Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (37)
- Library and Information Science (27)
- Information Security (25)
- Graphics and Human Computer Interfaces (22)
- Education (17)
-
- Artificial Intelligence and Robotics (16)
- Databases and Information Systems (15)
- Engineering (13)
- Other Computer Sciences (13)
- Arts and Humanities (12)
- Software Engineering (12)
- Theory and Algorithms (11)
- Curriculum and Instruction (10)
- Programming Languages and Compilers (9)
- Art and Design (7)
- Computer Engineering (7)
- Data Science (7)
- Business (6)
- Game Design (6)
- Numerical Analysis and Scientific Computing (6)
- Archival Science (5)
- Life Sciences (5)
- Management Sciences and Quantitative Methods (5)
- Mathematics (5)
- Electrical and Computer Engineering (4)
- Higher Education (4)
- OS and Networks (4)
- Physics (4)
- Institution
-
- City University of New York (CUNY) (29)
- Selected Works (28)
- SelectedWorks (9)
- University of Lynchburg (7)
- University of Nebraska at Omaha (7)
-
- Arkansas Tech University (6)
- Colby College (6)
- Ursinus College (5)
- Loyola University Chicago (4)
- Hope College (3)
- Kennesaw State University (3)
- Minnesota State University Moorhead (3)
- Illinois Math and Science Academy (2)
- Nova Southeastern University (2)
- Old Dominion University (2)
- San Jose State University (2)
- The University of San Francisco (2)
- University of Washington Tacoma (2)
- Arcadia University (1)
- Augustana College (1)
- California Polytechnic State University, San Luis Obispo (1)
- Clemson University (1)
- DePaul University (1)
- Eastern Kentucky University (1)
- Elizabethtown College (1)
- Georgia Southern University (1)
- James Madison University (1)
- Liberty University (1)
- Olivet Nazarene University (1)
- Pace University (1)
- Keyword
-
- Cybersecurity (19)
- CS1 (3)
- Computational thinking (3)
- Computer science (3)
- Personality (3)
-
- Student research (3)
- Collaboration (2)
- English (2)
- Extraversion (2)
- Game design (2)
- ICT for Development and Poverty Alleviation (2)
- Introversion (2)
- K-12 (2)
- Presentations (2)
- Programming (2)
- Python (2)
- R programming language (2)
- Retention (2)
- Sentiment analysis (2)
- Twitter (2)
- Undergraduate (2)
- Visualization (2)
- Web development (2)
- AI Decision Making (1)
- AVED (1)
- Abm (1)
- Accessibility (1)
- Active learning (1)
- Adam Smith (1)
- Agent-based model (1)
- Publication Year
- Publication
-
- Open Educational Resources (22)
- Amber Settle (19)
- Publications and Research (7)
- Student Scholar Showcase (7)
- UNO Student Research and Creative Activity Fair (7)
-
- ATU Research Symposium (6)
- CLAS: Colby Liberal Arts Symposium (6)
- Mathematics and Computer Science Presentations (4)
- Computer Science: Faculty Publications and Other Works (3)
- Jason A Bengtson (3)
- Student Academic Conference (3)
- Yuliya Lierler (3)
- 11th Annual Celebration of Undergraduate Research and Creative Performance (2012) (2)
- Computer Science Faculty Publications (2)
- Creative Activity and Research Day - CARD (2)
- Dr Deogratias Harorimana (2)
- Inaugural CSU IR Conference, 2015 (2)
- Professional Learning Day (2)
- Symposium of Student Scholars (2)
- TAC Talks (2)
- 10th Annual Celebration of Undergraduate Research and Creative Performance (2011) (1)
- 2017 Academic High Altitude Conference (1)
- ASA Multidisciplinary Research Symposium (1)
- Amanda Hartman McLellan (1)
- Associate Professor Katina Michael (1)
- CCE Faculty Proceedings, Presentations, Speeches and Lectures (1)
- Capstone Showcase (1)
- Celebration of Learning (1)
- Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI (1)
- Computer Science Research Seminars and Symposia (1)
- Publication Type
Articles 1 - 30 of 140
Full-Text Articles in Computer Sciences
Requiring Students To Integrate Chatgptinto Course Assignments, Mark Small, Venera Balidemaj
Requiring Students To Integrate Chatgptinto Course Assignments, Mark Small, Venera Balidemaj
Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI
No abstract provided.
Toxic Comment Classification Project, Brandon Solon
Toxic Comment Classification Project, Brandon Solon
Symposium of Student Scholars
The digital landscape has blossomed thanks to the surge of online platforms, boosting the variety and volume of user-created content. But it's not without its shadows; cyberbullying and hate speech have also proliferated, making web spaces less safe. At our project centerstage, we work on creating a machine learning model skilled at spotting toxic comments with precision - this way contributing towards an internet society free from fear or discomfort. We put well-documented datasets to good use along with careful preprocessing maneuvers while trialing diverse machina-learning protocols as part of constructing solid classification architecture for usages beyond current limitations within …
Artificial Intelligence History, And Libraries: History And Legacy Of Library Contributions To Machine Learning, Wilhelmina Randtke
Artificial Intelligence History, And Libraries: History And Legacy Of Library Contributions To Machine Learning, Wilhelmina Randtke
Library Faculty Presentations
Machine learning seems to be newly everywhere. It's not new, so much as faster processing makes it newly useful. Imagine an automated cataloging program that takes 300 years to run, versus one that takes a week to run. Increased processing speed is a substantive change. This presentation overviews the history of libraries and artificial intelligence. First, teasing out past applications of machine learning in libraries. High quality results and concrete applications of artificial intelligence in libraries have been explored and published for decades. Over time, faster processing allows use at scale. Second, how library and metadata work contributes to machine …
Sentiment Analysis Before And During The Covid-19 Pandemic, Emily Musgrove
Sentiment Analysis Before And During The Covid-19 Pandemic, Emily Musgrove
Mathematics Summer Fellows
This study examines the change in connotative language use before and during the Covid-19 pandemic. By analyzing news articles from several major US newspapers, we found that there is a statistically significant correlation between the sentiment of the text and the publication period. Specifically, we document a large, systematic, and statistically significant decline in the overall sentiment of articles published in major news outlets. While our results do not directly gauge the sentiment of the population, our findings have important implications regarding the social responsibility of journalists and media outlets especially in times of crisis.
Blind Fighter – A Video Game For The Visually Impaired, Avery Wayne Harrah
Blind Fighter – A Video Game For The Visually Impaired, Avery Wayne Harrah
ATU Research Symposium
Blind Fighter is a video game made to be playable by anyone, regardless of any visual impairments the player may have. The game relies on auditory queues to allow players to understand what is happening in the game without ever having to see the screen. The project’s goal is to serve as a proof of concept that video games can be made inclusive with a few additions during development, without sacrificing overall quality. To do this, the game features full graphics in addition to testing many strategies for visually impaired players, including direction-based audio, unique sound effects for each game …
Crime Prediction Using Machine Learning: The Case Of The City Of Little Rock, Zurab Sabakhtarishvili, Sijan Panday, Clayton Jensen
Crime Prediction Using Machine Learning: The Case Of The City Of Little Rock, Zurab Sabakhtarishvili, Sijan Panday, Clayton Jensen
ATU Research Symposium
Crime is a severe problem in the city of Little Rock, Arkansas. In this study, we aim to develop a machine-learning model to predict criminal activities in the city and provide insights into crime patterns. We will analyze publicly available crime datasets from Little Rock Police Department from January 2017 to March 2023 to identify trends and patterns in crime occurrence. We used data cleaning and exploratory data analysis techniques, such as figured-based visualizations, to prepare the data for machine learning. We will employ the Neural Prophet, a time-series machine learning model, to predict daily crime counts. The model will …
Reworking Of The Arkansas Tech Human Resources Employee Records Software, Dalton J. George, Brayan Bonilla-Chavez, John Modica, Angelina Das
Reworking Of The Arkansas Tech Human Resources Employee Records Software, Dalton J. George, Brayan Bonilla-Chavez, John Modica, Angelina Das
ATU Research Symposium
Evisions Argos is a real-time reporting tool used by Arkansas Tech in many record-keeping departments. Reworking HR's software using this tool, security and database access concerns were negated, as Argos is already connected to the University's backend. Using Argos, we have made ATU HR's employee records software more user friendly and built a system that can be pushed to production for use by the university. As a secondary portion to this final project, we developed a proof-of-concept web application using the MEAN (Mongo, Express, Angular, Node) stack. This gave us the opportunity to produce a full-stack application from scratch as …
The Ozark Getaway, Houston Barber, Marcus Gasca, Evan Reece Matlock, Avery Wayne Harrah
The Ozark Getaway, Houston Barber, Marcus Gasca, Evan Reece Matlock, Avery Wayne Harrah
ATU Research Symposium
Website designed for usage of renting AirBnb houses outside of the original website under the specific owner.
Premium Wireless, Dakota Burkhart, Andrew Clark, Garrett Kenney, Brandon Monroe
Premium Wireless, Dakota Burkhart, Andrew Clark, Garrett Kenney, Brandon Monroe
ATU Research Symposium
Our work implements an inventory system and appointment system for the Premium Wireless phone company. It includes separate views for employees to manage inventory and view appointments for the day and the near future and allows customers to view all current inventory and set an appointment.
Arkavalley Liquor: Simplifying Restaurant Alcohol Orders, Isaiah A. Kitts, Dayton Drilling, Bradlee Treece, Cameron Lumpkin
Arkavalley Liquor: Simplifying Restaurant Alcohol Orders, Isaiah A. Kitts, Dayton Drilling, Bradlee Treece, Cameron Lumpkin
ATU Research Symposium
The ArkaValley Liquor system is a web-based ordering platform designed to simplify the process of ordering alcohol for local restaurants. Currently, restaurants place orders by emailing the store, which makes it difficult to maintain a paper trail and track order details. With the ArkaValley Liquor system, the ordering process is automated, and all order details are saved in one central location. Each restaurant will have a login, ensuring only authorized individuals can place orders. The system will also provide a record of each restaurant's most recent order, making it easy to reorder if necessary. By using the ArkaValley Liquor system, …
Nviz: Unraveling Neural Networks Through Visualization, Kevin Hoffman
Nviz: Unraveling Neural Networks Through Visualization, Kevin Hoffman
Mathematics and Computer Science Presentations
The growing utility of artificial intelligence (AI) is attributed to the development of neural networks. These networks are a class of models that make predictions based on previously observed data. While the inferential power of neural networks is great, the ability to explain their results is difficult because the underlying model is automatically generated. The AI community commonly refers to neural networks as black boxes because the patterns they learn from the data are not easily understood. This project aims to improve the visibility of patterns that neural networks identify in data. Through an interactive web application, NVIZ affords the …
R Text Analysis For Adam Smith Cie Selected Works, Charlotte Grahame
R Text Analysis For Adam Smith Cie Selected Works, Charlotte Grahame
Mathematics and Computer Science Presentations
Text mining and text analysis is a way of understanding text documents using r coding that is more frequently used for numbered data. It helps with understanding portions of the text and drawing conclusions from there. This research looks specifically at the Adam Smith required documents that are used in the CIE course designated for freshmen. It looks at sentiments of the documents, including word sentiment, sentence sentiment, page and overall document sentiment as well. It provides visuals of word clouds to portray word frequency, tf-idf (which is explained in the presentation) and bigram analysis.
Cie Text Analysis: Narrative Of The Life Of Frederick Douglass, The Declaration Of Independence, And The Declaration Of Sentiments, Arianna Knipe
Cie Text Analysis: Narrative Of The Life Of Frederick Douglass, The Declaration Of Independence, And The Declaration Of Sentiments, Arianna Knipe
Mathematics and Computer Science Presentations
Our STAT-451 class has worked with analyzing the words from CIE texts and assigning them to a sentiment or feeling and comparing them with one another using RStudio. This project analyzes texts from three sources: The Narrative of the Life of Frederick Douglass, The Declaration of Independence and the Declaration of Sentiments.
Generation Z Cybersecurity Learners: The Identification Of Cybersecurity Instructor Strategies And Attributes That Maximize Student Engagement, Jeffrey Rice
Scholar Week 2016 - present
There exists a significant shortage of cybersecurity specialists in the workforce. Universities should endeavor to keep cybersecurity students engaged if they desire to be competitive and contribute graduates to the remediation efforts of this cybersecurity deficit. Instructors significantly contribute to student engagement and there is a correlation between student engagement and student retention. The purpose of this regional qualitative exploratory study was to identify attributes that Generation Z collegiate cybersecurity learners felt kept them engaged in their cybersecurity courses. The sample comprised 10 individuals identified as GenZ and used purposeful and snowball sampling to select participants. A semi-structured interview strategy …
Temporal Tensor Factorization For Multidimensional Forecasting, Jackson Cates, Karissa Scipke, Randy Hoover, Kyle Caudle
Temporal Tensor Factorization For Multidimensional Forecasting, Jackson Cates, Karissa Scipke, Randy Hoover, Kyle Caudle
SDSU Data Science Symposium
In the era of big data, there is a need for forecasting high-dimensional time series that might be incomplete, sparse, and/or nonstationary. The current research aims to solve this problem for two-dimensional data through a combination of temporal matrix factorization (TMF) and low-rank tensor factorization. From this method, we propose an expansion of TMF to two-dimensional data: temporal tensor factorization (TTF). The current research aims to interpolate missing values via low-rank tensor factorization, which produces a latent space of the original multilinear time series. We then can perform forecasting in the latent space. We present experimental results of the proposed …
From Computer Curriculum That Works For The Use Of Computer Intellignece Computer Science, Malachi B. Bacchus
From Computer Curriculum That Works For The Use Of Computer Intellignece Computer Science, Malachi B. Bacchus
Publications and Research
Computer interconnection can link different networks by using electrical artificial flow ways that can travel through different connections. these are called data network which travels through different sectors of the network simulation of service computer network using artificial intelligence to enhanced further understanding the computations, I've also demonstrated knowing by using the network to get better understanding of how ethical computing can be learned through universities and collegiate that can help established knowledge and healthy computer information. The main tools for the research are using data networking, ethical learning and translation towards different computer systems.
Simulating Salience: Developing A Model Of Choice In The Visual Coordination Game, Adib Sedig
Simulating Salience: Developing A Model Of Choice In The Visual Coordination Game, Adib Sedig
Undergraduate Student Research Internships Conference
This project is primarily inspired by three papers: Colin Camerer and Xiaomin Li’s (2019 working paper)—Using Visual Salience in Empirical Game Theory, Ryan Oprea’s (2020)—What Makes a Rule Complex?, and Caplin et. al.’s (2011)—Search and Satisficing. Over the summer, I worked towards constructing a model of choice for the visual coordination game that can model player behavior more accurately than traditional game theoretic predictions. It attempts to do so by incorporating a degree of bias towards salience into a cellular automaton search algorithm and utilizing it alongside a sequential search mechanism of satisficing. This …
Code Cyber: A Curated Collection Of Cybersecurity Career Learning And Preparation Resources, Kazi Tasin, Ethan Pruzhansky, Jason Lin, Tanvir Rahman, Patrick J. Slattery
Code Cyber: A Curated Collection Of Cybersecurity Career Learning And Preparation Resources, Kazi Tasin, Ethan Pruzhansky, Jason Lin, Tanvir Rahman, Patrick J. Slattery
Publications and Research
Since we are living in a digital age, the need to protect ourselves and those who are vulnerable to cyber-attacks is paramount to prevent cyber attacks that steal information such as banking accounts and important sensitive information.
Our research team extensively investigated the five aspects of cybersecurity such as identity, protection, detection, and response. By conducting various interviews with cybersecurity professionals, we gathered information about these five aspects for example security intelligence or security operations and response, (thread hunting, response orchestration) identity access management, (identity management, and data protection), and risks (risk perspective). Our main goal is to look into …
Phishing For Fun, Madeline Moran
Phishing For Fun, Madeline Moran
Computer Science Research Seminars and Symposia
The process of a phishing experiment that will be used to investigate a possible correlation between a person thinking style and their susceptibility to phishing scams.
Rotoscoping Image Processing, David J. Blackstone
Rotoscoping Image Processing, David J. Blackstone
Student Scholar Showcase
I wrote a program to perform rotoscoping image processing. Rotoscoping is an animation technique that is used to turn real images into cartoon images. This is a lengthy process to do by hand, taking hundreds of hours. To make this job easier, I have written a program to do automated rotoscoping. This program uses many algorithms and techniques such as edge detection, blurring, directional detection, and edge tracking. What once would take hours by hand, takes seconds!
Seizure Prediction In Epilepsy Patients, Gary Dean Cravens
Seizure Prediction In Epilepsy Patients, Gary Dean Cravens
NSU REACH and IPE Day
Purpose/Objective: Characterize rigorously the preictal period in epilepsy patients to improve the development of seizure prediction techniques. Background/Rationale: 30% of epilepsy patients are not well-controlled on medications and would benefit immensely from reliable seizure prediction. Methods/Methodology: Computational model consisting of in-silico Hodgkin-Huxley neurons arranged in a small-world topology using the Watts-Strogatz algorithm is used to generate synthetic electrocorticographic (ECoG) signals. ECoG data from 18 epilepsy patients is used to validate the model. Unsupervised machine learning is used with both patient and synthetic data to identify potential electrophysiologic biomarkers of the preictal period. Results/Findings: The model has shown states corresponding to …
Analyze And Examine Wildfire Events In California, Aleena Hoodith, Sakim Zaman, Safoan Hossain, Jiehao Huang
Analyze And Examine Wildfire Events In California, Aleena Hoodith, Sakim Zaman, Safoan Hossain, Jiehao Huang
Publications and Research
•A wildfire is an unplanned, unwanted, uncontrolled fire in an area of combustible vegetation starting in rural areas and urban areas. •Recent studies have shown that the effect of anthropogenic climate change has fueled the wildfire events, leading to an increase in the annual burned areas and number of events. •California is one of the places having the most deadliest and destructive wildfire seasons. With the global warming effect of 1°C since 1850, the 20 largest wildfires events that have occurred in California, 8 of them were in 2017. (Center For Climate And Energy Solutions) •Climate change is primarily caused …
Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin
Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
Cybersecurity breaches can occur when one uses an easily hacked password. Prior research has investigated 1) possible steps to encourage users to use strong passwords and 2) how personality is related to users using strong passwords.
We investigated whether personality-based nudging messages based on Big Five traits could nudge people to create stronger passwords (c.f., Jones et al., 2021). We also examined how personal characteristics, such as gender, age, personality traits, password knowledge, attitudes, and behavior, and need for cognition, were related to password strength.
We tested the hypothesis that passwords created following messages matching participants’ personality would be stronger …
Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison
Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison
Computer Science: Faculty Publications and Other Works
The research investigated the suggestion from prior research that language and emojis use on Twitter and other social media platforms can predict users’ personality and gender (Adali et al., 2014; Golbeck et al., 2011; Li et al., 2019; Moreno et al., 2019; Raess, 2018). Some studies have also analyzed Twitter language to identify individuals with specific health conditions (e.g., alcohol recovery, Golbeck, 2012; sleep problems, Suarez et al., 2018).
If strategies to predict Twitter users’ characteristics prove to be successful, future efforts to direct persuasive messages related to recommended practices in public health and/or cybersecurity will be possible. Commercial applications …
Student Academic Conference, Caitlin Brooks
Student Academic Conference, Caitlin Brooks
Student Academic Conference
No abstract provided.
The Origin & Evolution Of The Chinese Language, Charity Bullis, Yan Xie
The Origin & Evolution Of The Chinese Language, Charity Bullis, Yan Xie
Liberty University Research Week
Undergraduate
Textual or Investigative
Sector: A Web-Based Data Management And Sharing System Secured By Blockchain, Matthew Grohotolski
Sector: A Web-Based Data Management And Sharing System Secured By Blockchain, Matthew Grohotolski
Summer Scholarship, Creative Arts and Research Projects (SCARP)
Since the advent of technology, securely transferring data between two computers over the internet has been a difficult task. This is especially true for organizations and universities who want to take advantage of technology to securely transfer or share data. Although many file transfer services exist, none have achieved secure transfers while also offering a friendly and easy-to-use user interface. SECTOR uses an existing secure transfer service called Globus to conduct secure file transfers and has built a safe and secure user permissions system on top of their functionality. All data used by SECTOR is stored on a distributed ledger …
Responsive Web Design, Ashley Varon, David Karlins
Responsive Web Design, Ashley Varon, David Karlins
Publications and Research
Responsive web design is one of the most important topics in web. It can be one of the main reasons a website can be costing a business clients, and creating an effect on a business. The rise in popularity of mobile phones and tablets makes it crucial for a website to be designed to respond and adjust to different viewports. This project will research how important responsive web design is in 2020 and the positive or negative impacts it may have on the users, customers, and businesses. Companies must consider text size, layout, navigation, image sizes, and testing when designing …
Geometry Aided Sonification, Michael Tecce
Geometry Aided Sonification, Michael Tecce
Mathematics and Computer Science Presentations
Sonification is the process of deriving an audio representation of a time series which conveys important information about that time series. Otology and vision science have established that humans process audio information more quickly than visual information, and sonification can convey data to the visually impaired. In our work, we implement pipelines using Python/Numpy, and we handle both ordinary 1D time series and multivariate time series. For 1D time series, we find that using data to modulate the pitch or timing of preselected sounds (such as sine waves) simply and effectively captures repeating patterns and anomalies/outliers within the data. To …
Javafx Application, Pengfei Huang
Javafx Application, Pengfei Huang
Student Academic Conference
Developing java GUI application by using JavaFX.