Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer science

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 498

Full-Text Articles in Physical Sciences and Mathematics

Some Advice For Psychologists Who Want To Work With Computer Scientists On Big Data, Cornelius J. König, Andrew M. Demetriou, Philipp Glock, Annemarie M. F. Hiemstra, Dragos Iliescu, Camelia Ionescu, Markus Langer, Cynthia C. S. Liem, Anja Linnenbürger, Rudolf Siegel, Ilias Vartholomaios Mar 2020

Some Advice For Psychologists Who Want To Work With Computer Scientists On Big Data, Cornelius J. König, Andrew M. Demetriou, Philipp Glock, Annemarie M. F. Hiemstra, Dragos Iliescu, Camelia Ionescu, Markus Langer, Cynthia C. S. Liem, Anja Linnenbürger, Rudolf Siegel, Ilias Vartholomaios

Personnel Assessment and Decisions

This article is based on conversations from the project “Big Data in Psychological Assessment” (BDPA) funded by the European Union, which was initiated because of the advances in data science and artificial intelligence that offer tremendous opportunities for personnel assessment practice in handling and interpreting this kind of data. We argue that psychologists and computer scientists can benefit from interdisciplinary collaboration. This article aims to inform psychologists who are interested in working with computer scientists about the potentials of interdisciplinary collaboration, as well as the challenges such as differing terminologies, foci of interest, data quality standards, approaches to data analyses ...


Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner Jan 2020

Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner

Capstone Showcase

The website, arcadia-transfer-equiv.com, was drafted and created for Bill Enick, Registrar at Arcadia University. This was an expansion of a preliminary version of the website created by Caleigh Diefenthaler, Christian Charney, and Dylan Power. The site includes two transfer equivalency tools which can be used to search for course equivalencies by academic institution or by a given Arcadia course. The tools, which pull from a database maintained by the Registrar, will display courses that have transferred to the University successfully. The website also hosts two interactive forms. These forms allow Arcadia students to request approval for courses that have ...


Ethics, Privacy And Data Collection: A Complex Intersection, Matthew S. Brown Jan 2020

Ethics, Privacy And Data Collection: A Complex Intersection, Matthew S. Brown

Honors Theses

The technology around us enables incredible abilities such as high-resolution video calls and the ability to stay connected with everyone we care about through social media. This technology also comes with a hidden cost in the form of data collection.

This work explores what privacy means and how users understand what data social media companies collect and monetize. This thesis also proposes a more ethical business model that addresses privacy concerns from an individual perspective.


Overrepresentation Of The Underrepresented: Gender Bias In Wikipedia, Anna Marinina Dec 2019

Overrepresentation Of The Underrepresented: Gender Bias In Wikipedia, Anna Marinina

Honors College Theses

The goal of our research is to determine if gender bias exists in Wikipedia. Wikipedia is a very large dataset that has been used to train artificial intelligence models. If a dataset that is being used for this purpose is biased, then the artificial intelligence model that was trained with it will be biased as well, therefore making biased decisions. For this reason, it is important to explore large datasets for any potential biases before they are used in machine learning. Since Wikipedia is ontologically structured, we used graph theory to create a network of all of the website’s ...


A Longitudinal Study Of Mammograms Utilizing The Automated Wavelet Transform Modulus Maxima Method, Brian C. Toner Dec 2019

A Longitudinal Study Of Mammograms Utilizing The Automated Wavelet Transform Modulus Maxima Method, Brian C. Toner

Electronic Theses and Dissertations

Breast cancer is a disease which predominatly affects women. About 1 in 8 women are diagnosed with breast cancer during their lifetime. Early detection is key to increasing the survival rate of breast cancer patients since the longer the tumor goes undetected, the more deadly it can become. The modern approach for diagnosing breast cancer relies on a combination of self-breast exams and mammography to detect the formation of tumors. However, this approach only accounts for tumors which are either detectable by touch or are large enough to be observed during a screening mammogram. For some individuals, by the time ...


Realtime Object Detection Via Deep Learning-Based Pipelines, James G. Shanahan, Liang Dai Nov 2019

Realtime Object Detection Via Deep Learning-Based Pipelines, James G. Shanahan, Liang Dai

Computer Information Systems Conference Proceedings

Ever wonder how the Tesla Autopilot system works (or why it fails)? In this tutorial we will look under the hood of self-driving cars and of other applications of computer vision and review state-of-the-art tech pipelines for object detection such as two-stage approaches (e.g., Faster R-CNN) or single-stage approaches (e.g., YOLO/SSD). This is accomplished via a series of Jupyter Notebooks that use Python, OpenCV, Keras, and Tensorflow. No prior knowledge of computer vision is assumed (although it will be help!). To this end we begin this tutorial with a review of computer vision and traditional approaches to ...


Technical Report 2019-01: Pupil Labs Eye Tracking User Guide, Joan D. Gannon, Augustine Ubah, Chris Dancy Sep 2019

Technical Report 2019-01: Pupil Labs Eye Tracking User Guide, Joan D. Gannon, Augustine Ubah, Chris Dancy

Other Faculty Research and Publications

No abstract provided.


Versatile Binary-Level Concolic Testing, Bo Chen Jul 2019

Versatile Binary-Level Concolic Testing, Bo Chen

Dissertations and Theses

Computing systems are experiencing an explosive growth, both in complexities and diversities, ushered in by the proliferation of cloud computing, mobile computing, and Internet of Things. This growth has also exposed the consequences of unsafe, insecure, and unreliable computing systems. These all point to the great needs of sophisticated system validation techniques. Recent advances in research on symbolic execution has shown great promises for automated software analysis, e.g., generating test cases, finding bugs, and detecting security vulnerabilities. However, symbolic execution is mostly adopted to analyze user applications, while modern computing systems in practice consist of many components shipped by ...


Design And Experimental Evaluation Of Deepmarket: An Edge Computing Marketplace With Distributed Tensorflow Execution Capability, Soyoung Kim Jul 2019

Design And Experimental Evaluation Of Deepmarket: An Edge Computing Marketplace With Distributed Tensorflow Execution Capability, Soyoung Kim

Dissertations and Theses

There is a rise in demand among machine learning researchers for powerful computational resources to train complex machine learning models, e.g., deep learning models. In order to train these models in a reasonable amount of time, the training is often distributed among multiple machines; yet paying for such machines (either through renting them on cloud data centers or building a local infrastructure) is costly. DeepMarket attempts to reduce these costs by creating a marketplace that integrates multiple computational resources over a distributed TensorFlow framework. Instead of requiring users to rent expensive GPU/CPUs from a third-party cloud provider, DeepMarket ...


Cs + Sociology: Using Big Data To Identify And Understand Educational Inequality In America (1), Joseph Cleary, Elin Waring Jun 2019

Cs + Sociology: Using Big Data To Identify And Understand Educational Inequality In America (1), Joseph Cleary, Elin Waring

Open Educational Resources

This is the first of two lessons/labs for teaching and learning of computer science and sociology. Either and be used on their own or they can be used in sequence, in which case this should be used first.

Students will develop CS skills and behaviors including but not limited to: learning what an API is, learning how to access and utilize data on an API, and developing their R coding skills and knowledge. Students will also learn basic, but important, sociological principles such as how poverty is related to educational opportunities in America. Although prior knowledge of CS and ...


Crumpled And Abraded Encryption: Implementation And Provably Secure Construction, Scott Sherlock Griffy May 2019

Crumpled And Abraded Encryption: Implementation And Provably Secure Construction, Scott Sherlock Griffy

Dissertations and Theses

Abraded and crumpled encryption allows communication software such as messaging platforms to ensure privacy for their users while still allowing for some investigation by law enforcement. Crumpled encryption ensures that each decryption is costly and prevents law enforcement from performing mass decryption of messages. Abrasion ensures that only large organizations like law enforcement are able to access any messages. The current abrasion construction uses public key parameters such as prime numbers which makes the abrasion scheme difficult to analyze and allows possible backdoors. In this thesis, we introduce a new abrasion construction which uses hash functions to avoid the problems ...


Seeing Eye To Eye: A Machine Learning Approach To Automated Saccade Analysis, Maigh Attre May 2019

Seeing Eye To Eye: A Machine Learning Approach To Automated Saccade Analysis, Maigh Attre

Honors Scholar Theses

Abnormal ocular motility is a common manifestation of many underlying pathologies particularly those that are neurological. Dynamics of saccades, when the eye rapidly changes its point of fixation, have been characterized for many neurological disorders including concussions, traumatic brain injuries (TBI), and Parkinson’s disease. However, widespread saccade analysis for diagnostic and research purposes requires the recognition of certain eye movement parameters. Key information such as velocity and duration must be determined from data based on a wide set of patients’ characteristics that may range in eye shapes and iris, hair and skin pigmentation [36]. Previous work on saccade analysis ...


Interview Of Stephen Andrilli, Ph.D., Stephen Francis Andrilli Ph.D., Jane Highley Apr 2019

Interview Of Stephen Andrilli, Ph.D., Stephen Francis Andrilli Ph.D., Jane Highley

All Oral Histories

Stephen Francis Andrilli was born in August 1952 in Bryn Mawr, PA. He was born to Francis and Leatrice Andrilli. Dr. Andrilli is the oldest of four children; his three sisters are Carol (now Carol Strosser), Patricia (now Patricia Kempczynski), and Barbara (now Barbara Parkes). Aside from a few years of living in Gettysburg, Dr. Andrilli has lived in the Philadelphia area for most of his life. He attended St. Jerome School, where he finished 8th grade. He then attended LaSalle College High School, where he graduated in 1969 at age 16. He entered La Salle University (formerly La Salle ...


Csci 380-04 Selected Topics In Computer Science: Mobile Application And Product Development, Bhargava Chinthirla, Eric Spector, Nyc Tech-In-Residence Corps Apr 2019

Csci 380-04 Selected Topics In Computer Science: Mobile Application And Product Development, Bhargava Chinthirla, Eric Spector, Nyc Tech-In-Residence Corps

Open Educational Resources

No abstract provided.


Cis 356 Digital Trends And Transformations, Douglas Ng, Nyc Tech-In-Residence Corps Apr 2019

Cis 356 Digital Trends And Transformations, Douglas Ng, Nyc Tech-In-Residence Corps

Open Educational Resources

No abstract provided.


Csci 381/780 Data Analytics, Kumar Ramansenthil, Nyc Tech-In-Residence Corps Apr 2019

Csci 381/780 Data Analytics, Kumar Ramansenthil, Nyc Tech-In-Residence Corps

Open Educational Resources

No abstract provided.


Csc 21700 Probability And Statistics For Computer Science, Evan Agovino, Nyc Tech-In-Residence Corps Apr 2019

Csc 21700 Probability And Statistics For Computer Science, Evan Agovino, Nyc Tech-In-Residence Corps

Open Educational Resources

No abstract provided.


Concept Building Web Application, Jaime Becker Apr 2019

Concept Building Web Application, Jaime Becker

Computer Science

In this thesis, I have ported a python software application that is used for the collection of information for functional learning classifications into a web application. I have analyzed the problems in the previous software and created the new web application to address these problems using Flask, AppEngine, and Bootstrap. This web application mirrors the original software look and feel but adds several functionalities and improvements like support for multiple input modalities and a separate administrative and user view. I also present a proposed evaluation of the web application.


The Evolution Of Data Science: A New Mode Of Knowledge Production, Jennifer Lewis Priestley, Robert J. Mcgrath Apr 2019

The Evolution Of Data Science: A New Mode Of Knowledge Production, Jennifer Lewis Priestley, Robert J. Mcgrath

Faculty Publications

Is data science a new field of study or simply an extension or specialization of a discipline that already exists, such as statistics, computer science, or mathematics? This article explores the evolution of data science as a potentially new academic discipline, which has evolved as a function of new problem sets that established disciplines have been ill-prepared to address. The authors find that this newly-evolved discipline can be viewed through the lens of a new mode of knowledge production and is characterized by transdisciplinarity collaboration with the private sector and increased accountability. Lessons from this evolution can inform knowledge production ...


Assessing The Effectiveness Of Computer Science Rpps: The Case Of Cafecs, Erin Henrick, Steven Mcgee, Ronald I. Greenberg, Lucia Dettori, Andrew M. Rasmussen, Don Yanek, Dale F. Reed Feb 2019

Assessing The Effectiveness Of Computer Science Rpps: The Case Of Cafecs, Erin Henrick, Steven Mcgee, Ronald I. Greenberg, Lucia Dettori, Andrew M. Rasmussen, Don Yanek, Dale F. Reed

Computer Science: Faculty Publications and Other Works

Research Practice Partnerships (RPPs) are a relatively

recent development as a potential strategy to address the

complex challenges in computer science education. Consequently,

there is little guidance available for assessing the effectiveness of

RPPs. This paper describes the formative evaluation approach

used to assess the progress of the first year of the formalized RPP,

Chicago Alliance for Equity in Computer Science (CAFE´CS).

This paper contributes to the RPP literature by providing a case

study of how an RPP effectiveness framework can be adapted

and used to inform partnership improvement efforts in computer

science education.


A Semester Long Classroom Course Mimicking A Software Company And A New Hire Experience For Computer Science Students Preparing To Enter The Software Industry, David A. Chamberlain Jan 2019

A Semester Long Classroom Course Mimicking A Software Company And A New Hire Experience For Computer Science Students Preparing To Enter The Software Industry, David A. Chamberlain

Master’s Theses and Projects

Students in a Computer Science degree programs must learn to code before they can be taught Software Engineering skills. This core skill set is how to program and consists of the constructs of various languages, how to create short programs or applications, independent assignments, and arrive at solutions that utilize the skills being covered in the language for that course (Chatley & Field, 2017). As an upperclassman, students will often be allowed to apply these skills in newer ways and have the opportunity to work on longer, more involved assignments although frequently still independent or in small groups of two to ...


Visual Programming Language With Natural User Interface, Matthew Britton Jan 2019

Visual Programming Language With Natural User Interface, Matthew Britton

Williams Honors College, Honors Research Projects

One of the fastest-growing fields of interest in computer science, fueled primarily by gaming, is the Natural User Interface (NUI). NUI encompasses technologies which would replace the typical mouse-and-keyboard approach to interaction with computer systems, with the goal of making human-computer interactions more similar to face-to-face interpersonal interactions. This is done by using technologies such as gesture recognition or speech recognition and speech synthesis, which use interpersonal skills we learn and practice on a daily basis. Visual Programming Languages (VPLs) are languages that allow the creation of a program by arranging graphical representations of program behavior, rather than textual program ...


Gms - Guest Management System, Ethan Clark Jan 2019

Gms - Guest Management System, Ethan Clark

Williams Honors College, Honors Research Projects

This paper examines the benefits of custom built as opposed to licensed software, using a guest management system as a comparison. The University of Akron employs a web application that allows residents to check guests into each residence hall on campus. In addition to this paper, a custom web application was built to contrast against the university's current system and to recognize the issues raised by its employee staff. This paper is written using the software development lifecycle as its main structure; the planning and analysis through the development process is discussed at length.


Content Management System, Raymond Gines Jan 2019

Content Management System, Raymond Gines

Williams Honors College, Honors Research Projects

The Imprint CMS (Content Management System) aims to emulate the key features of popular existing CMS applications such as Wordpress, Drupal, Magento, etc. This will be a lightweight alternative that can be used to kick start a digital presence by producing landing pages, product pages, and blog posts with ease. Individuals will be able to register and create their own account that will be secured in a database that they can use to login and manage their pages and posts. In addition, they will have the option of changing multiple settings such as the theme and color scheme of their ...


U.S. Census Explorer: A Gui And Visualization Tool For The U.S. Census Data Api, Timothy Snyder Jan 2019

U.S. Census Explorer: A Gui And Visualization Tool For The U.S. Census Data Api, Timothy Snyder

Williams Honors College, Honors Research Projects

U.S. Census Explorer is a software application that is designed to provide tools for intuitive exploration and analysis of United States census data for non-technical users. The application serves as an interface into the U.S. Census Bureau’s data API that enables a complete workflow from data acquisition to data visualization without the need for technical intervention from the user. The suite of tools provided include a graphical user interface for dynamically querying U.S. census data, geographic visualizations, and the ability to download your work to common spreadsheet and image formats for inclusion in external works.


Reduction Of False Positives In Intrusion Detection Based On Extreme Learning Machine With Situation Awareness, Donald A. Burgio Jan 2019

Reduction Of False Positives In Intrusion Detection Based On Extreme Learning Machine With Situation Awareness, Donald A. Burgio

CCE Theses and Dissertations

Protecting computer networks from intrusions is more important than ever for our privacy, economy, and national security. Seemingly a month does not pass without news of a major data breach involving sensitive personal identity, financial, medical, trade secret, or national security data. Democratic processes can now be potentially compromised through breaches of electronic voting systems. As ever more devices, including medical machines, automobiles, and control systems for critical infrastructure are increasingly networked, human life is also more at risk from cyber-attacks. Research into Intrusion Detection Systems (IDSs) began several decades ago and IDSs are still a mainstay of computer and ...


Adaptive Strategies Of Multi-Objective Optimization For Greener Networks, Hatem Yazbek Jan 2019

Adaptive Strategies Of Multi-Objective Optimization For Greener Networks, Hatem Yazbek

CCE Theses and Dissertations

Increasing energy costs and environmental issues related to the Internet and wired networks continue to be a major concern. Energy-efficient or power-aware networks continue to gain interest in the research community. Existing energy reduction approaches do not fully address all aspects of the problem. We consider the problem of reducing energy by turning off network links, while achieving acceptable load balance, by adjusting link weights. Changing link weights frequently can cause network oscillation or instability in measuring the resulting traffic load, which is a situation to be avoided. In this research, we optimize two objectives, which are minimizing network power ...


Assessing The Presence Of Mindfulness Within Cyber And Non-Cybersecurity Groups, Christopher Wilder Jan 2019

Assessing The Presence Of Mindfulness Within Cyber And Non-Cybersecurity Groups, Christopher Wilder

CCE Theses and Dissertations

Corporations and individuals continue to be under Phishing attack. Researchers categorizes methods corporations and individuals can employ to reduce the impact of being caught in a Phishing scheme. Corporation enable technical mechanisms such as automated filtering, URL blacklisting, and manipulation of browser warning messages to reduce phishing susceptibility costing billions of dollars annually. However, even with robust efforts to educate employees about phishing techniques through security awareness training the abundance of attacks continues to plague organizations. This study aims to identify whether a correlation exists between mindfulness and phishing susceptibility. The goal of this research is to determine if mindful ...


A Survey Of Attention Deficit Hyperactivity Disorder Identification Using Psychophysiological Data, S. De Silva, S. Dayarathna, G. Ariyarathne, D. Meedeniya, Sampath Jayarathna Jan 2019

A Survey Of Attention Deficit Hyperactivity Disorder Identification Using Psychophysiological Data, S. De Silva, S. Dayarathna, G. Ariyarathne, D. Meedeniya, Sampath Jayarathna

Computer Science Faculty Publications

Attention Deficit Hyperactivity Disorder (ADHD) is one of the most common neurological disorders among children, that affects different areas in the brain that allows executing certain functionalities. This may lead to a variety of impairments such as difficulties in paying attention or focusing, controlling impulsive behaviours and overreacting. The continuous symptoms may have a severe impact in the long-term. This paper explores the ADHD identification studies using eye movement data and functional Magnetic Resonance Imaging (fMRI). This study discusses different machine learning techniques, existing models and analyses the existing literature. We have identified the current challenges and possible future directions ...


Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles Jan 2019

Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles

Computer Science Faculty Publications

Researchers from academia and the corporate-sector rely on scholarly digital libraries to access articles. Attackers take advantage of innocent users who consider the articles' files safe and thus open PDF-files with little concern. In addition, researchers consider scholarly libraries a reliable, trusted, and untainted corpus of papers. For these reasons, scholarly digital libraries are an attractive-target and inadvertently support the proliferation of cyber-attacks launched via malicious PDF-files. In this study, we present related vulnerabilities and malware distribution approaches that exploit the vulnerabilities of scholarly digital libraries. We evaluated over two-million scholarly papers in the CiteSeerX library and found the library ...