Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Social and Behavioral Sciences

2018

Institution
Keyword
Publication

Articles 1 - 26 of 26

Full-Text Articles in Computer Engineering

Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht Dec 2018

Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht

Publications and Research

Spatial Decision Support Systems (SDSS) were a hot topic in the 1990s, when researchers tried to imbue GIS with additional decision support features. Successful practical developments such as HAZUS or CommunityViz have since been built, based on commercial desktop software and without much heed for theory other than what underlies their process models. Others, like UrbanSim, have been completely overhauled twice but without much external scrutiny. Both the practical and the theoretical foundations of decision support systems have developed considerably over the past 20 years. This article presents an overview of these developments and then looks at what corresponding tools …


Building A Smart Nation: Singapore's Digital Journey, Siu Loon Hoe Dec 2018

Building A Smart Nation: Singapore's Digital Journey, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

Singapore’s smart nation journey began when the drive was officially announced by the country’s Prime Minister Lee Hsien Loong in November 2014 (Lee, 2014). The vision is to improve people’s lives and create more opportunities through information and communications technology (ICT). The smart nation drive is an effort by the government to co-create innovative, people-centric solutions with citizens and businesses. The three priority areas, underpinned by cyber security, are elderly, transportation and data. Since then, various digital strategies and policies have been further articulated, and digital programmes and projects implemented in the country.


Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto Nov 2018

Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto

Department of Anthropology: Faculty Publications

While digital technologies have been part of archaeology for more than fifty years, archaeologists still look for more efficient methodologies to integrate digital practices of fieldwork recording with data management, analysis, and ultimately interpretation.This Special Issue of the Journal of Field Archaeology gathers international scholars affiliated with universities, organizations, and commercial enterprises working in the field of Digital Archaeology. Our goal is to offer a discussion to the international academic community and practitioners. While the approach is interdisciplinary, our primary audience remains readers interested in web technology and collaborative platforms in archaeology


I Know What You Did Last Summer: Your Smart Home Internet Of Things And Your Iphone Forensically Ratting You Out, Gokila Dorai, Shiva Houshmand, Ibrahim Baggili Aug 2018

I Know What You Did Last Summer: Your Smart Home Internet Of Things And Your Iphone Forensically Ratting You Out, Gokila Dorai, Shiva Houshmand, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The adoption of smart home Internet of Things (IoT) devices continues to grow. What if your devices can snitch on you and let us know where you are at any given point in time? In this work we examined the forensic artifacts produced by Nest devices, and in specific, we examined the logical backup structure of an iPhone used to control a Nest thermostat, Nest Indoor Camera and a Nest Outdoor Camera. We also integrated the Google Home Mini as another method of controlling the studied Smart Home devices. Our work is the primary account for the examination of Nest …


Digital Forensics In The Next Five Years, Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, Frank Breitinger Aug 2018

Digital Forensics In The Next Five Years, Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Cyber forensics has encountered major obstacles over the last decade and is at a crossroads. This paper presents data that was obtained during the National Workshop on Redefining Cyber Forensics (NWRCF) on May 23-24, 2017 supported by the National Science Foundation and organized by the University of New Haven. Qualitative and quantitative data were analyzed from twenty-four cyber forensics expert panel members. This work identified important themes that need to be addressed by the community, focusing on (1) where the domain currently is; (2) where it needs to go and; (3) steps needed to improve it. Furthermore, based on the …


The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow Aug 2018

The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow

All Faculty Scholarship

In this report, Shakow explains how a decentralized autonomous organization functions and interacts with the U.S. tax system and presents the many tax issues that these structures raise. The possibility of using smart contracts to allow an entity to operate totally autonomously on a blockchain platform seems attractive. However, little thought has been given to how such an entity can comply with the requirements of a tax system. The DAO, the first major attempt to create such an organization, failed because of a programming error. If successful examples proliferate in the future, tax authorities will face significant problems in getting …


Forensic Analysis Of Immersive Virtual Reality Social Applications: A Primary Account, Ananya Yarramreddy, Peter Gromkowski, Ibrahim Baggili Aug 2018

Forensic Analysis Of Immersive Virtual Reality Social Applications: A Primary Account, Ananya Yarramreddy, Peter Gromkowski, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Our work presents the primary account for exploring the forensics of immersive Virtual Reality (VR) systems and their social applications. The Social VR applications studied in this work include Bigscreen, Altspace VR, Rec Room and Facebook Spaces. We explored the two most widely adopted consumer VR systems: the HTC Vive and the Oculus Rift. Our tests examined the efficacy of reconstructing evidence from network traffic as well as the systems themselves. The results showed that a significant amount of forensically relevant data such as user names, user profile pictures, events, and system details may be recovered. We anticipate that this …


Advanced Recurrent Network-Based Hybrid Acoustic Models For Low Resource Speech Recognition, Jian Kang, Wei-Qiang Zhang, Wei-Wei Liu, Jia Liu, Michael T. Johnson Jul 2018

Advanced Recurrent Network-Based Hybrid Acoustic Models For Low Resource Speech Recognition, Jian Kang, Wei-Qiang Zhang, Wei-Wei Liu, Jia Liu, Michael T. Johnson

Electrical and Computer Engineering Faculty Publications

Recurrent neural networks (RNNs) have shown an ability to model temporal dependencies. However, the problem of exploding or vanishing gradients has limited their application. In recent years, long short-term memory RNNs (LSTM RNNs) have been proposed to solve this problem and have achieved excellent results. Bidirectional LSTM (BLSTM), which uses both preceding and following context, has shown particularly good performance. However, the computational requirements of BLSTM approaches are quite heavy, even when implemented efficiently with GPU-based high performance computers. In addition, because the output of LSTM units is bounded, there is often still a vanishing gradient issue over multiple layers. …


Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …


Survey Results On Adults And Cybersecurity Education, Frank Breitinger, Joseph Ricci, Ibrahim Baggili Jul 2018

Survey Results On Adults And Cybersecurity Education, Frank Breitinger, Joseph Ricci, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Cyberattacks and identity theft are common problems nowadays where researchers often say that humans are the weakest link in the security chain. Therefore, this survey focused on analyzing the interest for adults for ‘cyber threat education seminars’, e.g., how to project themselves and their loved ones. Specifically, we asked questions to understand a possible audience, willingness for paying / time commitment, or fields of interest as well as background and previous training experience. The survey was conducted in late 2016 and taken by 233 participants. The results show that many are worried about cyber threats and about their children exploring …


Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger Jul 2018

Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

While various tools have been created to assist the digital forensics community with acquiring, processing, and organizing evidence and indicating the existence of artifacts, very few attempts have been made to establish a centralized system for archiving artifacts. The Artifact Genome Project (AGP) has aimed to create the largest vetted and freely available digital forensics repository for Curated Forensic Artifacts (CuFAs). This paper details the experience of building, implementing, and maintaining such a system by sharing design decisions, lessons learned, and future work. We also discuss the impact of AGP in both the professional and academic realms of digital forensics. …


Spatial Distribution Of Partner-Seeking Men Who Have Sex With Men Using Geosocial Networking Apps: Epidemiologic Study, Angel B. Algarin, Patrick J. Ward, W. Jay Christian, Abby E. Rudolph, Ian W. Holloway, April M. Young May 2018

Spatial Distribution Of Partner-Seeking Men Who Have Sex With Men Using Geosocial Networking Apps: Epidemiologic Study, Angel B. Algarin, Patrick J. Ward, W. Jay Christian, Abby E. Rudolph, Ian W. Holloway, April M. Young

Epidemiology and Environmental Health Faculty Publications

Background: Geosocial networking apps have made sexual partner-seeking easier for men who have sex with men, raising both challenges and opportunities for human immunodeficiency virus and sexually transmitted infection prevention and research. Most studies on men who have sex with men geosocial networking app use have been conducted in large urban areas, despite research indicating similar patterns of online- and app-based sex-seeking among men who have sex with men in rural and midsize cities.

Objective: The goal of our research was to examine the spatial distribution of geosocial networking app usage and characterize areas with increasing numbers of partner-seeking men …


Experiences Building, Training, And Deploying A Chatbot In An Academic Library, David Meincke May 2018

Experiences Building, Training, And Deploying A Chatbot In An Academic Library, David Meincke

Library Staff Publications

No abstract provided.


Security Analysis Of The Uconn Husky One Card, Trevor Phillips May 2018

Security Analysis Of The Uconn Husky One Card, Trevor Phillips

Honors Scholar Theses

The “Husky One Card” is the name given to student IDs at the University of Connecticut. It can identify students, faculty, and staff in a variety of situations. The One Card is used for meal plans, Husky Bucks (an equivalent of money, but valid only in the Storrs area), residence hall/ university facility access, and student health services. The current Husky One Card consists of a picture identification on the front and a standard 1-dimensional barcode and 3-track magnetic strip on the back.

The goal of this thesis is to investigate the feasibility of cloning Husky One Cards, the ease …


Building A Smart Nation: Singapore’S Digital Journey, Siu Loon Hoe May 2018

Building A Smart Nation: Singapore’S Digital Journey, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

The journey towards smart city status is a strong global trend as governments around the world strive to harness technology to improve the quality of life for their citizens (United Nations, 2016). The widespread phenomenon of becoming “smart” is a key topic of discussion and research that continues to change as new digital technologies develop (Ishkineeva et al., 2015). The smart cities theme is important because it explores how governments, as providers of public goods, harness digital technologies to improve the lives of citizens around the world in the present and the future.


Library Awesome Sauce Undergraduate Research, Jeremy Evert, Phillip Joe Fitzsimmons, Hector Lucas Apr 2018

Library Awesome Sauce Undergraduate Research, Jeremy Evert, Phillip Joe Fitzsimmons, Hector Lucas

Faculty Articles & Research

Library Awesome Sauce Undergraduate Research was a presentation at the 2018 CADRE Conference in Stillwater, OK. The presenters discussed their collaboration on a video project to film interviews of students giving progress reports about their software engineering projects. The videos were posted on the institutional repository.

The speakers discussed Student-Led research and the role that academic libraries play in facilitating student and faculty research and publishing for all disciplines on campus.


Artificial Intelligence(Ai) Application In Library Systems In Iran: A Taxonomy Study, Asefeh Asemi, Adeleh Asemi Feb 2018

Artificial Intelligence(Ai) Application In Library Systems In Iran: A Taxonomy Study, Asefeh Asemi, Adeleh Asemi

Library Philosophy and Practice (e-journal)

With introducing and developing AI logic, this science as a branch of computer science could impact and improve all sciences which used computer systems. LIS also could get benefit from AI in many areas. This paper survey applications of AI in library and information science and introduce the potential of library system to apply AI techniques. Intelligent systems have contributed for many librarian purposes like cataloging, indexing, information retrieval, reference, and other purposes. We applied Exploratory Factor Analysis (EFA) as a primer method for identification of the most applicable AI techniques categories in LIS. ESs are the most usable intelligent …


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2018

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

All Faculty Scholarship

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …


An Overview Of The Usage Of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim Baggili Jan 2018

An Overview Of The Usage Of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The recent Mirai botnet attack demonstrated the danger of using default passwords and showed it is still a major problem. In this study we investigated several common applications and their password policies. Specifically, we analyzed if these applications: (1) have default passwords or (2) allow the user to set a weak password (i.e., they do not properly enforce a password policy). Our study shows that default passwords are still a significant problem: 61% of applications inspected initially used a default or blank password. When changing the password, 58% allowed a blank password, 35% allowed a weak password of 1 character.


Common Carriage’S Domain, Christopher S. Yoo Jan 2018

Common Carriage’S Domain, Christopher S. Yoo

All Faculty Scholarship

The judicial decision invalidating the Federal Communications Commission's first Open Internet Order has led advocates to embrace common carriage as the legal basis for network neutrality. In so doing, network neutrality proponents have overlooked the academic literature on common carriage as well as lessons from its implementation history. This Essay distills these learnings into five factors that play a key role in promoting common carriage's success: (1) commodity products, (2) simple interfaces, (3) stability and uniformity in the transmission technology, (4) full deployment of the transmission network, and (5) stable demand and market shares. Applying this framework to the Internet …


Forecasting Changes In Religiosity And Existential Security With An Agent-Based Model, Ross J. Gore, Carlos Lemos, F. Leron Shults, Wesley J. Wildman Jan 2018

Forecasting Changes In Religiosity And Existential Security With An Agent-Based Model, Ross J. Gore, Carlos Lemos, F. Leron Shults, Wesley J. Wildman

VMASC Publications

We employ existing data sets and agent-based modeling to forecast changes in religiosity and existential security among a collective of individuals over time. Existential security reflects the extent of economic, socioeconomic and human development provided by society. Our model includes agents in social networks interacting with one another based on the education level of the agents, the religious practices of the agents, and each agent's existential security within their natural and social environments. The data used to inform the values and relationships among these variables is based on rigorous statistical analysis of the International Social Survey Programme Religion Module (ISSP) …


A Pilot Study On Facial Expression Recognition Ability Of Autistic Children Using Ryan, A Rear-Projected Humanoid Robot, Farzaneh Askari, Huanghao Feng, Timothy D. Sweeny, Mohammad H. Mahoor Jan 2018

A Pilot Study On Facial Expression Recognition Ability Of Autistic Children Using Ryan, A Rear-Projected Humanoid Robot, Farzaneh Askari, Huanghao Feng, Timothy D. Sweeny, Mohammad H. Mahoor

Electrical and Computer Engineering: Graduate Student Scholarship

Rear-projected robots use computer graphics technology to create facial animations and project them on a mask to show the robot’s facial cues and expressions. These types of robots are becoming commercially available, though more research is required to understand how they can be effectively used as a socially assistive robotic agent. This paper presents the results of a pilot study on comparing the facial expression recognition abilities of children with Autism Spectrum Disorder (ASD) with typically developing (TD) children using a rear-projected humanoid robot called Ryan. Six children with ASD and six TD children participated in this research, where Ryan …


How Children With Autism Spectrum Disorder Recognize Facial Expressions Displayed By A Rear-Projection Humanoid Robot, Farzaneh Askari, Huanghao Feng, Anibal Gutierrez, Timothy Sweeny, Mohammad H. Mahoor Jan 2018

How Children With Autism Spectrum Disorder Recognize Facial Expressions Displayed By A Rear-Projection Humanoid Robot, Farzaneh Askari, Huanghao Feng, Anibal Gutierrez, Timothy Sweeny, Mohammad H. Mahoor

Electrical and Computer Engineering: Graduate Student Scholarship

Background: Children with Autism Spectrum Disorder (ASD) experience reduced ability to perceive crucial nonverbal communication cues such as eye gaze, gestures, and facial expressions. Recent studies suggest that social robots can be used as effective tools to improve communication and social skills in children with ASD. One explanation has been put forward by several studies that children with ASD feel more contented and motivated in systemized and predictable environment, like interacting with robots.

Objectives: There have been few research studies evaluating how children with ASD perceive facial expression in humanoid robots but no research evaluating facial expression perception …


Using Virtual Reality And Photogrammetry To Enrich 3d Object Identity, Cole Juckette, Heather Richards-Rissetto, Hector Eluid Guerra Aldana, Norman Martinez Jan 2018

Using Virtual Reality And Photogrammetry To Enrich 3d Object Identity, Cole Juckette, Heather Richards-Rissetto, Hector Eluid Guerra Aldana, Norman Martinez

Department of Anthropology: Faculty Publications

The creation of digital 3D models for cultural heritage is commonplace. With the advent of efficient and cost effective technologies archaeologists are making a plethora of digital assets. This paper evaluates the identity of 3D digital assets and explores how to enhance or expand that identity by integrating photogrammetric models into VR. We propose that when a digital object acquires spatial context from its virtual surroundings, it gains an identity in relation to that virtual space, the same way that embedding the object with metadata gives it a specific identity through its relationship to other information. We explore this concept …


If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili Jan 2018

If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Cryptocurrencies have gained wide adoption by enthusiasts and investors. In this work, we examine seven different Android cryptowallet applications for forensic artifacts, but we also assess their security against tampering and reverse engineering. Some of the biggest benefits of cryptocurrency is its security and relative anonymity. For this reason it is vital that wallet applications share the same properties. Our work, however, indicates that this is not the case. Five of the seven applications we tested do not implement basic security measures against reverse engineering. Three of the applications stored sensitive information, like wallet private keys, insecurely and one was …


Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook Jan 2018

Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook

Copyright, Fair Use, Scholarly Communication, etc.

The main aim of this thesis is to call for a new analysis of cyber security which departs from the traditional security theory. I argue that the cyber domain is inherently different in nature, in that it is lacking in traditional boundaries and is reflexive in nature. Policy-makers are aware of these characteristics, and in turn this awareness changes the way that national cyber security strategy is handled and understood. These changes cannot be adequately understood through traditional understanding of security, as they often are, without missing significant details. Rather, examining these changes through the lens of Ulrich Beck’s risk …