Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Social and Behavioral Sciences

Institution
Keyword
Publication Year
Publication

Articles 31 - 60 of 132

Full-Text Articles in Computer Engineering

Detecting User Emotions From Audio Conversations With The Smart Assistants, Sunanda Guha Jan 2022

Detecting User Emotions From Audio Conversations With The Smart Assistants, Sunanda Guha

MSU Graduate Theses

With the proliferation of smart home devices like Google Home or Amazon Alexa, significant research endeavors are being carried out to improve the user experience while interacting with these smart assistants. One such dimension in this endeavor is ongoing research on successful emotion detection from short voice commands used in smart home environment. Besides facial expression and body language, etc., speech plays a pivotal role in the classification of emotions when it comes to smart home application. Upon successful implementation of accurate emotion recognition, the smart devices will be able to intelligently and empathetically suggest appropriate actions based on the …


Addressing Security And Privacy Issues By Analyzing Vulnerabilities In Iot Applications, Francsico Javier Candelario Burgoa Dec 2021

Addressing Security And Privacy Issues By Analyzing Vulnerabilities In Iot Applications, Francsico Javier Candelario Burgoa

Open Access Theses & Dissertations

The Internet of Things (IoT) environment has been expanding rapidly for the past few years into several areas of our lives, from factories, to stores and even into our own homes. All these new devices in our homes make our day-to-day lives easier and more comfortable with less effort on our part, converting our simple houses into smart homes. This increase in inter-connectivity brings multiple benefits including the improvement in energy efficiency in our homes, however it also brings with it some potential dangers since more points of connection mean more potential vulnerabilities in our grid. These vulnerabilities bring security …


A Youthful Metaverse: Towards Designing Safe, Equitable, And Emotionally Fulfilling Social Virtual Reality Spaces For Younger Users, Divine Maloney Dec 2021

A Youthful Metaverse: Towards Designing Safe, Equitable, And Emotionally Fulfilling Social Virtual Reality Spaces For Younger Users, Divine Maloney

All Dissertations

Social virtual reality (VR) represents the modern rendition of the metaverse, this dissertation aims to fill the research gaps while highlighting trends of youth in VR. The scientific contributions of this research include 1) expanding the current HCI understanding of the social dynamics and the interactions of teens in emerging novel online digital spaces; 2) bridging two research areas that have not been widely studied in HCI, social VR and young users in social VR; and 3) generating design implications to inform the design of future social VR platforms to better support and protect teens’ online social experiences, results which …


Towards Characterizing Adversarial Opportunity And Behavior In Critical Infrastructure Network, Md Sharif Ullah Dec 2021

Towards Characterizing Adversarial Opportunity And Behavior In Critical Infrastructure Network, Md Sharif Ullah

Electrical & Computer Engineering Theses & Dissertations

The growth of information and communication technology is constantly revolutionizing various domains, e.g., energy utility systems, healthcare, the internet of things, etc. This inception of widespread cyber technology enables reliability and first operability of the system, yet simultaneously imposed a risk of significant impact due to disruption of safe and secure operation. The attack surface is expanding, creating a cyber exposure gap which indicates a higher threat landscape and increased risk of compromise. Motivated by this increased threat exposure, this dissertation investigates the attack surface as a static and dynamic indicator of adversary propagation, seeking an efficient modeling paradigm to …


Data-Driven Operational And Safety Analysis Of Emerging Shared Electric Scooter Systems, Qingyu Ma Dec 2021

Data-Driven Operational And Safety Analysis Of Emerging Shared Electric Scooter Systems, Qingyu Ma

Computational Modeling & Simulation Engineering Theses & Dissertations

The rapid rise of shared electric scooter (E-Scooter) systems offers many urban areas a new micro-mobility solution. The portable and flexible characteristics have made E-Scooters a competitive mode for short-distance trips. Compared to other modes such as bikes, E-Scooters allow riders to freely ride on different facilities such as streets, sidewalks, and bike lanes. However, sharing lanes with vehicles and other users tends to cause safety issues for riding E-Scooters. Conventional methods are often not applicable for analyzing such safety issues because well-archived historical crash records are not commonly available for emerging E-Scooters.

Perceiving the growth of such a micro-mobility …


Subnational Map Of Poverty Generated From Remote-Sensing Data In Africa: Using Machine Learning Models And Advanced Regression Methods For Poverty Estimation, Lionel N. Hanke Sep 2021

Subnational Map Of Poverty Generated From Remote-Sensing Data In Africa: Using Machine Learning Models And Advanced Regression Methods For Poverty Estimation, Lionel N. Hanke

Master's Theses

According to the 2020 poverty estimates from the World Bank, it is estimated that 9.1% - 9.4% of the global population lived on less than $1.90 per day. It is estimated that the Covid-19 pandemic further aggravated the issue by pushing more than 1% of the global population below the international poverty line of $1.90 per day (WorldBank, 2020). To provide help and formulate effective measures, poverty needs to be located as exact as possible. For this purpose, it was investigated whether regression methods with aggregated remote-sensing data could be used to estimate poverty in Africa. Therefore, five distinct regression …


Promoting Diversity In Academic Research Communities Through Multivariate Expert Recommendation, Omar Salman Jul 2021

Promoting Diversity In Academic Research Communities Through Multivariate Expert Recommendation, Omar Salman

Graduate Theses and Dissertations

Expert recommendation is the process of identifying individuals who have the appropriate knowledge and skills to achieve a specific task. It has been widely used in the educational environment mainly in the hiring process, paper-reviewer assignment, and assembling conference program committees. In this research, we highlight the problem of diversity and fair representation of underrepresented groups in expertise recommendation, factors that current expertise recommendation systems rarely consider. We introduce a novel way to model experts in academia by considering demographic attributes in addition to skills. We use the h-index score to quantify skills for a researcher and we identify five …


Data-Driven Studies On Social Networks: Privacy And Simulation, Yasanka Sameera Horawalavithana Jun 2021

Data-Driven Studies On Social Networks: Privacy And Simulation, Yasanka Sameera Horawalavithana

USF Tampa Graduate Theses and Dissertations

Social media datasets are fundamental to understanding a variety of phenomena, such as epidemics, adoption of behavior, crowd management, and political uprisings. At the same time, many such datasets capturing computer-mediated social interactions are recorded nowadays by individual researchers or by organizations. However, while the need for real social graphs and the supply of such datasets are well established, the flow of data from data owners to researchers is significantly hampered by privacy risks: even when humans’ identities are removed, or data is anonymized to some extent, studies have proven repeatedly that re-identifying anonymized user identities (i.e., de-anonymization) is doable …


The Effects Of Artificial Intelligence On Competitive Sports, Qiyu Pu Jun 2021

The Effects Of Artificial Intelligence On Competitive Sports, Qiyu Pu

School of Professional Studies

This Research thesis is to explore the application and impact of artificial intelligence in the field of competitive sports, discover the risks and problems in it, and discuss solutions. Nowadays, artificial intelligence has been applied to all walks of life, and the field of competitive sports is no exception, such as VR video technology, artificial intelligence for competition and player data analysis, artificial intelligence equipment to help players train, artificial intelligence to develop tactics, etc. But artificial intelligence has also brought about problems such as disrupting game viewing, making intellectual competitive sports meaningless, and threatening the status of industry practitioners. …


Human Fatigue Predictions In Complex Aviation Crew Operational Impact Conditions, Suresh Rangan May 2021

Human Fatigue Predictions In Complex Aviation Crew Operational Impact Conditions, Suresh Rangan

Doctoral Dissertations

In this last decade, several regulatory frameworks across the world in all modes of transportation had brought fatigue and its risk management in operations to the forefront. Of all transportation modes air travel has been the safest means of transportation. Still as part of continuous improvement efforts, regulators are insisting the operators to adopt strong fatigue science and its foundational principles to reinforce safety risk assessment and management. Fatigue risk management is a data driven system that finds a realistic balance between safety and productivity in an organization. This work discusses the effects of mathematical modeling of fatigue and its …


Malicious Hardware & Its Effects On Industry, Gustavo Perez May 2021

Malicious Hardware & Its Effects On Industry, Gustavo Perez

Computer Science and Computer Engineering Undergraduate Honors Theses

In recent years advancements have been made in computer hardware security to circumnavigate the threat of malicious hardware. Threats come in several forms during the development and overall life cycle of computer hardware and I aim to highlight those key points. I will illustrate the various ways in which attackers exploit flaws in a chip design, or how malicious parties take advantage of the many steps required to design and fabricate hardware. Due to these exploits, the industry and consumers have suffered damages in the form of financial loss, physical harm, breaches of personal data, and a multitude of other …


Authentication Schemes' Impact On Working Memory, Janine D. Mator Apr 2021

Authentication Schemes' Impact On Working Memory, Janine D. Mator

Psychology Theses & Dissertations

Authentication is the process by which a computing system validates a user’s identity. Although this process is necessary for system security, users view authentication as a frequent disruption to their primary tasks. During this disruption, primary task information must be actively maintained in working memory. As a result, primary task information stored in working memory is at risk of being lost or corrupted while users authenticate. For over two decades, researchers have focused on developing more memorable passwords by replacing alphanumeric text with visual graphics (Biddle et al., 2012). However, very little attention has been given to the impact authentication …


Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King Jan 2021

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King

CCE Theses and Dissertations

It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …


Improving Employees’ Compliance With Password Policies, Enas Albataineh Jan 2021

Improving Employees’ Compliance With Password Policies, Enas Albataineh

CCE Theses and Dissertations

Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.

The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.

A non-probability convenience sample was employed. The sample consisted of …


Effect Of Digital Advertising On Website Traffic At A Kentucky Comprehensive Regional University, Brandon Lee Moore Jan 2021

Effect Of Digital Advertising On Website Traffic At A Kentucky Comprehensive Regional University, Brandon Lee Moore

Online Theses and Dissertations

The purpose of this research is to quantify differences in key performance indicators between paid and organic (not paid) website traffic over a one year period of time at a regional comprehensive university in Kentucky, which is located in the southeastern United States. Two distinct sources of website traffic can be measured: paid traffic and organic traffic. Using data from website traffic analytics, this study employed multiple linear regression analysis and time series methods to understand the similarities and differences between key performance indicators of paid traffic and organic traffic as they relate to key performance indicators. Data from Google …


Evaluating Social Media As A Medium Of Private Communication Through Steganographic Images, Kendall Weldon Coles Jan 2021

Evaluating Social Media As A Medium Of Private Communication Through Steganographic Images, Kendall Weldon Coles

Graduate Theses, Dissertations, and Problem Reports

Social media is a vastly used communication tool with billions of users worldwide. These social networks provide users the ability to share their ideas and thoughts through the messages, videos, and images that they post. The images that are shared can possibly be embedded with private messages through the use of a steganographic tool. The messages are embedded in a fashion that doesn’t change the visual appearance of an image. This allows for these types of images to hide in plain sight, which creates the possibility of someone communicating privately in a public social media setting. This project proved how …


Reading Robot, Gillian Watts, Andrew Myers, Sabrinna Tan, Taylor Klein, Omeed Djassemi Jun 2020

Reading Robot, Gillian Watts, Andrew Myers, Sabrinna Tan, Taylor Klein, Omeed Djassemi

General Engineering

Presently, there is an insufficient availability of human experts to assist students in reading competency and comprehension. Our team’s goal was to create an improved socially assistive robot for use by therapists, teachers, and parents to help children and adults develop reading skills while they do not have access to specialists. HAPI is a socially assistive robot that we created with the goal of helping students practice their reading comprehension skills. HAPI enables a student to improve their reading skills without an educator present, while enabling educators to review the student's performance remotely. Design constraints included: physical size, weight, duration …


A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki Jan 2020

A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki

Electronic Thesis and Dissertation Repository

Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data interaction, and …


Dual-Axis Solar Tracker, Bryan Kennedy Jan 2020

Dual-Axis Solar Tracker, Bryan Kennedy

All Undergraduate Projects

Renewable energies, and fuels that are not fossil fuel-based, are one of the prolific topics of debate in modern society. With climate change now becoming a primary focus for scientists and innovators of today, one of the areas for the largest amount of potential and growth is that of the capturing and utilization of Solar Energy. This method involves using a mechanical system to track the progression of the sun as it traverses the sky throughout the day. A dual-axis solar tracker such as the one designed and built for this project, can follow the sun both azimuthally and in …


Desarrollo De Un Esquema De Gestión Hídrica En El Sistema Acuífero Sap 3.1 Apoyado De La Tipificación De Suelos Y El Modelo Conceptual De Thöt, Maria Camila Soriano Espinosa, Camilo José Rodríguez Carvajal Jan 2020

Desarrollo De Un Esquema De Gestión Hídrica En El Sistema Acuífero Sap 3.1 Apoyado De La Tipificación De Suelos Y El Modelo Conceptual De Thöt, Maria Camila Soriano Espinosa, Camilo José Rodríguez Carvajal

Ingeniería Ambiental y Sanitaria

El presente proyecto tiene como objetivo principal desarrollar un esquema de gestión hídrica (EGH) en el sistema acuífero SAP 3.1, provincia llanos orientales, con base en la tipificación de suelos y el modelo conceptual de Tӧth, partiendo de que las aguas subterráneas se consideran una fuente alternativa de abastecimiento por su mejor calidad y el bajo costo de manejo en comparación al agua superficial, y teniendo en cuenta que el Departamento del Meta conoce la riqueza hídrica que está en su jurisdicción, no cuenta con una regulación adecuada en pro de una gestión hídrica a nivel subterráneo. La metodología empleada …


Eyecom: An Innovative Approach For Computer Interaction, Anam Mazhar Jan 2020

Eyecom: An Innovative Approach For Computer Interaction, Anam Mazhar

Theses, Dissertations and Capstones

The world is innovating rapidly, and there is a need for continuous interaction with the technology. Sadly, there do not exist promising options for paralyzed people to interact with the machines i.e., laptops, smartphones, and tabs. A few commercial solutions such as Google Glasses are costly and cannot be afforded by every paralyzed person for such interaction. Towards this end, the thesis proposes a retina-controlled device called EYECOM. The proposed device is constructed from off-the-shelf cost-effective yet robust IoT devices (i.e., Arduino microcontrollers, Xbee wireless sensors, IR diodes, and accelerometer). The device can easily be mounted on to the glasses; …


Xylo-Bot: A Therapeutic Robot-Based Music Platform For Children With Autism, Huanghao Feng Jan 2020

Xylo-Bot: A Therapeutic Robot-Based Music Platform For Children With Autism, Huanghao Feng

Electronic Theses and Dissertations

Children with Autism Spectrum Disorder (ASD) experience deficits in verbal and nonverbal communication skills, including motor control, emotional facial expressions, and eye gaze / joint attention. This Ph.D. dissertation focuses on studying the feasibility and effectiveness of using a social robot, called NAO, and a toy music instrument, xylophone, at modeling and improving the social responses and behaviors of children with ASD. In our investigation, we designed an autonomous social interactive music teaching system to fulfill this mission.

A novel modular robot-music teaching system consisting of three modules is presented. Module 1 provides an autonomous self-awareness positioning system for the …


Nyku: A Social Robot For Children With Autism Spectrum Disorders, Dan Stephan Stoianovici Jan 2020

Nyku: A Social Robot For Children With Autism Spectrum Disorders, Dan Stephan Stoianovici

Electronic Theses and Dissertations

The continued growth of Autism Spectrum Disorders (ASD) around the world has spurred a growth in new therapeutic methods to increase the positive outcomes of an ASD diagnosis. It has been agreed that the early detection and intervention of ASD disorders leads to greatly increased positive outcomes for individuals living with the disorders. Among these new therapeutic methods, Robot-Assisted Therapy (RAT) has become a hot area of study. Recent works have shown that high functioning ASD children have an affinity for interacting with robots versus humans. It is proposed that this is due to a less complex set of communication …


Determining Tone Of A Body Of Text, Cole G. Hollant Jan 2020

Determining Tone Of A Body Of Text, Cole G. Hollant

Senior Projects Spring 2020

We will be looking into emotion detection and manipulation within a body of text based off of Robert Plutchik’s basic emotions. This project encompasses building probabilistic and lexical models, full-stack web development, and dataset creation and application. We will build our models off of Latent Dirichlet Allocation—a grouping model common in natural language processing (nlp) and lexicons compiled through crowdsourcing. User testing is undergone as a means of measuring the effectiveness of our models. We discuss the application of concepts and technologies including MongoDB, REST APIs, containerization, IaaS, and web frontends.


Fast Decision-Making Under Time And Resource Constraints, Kyle Gabriel Lassak Jan 2020

Fast Decision-Making Under Time And Resource Constraints, Kyle Gabriel Lassak

Graduate Theses, Dissertations, and Problem Reports

Practical decision makers are inherently limited by computational and memory resources as well as the time available in which to make decisions. To cope with these limitations, humans actively seek methods which limit their resource demands by exploiting structure within the environment and exploiting a coupling between their sensing and actuation to form heuristics for fast decision-making. To date, such behavior has not been replicated in artificial agents. This research explores how heuristics may be incorporated into the decision-making process to quickly make high-quality decisions through the analysis of a prominent case study: the outfielder problem. In the outfielder problem, …


Modeling Social Learning: An Agent-Based Approach, Erika G. Ardiles Cruz Oct 2019

Modeling Social Learning: An Agent-Based Approach, Erika G. Ardiles Cruz

Computational Modeling & Simulation Engineering Theses & Dissertations

Learning is the process of acquiring or modifying knowledge, behavior, or skills. The ability to learn is inherent to humans, animals, and plants, and even machines are provided with algorithms that could mimic in a restricted way the processes of learning. Humans learn from the time they are born until they die because of a continuous process of interaction between them and their environment. Behavioral Psychology Theories and Social Learning Theories study behavior learned from the environment and social interactions through stimulus-response. Some computer approaches to modeling human behavior attempted to represent the learning and decision-making processes using agent-based models. …


Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera Jun 2019

Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera

Student Theses

In today’s world, the Blockchain technology is used for different purposes has brought an increment in the development of different Blockchain platforms, services, and utilities for storing data securely and efficiently. Quorum Blockchain, an Ethereum fork created by JPMorgan Chase, has placed itself in one of the widely used, efficient and trustful Blockchain platforms available today. Because of the importance which Quorum is contributing to the world, it is important to test and measure different aspects of the platform, not only to prove how efficient the software can be but as well as to have a clear view on what …


Prototyping A Capacitive Sensing Device For Gesture Recognition, Chenglong Lin May 2019

Prototyping A Capacitive Sensing Device For Gesture Recognition, Chenglong Lin

Computer Science and Computer Engineering Undergraduate Honors Theses

Capacitive sensing is a technology that can detect proximity and touch. It can also be utilized to measure position and acceleration of gesture motions. This technology has many applications, such as replacing mechanical buttons in a gaming device interface, detecting respiration rate without direct contact with the skin, and providing gesture sensing capability for rehabilitation devices. In this thesis, an approach to prototype a capacitive gesture sensing device using the Eagle PCB design software is demonstrated. In addition, this paper tested and evaluated the resulting prototype device, validating the effectiveness of the approach.


Identifying Fake News Using Emotion Analysis, Brady Gilleran May 2019

Identifying Fake News Using Emotion Analysis, Brady Gilleran

Computer Science and Computer Engineering Undergraduate Honors Theses

This paper presents research applying Emotional Analysis to “Fake News” and “Real News” articles to investigate whether or not there is a difference in the emotion used in these two types of news articles. The paper reports on a dataset for Fake and Real News that we created, and the natural language processing techniques employed to process the collected text. We use a lexicon that includes predefined words for eight emotions (anger, anticipation, disgust, fear, surprise, sadness, joy, trust) to measure the emotional impact in each of these eight dimensions. The results of the emotion analysis are used as features …


Applications Of Fog Computing In Video Streaming, Kyle Smith May 2019

Applications Of Fog Computing In Video Streaming, Kyle Smith

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this paper is to show the viability of fog computing in the area of video streaming in vehicles. With the rise of autonomous vehicles, there needs to be a viable entertainment option for users. The cloud fails to address these options due to latency problems experienced during high internet traffic. To improve video streaming speeds, fog computing seems to be the best option. Fog computing brings the cloud closer to the user through the use of intermediary devices known as fog nodes. It does not attempt to replace the cloud but improve the cloud by allowing faster …