Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

2015

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 87

Full-Text Articles in Computer Engineering

How Can We Build A Moral Robot?, Kristen E. Clark Dec 2015

How Can We Build A Moral Robot?, Kristen E. Clark

Capstones

Artificial intelligence is already starting to drive our cars and make choices that affect the world economy. One day soon, we’ll have robots that can take care of our sick and elderly, and even rescue us in rescue us in emergencies. But as robots start to make decisions that matter—it’s raising questions that go far beyond engineering. We’re stating to think about ethics.

Bertram Malle and Matthias Scheutz are part of a team funded by the department of defense. It's their job to answer a question that seems straight out of a sci-fi novel: How can we build a moral …


Data To Decisions For Cyberspace Operations, Steve Stone Dec 2015

Data To Decisions For Cyberspace Operations, Steve Stone

Military Cyber Affairs

In 2011, the United States (U.S.) Department of Defense (DOD) named cyberspace a new operational domain. The U.S. Cyber Command and the Military Services are working to make the cyberspace environment a suitable place for achieving national objectives and enabling military command and control (C2). To effectively conduct cyberspace operations, DOD requires data and analysis of the Mission, Network, and Adversary. However, the DOD’s current data processing and analysis capabilities do not meet mission needs within critical operational timelines. This paper presents a summary of the data processing and analytics necessary to effectively conduct cyberspace operations.


Bridging Researchers’ Active Data Storage Needs, Matt Schultz Oct 2015

Bridging Researchers’ Active Data Storage Needs, Matt Schultz

Matt Schultz

The 2015 Midwest Data Librarian Symposium was the inaugural launch of this now widely-attended un-conference series. Attendees were encouraged to submit lightning presentations on local developments in the area of data management support from within their Libraries. This brief presentation highlighted early work undertaken to develop a checklist that my role as Metadata & Digital Curation could make use of to navigate faculty researcher questions that arise when considering where to store and maintain research data during active stages of any given sponsored research project.


Whatsapp Network Forensics: Decrypting And Understanding The Whatsapp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, Frank Breitinger Oct 2015

Whatsapp Network Forensics: Decrypting And Understanding The Whatsapp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

WhatsApp is a widely adopted mobile messaging application with over 800 million users. Recently, a calling feature was added to the application and no comprehensive digital forensic analysis has been performed with regards to this feature at the time of writing this paper. In this work, we describe how we were able to decrypt the network traffic and obtain forensic artifacts that relate to this new calling feature which included the: a) WhatsApp phone numbers, b) WhatsApp server IPs, c) WhatsApp audio codec (Opus), d) WhatsApp call duration, and e) WhatsApp's call termination. We explain the methods and tools used …


Gvsu Repository Migration Update, Matt Schultz Oct 2015

Gvsu Repository Migration Update, Matt Schultz

Matt Schultz

In late 2015, GVSU Libraries carried out a full-scale usability evaluation on their new digital preservation and access solution known as Preservica. The evaluation was geared primarily towards the access interface in order to ensure that GVSU faculty and students would have success in navigating the digital collections. In this presentation for the Mid-Michigan Digital Practitioners (MMDP) community, preliminary findings from the evaluations are shared.


A Computational Translation Of The Phaistos Disk, Peter Revesz Oct 2015

A Computational Translation Of The Phaistos Disk, Peter Revesz

CSE Conference and Workshop Papers

For over a century the text of the Phaistos Disk remained an enigma without a convincing translation. This paper presents a novel semi-automatic translation method that uses for the first time a recently discovered connection between the Phaistos Disk symbols and other ancient scripts, including the Old Hungarian alphabet. The connection between the Phaistos Disk script and the Old Hungarian alphabet suggested the possibility that the Phaistos Disk language may be related to Proto-Finno-Ugric, Proto-Ugric, or Proto-Hungarian. Using words and suffixes from those languages, it is possible to translate the Phaistos Disk text as an ancient sun hymn, possibly connected …


Professor Frank Breitinger's Full Bibliography, Frank Breitinger Oct 2015

Professor Frank Breitinger's Full Bibliography, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

No abstract provided.


A Computational Study Of The Evolution Of Cretan And Related Scripts, Peter Revesz Oct 2015

A Computational Study Of The Evolution Of Cretan And Related Scripts, Peter Revesz

CSE Conference and Workshop Papers

Crete was the birthplace of several ancient writings, including the Cretan Hieroglyphs, the Linear A and the Linear B scripts. Out of these three only Linear B is deciphered. The sound values of the Cretan Hieroglyph and the Linear A symbols are unknown and attempts to reconstruct them based on Linear B have not been fruitful. In this paper, we compare the ancient Cretan scripts with four other Mediterranean and Black Sea scripts, namely Phoenician, South Arabic, Greek and Old Hungarian. We provide a computational study of the evolution of the three Cretan and four other scripts. This study encompasses …


Social Signal Processing For Real-Time Situational Understanding: A Vision And Approach, Kasthuri Jeyarajah, Shuchao Yao, Raghava Muthuraju, Archan Misra, Geeth De Mel, Julie Skipper, Tarek Abdelzaher, Michael Kolodny Oct 2015

Social Signal Processing For Real-Time Situational Understanding: A Vision And Approach, Kasthuri Jeyarajah, Shuchao Yao, Raghava Muthuraju, Archan Misra, Geeth De Mel, Julie Skipper, Tarek Abdelzaher, Michael Kolodny

Research Collection School Of Computing and Information Systems

The US Army Research Laboratory (ARL) and the Air Force Research Laboratory (AFRL) have established a collaborative research enterprise referred to as the Situational Understanding Research Institute (SURI). The goal is to develop an information processing framework to help the military obtain real-time situational awareness of physical events by harnessing the combined power of multiple sensing sources to obtain insights about events and their evolution. It is envisioned that one could use such information to predict behaviors of groups, be they local transient groups (e.g., protests) or widespread, networked groups, and thus enable proactive prevention of nefarious activities. This paper …


Network Analysis Of The Sardex Community Currency, Georgios Iosifidis, Yanick Charette, Giuseppe Littera, Leandros Tassiulas, Nicholas Christakis Sep 2015

Network Analysis Of The Sardex Community Currency, Georgios Iosifidis, Yanick Charette, Giuseppe Littera, Leandros Tassiulas, Nicholas Christakis

Yale Day of Data

We present a transaction dataset and preliminary analysis results about Sardex, a complementary currency (CC) in Sardinia, Italy. Sardex is currently considered one of the most successful CCs in Europe, as it grows continuously in terms of transactions’ volume and membership, and has been already replicated in 8 other regions in Italy. We model Sardex as a transaction network and study its basic properties.


Practical Guidance For Integrating Data Management Into Long-Term Ecological Monitoring Projects, Robert D. Sutter, Susan Wainscott, John R. Boetsch, Craig Palmer, David J. Rugg Sep 2015

Practical Guidance For Integrating Data Management Into Long-Term Ecological Monitoring Projects, Robert D. Sutter, Susan Wainscott, John R. Boetsch, Craig Palmer, David J. Rugg

Library Faculty Publications

Long-term monitoring and research projects are essential to understand ecological change and the effectiveness of management activities. An inherent characteristic of long-term projects is the need for consistent data collection over time, requiring rigorous attention to data management and quality assurance. Recent papers have provided broad recommendations for data management; however, practitioners need more detailed guidance and examples. We present general yet detailed guidance for the development of comprehensive, concise, and effective data management for monitoring projects. The guidance is presented as a graded approach, matching the scale of data management to the needs of the organization and the complexity …


Study Of The Research Status On E-Navigation, Qiwei Chen Aug 2015

Study Of The Research Status On E-Navigation, Qiwei Chen

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Network Structure, Network Flows And The Phenomenon Of Influence In Online Social Networks: An Exploratory Empirical Study Of Twitter Conversations About Youtube Product Categories, Nitin Venkat Mayande Aug 2015

Network Structure, Network Flows And The Phenomenon Of Influence In Online Social Networks: An Exploratory Empirical Study Of Twitter Conversations About Youtube Product Categories, Nitin Venkat Mayande

Dissertations and Theses

Traditional marketing models are swiftly being upended by the advent of online social networks. Yet, practicing firms that are engaging with online social networks neither have a reliable theory nor sufficient practical experience to make sense of the phenomenon. Extant theory in particular is based on observations of the real world, and may thus not apply to online social networks. Practicing firms may consequently be misallocating a large amount of resources, simply because they do not know how the online social networks with which they interact are organized.

The purpose of this dissertation is to investigate how online social networks …


Novelty Wins, “Straight Toward Objective” Loses! Or Book Review: Why Greatness Cannot Be Planned: The Myth Of The Objective, By Kenneth O. Stanley And Joel Lehman, Reuben Hersh Jul 2015

Novelty Wins, “Straight Toward Objective” Loses! Or Book Review: Why Greatness Cannot Be Planned: The Myth Of The Objective, By Kenneth O. Stanley And Joel Lehman, Reuben Hersh

Journal of Humanistic Mathematics

Experiments in evolutionary artificial intelligence demonstrate that progress toward an important, difficult goal is not best achieved by attempting to go directly toward that goal, but rather, by rewarding novelty.


Apis And The Library: What, Why?, Graham S. Hukill Jul 2015

Apis And The Library: What, Why?, Graham S. Hukill

Scholars Cooperative Brown Bag Series

APIs (Application Programming Interface): What are they? Why are they? Introduction to APIs and their role in the Library


Creating A Data-Based Facebook Engagement Plan For Chabad At Binghamton, Justin Hayet Jul 2015

Creating A Data-Based Facebook Engagement Plan For Chabad At Binghamton, Justin Hayet

Capstone Projects 2015-Present

Core Capstone Question: How does Chabad at Binghamton maximize its online Facebook Engagement in a fashion which mirrors the needs of its diverse online stakeholders?

Schmalzbauer (2013) calculated that two thirds of America’s 400,000 Jewish college students attend schools with a Chabad chapter” (p. 120). Binghamton University’s student population is thirty percent Jewish, that is, 3,500 Jewish students (Hillel, 2014). Chabad at Binghamton’s seven full time staff members and student leadership of eighty-seven designated positions seek to engage all 3,500 of those students through weekly programs, Shabbat dinners, large scale programs and individual meetings. Chabad at Binghamton has been serving …


Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen Jul 2015

Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen

Computer Science Theses & Dissertations

The content of social media has grown exponentially in the recent years and its role has evolved from narrating life events to actually shaping them. Unfortunately, content posted and shared in social networks is vulnerable and prone to loss or change, rendering the context associated with it (a tweet, post, status, or others) meaningless. There is an inherent value in maintaining the consistency of such social records as in some cases they take over the task of being the first draft of history as collections of these social posts narrate the pulse of the street during historic events, protest, riots, …


Not Just A Tool. Taking Context Into Account In The Development Of A Mobile App For Rural Water Supply In Tanzania, Robert Hoppe, Anne Wesselink, Rob Lemmens Jun 2015

Not Just A Tool. Taking Context Into Account In The Development Of A Mobile App For Rural Water Supply In Tanzania, Robert Hoppe, Anne Wesselink, Rob Lemmens

Robert Hoppe

The 'eGovernance' hype around the potential of mobile phone and geoweb technologies for enhancing 'good governance' is soaring. In East Africa, the extensive use of mobile telephony adds to the imagined promises of ICT. We reflect on the assumptions made by the proponents of such tools, using our own action research project as an example. We took great care to consider context in the development of software for enhancing empowerment and accountability in rural water supply in Tanzania. However, we found that the rural water supply context in Tanzania is much more complex than the contexts for which successful mApps …


The Social Life Of Big Data - Pawsey Resources, Luke Edwards Jun 2015

The Social Life Of Big Data - Pawsey Resources, Luke Edwards

The Social Life of Big Data Symposium

The presentation covers the supercomputing facilities and services available at the Pawsey Supercomputing Centre, Western Australia.
The Pawsey Supercomputing Centre is an unincorporated joint venture between CSIRO, Curtin University, Edith Cowan University, Murdoch University and the University of Western Australia and is supported by the Western Australian Government.


Understanding The Relationships Of User-Selected Music In Video Games, Memphis Wong Jun 2015

Understanding The Relationships Of User-Selected Music In Video Games, Memphis Wong

Liberal Arts and Engineering Studies

Music has been an integral part of video games in its contribution to users' gameplay experiences. Varying from simple sound effects to elaborate scores, music helps shape the reactive environment of each video game. In particular, video games that generate unique levels and scenarios based on music has become more popular as its own genre. Games such as Audiosurf take this further, with having the game revolve entirely around levels generated to custom tracks. The aim of this study is to analyze the impact of such games, when it allows a user to select his or her own music.


Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain Jun 2015

Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain

Electronic Theses and Dissertations

Alternative networking is a growing field of study and practice due to advancements in computer networking hardware, and software protocols. Methods of integrating alternative networking configurations into infrastructure present enhanced forms of empowerment and embodiment for participants. Through an analysis of multiple hardware and software examples, this research suggests that practices of sharing and collaboration, which are embedded in the history of computer networking, have the potential to reinvigorate the notion of a virtual public sphere, and support the ideals of digital democracy.


Fundamentals Of Library Instruction, Darren Sweeper Jun 2015

Fundamentals Of Library Instruction, Darren Sweeper

Sprague Library Scholarship and Creative Works

No abstract provided.


Presentation On Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett May 2015

Presentation On Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett

UConn Library Presentations

No abstract provided.


Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett May 2015

Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett

Published Works

Though the roots of photogrammetry can be traced back to photography’s earliest days, only recent advances in both digital technology and software applications have put the possibilities of 3D modeling from 2D source images in the hands of the greater cultural heritage community. The possibilities of such 3D digital rendering are many. With these possibilities come unique digital preservation challenges. This study explores basic close-range photogrammetry as applied to sample archival objects. Additionally, the latest BagIt and ZIP-based bundling formats along with repository-based solutions are also surveyed as potential 3D data management and archiving aggregators for resulting 3D models.


Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout May 2015

Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout

MODVIS Workshop

Images convey multiple meanings that depend on the context in which the viewer perceptually organizes the scene. This presents a problem for automated image segmentation, because it adds uncertainty to the process of selecting which objects to include or not include within a segment. I’ll discuss the implementation of a fuzzy-logic-natural-vision-processing engine that solves this problem by assuming the scene architecture prior to processing. The scene architecture, a standardized natural-scene-perception-taxonomy comprised of a hierarchy of nested spatial-taxons. Spatial-taxons are regions (pixel-sets) that are figure-like, in that they are perceived as having a contour, are either `thing-like', or a `group of …


Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo May 2015

Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo

MODVIS Workshop

Computer vision research rarely makes use of symmetry in stereo reconstruction despite its established importance in perceptual psychology. Such stereo reconstructions produce visually satisfying figures with precisely located points and lines, even when input images have low or moderate resolution. However, because few invariants exist, there are no known general approaches to solving symmetry correspondence on real images. The problem is significantly easier when combined with the binocular correspondence problem, because each correspondence problem provides strong non-overlapping constraints on the solution space. We demonstrate a system that leverages these constraints to produce accurate stereo models from pairs of binocular images …


Session D-4: Coolhub.Imsa: Collaborative Innovation In Action, Carl Heine, James Gerry May 2015

Session D-4: Coolhub.Imsa: Collaborative Innovation In Action, Carl Heine, James Gerry

Carl Heine

Transform STEM teaching and learning with CoolHub.IMSA, a free virtual platform where youth and adults collaborate on projects they create. Explore the site through the eyes of project members and discover powerful ways to collaborate, innovate and network for learning.


Design, Programming, And User-Experience, Kaila G. Manca May 2015

Design, Programming, And User-Experience, Kaila G. Manca

Honors Scholar Theses

This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.

I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.

The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


A Comparison Between Single And Dual Monitor Productivity And The Effects Of Window Management Styles On Performance, Alex Stegman, Chen Ling, Randa Shehab Apr 2015

A Comparison Between Single And Dual Monitor Productivity And The Effects Of Window Management Styles On Performance, Alex Stegman, Chen Ling, Randa Shehab

Dr. Chen Ling

Several research studies have been published on user opinion and productivity of using dual monitor systems. These studies found that users typically enjoy using multiple monitors, but none found a strong increase in performance and productivity. Other researchers have focused on improving multiple monitor usability, but often without any statistical framework. This study compared single and dual monitor productivity measures: task time, cursor movement, and number of window switches. Additionally, window management styles (WMS) were studied in order to help designers understand user behavior better. WMS were broken into two categories, toggler and resizer, and then compared to the WMS …