Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

2015

Computer science

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 67

Full-Text Articles in Entire DC Network

The Impact Of Technology On Primary Education, Kathryn Holt Oct 2015

The Impact Of Technology On Primary Education, Kathryn Holt

Capstone Projects and Master's Theses

Using technology and computer science to facilitate learning as well as its role within education is important to understand as technology plays a dominant role in daily life. The availability, affordability, and efficiency of technological devices and tools have benefited both students and educators. Technology usage has increased as students with learning disabilities use different technological devices to support their needs, as well as teachers using assistive devices to directly identify students’ needs. Additionally, with the integration of technology and educational applications with lessons or texts, teachers provide students the opportunity to expand their learning through different forms of media, …


On The Analysis Of Some Recursive Equations In Probability., Arunangshu Biswas Dr. Sep 2015

On The Analysis Of Some Recursive Equations In Probability., Arunangshu Biswas Dr.

Doctoral Theses

This thesis deals with recursive systems used in theoretical and applied probability. Recursive systems are stochastic processes {Xn}n≥1 where the Xn depends on the earlier Xn−1 and also on some increment process which is uncorrelated with the process Xn. The simplest example of a recursive system is the Random Walk, whose properties have been extensively studied. Mathematically a recursive system takes the form Xn = f(Xn−1, n), is the increment/ innovation procedure and f(·, ·) is a function on the product space of xn and n. We first consider a recursive system called Self-Normalized sums (SNS) corresponding to a sequence …


Preparing Computer Science Graduates For The 21st Century, Paul Parsons Sep 2015

Preparing Computer Science Graduates For The 21st Century, Paul Parsons

Paul Parsons

The nature of computer use has changed remarkably in the past fifty years. However, most undergraduate computer science courses are still often taught through an old paradigm that is not adequate to address modern concerns. This 90 minute seminar will address some issues relevant to preparing computer scientists for the 21st century. These include issues central to human-computer interaction (HCI) such as cognitive and perceptual aspects of computer users, ergonomics, and human factors. Although there has been literature on this topic for at least the past 15 years, it is still not widely recognized nor understood by the majority of …


A Constraint Language For Static Semantic Analysis Based On Scope Graphs, Hendrik Van Antwerpen, Pierre Néron, Andrew Tolmach, Eelco Visser, Guido Wachsmuth Sep 2015

A Constraint Language For Static Semantic Analysis Based On Scope Graphs, Hendrik Van Antwerpen, Pierre Néron, Andrew Tolmach, Eelco Visser, Guido Wachsmuth

Computer Science Faculty Publications and Presentations

In previous work, we introduced scope graphs as a formalism for describing program binding structure and performing name resolution in an AST-independent way. In this paper, we show how to use scope graphs to build static semantic analyzers. We use constraints extracted from the AST to specify facts about binding, typing, and initialization. We treat name and type resolution as separate building blocks, but our approach can handle language constructs—such as record field access—for which binding and typing are mutually dependent.We also refine and extend our previous scope graph theory to address practical concerns including ambiguity checking and support for …


Some Issues In Unsupervised Feature Selection Using Similarity., Partha Pratim Kundu Dr. Aug 2015

Some Issues In Unsupervised Feature Selection Using Similarity., Partha Pratim Kundu Dr.

Doctoral Theses

Pattern recognition is what humans do most of the time, without any conscious effort, and fortunately excel in. Information is received through various sensory organs, processed simultaneously in the brain, and its source is instantaneously identified without any perceptible effort. The interesting issue is that recognition occurs even under non-ideal conditions, i.e., when information is vague, imprecise or incomplete. In reality, most human activities depend on the success in performing various pattern recognition tasks. Let us consider an example. Before boarding a train or bus, we first select the appropriate one by identifying either the route number or its destination …


On Supervised And Unsupervised Methodologies For Mining Of Text Data., Tanmay Basu Dr. Jul 2015

On Supervised And Unsupervised Methodologies For Mining Of Text Data., Tanmay Basu Dr.

Doctoral Theses

The supervised and unsupervised methodologies of text mining using the plain text data of English language have been discussed. Some new supervised and unsupervised methodologies have been developed for effective mining of the text data after successfully overcoming some limitations of the existing techniques.The problems of unsupervised techniques of text mining, i.e., document clustering methods are addressed. A new similarity measure between documents has been designed to improve the accuracy of measuring the content similarity between documents. Further, a hierarchical document clustering technique is designed using this similarity measure. The main significance of the clustering algorithm is that the number …


Technical Communication As Teaching: A Grounded Theory Study Of Cognitive Empathy And Audience Engagement Among Computer Science Majors In A Technical Communication Classroom, Robert Michael Rowan Jun 2015

Technical Communication As Teaching: A Grounded Theory Study Of Cognitive Empathy And Audience Engagement Among Computer Science Majors In A Technical Communication Classroom, Robert Michael Rowan

Theses and Dissertations

This dissertation is a grounded theory study of empathy, ethical awareness, and audience engagement activities in students in a technical writing service course. The course was designed around an empathy-oriented approach to teaching technical writing and writing research. The students are primarily computer science majors, and the teaching methods include a genre and writing research approach as well as the use of an extended metaphor of technical communication as a form of teaching. Findings indicate that students respond to the metaphor by drawing upon positive and empathetically-informed models of teachers and teaching to guide how they would work with and …


Creating A 3d Racing Game In Opengl, Noah Harper Jun 2015

Creating A 3d Racing Game In Opengl, Noah Harper

Computer Science and Software Engineering

No abstract provided.


Enterprise Smart Outlet: Android Development, Aaron Koeppel Jun 2015

Enterprise Smart Outlet: Android Development, Aaron Koeppel

Computer Science and Software Engineering

This project consists of one part of a larger multidisciplinary project, Enterprise Smart Outlet. The purpose of the Enterprise Smart Outlet is to create an electrical outlet which would allow enterprise users to monitor and change their power consumption habits on a large scale. The goal of this project is to allow consumers to see their power consumption per outlet in real time, and then use that information to inform their future habits, helping them conserve electrical energy and money. The Enterprise Smart Outlet Android application provides an interface to display the real time data of all smart outlets connected …


Service Quality And Perceived Value Of Cloud Computing-Based Service Encounters: Evaluation Of Instructor Perceived Service Quality In Higher Education In Texas, Eges Egedigwe Jun 2015

Service Quality And Perceived Value Of Cloud Computing-Based Service Encounters: Evaluation Of Instructor Perceived Service Quality In Higher Education In Texas, Eges Egedigwe

CCE Theses and Dissertations

Cloud computing based technology is becoming increasingly popular as a way to deliver quality education to community colleges, universities and other organizations. At the same time, compared with other industries, colleges have been slow on implementing and sustaining cloud computing services on an institutional level because of budget constraints facing many large community colleges, in addition to other obstacles. Faced with this challenge, key stakeholders are increasingly realizing the need to focus on service quality as a measure to improve their competitive position in today's highly competitive environment. Considering the amount of study done with cloud computing in education, very …


The School Of Engineering And Computer Science Class Of 2015 Computer Science And Computer And Electrical Engineering Academic Celebration Program, Cedarville University May 2015

The School Of Engineering And Computer Science Class Of 2015 Computer Science And Computer And Electrical Engineering Academic Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Efficient Variations Of The Quality Threshold Clustering Algorithm, Frank Loforte Jr. May 2015

Efficient Variations Of The Quality Threshold Clustering Algorithm, Frank Loforte Jr.

CCE Theses and Dissertations

Clustering gene expression data such that the diameters of the clusters formed are no greater than a specified threshold prompted the development of the Quality Threshold Clustering (QTC) algorithm. It iteratively forms clusters of non-increasing size until all points are clustered; the largest cluster is always selected first. The QTC algorithm applies in many other domains that require a similar quality guarantee based on cluster diameter. The worst-case complexity of the original QTC algorithm is (n5). Since practical applications often involve large datasets, researchers called for more efficient versions of the QTC algorithm.

This dissertation aimed to develop …


The Importance Of A Pictorial Medical History In Assisting Medical Diagnosis Of Individuals With Intellectual Disabilities: A Telemedicine Approach, Grace Bonanno May 2015

The Importance Of A Pictorial Medical History In Assisting Medical Diagnosis Of Individuals With Intellectual Disabilities: A Telemedicine Approach, Grace Bonanno

CCE Theses and Dissertations

When face-to-face physical medical exams are not possible, virtual physical exams, in the form of a pictorial medical exam/history, can be substituted, and telemedicine can be the means to deliver these virtual exams. The goal of this work was to determine if presence in the form of a visual and/or pictorial medical history can be of benefit to clinicians in the diagnosis of medical conditions of individuals with developmental disabilities (DDs) and/or intellectual disabilities (IDs), in particular those who cannot, because of their cognitive and/or physical disabilities, verbally relate their illness to a clinician. Virtual exams can also be useful …


Broadband Access In Arkansas Schools, Sarah C. Mckenzie, Gary W. Ritter Apr 2015

Broadband Access In Arkansas Schools, Sarah C. Mckenzie, Gary W. Ritter

Policy Briefs

With the computer-based Partnership for Assessment of Readiness for College and Career (PARCC) test, the Arkansas Digital Learning Act, and Governor Hutchinson’s efforts to increase participation in computer science courses, the Arkansas Legislature is discussing actions to take in order to close the “digital divide” in the state. This brief will explore the technological requirements of providing the recommended bandwidth to schools, the barriers to the provision of that service, and potential steps for the Arkansas Department of Education to take in order to ensure that every Arkansas student has fast, consistent access to the Internet to support their learning.


Interview Of Margaret Mccoey, M.S., Margaret M. Mccoey, Matthew Riffe Apr 2015

Interview Of Margaret Mccoey, M.S., Margaret M. Mccoey, Matthew Riffe

All Oral Histories

Margaret “Peggy” McCoey is the Director of Graduate Programs in Computer Information Science, Information Technology, and Economic Crime Forensics at La Salle University. Born in the Oxford Circle section of Philadelphia in 1957, Peggy grew up in St. Martin of Tours parish attending their grade school before going to Little Flower High School. After graduation in 1975, Peggy entered La Salle University an undergraduate where she received a bachelor’s degree in Computer Science. Peggy received a master’s degree from Villanova in 1984. Beginning in 1982, Peggy McCoey has taught at La Salle University in some capacity. Throughout the 1990’s, Peggy …


Ala Al-Fuqaha, Margaret Von Steinen Apr 2015

Ala Al-Fuqaha, Margaret Von Steinen

International Faculty Researchers

A wide range of road safety and driver assistive applications— Intelligent Transport Systems—could result from a collaborative research project that Dr. Ala Al-Fuqaha, WMU professor of computer science, is working on with Dr. Elyes Hamida at the Qatar Mobility Innovation Center and Dr. Bharat Bhargava at Purdue University.


Immunology Inspired Detection Of Data Theft From Autonomous Network Activity, Theodore O. Cochran Apr 2015

Immunology Inspired Detection Of Data Theft From Autonomous Network Activity, Theodore O. Cochran

CCE Theses and Dissertations

The threat of data theft posed by self-propagating, remotely controlled bot malware is increasing. Cyber criminals are motivated to steal sensitive data, such as user names, passwords, account numbers, and credit card numbers, because these items can be parlayed into cash. For anonymity and economy of scale, bot networks have become the cyber criminal’s weapon of choice. In 2010 a single botnet included over one million compromised host computers, and one of the largest botnets in 2011 was specifically designed to harvest financial data from its victims. Unfortunately, current intrusion detection methods are unable to effectively detect data extraction techniques …


Usable Security Using Goms: A Study To Evaluate And Compare The Usability Of User Accounts On E-Government Websites, Amran Din Apr 2015

Usable Security Using Goms: A Study To Evaluate And Compare The Usability Of User Accounts On E-Government Websites, Amran Din

CCE Theses and Dissertations

The term e-Government refers to providing citizens a series of services that can be conveniently conducted over the Internet. However, the potential to redefine and transform e-Government increasingly relies on citizens successfully establishing and managing a user account profile online. E-Government has not adequately addressed user-centric designs for social inclusion of all citizens on e-Government websites. There is a lack of research on the usability of user account management, and a clear lack of innovation in incorporating user-friendly authentication interfaces to accommodate a diverse user population given the wealth of existing research in web authentication techniques within Identity Management. The …


Generic Constructions Of Different Cryptographic Primitives Over Various Public Key Paradigms., Sumit Kumar Pandey Dr. Feb 2015

Generic Constructions Of Different Cryptographic Primitives Over Various Public Key Paradigms., Sumit Kumar Pandey Dr.

Doctoral Theses

In this thesis, we study the generic construction of some cryptographic primitives over various public key paradigms like traditional Public Key Cryptosystems and Identity Based Cryptosystems. It can be broadly divided into two categories1. Generic construction of some highly secure cryptographic primitives from less secure cryptographic primitives, and2. Generic construction of some complex cryptographic primitives from basic cryptographic primitives. Mathematical tools provide a way to achieve cryptographic functionality like confidentiality, authentication, data-integrity, non-repudiation etc., but in the case of complex cryptographic functionality like achieving confidentiality and authentication at the same time or confidentiality, authentication and non-repudiation at the same time …


Residual-Based Measurement Of Peer And Link Lifetimes In Gnutella Networks, Xiaoming Wang, Zhongmei Yao, Dmitri Loguinov Jan 2015

Residual-Based Measurement Of Peer And Link Lifetimes In Gnutella Networks, Xiaoming Wang, Zhongmei Yao, Dmitri Loguinov

Zhongmei Yao

Existing methods of measuring lifetimes in P2P systems usually rely on the so-called create-based method (CBM), which divides a given observation window into two halves and samples users "created" in the first half every Delta time units until they die or the observation period ends. Despite its frequent use, this approach has no rigorous accuracy or overhead analysis in the literature. To shed more light on its performance, we flrst derive a model for CBM and show that small window size or large Delta may lead to highly inaccurate lifetime distributions. We then show that create-based sampling exhibits an inherent …


On Node Isolation Under Churn In Unstructured P2p Networks With Heavy-Tailed Lifetimes, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov Jan 2015

On Node Isolation Under Churn In Unstructured P2p Networks With Heavy-Tailed Lifetimes, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov

Zhongmei Yao

Previous analytical studies [12], [18] of unstructured P2P resilience have assumed exponential user lifetimes and only considered age-independent neighbor replacement. In this paper, we overcome these limitations by introducing a general node-isolation model for heavy-tailed user lifetimes and arbitrary neighbor-selection algorithms. Using this model, we analyze two age-biased neighbor-selection strategies and show that they significantly improve the residual lifetimes of chosen users, which dramatically reduces the probability of user isolation and graph partitioning compared to uniform selection of neighbors. In fact, the second strategy based on random walks on age-weighted graphs demonstrates that for lifetimes with infinite variance, the system …


Modeling Heterogeneous User Churn And Local Resilience Of Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov, Xiaoming Wang Jan 2015

Modeling Heterogeneous User Churn And Local Resilience Of Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov, Xiaoming Wang

Zhongmei Yao

Previous analytical results on the resilience of unstructured P2P systems have not explicitly modeled heterogeneity of user churn (i.e., difference in online behavior) or the impact of in-degree on system resilience. To overcome these limitations, we introduce a generic model of heterogeneous user churn, derive the distribution of the various metrics observed in prior experimental studies (e.g., lifetime distribution of joining users, joint distribution of session time of alive peers, and residual lifetime of a randomly selected user), derive several closed-form results on the transient behavior of in-degree, and eventually obtain the joint in/out degree isolation probability as a simple …


Gender Differences In College Students’ Perceptions Of Technology-Related Jobs In Computer Science, Joseph Appianing, Richard Van Eck Jan 2015

Gender Differences In College Students’ Perceptions Of Technology-Related Jobs In Computer Science, Joseph Appianing, Richard Van Eck

Teaching, Leadership & Professional Practice Faculty Publications

Demand for computer technology (CT) professionals continues to rise, yet the supply of related majors is insufficient to meet demand. As with science, engineering, and mathematics (technology’s STEM field siblings), women’s participation in CT fields is abysmally low. While there are many junctures in the “leaky pipeline” for women and STEM careers, college is one of the important pathways to recruit women into CT fields. Wigfield and Eccles’ (2000) expectancy-value theory of achievement motivation provides a valuable framework for examining factors that impact women’s decisions to pursue CT majors, but no validated survey instruments exist for doing so. A questionnaire …


Pedagogical Possibilities For The 2048 Puzzle Game, Todd W. Neller Jan 2015

Pedagogical Possibilities For The 2048 Puzzle Game, Todd W. Neller

Computer Science Faculty Publications

In this paper, we describe an engaging puzzle game called 2048 and outline a variety of exercises that can leverage the game’s popularity to engage student interest, reinforce core CS concepts, and excite student curiosity towards undergraduate research. Exercises range in difficulty from CS1-level exercises suitable for exercising and assessing 1D and 2D array skills to empirical undergraduate research in Monte Carlo Tree Search methods and skilled heuristic evaluation design.


Recdroid: A Resource Access Permission Control Portal And Recommendation Service For Smartphone Users, Gerrit Bond, Steven Jackson, Marcus Pare Jan 2015

Recdroid: A Resource Access Permission Control Portal And Recommendation Service For Smartphone Users, Gerrit Bond, Steven Jackson, Marcus Pare

Capstone Design Expo Posters

The rapid growth of the smartphone applications market raises security concerns regarding untrusted applications. Studies have shown that most apps in markets request to collect data irrelevant to the main functions of the apps. Traditional Android permission control design based on one-time decisions on installation has been proven to be ineffective in protecting users’ privacy and poorly utilizes scarce mobile resources (e.g. battery). RecDroid is designed to help protect user data in a market where unauthorized data collection is prevalent in most applications. With RecDroid’s recommendation feature, which is based on expert analysis, the user will be able to avoid …


Rams Onboard: Improving Employment Process, De-Shunda White, Yamil Boo Irizarry, Samuel Brazil Jan 2015

Rams Onboard: Improving Employment Process, De-Shunda White, Yamil Boo Irizarry, Samuel Brazil

Capstone Design Expo Posters

In order for the Virginia Commonwealth University Engineering Human Resources department to provide seamless new hire integration, they need to upgrade their current post-hire information gathering techniques. Currently the HR department continues to provide paper forms and packets to new hires to fill out and return for review. This method requires over $30,000 in cost for materials and labor. The main goal of our project is to establish a way for newly hired employees to complete their new hire forms electronically through the VCU server.

By successfully executing our project we are moving VCU’s onboarding process to a completely paperless …


Grid Game: Developing A Java/Android Version For Increased Accessibility And Usability, Sean Amos, Patrick Sivils, Aidan Collins Jan 2015

Grid Game: Developing A Java/Android Version For Increased Accessibility And Usability, Sean Amos, Patrick Sivils, Aidan Collins

Capstone Design Expo Posters

Objective: Idaho University has implemented a power grid simulator game as a teaching aid for students enrolled in their Resilient Control Systems course. The game was created in LabView and requires the user to download the LabView client, as well as install the Grid Game on their machine in order to play. Our goal is to recreate the Grid Game in a Java based web-browser format so that the game is more accessible and easy to use. By recreating the Grid Game in a format that can be played in browser, other universities, companies, and individuals will easily be able …


Virtual Bus Simulation: Driver And Fuel Efficiency, James Freund, Ivan Grinkevich, Justin Boswell Jan 2015

Virtual Bus Simulation: Driver And Fuel Efficiency, James Freund, Ivan Grinkevich, Justin Boswell

Capstone Design Expo Posters

Problem Statement: VCU will be putting together state of the art 3D curved screen driving simulator. This simulator will mimic fleets of vehicles behavior and will be networked with INL and Univ. of Idaho simulators. The project will entail putting the simulator together and improving existing simulator software.

Rationale: Conduct research in the areas of important behaviors to increase driver efficiency, how simulation training can encourage good driving habits, Psychology of driver habits and distractions, and benefits of audio and visual cues to assist drivers. Approach: Identify the most optimal 3d engine and develop simulation environment using the chosen engine. …


Smart Grid Network Simulation, Morgan Waser, Brandon Perkins, Benjamin Koppier Jan 2015

Smart Grid Network Simulation, Morgan Waser, Brandon Perkins, Benjamin Koppier

Capstone Design Expo Posters

Problem: In the coming years the United States is working to move towards a smarter electric grid. One that is more versatile and can adjust to different situations. To move forward with these from our current electric grid to the Smart Grid, simulations are needed to understand how the new grid is likely to behave in different situations.

Rationale: The importance of creating these simulations is to try and predict which topological set-ups are best for different kinds of scenarios as well as how the grid might behave under different circumstances. Once different situations are simulated, Smart Grid developers can …


Scientifically Defensible And Measurable Anti-Phishing Training, Josh Rymer, Chris Neville, Robert Hodges Jan 2015

Scientifically Defensible And Measurable Anti-Phishing Training, Josh Rymer, Chris Neville, Robert Hodges

Capstone Design Expo Posters

Problem: How can the effectiveness of a phishing attack be quantified and/or measured?

Applications: This project will provide a resource for Idaho National Labs to quantitavely evaluate the effectiveness of their security awareness program in regards to phishing attacks. In turn, it will aid them in hardening the human element of security at the research facility.

Approach: Our approach is to construct a fully functional phishing system where we can craft phishing emails, send emails, and place links that point to our web application. We hope to use this system to conduct an anonymous and non-malicious experiment. This data will …