Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (27)
- California State University, San Bernardino (8)
- Selected Works (5)
- University of New Haven (4)
- City University of New York (CUNY) (3)
-
- Old Dominion University (3)
- San Jose State University (3)
- University of Connecticut (3)
- University of Pennsylvania Carey Law School (3)
- Purdue University (2)
- Singapore Management University (2)
- University of Denver (2)
- University of Nebraska - Lincoln (2)
- University of Texas at El Paso (2)
- Binghamton University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Claremont Colleges (1)
- Edith Cowan University (1)
- Montclair State University (1)
- Portland State University (1)
- SelectedWorks (1)
- University of Nevada, Las Vegas (1)
- University of South Florida (1)
- Wayne State University (1)
- World Maritime University (1)
- Yale University (1)
- Keyword
-
- Digital Forensics (5)
- Technology (5)
- Data management (4)
- Digital forensics (4)
- Editor (4)
-
- Table (4)
- Contents (3)
- 3D modeling (2)
- Android forensics (2)
- Computer Forensics (2)
- Cretan Hieroglyph (2)
- Cybersecurity (2)
- Data (2)
- Data preservation (2)
- Evolution (2)
- Information (2)
- International (2)
- Internet (2)
- Journal (2)
- Linear A (2)
- Linear B (2)
- Machine learning (2)
- Management (2)
- Marketing (2)
- Mobile forensics (2)
- Network forensics (2)
- PhotoScan (2)
- Photogrammetry (2)
- Policies (2)
- Robotics (2)
- Publication
-
- Journal of Digital Forensics, Security and Law (27)
- Journal of International Technology and Information Management (8)
- Electrical & Computer Engineering and Computer Science Faculty Publications (4)
- All Faculty Scholarship (3)
- Inaugural CSU IR Conference, 2015 (3)
-
- Jerry C Schnepp (3)
- CSE Conference and Workshop Papers (2)
- MODVIS Workshop (2)
- Open Access Theses & Dissertations (2)
- Publications and Research (2)
- Research Collection School Of Computing and Information Systems (2)
- Capstone Projects 2015-Present (1)
- Capstones (1)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computer Science Theses & Dissertations (1)
- Dissertations and Theses (1)
- Electrical and Computer Engineering: Graduate Student Scholarship (1)
- Electronic Theses and Dissertations (1)
- Honors Scholar Theses (1)
- Jan Kallberg (1)
- January 23, 2015: Storm Surge Modeling Tools for Planning and Response (1)
- Journal of Humanistic Mathematics (1)
- Liberal Arts and Engineering Studies (1)
- Library Faculty Publications (1)
- Maritime Safety & Environment Management Dissertations (Dalian) (1)
- Matt Schultz (1)
- Military Cyber Affairs (1)
- Published Works (1)
- Robert Hoppe (1)
- Scholars Cooperative Brown Bag Series (1)
Articles 1 - 30 of 81
Full-Text Articles in Social and Behavioral Sciences
How Can We Build A Moral Robot?, Kristen E. Clark
How Can We Build A Moral Robot?, Kristen E. Clark
Capstones
Artificial intelligence is already starting to drive our cars and make choices that affect the world economy. One day soon, we’ll have robots that can take care of our sick and elderly, and even rescue us in rescue us in emergencies. But as robots start to make decisions that matter—it’s raising questions that go far beyond engineering. We’re stating to think about ethics.
Bertram Malle and Matthias Scheutz are part of a team funded by the department of defense. It's their job to answer a question that seems straight out of a sci-fi novel: How can we build a moral …
Data To Decisions For Cyberspace Operations, Steve Stone
Data To Decisions For Cyberspace Operations, Steve Stone
Military Cyber Affairs
In 2011, the United States (U.S.) Department of Defense (DOD) named cyberspace a new operational domain. The U.S. Cyber Command and the Military Services are working to make the cyberspace environment a suitable place for achieving national objectives and enabling military command and control (C2). To effectively conduct cyberspace operations, DOD requires data and analysis of the Mission, Network, and Adversary. However, the DOD’s current data processing and analysis capabilities do not meet mission needs within critical operational timelines. This paper presents a summary of the data processing and analytics necessary to effectively conduct cyberspace operations.
Whatsapp Network Forensics: Decrypting And Understanding The Whatsapp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, Frank Breitinger
Whatsapp Network Forensics: Decrypting And Understanding The Whatsapp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
WhatsApp is a widely adopted mobile messaging application with over 800 million users. Recently, a calling feature was added to the application and no comprehensive digital forensic analysis has been performed with regards to this feature at the time of writing this paper. In this work, we describe how we were able to decrypt the network traffic and obtain forensic artifacts that relate to this new calling feature which included the: a) WhatsApp phone numbers, b) WhatsApp server IPs, c) WhatsApp audio codec (Opus), d) WhatsApp call duration, and e) WhatsApp's call termination. We explain the methods and tools used …
Gvsu Repository Migration Update, Matt Schultz
Gvsu Repository Migration Update, Matt Schultz
Matt Schultz
A Computational Translation Of The Phaistos Disk, Peter Revesz
A Computational Translation Of The Phaistos Disk, Peter Revesz
CSE Conference and Workshop Papers
For over a century the text of the Phaistos Disk remained an enigma without a convincing translation. This paper presents a novel semi-automatic translation method that uses for the first time a recently discovered connection between the Phaistos Disk symbols and other ancient scripts, including the Old Hungarian alphabet. The connection between the Phaistos Disk script and the Old Hungarian alphabet suggested the possibility that the Phaistos Disk language may be related to Proto-Finno-Ugric, Proto-Ugric, or Proto-Hungarian. Using words and suffixes from those languages, it is possible to translate the Phaistos Disk text as an ancient sun hymn, possibly connected …
Professor Frank Breitinger's Full Bibliography, Frank Breitinger
Professor Frank Breitinger's Full Bibliography, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
No abstract provided.
A Computational Study Of The Evolution Of Cretan And Related Scripts, Peter Revesz
A Computational Study Of The Evolution Of Cretan And Related Scripts, Peter Revesz
CSE Conference and Workshop Papers
Crete was the birthplace of several ancient writings, including the Cretan Hieroglyphs, the Linear A and the Linear B scripts. Out of these three only Linear B is deciphered. The sound values of the Cretan Hieroglyph and the Linear A symbols are unknown and attempts to reconstruct them based on Linear B have not been fruitful. In this paper, we compare the ancient Cretan scripts with four other Mediterranean and Black Sea scripts, namely Phoenician, South Arabic, Greek and Old Hungarian. We provide a computational study of the evolution of the three Cretan and four other scripts. This study encompasses …
Social Signal Processing For Real-Time Situational Understanding: A Vision And Approach, Kasthuri Jeyarajah, Shuchao Yao, Raghava Muthuraju, Archan Misra, Geeth De Mel, Julie Skipper, Tarek Abdelzaher, Michael Kolodny
Social Signal Processing For Real-Time Situational Understanding: A Vision And Approach, Kasthuri Jeyarajah, Shuchao Yao, Raghava Muthuraju, Archan Misra, Geeth De Mel, Julie Skipper, Tarek Abdelzaher, Michael Kolodny
Research Collection School Of Computing and Information Systems
The US Army Research Laboratory (ARL) and the Air Force Research Laboratory (AFRL) have established a collaborative research enterprise referred to as the Situational Understanding Research Institute (SURI). The goal is to develop an information processing framework to help the military obtain real-time situational awareness of physical events by harnessing the combined power of multiple sensing sources to obtain insights about events and their evolution. It is envisioned that one could use such information to predict behaviors of groups, be they local transient groups (e.g., protests) or widespread, networked groups, and thus enable proactive prevention of nefarious activities. This paper …
Network Analysis Of The Sardex Community Currency, Georgios Iosifidis, Yanick Charette, Giuseppe Littera, Leandros Tassiulas, Nicholas Christakis
Network Analysis Of The Sardex Community Currency, Georgios Iosifidis, Yanick Charette, Giuseppe Littera, Leandros Tassiulas, Nicholas Christakis
Yale Day of Data
We present a transaction dataset and preliminary analysis results about Sardex, a complementary currency (CC) in Sardinia, Italy. Sardex is currently considered one of the most successful CCs in Europe, as it grows continuously in terms of transactions’ volume and membership, and has been already replicated in 8 other regions in Italy. We model Sardex as a transaction network and study its basic properties.
Practical Guidance For Integrating Data Management Into Long-Term Ecological Monitoring Projects, Robert D. Sutter, Susan Wainscott, John R. Boetsch, Craig Palmer, David J. Rugg
Practical Guidance For Integrating Data Management Into Long-Term Ecological Monitoring Projects, Robert D. Sutter, Susan Wainscott, John R. Boetsch, Craig Palmer, David J. Rugg
Library Faculty Publications
Long-term monitoring and research projects are essential to understand ecological change and the effectiveness of management activities. An inherent characteristic of long-term projects is the need for consistent data collection over time, requiring rigorous attention to data management and quality assurance. Recent papers have provided broad recommendations for data management; however, practitioners need more detailed guidance and examples. We present general yet detailed guidance for the development of comprehensive, concise, and effective data management for monitoring projects. The guidance is presented as a graded approach, matching the scale of data management to the needs of the organization and the complexity …
Study Of The Research Status On E-Navigation, Qiwei Chen
Study Of The Research Status On E-Navigation, Qiwei Chen
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Network Structure, Network Flows And The Phenomenon Of Influence In Online Social Networks: An Exploratory Empirical Study Of Twitter Conversations About Youtube Product Categories, Nitin Venkat Mayande
Network Structure, Network Flows And The Phenomenon Of Influence In Online Social Networks: An Exploratory Empirical Study Of Twitter Conversations About Youtube Product Categories, Nitin Venkat Mayande
Dissertations and Theses
Traditional marketing models are swiftly being upended by the advent of online social networks. Yet, practicing firms that are engaging with online social networks neither have a reliable theory nor sufficient practical experience to make sense of the phenomenon. Extant theory in particular is based on observations of the real world, and may thus not apply to online social networks. Practicing firms may consequently be misallocating a large amount of resources, simply because they do not know how the online social networks with which they interact are organized.
The purpose of this dissertation is to investigate how online social networks …
Novelty Wins, “Straight Toward Objective” Loses! Or Book Review: Why Greatness Cannot Be Planned: The Myth Of The Objective, By Kenneth O. Stanley And Joel Lehman, Reuben Hersh
Journal of Humanistic Mathematics
Experiments in evolutionary artificial intelligence demonstrate that progress toward an important, difficult goal is not best achieved by attempting to go directly toward that goal, but rather, by rewarding novelty.
Apis And The Library: What, Why?, Graham S. Hukill
Apis And The Library: What, Why?, Graham S. Hukill
Scholars Cooperative Brown Bag Series
APIs (Application Programming Interface): What are they? Why are they? Introduction to APIs and their role in the Library
Creating A Data-Based Facebook Engagement Plan For Chabad At Binghamton, Justin Hayet
Creating A Data-Based Facebook Engagement Plan For Chabad At Binghamton, Justin Hayet
Capstone Projects 2015-Present
Core Capstone Question: How does Chabad at Binghamton maximize its online Facebook Engagement in a fashion which mirrors the needs of its diverse online stakeholders?
Schmalzbauer (2013) calculated that two thirds of America’s 400,000 Jewish college students attend schools with a Chabad chapter” (p. 120). Binghamton University’s student population is thirty percent Jewish, that is, 3,500 Jewish students (Hillel, 2014). Chabad at Binghamton’s seven full time staff members and student leadership of eighty-seven designated positions seek to engage all 3,500 of those students through weekly programs, Shabbat dinners, large scale programs and individual meetings. Chabad at Binghamton has been serving …
Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen
Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen
Computer Science Theses & Dissertations
The content of social media has grown exponentially in the recent years and its role has evolved from narrating life events to actually shaping them. Unfortunately, content posted and shared in social networks is vulnerable and prone to loss or change, rendering the context associated with it (a tweet, post, status, or others) meaningless. There is an inherent value in maintaining the consistency of such social records as in some cases they take over the task of being the first draft of history as collections of these social posts narrate the pulse of the street during historic events, protest, riots, …
Not Just A Tool. Taking Context Into Account In The Development Of A Mobile App For Rural Water Supply In Tanzania, Robert Hoppe, Anne Wesselink, Rob Lemmens
Not Just A Tool. Taking Context Into Account In The Development Of A Mobile App For Rural Water Supply In Tanzania, Robert Hoppe, Anne Wesselink, Rob Lemmens
Robert Hoppe
The 'eGovernance' hype around the potential of mobile phone and geoweb technologies for enhancing 'good governance' is soaring. In East Africa, the extensive use of mobile telephony adds to the imagined promises of ICT. We reflect on the assumptions made by the proponents of such tools, using our own action research project as an example. We took great care to consider context in the development of software for enhancing empowerment and accountability in rural water supply in Tanzania. However, we found that the rural water supply context in Tanzania is much more complex than the contexts for which successful mApps …
The Social Life Of Big Data - Pawsey Resources, Luke Edwards
The Social Life Of Big Data - Pawsey Resources, Luke Edwards
The Social Life of Big Data Symposium
The presentation covers the supercomputing facilities and services available at the Pawsey Supercomputing Centre, Western Australia.
The Pawsey Supercomputing Centre is an unincorporated joint venture between CSIRO, Curtin University, Edith Cowan University, Murdoch University and the University of Western Australia and is supported by the Western Australian Government.
Understanding The Relationships Of User-Selected Music In Video Games, Memphis Wong
Understanding The Relationships Of User-Selected Music In Video Games, Memphis Wong
Liberal Arts and Engineering Studies
Music has been an integral part of video games in its contribution to users' gameplay experiences. Varying from simple sound effects to elaborate scores, music helps shape the reactive environment of each video game. In particular, video games that generate unique levels and scenarios based on music has become more popular as its own genre. Games such as Audiosurf take this further, with having the game revolve entirely around levels generated to custom tracks. The aim of this study is to analyze the impact of such games, when it allows a user to select his or her own music.
Fundamentals Of Library Instruction, Darren Sweeper
Fundamentals Of Library Instruction, Darren Sweeper
Sprague Library Scholarship and Creative Works
No abstract provided.
Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain
Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain
Electronic Theses and Dissertations
Alternative networking is a growing field of study and practice due to advancements in computer networking hardware, and software protocols. Methods of integrating alternative networking configurations into infrastructure present enhanced forms of empowerment and embodiment for participants. Through an analysis of multiple hardware and software examples, this research suggests that practices of sharing and collaboration, which are embedded in the history of computer networking, have the potential to reinvigorate the notion of a virtual public sphere, and support the ideals of digital democracy.
Presentation On Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett
Presentation On Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett
UConn Library Presentations
No abstract provided.
Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett
Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett
Published Works
Though the roots of photogrammetry can be traced back to photography’s earliest days, only recent advances in both digital technology and software applications have put the possibilities of 3D modeling from 2D source images in the hands of the greater cultural heritage community. The possibilities of such 3D digital rendering are many. With these possibilities come unique digital preservation challenges. This study explores basic close-range photogrammetry as applied to sample archival objects. Additionally, the latest BagIt and ZIP-based bundling formats along with repository-based solutions are also surveyed as potential 3D data management and archiving aggregators for resulting 3D models.
Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout
Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout
MODVIS Workshop
Images convey multiple meanings that depend on the context in which the viewer perceptually organizes the scene. This presents a problem for automated image segmentation, because it adds uncertainty to the process of selecting which objects to include or not include within a segment. I’ll discuss the implementation of a fuzzy-logic-natural-vision-processing engine that solves this problem by assuming the scene architecture prior to processing. The scene architecture, a standardized natural-scene-perception-taxonomy comprised of a hierarchy of nested spatial-taxons. Spatial-taxons are regions (pixel-sets) that are figure-like, in that they are perceived as having a contour, are either `thing-like', or a `group of …
Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo
Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo
MODVIS Workshop
Computer vision research rarely makes use of symmetry in stereo reconstruction despite its established importance in perceptual psychology. Such stereo reconstructions produce visually satisfying figures with precisely located points and lines, even when input images have low or moderate resolution. However, because few invariants exist, there are no known general approaches to solving symmetry correspondence on real images. The problem is significantly easier when combined with the binocular correspondence problem, because each correspondence problem provides strong non-overlapping constraints on the solution space. We demonstrate a system that leverages these constraints to produce accurate stereo models from pairs of binocular images …
Design, Programming, And User-Experience, Kaila G. Manca
Design, Programming, And User-Experience, Kaila G. Manca
Honors Scholar Theses
This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.
I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.
The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …
Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo
Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo
All Faculty Scholarship
The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.
Using Google Tag Manager And Google Analytics, (Code{4}Lib Journal), Suzanna Conrad
Using Google Tag Manager And Google Analytics, (Code{4}Lib Journal), Suzanna Conrad
Inaugural CSU IR Conference, 2015
Suzanna Conrad, Digital Initiatives Librarian, Cal Poly Pomona
What’S New Since The April 2013 Stim Ir Subcommittee Report To Cold: Hydra, Islandora And Dspace, Aaron Collier, Suzanna Conrad, Carmen Mitchell, Joan Parker, Andrew Weiss, Jeremy C. Shellhase
What’S New Since The April 2013 Stim Ir Subcommittee Report To Cold: Hydra, Islandora And Dspace, Aaron Collier, Suzanna Conrad, Carmen Mitchell, Joan Parker, Andrew Weiss, Jeremy C. Shellhase
Inaugural CSU IR Conference, 2015
Aaron Collier, Digital Repository Services Manager, Chancellor’s Office
Suzanna Conrad, Digital Initiatives Librarian, Cal Poly Pomona
Carmen Mitchell, Institutional Repository Librarian, CSU San Marcos
Joan Parker, Librarian, Moss Landing Marine Laboratories
Andrew Weiss, Digital Services Librarian, CSU Northridge
Jeremy Shellhase, Head of Information Services & Systems Department, Humboldt State University
The State Of Scholarworks, Aaron Collier
The State Of Scholarworks, Aaron Collier
Inaugural CSU IR Conference, 2015
Aaron Collier, Digital Repository Services Manager, Chancellor’s Office