Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 40

Full-Text Articles in Social and Behavioral Sciences

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes Jun 2015

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

- From in-car video recording to body-worn video recording

- Exploring available technologies: how do they work, pros and cons

- Storing direct evidence in secure storage: factors to consider

- Citizens “shooting” back with POV tech – what are their rights?

- Crowdsourced sousveillance- harnessing public data for forensic profiling

- Police force policies and practices on the application of new media


Sojuznik Snowden: A Solid Russian Investment, Jan Kallberg Oct 2013

Sojuznik Snowden: A Solid Russian Investment, Jan Kallberg

Jan Kallberg

The Edward Snowden case catapulted us back to the heights of the Cold War for one single reason: His story is too manicured and well-placed to be true. As the old saying goes: If it sounds too good to be true, it probably isn’t. With the Snowden affair, many of the Russian political objectives are reached. It has has created a wedge that split the United States and Europe. Even if Vladimir Putin wears a fancy Italian suit, he is still a KGB-man, slightly better looking than the official grey suits in the heyday of the Soviet Eastern Bloc. The …


Etd_Con Utility And User Manual, Logan E. Jewett Oct 2013

Etd_Con Utility And User Manual, Logan E. Jewett

Logan E. Jewett

ETD_CON is a utility designed and developed for use by Iowa State University to improve workflow for processing electronic theses & dissertations for batch uploads to the digital repository.


Best Upgrade Plans For Large Road Networks, Yimin Lin, Kyriakos Mouratidis Aug 2013

Best Upgrade Plans For Large Road Networks, Yimin Lin, Kyriakos Mouratidis

Kyriakos MOURATIDIS

In this paper, we consider a new problem in the context of road network databases, named Resource Constrained Best Upgrade Plan computation (BUP, for short). Consider a transportation network (weighted graph) G where a subset of the edges are upgradable, i.e., for each such edge there is a cost, which if spent, the weight of the edge can be reduced to a specific new value. Given a source and a destination in G, and a budget (resource constraint) B, the BUP problem is to identify which upgradable edges should be upgraded so that the shortest path distance between source and …


Experimental Validation Of A Numerical Forward Model For Tunnel Detection Using Cross-Borehole Radar, Arvin Farid, Jose A. Martinez-Lorenzo, Akram N. Alshawabkeh, Carey M. Rappaport Aug 2013

Experimental Validation Of A Numerical Forward Model For Tunnel Detection Using Cross-Borehole Radar, Arvin Farid, Jose A. Martinez-Lorenzo, Akram N. Alshawabkeh, Carey M. Rappaport

Jose Martinez-Lorenzo

The goal of this research is to develop an experimentally validated two-dimensional(2D) finite difference frequency domain (FDFD) numerical forward model to studythe potential of radar-based tunnel detection. Tunnel detection has become a subject of interest to the nation due to the use of tunnels by illegal immigrants, smugglers, prisoners, assailants, and terrorists. These concerns call for research to nondestructively detect, localize, and monitor tunnels. Nondestructive detection requires robust image reconstruction and inverse models, which in turn need robust forward models. Cross-Well Radar (CWR) modality is used for experimentation to avoid soil-air interface roughness. CWR is not a versatile field technology …


Experimental Validation Of A Numerical Forward Model For Tunnel Detection Using Cross-Borehole Radar, Arvin Farid, Jose A. Martinez-Lorenzo, Akram N. Alshawabkeh, Carey M. Rappaport Aug 2013

Experimental Validation Of A Numerical Forward Model For Tunnel Detection Using Cross-Borehole Radar, Arvin Farid, Jose A. Martinez-Lorenzo, Akram N. Alshawabkeh, Carey M. Rappaport

Akram N. Alshawabkeh

The goal of this research is to develop an experimentally validated two-dimensional(2D) finite difference frequency domain (FDFD) numerical forward model to studythe potential of radar-based tunnel detection. Tunnel detection has become a subject of interest to the nation due to the use of tunnels by illegal immigrants, smugglers, prisoners, assailants, and terrorists. These concerns call for research to nondestructively detect, localize, and monitor tunnels. Nondestructive detection requires robust image reconstruction and inverse models, which in turn need robust forward models. Cross-Well Radar (CWR) modality is used for experimentation to avoid soil-air interface roughness. CWR is not a versatile field technology …


Electromagnetic Waves In Contaminated Soils, Arvin Farid, Akram Alshawabkeh, Carey Rappaport Aug 2013

Electromagnetic Waves In Contaminated Soils, Arvin Farid, Akram Alshawabkeh, Carey Rappaport

Akram N. Alshawabkeh

No abstract provided.


Experimental Validation Of A Numerical Forward Model For Tunnel Detection Using Cross-Borehole Radar, Arvin Farid, Jose A. Martinez-Lorenzo, Akram N. Alshawabkeh, Carey M. Rappaport Aug 2013

Experimental Validation Of A Numerical Forward Model For Tunnel Detection Using Cross-Borehole Radar, Arvin Farid, Jose A. Martinez-Lorenzo, Akram N. Alshawabkeh, Carey M. Rappaport

Carey Rappaport

The goal of this research is to develop an experimentally validated two-dimensional(2D) finite difference frequency domain (FDFD) numerical forward model to studythe potential of radar-based tunnel detection. Tunnel detection has become a subject of interest to the nation due to the use of tunnels by illegal immigrants, smugglers, prisoners, assailants, and terrorists. These concerns call for research to nondestructively detect, localize, and monitor tunnels. Nondestructive detection requires robust image reconstruction and inverse models, which in turn need robust forward models. Cross-Well Radar (CWR) modality is used for experimentation to avoid soil-air interface roughness. CWR is not a versatile field technology …


Electromagnetic Waves In Contaminated Soils, Arvin Farid, Akram N. Alshawabkeh, Carey M. Rappaport Aug 2013

Electromagnetic Waves In Contaminated Soils, Arvin Farid, Akram N. Alshawabkeh, Carey M. Rappaport

Carey Rappaport

No abstract provided.


Will We Connect Again? Machine Learning For Link Prediction In Mobile Social Networks, Ole J. Mengshoel, Raj Desai, Andrew Chen, Brian Tran Jul 2013

Will We Connect Again? Machine Learning For Link Prediction In Mobile Social Networks, Ole J. Mengshoel, Raj Desai, Andrew Chen, Brian Tran

Ole J Mengshoel

In this paper we examine link prediction for two types of data sets with mobility data, namely call data records (from the MIT Reality Mining project) and location-based social networking data (from the companies Gowalla and Brightkite). These data sets contain location information, which we incorporate in the features used for prediction. We also examine different strategies for data cleaning, in particular thresholding based on the amount of social interaction. We investigate the machine learning algorithms Decision Tree, Naïve Bayes, Support Vector Machine, and Logistic Regression. Generally, we find that our feature selection and filtering of the data sets have …


Private Cyber Retaliation Undermines Federal Authority, Jan Kallberg Jul 2013

Private Cyber Retaliation Undermines Federal Authority, Jan Kallberg

Jan Kallberg

The demarcation in cyber between the government and the private spheres is important to uphold because it influences how we see the state and the framework in which states interact. One reason we have a nation state is, in a uniform and structured way, under the guidance of a representative democracy, to deal with foreign hostility and malicious activity.

The state is given a monopoly on violence by its citizenry. The state then acts under the existing laws on behalf of the citizens to ensure the intentions of the population it represents. These powers grant the federal government an authority …


Burglary Crime Analysis Using Logistic Regression, Daniel Antolos, Dahai Liu, Andrei Ludu, Dennis Vincenzi Jul 2013

Burglary Crime Analysis Using Logistic Regression, Daniel Antolos, Dahai Liu, Andrei Ludu, Dennis Vincenzi

Dahai Liu

This study used a logistic regression model to investigate the relationship between several predicting factors and burglary occurrence probability with regard to the epicenter. These factors include day of the week, time of the day, repeated victimization, connectors and barriers. Data was collected from a local police report on 2010 burglary incidents. Results showed the model has various degrees of significance in terms of predicting the occurrence within difference ranges from the epicenter. Follow-up refined multiple comparisons of different sizes were observed to further discover the pattern of prediction strength of these factors. Results are discussed and further research directions …


Automated Extraction Of Community Mobility Measures From Gps Stream Data Using Temporal Dbscan, Sungsoon Hwang, Timothy Hanke, Christian Evans May 2013

Automated Extraction Of Community Mobility Measures From Gps Stream Data Using Temporal Dbscan, Sungsoon Hwang, Timothy Hanke, Christian Evans

Sungsoon Hwang

Inferring community mobility of patients from GPS data has received much attention in health research. Developing robust mobility (or physical activity) monitoring systems relies on the automated algorithm that classifies GPS track points into events (such as stops where activities are conducted, and routes taken) accurately. This paper describes the method that automatically extracts community mobility measures from GPS track data. The method uses temporal DBSCAN in classifying track points, and temporal filtering in removing noises (any misclassified track points). The result shows that the proposed method classifies track points with 88% accuracy. The percent of misclassified track points decreased …


A Mechanism For Organizing Last-Mile Service Using Non-Dedicated Fleet, Shih-Fen Cheng, Duc Thien Nguyen, Hoong Chuin Lau May 2013

A Mechanism For Organizing Last-Mile Service Using Non-Dedicated Fleet, Shih-Fen Cheng, Duc Thien Nguyen, Hoong Chuin Lau

Shih-Fen CHENG

Unprecedented pace of urbanization and rising income levels have fueled the growth of car ownership in almost all newly formed megacities. Such growth has congested the limited road space and significantly affected the quality of life in these megacities. Convincing residents to give up their cars and use public transport is the most effective way in reducing congestion; however, even with sufficient public transport capacity, the lack of last-mile (from the transport hub to the destination) travel services is the major deterrent for the adoption of public transport. Due to the dynamic nature of such travel demands, fixed-size fleets will …


Etd Conversion Utility, Logan E. Jewett May 2013

Etd Conversion Utility, Logan E. Jewett

Logan E. Jewett

This presentation describes the development and operation of an ETD Conversion Utility created to prepare electronic theses and dissertations (ETD) received from ProQuest for deposit in Iowa State University's Digital Commons-based institutional repository.


Identifying Subjective Statements In News Titles Using A Personal Sense Annotation Framework, Polina Panicheva, John Cardiff, Paolo Rosso Apr 2013

Identifying Subjective Statements In News Titles Using A Personal Sense Annotation Framework, Polina Panicheva, John Cardiff, Paolo Rosso

John Cardiff

Subjective language contains information about private states. The goal of subjective language identification is to determine that a private state is expressed, without considering its polarity or specific emotion. A component of word meaning, “Personal Sense,” has clear potential in the field of subjective language identification, as it reflects a meaning of words in terms of unique personal experience and carries personal characteristics. In this paper we investigate how Personal Sense can be harnessed for the purpose of identifying subjectivity in news titles. In the process, we develop a new Personal Sense annotation framework for annotating and classifying subjectivity, polarity, …


F-Trail: Finding Patterns In Taxi Trajectories, Yasuko Matsubara, Evangelos Papalexakis, Lei Li, David Lo, Yasushi Sakurai, Christos Faloutsos Apr 2013

F-Trail: Finding Patterns In Taxi Trajectories, Yasuko Matsubara, Evangelos Papalexakis, Lei Li, David Lo, Yasushi Sakurai, Christos Faloutsos

David LO

Given a large number of taxi trajectories, we would like to find interesting and unexpected patterns from the data. How can we summarize the major trends, and how can we spot anomalies? The analysis of trajectories has been an issue of considerable interest with many applications such as tracking trails of migrating animals and predicting the path of hurricanes. Several recent works propose methods on clustering and indexing trajectories data. However, these approaches are not especially well suited to pattern discovery with respect to the dynamics of social and economic behavior. To further analyze a huge collection of taxi trajectories, …


Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 3: Attitudinal Analysis - Artist Housing And Space Survey, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran Mar 2013

Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 3: Attitudinal Analysis - Artist Housing And Space Survey, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran

Ellen Cyran

A series of reports detailing the residential and work space location preferences of Cuyahoga county's artists.


Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 2: Profiles Of Artist Neighborhoods, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran Mar 2013

Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 2: Profiles Of Artist Neighborhoods, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran

Ellen Cyran

A series of reports detailing the residential and work space location preferences of Cuyahoga county's artists.


Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 1: Summary Report, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran Mar 2013

Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 1: Summary Report, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran

Ellen Cyran

A series of reports detailing the residential and work space location preferences of Cuyahoga county's artists.


Census 2000 Demographic And Housing Profile Reports, Mark Salling, Ellen Cyran, Sharon Bliss Mar 2013

Census 2000 Demographic And Housing Profile Reports, Mark Salling, Ellen Cyran, Sharon Bliss

Ellen Cyran

No abstract provided.


Foreign-Born Population In Selected Ohio Cities, 1870 To 2000 A Brief Descriptive Report, Mark Salling, Ellen Cyran Mar 2013

Foreign-Born Population In Selected Ohio Cities, 1870 To 2000 A Brief Descriptive Report, Mark Salling, Ellen Cyran

Ellen Cyran

No abstract provided.


Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 5: Properties Analysis - Artist Housing Characteristics, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran Mar 2013

Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 5: Properties Analysis - Artist Housing Characteristics, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran

Ellen Cyran

A series of reports detailing the residential and work space location preferences of Cuyahoga county's artists.


Foreign Migration To The Cleveland-Akron-Lorain Metropolitan Area From 1995 To 2000, Mark Salling, Ellen Cyran Mar 2013

Foreign Migration To The Cleveland-Akron-Lorain Metropolitan Area From 1995 To 2000, Mark Salling, Ellen Cyran

Ellen Cyran

This report is one of a series on migration to and from the region using the five percent Public Use Microdata Sample (PUMS) of the 2000 Census of Population and Housing and provides a description of foreign migrants moving to the Cleveland-Akron-Lorain (CAL) Consolidated Metropolitan Area (CMSA) from 1995 to 2000.* The report identifies the countries of origin of migrants and compares the demographic, socioeconomic, and housing characteristics of the foreign migrants to the CAL with other groups, including foreign migrants to Ohio and the nation, and, at times, to domestic migrants to and from the CAL.


Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 4: Predictive Analysis - Regression Modeling, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran Mar 2013

Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 4: Predictive Analysis - Regression Modeling, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran

Ellen Cyran

A series of reports detailing the residential and work space location preferences of Cuyahoga county's artists.


Using The Census Bureau's Public Use Microdata For Migration Analysis, Mark Salling, Ellen Cyran Mar 2013

Using The Census Bureau's Public Use Microdata For Migration Analysis, Mark Salling, Ellen Cyran

Ellen Cyran

Using the Census Bureau's Public Use Microdata for Migration Analysis, Proceedings of the annual conference of the Urban and Regional Information Systems Association, Vancouver, BC, Canada, September 2006, pp.336-348.


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael Jan 2013

Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael

Professor Katina Michael

The WIE Featured Person of the Month is Katina Michael, editor-in-chief of IEEE Technology and Society Magazine. After working at OTIS Elevator Company and Andersen Consulting, Katina was offered and exciting graduate engineering position at Nortel in 1996; and her career has been fast track from there. Read Katina’s story on Page 7.