Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

2015

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 87

Full-Text Articles in Social and Behavioral Sciences

How The University Of California Runs One Repository For Ten Campuses, Katie Fortney Apr 2015

How The University Of California Runs One Repository For Ten Campuses, Katie Fortney

Inaugural CSU IR Conference, 2015

Katie Fortney, JD, MLIS, Copyright Policy & Education Officer, Office of Scholarly Communication, University of California http://osc.universityofcalifornia.edu/


Implementing Metaarchive And Lockss At Digital Commons @Cal Poly, Michele Wyngard Apr 2015

Implementing Metaarchive And Lockss At Digital Commons @Cal Poly, Michele Wyngard

Inaugural CSU IR Conference, 2015

Michele Wyngard, Digital Repository Coordinator, CSU Cal Poly


Using Google Tag Manager And Google Analytics, (Code{4}Lib Journal), Suzanna Conrad Apr 2015

Using Google Tag Manager And Google Analytics, (Code{4}Lib Journal), Suzanna Conrad

Inaugural CSU IR Conference, 2015

Suzanna Conrad, Digital Initiatives Librarian, Cal Poly Pomona


What’S New Since The April 2013 Stim Ir Subcommittee Report To Cold: Hydra, Islandora And Dspace, Aaron Collier, Suzanna Conrad, Carmen Mitchell, Joan Parker, Andrew Weiss, Jeremy C. Shellhase Apr 2015

What’S New Since The April 2013 Stim Ir Subcommittee Report To Cold: Hydra, Islandora And Dspace, Aaron Collier, Suzanna Conrad, Carmen Mitchell, Joan Parker, Andrew Weiss, Jeremy C. Shellhase

Inaugural CSU IR Conference, 2015

Aaron Collier, Digital Repository Services Manager, Chancellor’s Office
Suzanna Conrad, Digital Initiatives Librarian, Cal Poly Pomona
Carmen Mitchell, Institutional Repository Librarian, CSU San Marcos
Joan Parker, Librarian, Moss Landing Marine Laboratories
Andrew Weiss, Digital Services Librarian, CSU Northridge

Jeremy Shellhase, Head of Information Services & Systems Department, Humboldt State University


The State Of Scholarworks, Aaron Collier Apr 2015

The State Of Scholarworks, Aaron Collier

Inaugural CSU IR Conference, 2015

Aaron Collier, Digital Repository Services Manager, Chancellor’s Office


Automated Technique For Real-Time Production Of Lifelike Animations Of American Sign Language, John Mcdonald, Rosalee Wolfe, Jerry C. Schnepp, Julie Hochgesang, Diana Gorman Jamrozik, Marie Stumbo, Larwan Berke, Melissa Bialek, Farah Thomas Apr 2015

Automated Technique For Real-Time Production Of Lifelike Animations Of American Sign Language, John Mcdonald, Rosalee Wolfe, Jerry C. Schnepp, Julie Hochgesang, Diana Gorman Jamrozik, Marie Stumbo, Larwan Berke, Melissa Bialek, Farah Thomas

Jerry C Schnepp

Generating sentences from a library of signs implemented through a sparse set of key frames derived from the segmental structure of a phonetic model of ASL has the advantage of flexibility and efficiency, but lacks the lifelike detail of motion capture. These difficulties are compounded when faced with real-time generation and display. This paper describes a technique for automatically adding realism without the expense of manually animating the requisite detail. The new technique layers transparently over and modifies the primary motions dictated by the segmental model, and does so with very little computational cost, enabling real-time production and display. The …


Synthetic Corpora: A Synergy Of Linguistics And Computer Animation, Jerry C. Schnepp, Rosalee Wolfe, John Mcdonald Apr 2015

Synthetic Corpora: A Synergy Of Linguistics And Computer Animation, Jerry C. Schnepp, Rosalee Wolfe, John Mcdonald

Jerry C Schnepp

Synthetic corpora enable the creation of computer-generated animations depicting sign language and are the complement of corpora containing videotaped exemplars. Any design for a synthetic corpus needs to accommodate linguistic processes as well as support the generation of believable, acceptable synthesized utterances. This paper explores one possibility for representing linguistic and extralinguistic processes that involve the face and reports on the outcomes of a user test evaluating the clarity of utterances synthesized by this approach.


Avatar To Depict Sign Language: Building From Reusable Hand Animation, Rosalee Wolfe, John Mcdonald, Jerry C. Schnepp Apr 2015

Avatar To Depict Sign Language: Building From Reusable Hand Animation, Rosalee Wolfe, John Mcdonald, Jerry C. Schnepp

Jerry C Schnepp

No abstract provided.


Using Support Vector Machine Ensembles For Target Audience Classification On Twitter, Siaw Ling Lo, Raymond Chiong, David Cornforth Apr 2015

Using Support Vector Machine Ensembles For Target Audience Classification On Twitter, Siaw Ling Lo, Raymond Chiong, David Cornforth

Research Collection School Of Computing and Information Systems

The vast amount and diversity of the content shared on social media can pose a challenge for any business wanting to use it to identify potential customers. In this paper, our aim is to investigate the use of both unsupervised and supervised learning methods for target audience classification on Twitter with minimal annotation efforts. Topic domains were automatically discovered from contents shared by followers of an account owner using Twitter Latent Dirichlet Allocation (LDA). A Support Vector Machine (SVM) ensemble was then trained using contents from different account owners of the various topic domains identified by Twitter LDA. Experimental results …


Institutional Maximization And Path Dependency – The Delay Of Implementation Of The Eu Public Sector Information Directive In Sweden, Jan Kallberg, Erik Lakomaa Mar 2015

Institutional Maximization And Path Dependency – The Delay Of Implementation Of The Eu Public Sector Information Directive In Sweden, Jan Kallberg, Erik Lakomaa

Jan Kallberg

The implementation of the EU public sector information (PSI) directive was expected to open up European governmental data sources for commercialization and create, conservatively estimated, a € 32 billion European public information market. Institutional arrangements and governmental path dependency has delayed the directive’s implementation in several countries, most notably Poland and Sweden. In this paper we use the Swedish case to examine how bureaucratic inertia and path dependence can stall the implementation of EU directives that conflicts with the member state’s internal bureaucratic agenda. Sweden usually implements EU directives rapidly and extensively. In the case of the PSI-directive however, the …


Agenda, Hr Adaptation Forum Jan 2015

Agenda, Hr Adaptation Forum

January 23, 2015: Storm Surge Modeling Tools for Planning and Response

No abstract provided.


Automated Technique For Real-Time Production Of Lifelike Animations Of American Sign Language, John Mcdonald, Rosalee Wolfe, Jerry C. Schnepp, Julie Hochgesang, Diana Gorman Jamrozik, Marie Stumbo, Larwan Berke, Melissa Bialek, Farah Thomas Jan 2015

Automated Technique For Real-Time Production Of Lifelike Animations Of American Sign Language, John Mcdonald, Rosalee Wolfe, Jerry C. Schnepp, Julie Hochgesang, Diana Gorman Jamrozik, Marie Stumbo, Larwan Berke, Melissa Bialek, Farah Thomas

Visual Communications and Technology Education Faculty Publications

Generating sentences from a library of signs implemented through a sparse set of key frames derived from the segmental structure of a phonetic model of ASL has the advantage of flexibility and efficiency, but lacks the lifelike detail of motion capture. These difficulties are compounded when faced with real-time generation and display. This paper describes a technique for automatically adding realism without the expense of manually animating the requisite detail. The new technique layers transparently over and modifies the primary motions dictated by the segmental model, and does so with very little computational cost, enabling real-time production and display. The …


From The Editor-In-Chief, Ibrahim Baggili Jan 2015

From The Editor-In-Chief, Ibrahim Baggili

Journal of Digital Forensics, Security and Law

Welcome to JDFSL’s first issue for 2015! First, I would like to thank our editorial board, reviewers, and the JDFSL team for bringing this issue to life. It has been a big year for JDFSL as the journal continues to progress. We are continuing our indexing efforts for the journal and we are getting closer with some of the major databases.


Data Loss Prevention Management And Control: Inside Activity Incident Monitoring, Identification, And Tracking In Healthcare Enterprise Environments, Manghui Tu, Kimberly Spoa-Harty, Liangliang Xiao Jan 2015

Data Loss Prevention Management And Control: Inside Activity Incident Monitoring, Identification, And Tracking In Healthcare Enterprise Environments, Manghui Tu, Kimberly Spoa-Harty, Liangliang Xiao

Journal of Digital Forensics, Security and Law

As healthcare data are pushed online, consumers have raised big concerns on the breach of their personal information. Law and regulations have placed businesses and public organizations under obligations to take actions to prevent data breach. Among various threats, insider threats have been identified to be a major threat on data loss. Thus, effective mechanisms to control insider threats on data loss are urgently needed. The objective of this research is to address data loss prevention challenges in healthcare enterprise environment. First, a novel approach is provided to model internal threat, specifically inside activities. With inside activities modeling, data …


On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis Jan 2015

On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis

Journal of Digital Forensics, Security and Law

While cybercrime proliferates – becoming more complex and surreptitious on the Internet – the tools and techniques used in performing digital investigations are still largely lagging behind, effectively slowing down law enforcement agencies at large. Real-time remote acquisition of digital evidence over the Internet is still an elusive ideal in the combat against cybercrime. In this paper we briefly describe the architecture of a comprehensive proactive digital investigation system that is termed as the Live Evidence Information Aggregator (LEIA). This system aims at collecting digital evidence from potentially any device in real time over the Internet. Particular focus is made …


A 3-D Stability Analysis Of Lee Harvey Oswald In The Backyard Photo, Srivamshi Pittala, Emily Whiting, Hany Farid Jan 2015

A 3-D Stability Analysis Of Lee Harvey Oswald In The Backyard Photo, Srivamshi Pittala, Emily Whiting, Hany Farid

Journal of Digital Forensics, Security and Law

Fifty years have passed since the assassination of U.S. President Kennedy. Despite the long passage of time, it is still argued that the famous backyard photo of Oswald, holding the same type of rifle used to assassinate the President, is a fake. These claims include, among others, that Oswald’s pose in the photo is physically implausible. We describe a detailed 3-D stability analysis to determine if this claim is warranted.


Open Forensic Devices, Lee Tobin, Pavel Gladyshev Jan 2015

Open Forensic Devices, Lee Tobin, Pavel Gladyshev

Journal of Digital Forensics, Security and Law

Cybercrime has been a growing concern for the past two decades. What used to be the responsibility of specialist national police has become routine work for regional and district police. Unfortunately, funding for law enforcement agencies is not growing as fast as the amount of digital evidence. In this paper, we present a forensic platform that is tailored for cost effectiveness, extensibility, and ease of use. The software for this platform is open source and can be deployed on practically all commercially available hardware devices such as standard desktop motherboards or embedded systems such as Raspberry Pi and Gizmosphere’s Gizmo …


Table Of Contents Jan 2015

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Merging Two Worlds: Agent-Based Simulation Methods For Autonomous Systems, Andreas Tolk Jan 2015

Merging Two Worlds: Agent-Based Simulation Methods For Autonomous Systems, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

This chapter recommends the increased use of agent-based simulation methods to support the design, development, testing, and operational use of autonomous systems. This recommendation is motivated by deriving taxonomies for intelligent software agents and autonomous robotic systems from the public literature, which shows their similarity: intelligent software agents can be interpreted as the virtual counterparts of autonomous robotic systems. This leads to examples of how simulation can be used to significantly improve autonomous system research and development in selected use cases. The chapter closes with observations on the operational effects of possible emergent behaviour and the need to align the …


Neighbor Discovery In Mobile Ad Hoc Networks, Esau Enrique Ruiz-Gaistardo Jan 2015

Neighbor Discovery In Mobile Ad Hoc Networks, Esau Enrique Ruiz-Gaistardo

Open Access Theses & Dissertations

Neighbor Discovery (ND) is the process that initializes a reliable communication between one-hop neighbors in mobile ad hoc networks (MANETs). This process consists of scheduled exchanges of control messages, called â??Hello Messagesâ?? (HMs) between one-hop neighbors. HMs build bidirectional links that are used to announce the topology information. Each node uses ND and the topology information to populate its routing tables and to communicate with every other node in the network. In MANETs, ND process is a permanent process to discover one-hop neighbors. It is based on two parameters: 1) ND message interval (the period of time in between sending …


Data Extraction On Mtk-Based Android Mobile Phone Forensics, Joe Kong Jan 2015

Data Extraction On Mtk-Based Android Mobile Phone Forensics, Joe Kong

Journal of Digital Forensics, Security and Law

In conducting criminal investigations it is quite common that forensic examiners need to recover evidentiary data from smartphones used by offenders. However, examiners encountered difficulties in acquiring complete memory dump from MTK Android phones, a popular brand of smartphones, due to a lack of technical knowledge on the phone architecture and that system manuals are not always available. This research will perform tests to capture data from MTK Android phone by applying selected forensic tools and compare their effectiveness by analyzing the extracted results. It is anticipated that a generic extraction tool, once identified, can be used on different brands …


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …


Using Robots As Therapeutic Agents To Teach Children With Autism Recognize Facial Expression, Seyedmohammad Mavadati, Huanghao Feng, Peyten B. Sanger, S. Silver, Anibal Gutierrez, Mohammad H. Mahoor Jan 2015

Using Robots As Therapeutic Agents To Teach Children With Autism Recognize Facial Expression, Seyedmohammad Mavadati, Huanghao Feng, Peyten B. Sanger, S. Silver, Anibal Gutierrez, Mohammad H. Mahoor

Electrical and Computer Engineering: Graduate Student Scholarship

Background: Recognizing and mimicking facial expressions are important cues for building great rapport and relationship in human-human communication. Individuals with Autism Spectrum Disorder (ASD) have often deficits in recognizing and mimicking social cues, such as facial expressions. In the last decade several studies have shown that individuals with ASD have superior engagement toward objects and particularly robots (i.e. humanoid and non-humanoid). However, majority of the studies have focused on investigating robot’s appearances and the engineering design concepts and very few research have been done on the effectiveness of robots in therapeutic and treatment applications. In fact, the critical question that …


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice E. Fischer Jan 2015

An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice E. Fischer

Electrical & Computer Engineering and Computer Science Faculty Publications

Hash functions are widespread in computer sciences and have a wide range of applications such as ensuring integrity in cryptographic protocols, structuring database entries (hash tables) or identifying known files in forensic investigations. Besides their cryptographic requirements, a fundamental property of hash functions is efficient and easy computation which is especially important in digital forensics due to the large amount of data that needs to be processed when working on cases. In this paper, we correlate the runtime efficiency of common hashing algorithms (MD5, SHA-family) and their implementation. Our empirical comparison focuses on C-OpenSSL, Python, Ruby, Java on Windows and …


Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger Jan 2015

Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

In this research we forensically acquire and analyze the device-stored data and network traffic of 20 popular instant messaging applications for Android. We were able to reconstruct some or the entire message content from 16 of the 20 applications tested, which reflects poorly on the security and privacy measures employed by these applications but may be construed positively for evidence collection purposes by digital forensic practitioners. This work shows which features of these instant messaging applications leave evidentiary traces allowing for suspect data to be reconstructed or partially reconstructed, and whether network forensics or device forensics permits the reconstruction of …