan 2019

Accessibility And Decay Of Web Citations In Computer Science Journals, Mohsen Jalali

Library Philosophy and Practice (e-journal)

The aim of this research is to scrutiny the accessibility and decay of web citations (URLs) used in refereed articles published by 27 Computer Science open access journals as indexed by Scopus. To do this, at first, we downloaded 1000 articles of Computer Science open access journals from 2009 to 2018. After acquiring articles, their web citations are extracted and analyzed from the accessibility and decay point of view. Moreover, for initially missed web citations complementary pathways such as using Google search engine are employed. Then, data collected are analyzed using descriptive statistical methods. Research findings indicated that 80.7% of …


Less Is More: Beating The Market With Recurrent Reinforcement Learning, Louis Kurt Bernhard Steinmeister Jan 2019

Less Is More: Beating The Market With Recurrent Reinforcement Learning, Louis Kurt Bernhard Steinmeister

Masters Theses

"Multiple recurrent reinforcement learners were implemented to make trading decisions based on real and freely available macro-economic data. The learning algorithm and different reinforcement functions (the Differential Sharpe Ratio, Differential Downside Deviation Ratio and Returns) were revised and the performances were compared while transaction costs were taken into account. (This is important for practical implementations even though many publications ignore this consideration.) It was assumed that the traders make long-short decisions in the S&P500 with complementary 3-month treasury bill investments. Leveraged positions in the S&P500 were disallowed. Notably, the Differential Sharpe Ratio and the Differential Downside Deviation Ratio are risk …


The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard Jan 2019

The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard

Copyright, Fair Use, Scholarly Communication, etc.

Executive Summary

Over the past three years, we have monitored the global organization of social media manipulation by governments and political parties. Our 2019 report analyses the trends of computational propaganda and the evolving tools, capacities, strategies, and resources.

1. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.

2.Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda …