Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Selected Works

Keyword
Publication Year
Publication
File Type

Articles 31 - 60 of 2682

Full-Text Articles in Physical Sciences and Mathematics

Tests As Maintainable Assets Via Auto-Generated Spies: A Case Study Involving The Scala Collections Library's Iterator Trait, Konstantin Läufer, John O'Sullivan, George K. Thiruvathukal Jun 2019

Tests As Maintainable Assets Via Auto-Generated Spies: A Case Study Involving The Scala Collections Library's Iterator Trait, Konstantin Läufer, John O'Sullivan, George K. Thiruvathukal

George K. Thiruvathukal

In testing stateful abstractions, it is often necessary to record interactions, such as method invocations, and express assertions over these interactions. Following the Test Spy design pattern, we can reify such interactions programmatically through additional mutable state. Alternatively, a mocking framework, such as Mockito, can automatically generate test spies that allow us to record the interactions and express our expectations in a declarative domain-specific language. According to our study of the test code for Scala’s Iterator trait, the latter approach can lead to a significant reduction of test code complexity in terms of metrics such as code size (in some …


Healthcare It In Skilled Nursing And Post-Acute Care Facilities: Reducing Hospital Admissions And Re-Admissions, Improving Reimbursement And Improving Clinical Operations, Scott L. Hopes Jun 2019

Healthcare It In Skilled Nursing And Post-Acute Care Facilities: Reducing Hospital Admissions And Re-Admissions, Improving Reimbursement And Improving Clinical Operations, Scott L. Hopes

Scott Hopes

Health information technology (HIT), which includes electronic health record (EHR) systems and clinical data analytics, has become a major component of all health care delivery and care management. The adoption of HIT by physicians, hospitals, post-acute care organizations, pharmacies and other health care providers has been accepted as a necessary (and recently, a government required) step toward improved quality, care coordination and reduced costs: “Better coordination of care provides a path to improving communication, improving quality of care, and reducing unnecessary emergency room use and hospital readmissions. LTPAC providers play a critical role in achieving these goals” (HealthIT.gov, 2013).

Though …


Plw Tutorial: Processing Narratives By Means Of Action Languages​, Yuliya Lierler Jun 2019

Plw Tutorial: Processing Narratives By Means Of Action Languages​, Yuliya Lierler

Yuliya Lierler

The tutorial explains the design of a narrative understanding tool Text2Alm. System Text2Alm uses an action language ALM to perform inferences on complex interactions of events described in narratives. The methodology used to implement the Text2Alm was originally outlined by Lierler, Inclezan, and Gelfond in 2017. Text2Alm relies on a conglomeration of resources and techniques from two distinct fields of artificial intelligence, namely, natural language processing and knowledge representation and reasoning. The tutorial will also present the results on the effectiveness of system Text2Alm measured by its ability to correctly answer questions from the bAbI tasks published by Facebook Research …


Shayna T. Blum: Design Research, Shayna Blum May 2019

Shayna T. Blum: Design Research, Shayna Blum

Shayna Blum

No abstract provided.


Draft Genome Sequences Of Three Monokaryotic Isolates Of The White-Rot Basidiomycete Fungus Dichomitus Squalens, Sara Casado López, Mao Peng, Paul Daly, Bill Andreopoulos, Jasmyn Pangilinan, Anna Lipzen, Robert Riley, Steven Ahrendt, Vivian Ng, Kerrie W. Barry, Chris Daum, Igor V. Grigoriev, Kristiina S. Hildén, Miia R. Mäkelä, Ronald P. De Vries May 2019

Draft Genome Sequences Of Three Monokaryotic Isolates Of The White-Rot Basidiomycete Fungus Dichomitus Squalens, Sara Casado López, Mao Peng, Paul Daly, Bill Andreopoulos, Jasmyn Pangilinan, Anna Lipzen, Robert Riley, Steven Ahrendt, Vivian Ng, Kerrie W. Barry, Chris Daum, Igor V. Grigoriev, Kristiina S. Hildén, Miia R. Mäkelä, Ronald P. De Vries

William B. Andreopoulos

Here, we report the draft genome sequences of three isolates of the wood-decaying white-rot basidiomycete fungus Dichomitus squalens. The genomes of these monokaryons were sequenced to provide more information on the intraspecies genomic diversity of this fungus and were compared to the previously sequenced genome of D. squalens LYAD-421 SS1.


Use Of Software Process In Research Software Development:A Survey, Nasir U. Eisty, George K. Thiruvathukal, Jeffrey C. Carver Apr 2019

Use Of Software Process In Research Software Development:A Survey, Nasir U. Eisty, George K. Thiruvathukal, Jeffrey C. Carver

George K. Thiruvathukal

Background: Developers face challenges in building high-quality research software due to its inherent complexity. These challenges can reduce the confidence users have in the quality of the result produced by the software. Use of a defined software development process, which divides the development into distinct phases, results in improved design, more trustworthy results, and better project management. Aims: This paper focuses on gaining a better understanding of the use of software development process for research software. Method: We surveyed research software developers to collect information about their use of software development processes. We analyze whether and demographic factors influence the …


Integrating Mathematics And Educational Robotics: Simple Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal, Sara T. Greenberg Apr 2019

Integrating Mathematics And Educational Robotics: Simple Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal, Sara T. Greenberg

George K. Thiruvathukal

This paper shows how students can be guided to integrate elementary mathematical analyses with motion planning for typical educational robots. Rather than using calculus as in comprehensive works on motion planning, we show students can achieve interesting results using just simple linear regression tools and trigonometric analyses. Experiments with one robotics platform show that use of these tools can lead to passable navigation through dead reckoning even if students have limited experience with use of sensors, programming, and mathematics.


Exploring Different Modalities For Learning Computer Programming, Maxwell Brickner Apr 2019

Exploring Different Modalities For Learning Computer Programming, Maxwell Brickner

Maxwell Brickner

My poster for the 2019 Annual BGSU Undergraduate Symposium for Research and Scholarship.


Virtual Reality And Older Hands: Dexterity And Accessibility In Hand-Held Vr Control, David M. Cook, Derani N. Dissanayake, Kulwinder Kaur Apr 2019

Virtual Reality And Older Hands: Dexterity And Accessibility In Hand-Held Vr Control, David M. Cook, Derani N. Dissanayake, Kulwinder Kaur

Dr. David M Cook

Whilst the VR Headset has a sense of commonality with users, VR hand controllers are largely incongruent with each other. This paper examines the common ground between VR developments in the area of hand control devices. This paper looks at VR controllers through the lens of older people, specifically for the purpose of including people from any age in the opportunity to enjoy the benefits of VR experiences. This study uses Fitts’ Index of Difficulty to determine areas of concern in terms of dexterity and accessibility. The study recommends a standardized approach to agility and access in VR hand control …


Multispectral Image Analysis Using Decision Trees, Arun D. Kulkarni, Anmol Shrestha Mar 2019

Multispectral Image Analysis Using Decision Trees, Arun D. Kulkarni, Anmol Shrestha

Arun Kulkarni

Many machine learning algorithms have been used to classify pixels in Landsat imagery. The maximum likelihood classifier is the widely-accepted classifier. Non-parametric methods of classification include neural networks and decision trees. In this research work, we implemented decision trees using the C4.5 algorithm to classify pixels of a scene from Juneau, Alaska area obtained with Landsat 8, Operation Land Imager (OLI). One of the concerns with decision trees is that they are often over fitted with training set data, which yields less accuracy in classifying unknown data. To study the effect of overfitting, we have considered noisy training set data …


Generating Classification Rules From Training Samples, Arun D. Kulkarni Mar 2019

Generating Classification Rules From Training Samples, Arun D. Kulkarni

Arun Kulkarni

In this paper, we describe an algorithm to extract classification rules from training samples using fuzzy membership functions. The algorithm includes steps for generating classification rules, eliminating duplicate and conflicting rules, and ranking extracted rules. We have developed software to implement the algorithm using MATLAB scripts. As an illustration, we have used the algorithm to classify pixels in two multispectral images representing areas in New Orleans and Alaska. For each scene, we randomly selected 10 per cent of the samples from our training set data for generating an optimized rule set and used the remaining 90 per cent of samples …


In The Beginning... A Legacy Of Computing At Marshall University, Jack L. Dickinson, Arnold R. Miller Ed.E Mar 2019

In The Beginning... A Legacy Of Computing At Marshall University, Jack L. Dickinson, Arnold R. Miller Ed.E

Arnold R. Miller

This book provides a brief history of the early computing technology at Marshall University, Huntington, W.Va., in the forty years: 1959-1999. This was before the move to Intel and Windows based servers. After installation of an IBM Accounting Machine in 1959, which arguably does not fit the modern definition of a computer, the first true computer arrived in 1963 and was installed in a room below the Registrar’s office. For the next twenty years several departments ordered their own midrange standalone systems to fit their individual departmental requirements. These represented different platforms from different vendors, and were not connected to …


Jual Obat Aborsi Di Jepang 081325757672 Jual Obat Cytotec Jepang, Baris Surya02 Feb 2019

Jual Obat Aborsi Di Jepang 081325757672 Jual Obat Cytotec Jepang, Baris Surya02

Jual Obat Aborsi Tuntas - Obat Penggugur Kandungan

  • Obat Aborsi Jepang,
 
  • Jual Obat Aborsi Jepang,
 
  • Jual Obat Telat Bulan Di Jepang,
 
  • Obat Telat Bulan Di Jepang,
 
  • Obat Telat Bulan Jepang,
 
  • Obat Penggugur Kandungan Di Jepang,
 
  • Obat Aborsi Tuntas Jepang,
 
  • Jual Cytotec Asli Di Jepang,
 
  • Alamat Jual Obat Aborsi Jepang,
 
Penjual Obat Aborsi Jepang.


2018 Florida Data Science For Social Good - Annual Report, Karthikeyan Umapathy, F. Dan Richard Jan 2019

2018 Florida Data Science For Social Good - Annual Report, Karthikeyan Umapathy, F. Dan Richard

Karthikeyan Umapathy

The Florida Data Science for Social Good (FL-DSSG) Program is a summer internship program that matches data science expertise with real-world problems in the public sector. During the 2018 program, the FL-DSSG supported stipends for 5 DSSG Interns, who worked 20 hours per week for 12 weeks and 3 DSSG interns, who worked 8 hours per week as well as registered for a Directed Independent Study course. Four non-profit organizations participated in the 2018 program: Baptist Health Y Healthy Living Centers (YHLCs), Family Support Services of North Florida (FSSNF), Girls Incorporated of Jacksonville (Girls Jax), and The Performers Academy (TPA). 


Trends In Phishing Attacks: Suggestions For Future Research, Ryan M. Schuetzler Jan 2019

Trends In Phishing Attacks: Suggestions For Future Research, Ryan M. Schuetzler

Ryan Schuetzler

Deception in computer-mediated communication is a widespread phenomenon. Cyber criminals are exploiting technological mediums to communicate with potential targets as these channels reduce both the deception cues and the risk of detection itself. A prevalent deception-based attack in computer-mediated communication is phishing. Prior phishing research has addressed the “bait” and “hook” components of phishing attacks, the human-computer interaction that takes place as users judge the veracity of phishing emails and websites, and the development of technologies that can aid users in identifying and rejecting these attacks. Despite the extant research on this topic, phishing attacks continue to be successful as …


When Disclosure Is Involuntary: Empowering Users With Control To Reduce Concerns, David W. Wilson, Ryan M. Schuetzler, Bradley Dorn, Jeffrey Gainer Proudfoot Jan 2019

When Disclosure Is Involuntary: Empowering Users With Control To Reduce Concerns, David W. Wilson, Ryan M. Schuetzler, Bradley Dorn, Jeffrey Gainer Proudfoot

Ryan Schuetzler

Modern organizations must carefully balance the practice of gathering large amounts of valuable data from individuals with the associated ethical considerations and potential negative public image inherent in breaches of privacy. As it becomes increasingly commonplace for many types of information to be collected without individuals' knowledge or consent, managers and researchers alike can benefit from understanding how individuals react to such involuntary disclosures, and how these reactions can impact evaluations of the data-collecting organizations. This research develops and empirically tests a theoretical model that shows how empowering individuals with a sense of control over their personal information can help …


Real-Time Embodied Agent Adaptation, Ryan M. Schuetzler, David W. Wilson Jan 2019

Real-Time Embodied Agent Adaptation, Ryan M. Schuetzler, David W. Wilson

Ryan Schuetzler

This paper reports on initial investigation of two emerging technologies, FaceFX and Smartbody, capable of creating life-like animations for embodied conversational agents (ECAs) such as the AVATAR agent. Real-time rendering and animation generation technologies can enable rapid adaptation of ECAs to changing circumstances. The benefits of each package are discussed.


The Influence Of Conversational Agent Embodiment And Conversational Relevance On Socially Desirable Responding, Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr. Jan 2019

The Influence Of Conversational Agent Embodiment And Conversational Relevance On Socially Desirable Responding, Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr.

Ryan Schuetzler

Conversational agents (CAs) are becoming an increasingly common component in a wide range of information systems. A great deal of research to date has focused on enhancing traits that make CAs more humanlike. However, few studies have examined the influence such traits have on information disclosure. This research builds on self-disclosure, social desirability, and social presence theories to explain how CA anthropomorphism affects disclosure of personally sensitive information. Taken together, these theories suggest that as CAs become more humanlike, the social desirability of user responses will increase. In this study, we use a laboratory experiment to examine the influence of …


The Influence Of Conversational Agents On Socially Desirable Responding, Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney, Jay F. Nunamaker Jr. Jan 2019

The Influence Of Conversational Agents On Socially Desirable Responding, Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney, Jay F. Nunamaker Jr.

Ryan Schuetzler

Conversational agents (CAs) are becoming an increasingly common component in many information systems. The ubiquity of CAs in cell phones, entertainment systems, and messaging applications has led to a growing need to understand how design choices made when developing CAs influence user interactions. In this study, we explore the use case of CAs that gather potentially sensitive information from people—for example, in a medical interview. Using a laboratory experiment, we examine the influence of CA responsiveness and embodiment on the answers people give in response to sensitive and non-sensitive questions. The results show that for sensitive questions, the responsiveness of …


Robustness Of Multiple Indicators In Automated Screening Systems For Deception Detection, Nathan Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Aaron Elkins, Douglas C. Derrick Jan 2019

Robustness Of Multiple Indicators In Automated Screening Systems For Deception Detection, Nathan Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Aaron Elkins, Douglas C. Derrick

Ryan Schuetzler

This study investigates the effectiveness of an automatic system for detection of deception by individuals with the use of multiple indicators of such potential deception. Deception detection research in the information systems discipline has postulated increased accuracy through a new class of screening systems that automatically conduct interviews and track multiple indicators of deception simultaneously. Understanding the robustness of this new class of systems and the limitations of its theoretical improved performance is important for refinement of the conceptual design. The design science proof-of-concept study presented here implemented and evaluated the robustness of these systems for automated screening for deception …


Kinesic Patterning In Deceptive And Truthful Interactions, Judee K. Burgoon, Ryan M. Schuetzler, David W. Wilson Jan 2019

Kinesic Patterning In Deceptive And Truthful Interactions, Judee K. Burgoon, Ryan M. Schuetzler, David W. Wilson

Ryan Schuetzler

A persistent question in the deception literature has been the extent to which nonverbal behaviors can reliably distinguish between truth and deception. It has been argued that deception instigates cognitive load and arousal that are betrayed through visible nonverbal indicators. Yet, empirical evidence has often failed to find statistically significant or strong relationships. Given that interpersonal message production is characterized by a high degree of simultaneous and serial patterning among multiple behaviors, it may be that patterns of behaviors are more diagnostic of veracity. Or it may be that the theorized linkage between internal states of arousal, cognitive taxation, and …


Patient Preferences For Authentication And Security: A Comparison Study Of Younger And Older Patients, Ann Fruhling, Devika Ramachandran, Tamara Bernard, Ryan Schuetzler, John R. Windle Jan 2019

Patient Preferences For Authentication And Security: A Comparison Study Of Younger And Older Patients, Ann Fruhling, Devika Ramachandran, Tamara Bernard, Ryan Schuetzler, John R. Windle

Ryan Schuetzler

We examine authentication and security preferences of younger versus older patients in the healthcare domain. Previous research has investigated users' perception of the acceptability of various forms of authentication in nonhealthcare domains, but not patients’ preferences. First, we developed an interactive prototype to test three authentication methods: passwords, pattern, and voice. Our results indicate that younger patients prefer passwords by a significant margin. Older patients indicated more mixed preferences. In addition, we evaluated the level of security patients desired for protection of health information compared to financial information. We found no difference based on age: both groups felt financial security …


Man Vs. Machine: Investigating The Effects Of Adversarial System Use On End-User Behavior In Automated Deception Detection Interviews, Jeffrey Gainer Proudfoot, Randall Boyle, Ryan M. Schuetzler Jan 2019

Man Vs. Machine: Investigating The Effects Of Adversarial System Use On End-User Behavior In Automated Deception Detection Interviews, Jeffrey Gainer Proudfoot, Randall Boyle, Ryan M. Schuetzler

Ryan Schuetzler

Deception is an inevitable component of human interaction. Researchers and practitioners are developing information systems to aid in the detection of deceptive communication. Information systems are typically adopted by end users to aid in completing a goal or objective (e.g., increasing the efficiency of a business process). However, end-user interactions with deception detection systems (adversarial systems) are unique because the goals of the system and the user are orthogonal. Prior work investigating systems-based deception detection has focused on the identification of reliable deception indicators. This research extends extant work by looking at how users of deception detection systems alter their …


Overview And Guidance On Agile Development In Large Organizations, Jordan B. Barlow, Justin Scott Giboney, Mark Jeffrey Keith, David W. Wilson, Ryan Schuetzler, Paul Benjamin Lowry, Anthony Vance Jan 2019

Overview And Guidance On Agile Development In Large Organizations, Jordan B. Barlow, Justin Scott Giboney, Mark Jeffrey Keith, David W. Wilson, Ryan Schuetzler, Paul Benjamin Lowry, Anthony Vance

Ryan Schuetzler

A continual debate surrounds the effectiveness of agile software development practices. Some organizations adopt agile practices to become more competitive, improve processes, and reduce costs. Other organizations are skeptical about whether agile development is beneficial. Large organizations face an additional challenge in integrating agile practices with existing standards and business processes. To examine the effects of agile development practices in large organizations, we review and integrate scientific literature and theory on agile software development. We further organize our theory and observations into a framework with guidelines for large organizations considering agile methodologies. Based on this framework, we present recommendations that …


Establishing A Foundation For Automated Human Credibility Screening, Jay F. Nunamaker Jr., Judee K. Burgoon, Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Justin Scott Giboney Jan 2019

Establishing A Foundation For Automated Human Credibility Screening, Jay F. Nunamaker Jr., Judee K. Burgoon, Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Justin Scott Giboney

Ryan Schuetzler

Automated human credibility screening is an emerging research area that has potential for high impact in fields as diverse as homeland security and accounting fraud detection. Systems that conduct interviews and make credibility judgments can provide objectivity, improved accuracy, and greater reliability to credibility assessment practices, need to be built. This study establishes a foundation for developing automated systems for human credibility screening.


Countermeasures And Eye Tracking Deception Detection, Ryan M. Schuetzler Jan 2019

Countermeasures And Eye Tracking Deception Detection, Ryan M. Schuetzler

Ryan Schuetzler

A new development in the field of deception detection is been the development of rapid, noncontact tools for automated detection. This research in progress paper describes a method for assessing the robustness of eye tracker-based deception detection to countermeasures employed by knowledgeable participants.


Facilitating Natural Conversational Agent Interactions: Lessons From A Deception Experiment, Ryan M. Schuetzler, Mark Grimes, Justin Scott Giboney, Joesph Buckman Jan 2019

Facilitating Natural Conversational Agent Interactions: Lessons From A Deception Experiment, Ryan M. Schuetzler, Mark Grimes, Justin Scott Giboney, Joesph Buckman

Ryan Schuetzler

This study reports the results of a laboratory experiment exploring interactions between humans and a conversational agent. Using the ChatScript language, we created a chat bot that asked participants to describe a series of images. The two objectives of this study were (1) to analyze the impact of dynamic responses on participants’ perceptions of the conversational agent, and (2) to explore behavioral changes in interactions with the chat bot (i.e. response latency and pauses) when participants engaged in deception. We discovered that a chat bot that provides adaptive responses based on the participant’s input dramatically increases the perceived humanness and …


A Systems Approach To Countermeasures In Credibility Assessment Interviews, Nathan Twyman, Ryan M. Schuetzler, Jeffrey Gainer Proudfoot, Aaron Elkins Jan 2019

A Systems Approach To Countermeasures In Credibility Assessment Interviews, Nathan Twyman, Ryan M. Schuetzler, Jeffrey Gainer Proudfoot, Aaron Elkins

Ryan Schuetzler

Countermeasures, or techniques for hiding guilt during a credibility assessment examination, have long been an important topic in cognitive psychology and criminal justice fields. With recent IS research on automated screening systems, understanding the potential for countermeasures in this new paradigm is of increasing importance. This paper reports on a large experiment examining countermeasures in an automated deception detection screening context. The effectiveness of traditional countermeasure types (mental and physical) are examined, as well as an exploratory approach of trying several countermeasures at once. The exploratory approach was tested to investigate a proposed novel systems-inspired solution to countermeasures—triangulating on deception …


Automatic Program Rewriting In Non-Ground Answer Set Programs, Yuliya Lierler Jan 2019

Automatic Program Rewriting In Non-Ground Answer Set Programs, Yuliya Lierler

Yuliya Lierler

No abstract provided.


Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose Jan 2019

Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose

J. Philip Craiger, Ph.D.

The FAA predicts that purchases of hobbyist small unmanned aerial systems (sUAS) will grow from 1.9 million in 2016 to 4.3 million by 2020, and commercial sUAS to increase from 600,000 in 2016 to 2.7 million by 2020. sUAS, often referred to as 'drones,' are comprised of aeronautical hardware, a CPU, RAM, onboard storage, radio frequency communications, sensors, a camera, and a controller used by the pilot-in-command (PIC). Some have argued that a sUAS is essentially a flying computer. As such, sUAS are sometimes susceptible to many of the types of attacks that are often used on PC-based computers attached …