Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 41

Full-Text Articles in Other Computer Engineering

Paper Prototyping Comfortable Vr Play For Diverse Sensory Needs, Louanne E. Boyd, Kendra Day, Ben Wasserman, Kaitlyn Abdo, Gillian Hayes, Erik J. Linstead May 2019

Paper Prototyping Comfortable Vr Play For Diverse Sensory Needs, Louanne E. Boyd, Kendra Day, Ben Wasserman, Kaitlyn Abdo, Gillian Hayes, Erik J. Linstead

Engineering Faculty Articles and Research

We co-designed paper prototype dashboards for virtual environments for three children with diverse sensory needs. Our goal was to determine individual interaction styles in order to enable comfortable and inclusive play. As a first step towards an inclusive virtual world, we began with designing for three sensory-diverse children who have labels of neurotypical, ADHD, and autism respectively. We focused on their leisure interests and their individual sensory profiles. We present the results of co-design with family members and paper prototyping sessions conducted by family members with the children. The results contribute preliminary empirical findings for accommodating different levels of engagement ...


Finding Truth In Fake News: Reverse Plagiarism And Other Models Of Classification, Matthew Przybyla, David Tran, Amber Whelpley, Daniel W. Engels Jan 2019

Finding Truth In Fake News: Reverse Plagiarism And Other Models Of Classification, Matthew Przybyla, David Tran, Amber Whelpley, Daniel W. Engels

SMU Data Science Review

As the digital age creates new ways of spreading news, fake stories are propagated to widen audiences. A majority of people obtain both fake and truthful news without knowing which is which. There is not currently a reliable and efficient method to identify “fake news”. Several ways of detecting fake news have been produced, but the various algorithms have low accuracy of detection and the definition of what makes a news item ‘fake’ remains unclear. In this paper, we propose a new method of detecting on of fake news through comparison to other news items on the same topic, as ...


Hometracker: A Household Information Feedback System For Food/Energy/Water Metabolism, Nichole Mackey Jan 2019

Hometracker: A Household Information Feedback System For Food/Energy/Water Metabolism, Nichole Mackey

Dissertations, Master's Theses and Master's Reports

The Food, Energy and Water Conscious (FEWCON) project seeks to understand how food, energy and water (FEW) as independent resources within households are connected. In the main study of the project, intervention messages that link household FEW consumption to equivalent climate consequences are pushed to the households. The goal of the FEWCON study is to determine potential intervention messages that influence household FEW consumption behavior.

A key component of the FEWCON study is a web application named HomeTracker (Household Metabolism Tracker) which collects FEW consumption data within households, then uses this data to select consumption-specific feedback to the homeowners. To ...


Discovering The Needs Of People At The 10/40 Window With Data Science, Germán H. Alférez, Ceila M. González May 2018

Discovering The Needs Of People At The 10/40 Window With Data Science, Germán H. Alférez, Ceila M. González

Adventist Human-Subject Researchers Association

Abstract: We propose an approach to discover the needs of people in particular areas of Iraq, a country located at the 10/40 Window, by means of Data Science applied to Open Big Data. The resulting model predicts refugee crises and artillery attacks with high accuracy even in areas with scarce data.


Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro Jan 2018

Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro

Journal of Human Performance in Extreme Environments

In this paper, we discuss the process we are using in the design and implementation of a tool to improve the situation awareness of cyberattacks in the power grid. We provide details of the steps we have taken to date and describe the steps that still need to be accomplished. The focus of this work is to provide situation awareness of the power grid to staff from different, non-overlapping roles in an electrical transmission organization in order to facilitate an understanding of a possible occurrence of a cyberattack. Our approach follows a user-centered design process and includes determining the types ...


Green Roof Policy Optimization Algorithms And Microsimulations Benefits And Downsides Of Green Roof Incentives And Mandates In San Francisco, Harrison Freund Jan 2018

Green Roof Policy Optimization Algorithms And Microsimulations Benefits And Downsides Of Green Roof Incentives And Mandates In San Francisco, Harrison Freund

Honors Theses at the University of Iowa

As the 21st Century progresses, developers are becoming more aware of their environmental footprint. As the Green Economy slowly gains its footing, developers will be expected to change current building practices to reflect the increasing demand to adapt to sustainability challenges. One such methodology used by LEED to evaluate the sustainability of a building is the implementation of a green roof, the installment of vegetation on the top of a building. There are many socioecological benefits that justify the implementation of a green roof, which explain why in recent years municipalities have enacted new policies to mandate or incentivize their ...


How The National Library Of Medicine Can Add Evidence To Your Mhealth App, Susan Halpin, Sherry Pagoto Nov 2017

How The National Library Of Medicine Can Add Evidence To Your Mhealth App, Susan Halpin, Sherry Pagoto

National Network of Libraries of Medicine New England Region (NNLM NER) Repository

Numerous systematic reviews of health-related mobile apps reveal they lack evidence based content. A major challenge to including evidence based content in apps is how to efficiently find accurate, credible, and vetted content. The National Library of Medicine houses the largest biomedical library in the world and provides numerous expert-developed online resources on disease and health education. In this webinar, Susan Halpin of the National Library of Medicine will introduce attendees to those resources, give examples of how they can and have been used in mobile apps, and discuss funding opportunities offered by the NLM.


Benchmarking Estonia's Cyber Security: An On-Ramping Methodology For Rapid Adoption And Implementation, Ernest Wong, Nan Porter, Mckinnon Hokanson, Bing Bing Xie Oct 2017

Benchmarking Estonia's Cyber Security: An On-Ramping Methodology For Rapid Adoption And Implementation, Ernest Wong, Nan Porter, Mckinnon Hokanson, Bing Bing Xie

Research Papers

In April of 2007, Estonia fell victim to a series of distributed denial of service (DDoS) attacks that crippled its government websites, email servers, media outlets, and banking system for nearly a month. Due to the devastating effects of these cyber attacks, Estonia took great efforts to strengthen its cyber security protocols. This research analyzes the reforms that Estonia has implemented in its domestic and foreign policies and attempts to determine if any of it systemic improvements can help to also bolster cyber security in the United States (US). The findings from this research are that Estonia’s policy reforms ...


In Search Of Homo Sociologicus, Yunqi Xue Sep 2017

In Search Of Homo Sociologicus, Yunqi Xue

All Dissertations, Theses, and Capstone Projects

The subject of this dissertation is to build an epistemic logic system that is able to show the spreading of knowledge and beliefs in a social network that contains multiple subgroups. Epistemic logic is the study of logical systems that express mathematical properties of knowledge and belief. In recent years, there have been increasing number of new epistemic logic systems that are focused on community properties such as knowledge and belief adoption among friends.

We are interested in revisable and actionable social knowledge/belief that leads to a large group action. Instead of centralized coordination, bottom-up approach is our focus ...


The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow Aug 2017

The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow

Faculty Scholarship at Penn Law

Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.


Modeling The Consumer Acceptance Of Retail Service Robots, So Young Song Aug 2017

Modeling The Consumer Acceptance Of Retail Service Robots, So Young Song

Doctoral Dissertations

This study uses the Computers Are Social Actors (CASA) and domestication theories as the underlying framework of an acceptance model of retail service robots (RSRs). The model illustrates the relationships among facilitators, attitudes toward Human-Robot Interaction (HRI), anxiety toward robots, anticipated service quality, and the acceptance of RSRs. Specifically, the researcher investigates the extent to which the facilitators of usefulness, social capability, the appearance of RSRs, and the attitudes toward HRI affect acceptance and increase the anticipation of service quality. The researcher also tests the inhibiting role of pre-existing anxiety toward robots on the relationship between these facilitators and attitudes ...


A Survey Of Addictive Software Design, Chauncey J. Neyman Jun 2017

A Survey Of Addictive Software Design, Chauncey J. Neyman

Computer Science

The average smartphone owner checks their phone more than 150 times per day. As of 2015, 62% of smartphone users had used their phone to look up information about a health condition, while 57% had used their phone to do online banking. Mobile platforms have become the dominant medium of human-computer interaction. So how have these devices established themselves as our go to connection to the Internet? The answer lies in addictive design. Software designers have become well versed in creating software that captivates us at a primal level. In this article, we survey addictive software design strategies, their bases ...


Real Time Learning Level Assessment Using Eye Tracking, Saurin S. Parikh, Hari Kalva May 2017

Real Time Learning Level Assessment Using Eye Tracking, Saurin S. Parikh, Hari Kalva

MODVIS Workshop

E-Learning is emerging as a convenient and effective learning tool. However, the challenge with eLearning is the lack of effective tools to assess levels of learning. Ability to predict difficult content in real time enables eLearning systems to dynamically provide supplementary content to meet learners’ needs. Recent developments have made possible low-cost eye trackers, which enables a new class of applications based on eye response. In comparison to past attempts using bio-metrics in learning assessments, with eye tracking, we can have access to the exact stimulus that is causing the response. A key aspect of the proposed approach is the ...


An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora May 2017

An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper presents a case study that occurred while observing peer-to-peer network communications on a botnet monitoring station and shares how tools were developed to discover what ultimately was identified as Mirai and many related IoT DDOS Botnets. The paper explains how researchers developed a customized protocol dissector in Wireshark using the Lua coding language, and how this enabled them to quickly identify new DDOS variants over a five month period of study.


Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu Oct 2016

Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu

Virginia Journal of Science

The use of social media has become an increasingly popular trend, and it is most favorite amongst teenagers. A major problem concerning teens using social media is that they are often unaware of the dangers involved when using these media. Also, teenagers are more inclined to misuse social media because they are often unaware of the privacy rights associated with the use of that particular media, or the rights of the other users. As a result, cyberbullying cases have a steady rise in recent years and have gone undiscovered, or are not discovered until serious harm has been caused to ...


An Inductive Ethnographic Study In Elderly Woman Technology Adoption And The Role Of Her Children, Noshad Rahimi, Antonie J, Jetter, Charles M. Weber Sep 2016

An Inductive Ethnographic Study In Elderly Woman Technology Adoption And The Role Of Her Children, Noshad Rahimi, Antonie J, Jetter, Charles M. Weber

Engineering and Technology Management Faculty Publications and Presentations

Elderly woman strives to have a streamlined life surrounded by ease and familiarity. As she is aging, her desire for simplicity grows, her self-efficacy weakens, her prudency intensifies and her overall inclination toward status quo strengthens. As a result, she delays, or refuses, making any decision that might bring complexity and disrupt the continuity in her life, particularly new and unfamiliar technologies (which often bring complexity, before providing ease). Consequently, her technology adoption has a much lower rate than that of other demographics. To open the black box of elderly woman technology adoption process, this study focuses on the role ...


Inducing Emotional Response In Interactive Media, Keenan M. Reimer Aug 2016

Inducing Emotional Response In Interactive Media, Keenan M. Reimer

Master's Theses and Project Reports

Video games, and entertainment media have been developed for many years, and eliciting emotional experiences is an integral part of that process. Producing and editing game content in order to affect desired emotional experiences can be expensive and cumbersome to developers. This paper presents a study intended to show that such experiences can be affected with simple after-the-fact audio-visual effects. As subjects of the study, participants experience three different emotional states, fear, peace, and none, over three rounds and in three different game environments. They are given a simple narrative in each environment that directs them to gather various objects ...


The Unique Hackathon Experience, Brittany Ann Kos Jan 2016

The Unique Hackathon Experience, Brittany Ann Kos

ATLAS Institute Graduate Contributions

In this paper, we give insight into the growing student hackathon movement. Student hackathons are weekend events where students come together to create, build, and share projects of any kind. These events are typically software and hardware focused, but have been expanding to broader disciplines. These events give students opportunities to learn and experience computing in ways that are not seen in a typical computer science classroom.

Out study collected data from 7,800 students participating in over 300 student hackathons, hosted from 2013-2016. We describe the particular model of student hackathon this data was collected from. Our analysis focuses ...


Network Structure, Network Flows And The Phenomenon Of Influence In Online Social Networks: An Exploratory Empirical Study Of Twitter Conversations About Youtube Product Categories, Nitin Venkat Mayande Aug 2015

Network Structure, Network Flows And The Phenomenon Of Influence In Online Social Networks: An Exploratory Empirical Study Of Twitter Conversations About Youtube Product Categories, Nitin Venkat Mayande

Dissertations and Theses

Traditional marketing models are swiftly being upended by the advent of online social networks. Yet, practicing firms that are engaging with online social networks neither have a reliable theory nor sufficient practical experience to make sense of the phenomenon. Extant theory in particular is based on observations of the real world, and may thus not apply to online social networks. Practicing firms may consequently be misallocating a large amount of resources, simply because they do not know how the online social networks with which they interact are organized.

The purpose of this dissertation is to investigate how online social networks ...


Understanding The Relationships Of User-Selected Music In Video Games, Memphis Wong Jun 2015

Understanding The Relationships Of User-Selected Music In Video Games, Memphis Wong

Liberal Arts and Engineering Studies

Music has been an integral part of video games in its contribution to users' gameplay experiences. Varying from simple sound effects to elaborate scores, music helps shape the reactive environment of each video game. In particular, video games that generate unique levels and scenarios based on music has become more popular as its own genre. Games such as Audiosurf take this further, with having the game revolve entirely around levels generated to custom tracks. The aim of this study is to analyze the impact of such games, when it allows a user to select his or her own music.


Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout May 2015

Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout

MODVIS Workshop

Images convey multiple meanings that depend on the context in which the viewer perceptually organizes the scene. This presents a problem for automated image segmentation, because it adds uncertainty to the process of selecting which objects to include or not include within a segment. I’ll discuss the implementation of a fuzzy-logic-natural-vision-processing engine that solves this problem by assuming the scene architecture prior to processing. The scene architecture, a standardized natural-scene-perception-taxonomy comprised of a hierarchy of nested spatial-taxons. Spatial-taxons are regions (pixel-sets) that are figure-like, in that they are perceived as having a contour, are either `thing-like', or a `group ...


Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo May 2015

Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo

MODVIS Workshop

Computer vision research rarely makes use of symmetry in stereo reconstruction despite its established importance in perceptual psychology. Such stereo reconstructions produce visually satisfying figures with precisely located points and lines, even when input images have low or moderate resolution. However, because few invariants exist, there are no known general approaches to solving symmetry correspondence on real images. The problem is significantly easier when combined with the binocular correspondence problem, because each correspondence problem provides strong non-overlapping constraints on the solution space. We demonstrate a system that leverages these constraints to produce accurate stereo models from pairs of binocular images ...


What Window Shopping The Health Insurance Exchanges In Year Two Revealed About The State Of The Consumer Experience, Daniel Polsky, Heather Howard Mar 2015

What Window Shopping The Health Insurance Exchanges In Year Two Revealed About The State Of The Consumer Experience, Daniel Polsky, Heather Howard

Penn Wharton Public Policy Initiative

Soon after the launch of HealthCare.gov, the exchange websites that formed the vanguard of the Affordable Care Act quickly became notorious for numerous bugs, crashes, and painfully slow loading times. Over a year later, the portals have reached a sufficient level of stability and core functionality on the back end. But what about the front end?


Mobile Apps In Collection Development: Supporting A Mobile Learning Environment, Stefanie Havelka, Rebecca Arzola Jan 2015

Mobile Apps In Collection Development: Supporting A Mobile Learning Environment, Stefanie Havelka, Rebecca Arzola

Publications and Research

We will discuss our rationale and thoughts on why we believe mobile apps should be part of a library’s collection development policy. An updated policy with apps encourages a mobile learning environment that is technologically diverse while being holistically supportive of its users and research.


An Empirical Study Of Semantic Similarity In Wordnet And Word2vec, Abram Handler Dec 2014

An Empirical Study Of Semantic Similarity In Wordnet And Word2vec, Abram Handler

University of New Orleans Theses and Dissertations

This thesis performs an empirical analysis of Word2Vec by comparing its output to WordNet, a well-known, human-curated lexical database. It finds that Word2Vec tends to uncover more of certain types of semantic relations than others -- with Word2Vec returning more hypernyms, synonomyns and hyponyms than hyponyms or holonyms. It also shows the probability that neighbors separated by a given cosine distance in Word2Vec are semantically related in WordNet. This result both adds to our understanding of the still-unknown Word2Vec and helps to benchmark new semantic tools built from word vectors.


Volunteered Geographical Information: An Alternative Solution For Overcoming The Chasm Between Stormwater Management And Community Participation, Yanfu Zhou May 2014

Volunteered Geographical Information: An Alternative Solution For Overcoming The Chasm Between Stormwater Management And Community Participation, Yanfu Zhou

Community and Regional Planning Program: Student Projects and Theses

It is a dramatic challenge to promote public engagement in stormwater management and green infrastructure initiatives. When traditional outreach approaches made important influence on public engagement, their limitations are also obvious. With the development of Web 2.0 technology, Volunteered Geographic Information (VGI) has been emerging as one of the most important user-generated geographic contents. The crowdsourcing data that generated by volunteers through geo-web, smartphones, and other geo-devices provides invaluable mass data for decision-making. VGI can provide a better understanding of planning issues and other challenges. The research aims to develop a mobile information platform to allow citizens to report ...


Improving Deaf Accessibility To Web-Based Multimedia, Brent N. Shiver Nov 2013

Improving Deaf Accessibility To Web-Based Multimedia, Brent N. Shiver

College of Computing and Digital Media Dissertations

Internet technologies have expanded rapidly over the past two decades, making information of all sorts more readily available. Not only are they more cost-effective than traditional media, these new media have contributed to quality and convenience. However, proliferation of video and audio media on the internet creates an inadvertent disadvantage for deaf Internet users. Despite technological and legislative milestones in recent decades in making television and movies more accessible, there has been little progress with online access. A major obstacle to providing captions for internet media is the high cost of captioning and transcribing services.

To respond to this problem ...


Dust To Digital: Electronic Document & Record Management For The Broome County Department Of Public Works- Engineering Divison, Scott R. Mastin Oct 2013

Dust To Digital: Electronic Document & Record Management For The Broome County Department Of Public Works- Engineering Divison, Scott R. Mastin

MPA Capstone Projects 2006 - 2015

The Broome County Department of Public Works- Engineering Division is currently preparing to implement an Electronic Document and Records Management System (EDRMS) to store their increasing number of digital records and to manage existing paper records as they are digitized. This study examines Division integrate electronic document and record management into their organization.


The Mayaarch3d Project: A 3d Webgis For Analyzing Ancient Architecture And Landscapes, Jennifer Von Schwerin, Heather Richards-Rissetto, Fabio Remondino, Giorgio Agugario, Gabrio Girardi Sep 2013

The Mayaarch3d Project: A 3d Webgis For Analyzing Ancient Architecture And Landscapes, Jennifer Von Schwerin, Heather Richards-Rissetto, Fabio Remondino, Giorgio Agugario, Gabrio Girardi

Anthropology Faculty Publications

There is a need in the humanities for a 3D WebGIS with analytical tools that allow researchers to analyze 3D models linked to spatially referenced data. Geographic Information Systems (GIS) allow for complex spatial analysis of 2.5D data. For example, they offer bird’s eye views of landscapes with extruded building footprints, but one cannot ‘get on the ground’ and interact with true 3D models from a pedestrian perspective. Meanwhile, 3D models and virtual environments visualize data in 3D space, but analytical tools are simple rotation or lighting effects. The MayaArch3D Project is developing a 3D WebGIS—called QueryArch3D ...


Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez Feb 2013

Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez

Emmanouil Alexander Zografakis EZ

Our era can be characterized as the era of knowledge proliferation and bountifulness. That has marked our era as the era following the pace of the Information Society Development. Information Society has also brought about a remarkable IT development pace over countries. Thereby, it is greatly important all that raw knowledge to become mind figments, ideas and even inventions and innovations. It is also essential to highlight that such a beneficial process will ensure the continuity of the IT development. The only way to achieve that goal is to find a way to secure all that aforementioned knowledge which is ...