Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Physical Sciences and Mathematics

Developing A Practice In Remote Sensing For Next-Generation Human Rights Researchers, Theresa Harris, Jonathan Drake, Umesh K. Haritashya, Wumi Asubiaro Dada, Fredy Cumes Dec 2021

Developing A Practice In Remote Sensing For Next-Generation Human Rights Researchers, Theresa Harris, Jonathan Drake, Umesh K. Haritashya, Wumi Asubiaro Dada, Fredy Cumes

Biennial Conference: The Social Practice of Human Rights

Remote sensing is increasingly recognized as an important tool for documenting human rights abuses. When used alongside interviews, case studies, surveys, forensic science, and other well-established research methods in human rights and humanitarian practice, remotely sensed data can effectively geolocate and establish chronologies for mass graves, forced displacement, destruction of cultural heritage sites, and other violations. But as a highly technical field of science that relies on ever-changing technologies, remote sensing and geospatial analysis are not readily accessible for human rights and humanitarian practitioners. The community of practice grew out of innovative work by practitioners at NGOs and specialized inter-governmental …


Human Rights, Environmental Justice, Social Justice, Faith Values And Ethics: Building Stronger Partnerships For The Common Good By Understanding The Differences, Theresa Harris, Leanne M. Jablonski, Sarah Fortner, Malcolm Daniels Oct 2019

Human Rights, Environmental Justice, Social Justice, Faith Values And Ethics: Building Stronger Partnerships For The Common Good By Understanding The Differences, Theresa Harris, Leanne M. Jablonski, Sarah Fortner, Malcolm Daniels

Biennial Conference: The Social Practice of Human Rights

Partnerships between human rights practitioners, local communities, scientists, engineers, and health professionals have shown potential to address deeply rooted, systemic human rights concerns. These collaborations are essential for achieving the UN Sustainable Development Goals (SDGs), and for engaging the perspectives and expertise of all constituents. However, even when the individuals in these partnerships or the organizations they represent have common goals, their motivations, analyses, and solutions often come from different perspectives. Members of good will can inadvertently alienate one another when attempting to work together. The fields of human rights, social justice, environmental justice, and ethics have each developed their …


Development, Energy, And Climate Change Policy: Enabling Sustainable Development Through Access To Energy, Robert J. Brecha Nov 2017

Development, Energy, And Climate Change Policy: Enabling Sustainable Development Through Access To Energy, Robert J. Brecha

Biennial Conference: The Social Practice of Human Rights

Human rights, human development, and climate change clearly overlap in many ways. Development, as quantified by the Human Development Index (HDI), for example, has historically been strongly correlated with energy consumption. This fact is recognized in Sustainable Development Goal (SDG) 7, to “ensure access to affordable, reliable, sustainable and modern energy for all.” Currently the world is in the midst of a large wave of human migration, much of it involuntary and due to stymied development opportunities as well as political upheaval. Climate change will become, or already is, an exacerbating factor in migration dynamics.

A pertinent question is how …


Democratic Civic Engagement: Transformative Local, Inclusive Decision-Making To Achieve Global Peace And Climate Solutions, Leah Ceperley Nov 2017

Democratic Civic Engagement: Transformative Local, Inclusive Decision-Making To Achieve Global Peace And Climate Solutions, Leah Ceperley

Biennial Conference: The Social Practice of Human Rights

The UN Sustainable Development Goals call for action on Climate (No. 13) and Strengthening Governance (No. 16) as imperative to transform our world toward one that is resilient, just, and peaceful. Climate change is a global problem, marked frequently in the U.S. by indifference, with far-reaching impacts disproportionately burdening the poor and vulnerable worldwide. Global in scope, its sources, impacts, and fields of action are local. Combating indifference at the local level can strengthen local governance structures, build trust across ideological divides, and shift the conversation from indifference to action.

Using an example from a University of Dayton-sponsored National Issues …


Encounters With Climate Change: How Sdg 13 Can Move From Awareness To Action, Rebecca C. Potter Nov 2017

Encounters With Climate Change: How Sdg 13 Can Move From Awareness To Action, Rebecca C. Potter

Biennial Conference: The Social Practice of Human Rights

In a well-known passage from his book I and Thou, Martin Buber relates his encounter with a tree: “I contemplate a tree,” he writes, and then lists the various ways he could perceive the tree, as an artist or biologist, as someone interested in the trees parts and construction or interested in its function as a living system. But in all cases, Buber observes, “the tree remains my object and has its place and its time span, its kind and condition.”

Yet sometimes, “if will and grace are conjoined,” Buber describes being drawn into a relation with the tree wherein …


Climate Change, Development, And The Global Commons, Robert J. Brecha Nov 2017

Climate Change, Development, And The Global Commons, Robert J. Brecha

Biennial Conference: The Social Practice of Human Rights

An important link between energy, climate change, human development, and human rights comes in the form of a question that has yet to be answered satisfactorily: The earth’s atmosphere and other physical systems are the ultimate example of the global commons. Do future generations have a human right to an unchanged earth system? Sustainable Development Goals 13, 14, and 15 imply an affirmative answer. Given that climate scientists have a good estimate of the amount of carbon dioxide that can be emitted before the safe uptake capacity of the atmosphere is breached, how do we allocate that remaining atmospheric capacity …


Building Academic/Practitioner Teams For Human Rights Projects: Examples, Lessons Learned, And Pitfalls To Avoid, Theresa Harris Nov 2017

Building Academic/Practitioner Teams For Human Rights Projects: Examples, Lessons Learned, And Pitfalls To Avoid, Theresa Harris

Biennial Conference: The Social Practice of Human Rights

Academics are increasingly interested in getting out of their classrooms and labs to contribute their knowledge, expertise, and resources to help communities develop evidence-based policies. In addition to post-election initiatives such as the March for Science and 314 Action, many academics are joining “without borders”-type programs and organizations that connect academics with opportunities to volunteer their time and talents for “social good.”

One of the longest-running of these is On-call Scientists, an initiative of the American Association for the Advancement of Science (AAAS) that connects human rights organizations with pro bono scientists across all fields — life, physical, behavioral, and …


A Study Of Android Malware Detection Techniques And Machine Learning, Balaji Baskaran, Anca Ralescu Apr 2016

A Study Of Android Malware Detection Techniques And Machine Learning, Balaji Baskaran, Anca Ralescu

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

Android OS is one of the widely used mobile Operating Systems. The number of malicious applications and adwares are increasing constantly on par with the number of mobile devices. A great number of commercial signature based tools are available on the market which prevent to an extent the penetration and distribution of malicious applications. Numerous researches have been conducted which claims that traditional signature based detection system work well up to certain level and malware authors use numerous techniques to evade these tools. So given this state of affairs, there is an increasing need for an alternative, really tough malware …


Extended Pixel Representation For Image Segmentation, Deeptha Girish, Vineeta Singh, Anca Ralescu Apr 2016

Extended Pixel Representation For Image Segmentation, Deeptha Girish, Vineeta Singh, Anca Ralescu

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

We explore the use of extended pixel representation for color based image segmentation using the K-means clustering algorithm. Various extended pixel representations have been implemented in this paper and their results have been compared. By extending the representation of pixels an image is mapped to a higher dimensional space. Unlike other approaches, where data is mapped into an implicit features space of higher dimension (kernel methods), in the approach considered here, the higher dimensions are defined explicitly. Preliminary experimental results which illustrate the proposed approach are promising.


An Autonomic Computing System Based On A Rule-Based Policy Engine And Artificial Immune Systems, Rahmira Rufus, William Nick, Joseph Shelton, Albert Esterline Apr 2016

An Autonomic Computing System Based On A Rule-Based Policy Engine And Artificial Immune Systems, Rahmira Rufus, William Nick, Joseph Shelton, Albert Esterline

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

Autonomic computing systems arose from the notion that complex computing systems should have properties like those of the autonomic nervous system, which coordinates bodily functions and allows attention to be directed to more pressing needs. An autonomic system allows the system administrator to specify high-level policies, which the system maintains without administrator assistance. Policy enforcement can be done with a rule based system such as Jess (a java expert system shell). An autonomic system must be able to monitor itself, and this is often a limiting factor. We are developing an automatic system that has a policy engine and uses …


Towards The Development Of A Cyber Analysis & Advisement Tool (Caat) For Mitigating De-Anonymization Attacks, Siobahn Day, Henry Williams, Joseph Shelton, Gerry Dozier Apr 2016

Towards The Development Of A Cyber Analysis & Advisement Tool (Caat) For Mitigating De-Anonymization Attacks, Siobahn Day, Henry Williams, Joseph Shelton, Gerry Dozier

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

We are seeing a rise in the number of Anonymous Social Networks (ASN) that claim to provide a sense of user anonymity. However, what many users of ASNs do not know that a person can be identified by their writing style.

In this paper, we provide an overview of a number of author concealment techniques, their impact on the semantic meaning of an author's original text, and introduce AuthorCAAT, an application for mitigating de-anonymization attacks. Our results show that iterative paraphrasing performs the best in terms of author concealment and performs well with respect to Latent Semantic Analysis.


Situations And Evidence For Identity Using Dempster-Shafer Theory, William Nick, Yenny Dominguez, Albert Esterline Apr 2016

Situations And Evidence For Identity Using Dempster-Shafer Theory, William Nick, Yenny Dominguez, Albert Esterline

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

We present a computational framework for identity based on Barwise and Devlin’s situation theory. We present an example with constellations of situations identifying an individual to create what we call id-situations, where id-actions are performed, along with supporting situations. We use Semantic Web standards to represent and reason about the situations in our example. We show how to represent the strength of the evidence, within the situations, as a measure of the support for judgments reached in the id-situation. To measure evidence of an identity from the supporting situations, we use the Dempster-Shafer theory of evidence. We enhance Dempster- Shafer …


Student Understanding And Engagement In A Class Employing Comps Computer Mediated Problem Solving: A First Look, Jung Hee Kim, Michael Glass, Taehee Kim, Kelvin Bryant, Angelica Willis, Ebonie Mcneil, Zachery Thomas Apr 2016

Student Understanding And Engagement In A Class Employing Comps Computer Mediated Problem Solving: A First Look, Jung Hee Kim, Michael Glass, Taehee Kim, Kelvin Bryant, Angelica Willis, Ebonie Mcneil, Zachery Thomas

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

COMPS computer-mediated group discussion exercises are being added to a second-semester computer programming class. The class is a gateway for computer science and computer engineering students, where many students have difficulty succeeding well enough to proceed in their major. This paper reports on first results of surveys on student experience with the exercises. It also reports on the affective states observed in the discussions that are candidates for analysis of group functioning. As a step toward computer monitoring of the discussions, an experiment in using dialogue features to identify the gender of the participants is described.


A Tool For Staging Mixed-Initiative Dialogs, Joshua W. Buck, Saverio Perugini Apr 2016

A Tool For Staging Mixed-Initiative Dialogs, Joshua W. Buck, Saverio Perugini

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

We discuss and demonstrate a tool for prototyping dialog-based systems that, given a high-level specification of a human-computer dialog, stages the dialog for interactive use. The tool enables a dialog designer to evaluate a variety of dialogs without having to program each individual dialog, and serves as a proof-of-concept for our approach to mixed-initiative dialog modeling and implementation from a programming language-based perspective.


Keynote Talk 2: Social And Perceptual Fidelity Of Avatars And Autonomous Agents In Virtual Reality, Benjamin Kunz Apr 2016

Keynote Talk 2: Social And Perceptual Fidelity Of Avatars And Autonomous Agents In Virtual Reality, Benjamin Kunz

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

Advances in display, computing and sensor technologies have led to a revival of interest and excitement surrounding immersive virtual reality. Here, on the cusp of the arrival of practical and affordable virtual reality technology, are open questions regarding the factors that contribute to compelling and immersive virtual worlds.

In order for virtual reality to be useful as a tool for use in training, education, communication, research, content-creation and entertainment, we must understand the degree to which the perception of the virtual environment and virtual characters resembles perception of the real world.

Relatedly, virtual reality's utility in these contexts demands evidence …


Exploring Web-Based Visual Interfaces For Searching Research Articles On Digital Library Systems, Maxwell Fowler, Chris Bellis, Chris Perry, Beomjin Kim Apr 2016

Exploring Web-Based Visual Interfaces For Searching Research Articles On Digital Library Systems, Maxwell Fowler, Chris Bellis, Chris Perry, Beomjin Kim

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

Previous studies that present information archived in digital libraries have used either document meta-data or document content. The current search mechanisms commonly return text-based results that were compiled from the meta-data without reflecting the underlying content. Visual analytics is a possible solution for improving searches by presenting a large amount of information, including document content alongside meta-data, in a limited screen space. This paper introduces a multi-tiered visual interface for searching research articles stored in Digital Library systems. The goals of this system are to allow users to find research papers about their interests in a large work space, to …


Fuzzy Algorithms: Applying Fuzzy Logic To The Golden Ratio Search To Find Solutions Faster, Stephany Coffman-Wolph Apr 2016

Fuzzy Algorithms: Applying Fuzzy Logic To The Golden Ratio Search To Find Solutions Faster, Stephany Coffman-Wolph

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

Applying the concept of fuzzy logic (an abstract version of Boolean logic) to well-known algorithms generates an abstract version (i.e., fuzzy algorithm) that often results in computational improvements. Precision may be reduced but counteracted by gaining computational efficiency. The trade-offs (e.g., small increase in space, loss of precision) for a variety of applications are deemed acceptable. The fuzzification of an algorithm can be accomplished using a simple three-step framework. Creating a new fuzzy algorithm goes beyond simply converting the data from raw data into fuzzy data by additionally converting the operators and concepts into their abstract equivalents. This paper demonstrates: …


The Webid Protocol Enhanced With Group Access, Biometrics, And Access Policies, Cory Sabol, William Nick, Maya Earl, Joseph Shelton, Albert Esterline Apr 2016

The Webid Protocol Enhanced With Group Access, Biometrics, And Access Policies, Cory Sabol, William Nick, Maya Earl, Joseph Shelton, Albert Esterline

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

The WebID protocol solves the challenge of remembering usernames and passwords. We enhance this protocol in three ways. First, we give it the ability to manage groups of agents and control their access to resources on the Web. Second, we add support for biometric access control to enhance security. Finally, we add support for OWL-based policies that may be federated and result in flexible access control.


Real-Time Unsupervised Clustering, Gabriel Ferrer Apr 2016

Real-Time Unsupervised Clustering, Gabriel Ferrer

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

In our research program, we are developing machine learning algorithms to enable a mobile robot to build a compact representation of its environment. This requires the processing of each new input to terminate in constant time. Existing machine learning algorithms are either incapable of meeting this constraint or deliver problematic results. In this paper, we describe a new algorithm for real-time unsupervised clustering, Bounded Self-Organizing Clustering. It executes in constant time for each input, and it produces clusterings that are significantly better than those created by the Self-Organizing Map, its closest competitor, on sensor data acquired from a physically embodied …