Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Internet of Things (4)
- Security (4)
- Cloud computing (3)
- Flood control (3)
- Machine learning (3)
-
- Privacy (3)
- Computer vision (2)
- Conference Calls (2)
- Corporate Earnings (2)
- Economic analysis (2)
- Ethics (2)
- Social media (2)
- Text Analytics (2)
- VANETs (2)
- Wearables (2)
- Accidents (1)
- Adversarial machine learning (1)
- Agreement (1)
- Ambulance service (1)
- Appalachia (1)
- Applications (1)
- Artificial intelligence (1)
- Authentication (1)
- Autonomous vehicles (1)
- Bias (1)
- Big data (1)
- Big data research (1)
- Biomedical monitoring (1)
- Body sensor network (1)
- Bystanders’ privacy (1)
- Publication
- Publication Type
Articles 1 - 29 of 29
Full-Text Articles in Social and Behavioral Sciences
Improving Connectivity For Remote Cancer Patient Symptom Monitoring And Reporting In Rural Medically Underserved Regions, Esther Max-Onakpoya
Improving Connectivity For Remote Cancer Patient Symptom Monitoring And Reporting In Rural Medically Underserved Regions, Esther Max-Onakpoya
Theses and Dissertations--Computer Science
Rural residents are often faced with many disparities when compared to their urban counterparts. Two key areas where these disparities are apparent are access to health and Internet services. Improved access to healthcare services has the potential to increase residents' quality of life and life expectancy. Additionally, improved access to Internet services can create significant social returns in increasing job and educational opportunities, and improving access to healthcare. Therefore, this dissertation focuses on the intersection between access to Internet and healthcare services in rural areas. More specifically, it attempts to analyze systems that can be used to improve Internet access …
The Basil Technique: Bias Adaptive Statistical Inference Learning Agents For Learning From Human Feedback, Jonathan Indigo Watson
The Basil Technique: Bias Adaptive Statistical Inference Learning Agents For Learning From Human Feedback, Jonathan Indigo Watson
Theses and Dissertations--Computer Science
We introduce a novel approach for learning behaviors using human-provided feedback that is subject to systematic bias. Our method, known as BASIL, models the feedback signal as a combination of a heuristic evaluation of an action's utility and a probabilistically-drawn bias value, characterized by unknown parameters. We present both the general framework for our technique and specific algorithms for biases drawn from a normal distribution. We evaluate our approach across various environments and tasks, comparing it to interactive and non-interactive machine learning methods, including deep learning techniques, using human trainers and a synthetic oracle with feedback distorted to varying degrees. …
Peer-To-Peer Energy Trading In Smart Residential Environment With User Behavioral Modeling, Ashutosh Timilsina
Peer-To-Peer Energy Trading In Smart Residential Environment With User Behavioral Modeling, Ashutosh Timilsina
Theses and Dissertations--Computer Science
Electric power systems are transforming from a centralized unidirectional market to a decentralized open market. With this shift, the end-users have the possibility to actively participate in local energy exchanges, with or without the involvement of the main grid. Rapidly reducing prices for Renewable Energy Technologies (RETs), supported by their ease of installation and operation, with the facilitation of Electric Vehicles (EV) and Smart Grid (SG) technologies to make bidirectional flow of energy possible, has contributed to this changing landscape in the distribution side of the traditional power grid.
Trading energy among users in a decentralized fashion has been referred …
Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally
Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally
Information Science Faculty Publications
Wearable sensing technologies are having a worldwide impact on the creation of novel business opportunities and application services that are benefiting the common citizen. By using these technologies, people have transformed the way they live, interact with each other and their surroundings, their daily routines, and how they monitor their health conditions. We review recent advances in the area of wearable sensing technologies, focusing on aspects such as sensor technologies, communication infrastructures, service infrastructures, security, and privacy. We also review the use of consumer wearables during the coronavirus disease 19 (COVID-19) pandemic caused by the severe acute respiratory syndrome coronavirus …
Challenges When Identifying Migration From Geo-Located Twitter Data, Caitrin Armstrong, Ate Poorthuis, Matthew Zook, Derek Ruths, Thomas Soehl
Challenges When Identifying Migration From Geo-Located Twitter Data, Caitrin Armstrong, Ate Poorthuis, Matthew Zook, Derek Ruths, Thomas Soehl
Geography Faculty Publications
Given the challenges in collecting up-to-date, comparable data on migrant populations the potential of digital trace data to study migration and migrants has sparked considerable interest among researchers and policy makers. In this paper we assess the reliability of one such data source that is heavily used within the research community: geolocated tweets. We assess strategies used in previous work to identify migrants based on their geolocation histories. We apply these approaches to infer the travel history of a set of Twitter users who regularly posted geolocated tweets between July 2012 and June 2015. In a second step we hand-code …
Vehicle-Life Interaction In Fog-Enabled Smart Connected And Autonomous Vehicles, Bushra Feroz, Amjad Mehmood, Hafsa Maryam, Sherali Zeadally, Carsten Maple, Munam Ali Shah
Vehicle-Life Interaction In Fog-Enabled Smart Connected And Autonomous Vehicles, Bushra Feroz, Amjad Mehmood, Hafsa Maryam, Sherali Zeadally, Carsten Maple, Munam Ali Shah
Information Science Faculty Publications
Traffic accidents have become a major issue for researchers, academia, government and vehicle manufacturers over the last few years. Many accidents and emergency situations frequently occur on the road. Unfortunately, accidents lead to health injuries, destruction of some infrastructure, bad traffic flow, and more importantly these events cause deaths of hundreds of thousands of people due to not getting treatment in time. Thus, we need to develop an efficient and smart emergency system to ensure the timely arrival of an ambulance service to the place of the accident in order to provide timely medical help to those injured. In addition, …
Maternal Proximity To Mountaintop Removal Mining And Birth Defects In Appalachian Kentucky, 1997-2003, Daniel B. Cooper
Maternal Proximity To Mountaintop Removal Mining And Birth Defects In Appalachian Kentucky, 1997-2003, Daniel B. Cooper
Theses and Dissertations--Public Health (M.P.H. & Dr.P.H.)
Background: Extraction of coal through mountaintop removal mining (MTR) alters many dimensions of the landscape, and explosive blasts, exposed rock, and coal washing have the potential to pollute air and water with substances known to increase risk of developmental and birth anomalies. Previous research suggests that infants born to mothers living in MTR coal mining counties have higher prevalence of most types of birth defects.
Objectives: This study seeks to examine further the relationship between MTR activity and birth defects by employing individual level exposure estimation through precise satellite data of MTR activity in the Appalachian region and maternal residence …
A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud
A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud
Information Science Faculty Publications
The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called …
Secure Authentication And Privacy-Preserving Techniques In Vehicular Ad-Hoc Networks (Vanets), Dakshnamoorthy Manivannan, Shafika Showkat Moni, Sherali Zeadally
Secure Authentication And Privacy-Preserving Techniques In Vehicular Ad-Hoc Networks (Vanets), Dakshnamoorthy Manivannan, Shafika Showkat Moni, Sherali Zeadally
Computer Science Faculty Publications
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks (VANETs). Today car manufacturers have already started to equip vehicles with sophisticated sensors that can provide many assistive features such as front collision avoidance, automatic lane tracking, partial autonomous driving, suggestive lane changing, and so on. Such technological advancements are enabling the adoption of VANETs not only to provide safer and more comfortable driving experience but also provide many other useful services to the driver as well as passengers of a vehicle. However, privacy, authentication and secure message dissemination are some of the main issues that …
Harnessing Artificial Intelligence Capabilities To Improve Cybersecurity, Sherali Zeadally, Erwin Adi, Zubair Baig, Imran A. Khan
Harnessing Artificial Intelligence Capabilities To Improve Cybersecurity, Sherali Zeadally, Erwin Adi, Zubair Baig, Imran A. Khan
Information Science Faculty Publications
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforcement. Over the years, although the original motives for carrying out cyberattacks largely remain unchanged, cybercriminals have become increasingly sophisticated with their techniques. Traditional cybersecurity solutions are becoming inadequate at detecting and mitigating emerging cyberattacks. Advances in cryptographic and Artificial Intelligence (AI) techniques (in particular, machine learning and deep learning) show promise in enabling cybersecurity experts to counter the ever-evolving threat posed by adversaries. Here, we explore AI's …
Estimating Free-Flow Speed With Lidar And Overhead Imagery, Armin Hadzic
Estimating Free-Flow Speed With Lidar And Overhead Imagery, Armin Hadzic
Theses and Dissertations--Computer Science
Understanding free-flow speed is fundamental to transportation engineering in order to improve traffic flow, control, and planning. The free-flow speed of a road segment is the average speed of automobiles unaffected by traffic congestion or delay. Collecting speed data across a state is both expensive and time consuming. Some approaches have been presented to estimate speed using geometric road features for certain types of roads in limited environments. However, estimating speed at state scale for varying landscapes, environments, and road qualities has been relegated to manual engineering and expensive sensor networks. This thesis proposes an automated approach for estimating free-flow …
Sensitive Research, Practice And Design In Hci, Stevie Chancellor, Nazanin Andalibi, Lindsay Blackwell, David Nemer, Wendy Moncur
Sensitive Research, Practice And Design In Hci, Stevie Chancellor, Nazanin Andalibi, Lindsay Blackwell, David Nemer, Wendy Moncur
Information Science Faculty Publications
New research areas in HCI examine complex and sensitive research areas, such as crisis, life transitions, and mental health. Further, research in complex topics such as harassment and graphic content can leave researchers vulnerable to emotional and physical harm. There is a need to bring researchers together to discuss challenges across sensitive research spaces and environments. We propose a workshop to explore the methodological, ethical, and emotional challenges of sensitive research in HCI. We will actively recruit from diverse research environments (industry, academia, government, etc.) and methods areas (qualitative, quantitative, design practices, etc.) and identify commonalities in and encourage relationship-building …
Examining Medline Search Query Reproducibility And Resulting Variation In Search Results, C. Sean Burns, Robert M. Shapiro Ii, Tyler Nix, Jeffrey T. Huber
Examining Medline Search Query Reproducibility And Resulting Variation In Search Results, C. Sean Burns, Robert M. Shapiro Ii, Tyler Nix, Jeffrey T. Huber
Information Science Faculty Publications
The MEDLINE database is publicly available through the National Library of Medicine’s PubMed but the data file itself is also licensed to a number of vendors, who may offer their versions to institutional and other parties as part of a database platform. These vendors provide their own interface to the MEDLINE file and offer other technologies that attempt to make their version useful to subscribers. However, little is known about how vendor platforms ingest and interact with MEDLINE data files, nor how these changes influence the construction of search queries and the results they produce. This poster presents a longitudinal …
Application Of Boolean Logic To Natural Language Complexity In Political Discourse, Austin Taing
Application Of Boolean Logic To Natural Language Complexity In Political Discourse, Austin Taing
Theses and Dissertations--Computer Science
Press releases serve as a major influence on public opinion of a politician, since they are a primary means of communicating with the public and directing discussion. Thus, the public’s ability to digest them is an important factor for politicians to consider. This study employs several well-studied measures of linguistic complexity and proposes a new one to examine whether politicians change their language to become more or less difficult to parse in different situations. This study uses 27,500 press releases from the US Senate between 2004–2008 and examines election cycles and natural disasters, namely hurricanes, as situations where politicians’ language …
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Information Science Faculty Publications
One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …
Sensor Technologies For Intelligent Transportation Systems, Juan Guerrero-Ibáñez, Sherali Zeadally, Juan Contreras-Castillo
Sensor Technologies For Intelligent Transportation Systems, Juan Guerrero-Ibáñez, Sherali Zeadally, Juan Contreras-Castillo
Information Science Faculty Publications
Modern society faces serious problems with transportation systems, including but not limited to traffic congestion, safety, and pollution. Information communication technologies have gained increasing attention and importance in modern transportation systems. Automotive manufacturers are developing in-vehicle sensors and their applications in different areas including safety, traffic management, and infotainment. Government institutions are implementing roadside infrastructures such as cameras and sensors to collect data about environmental and traffic conditions. By seamlessly integrating vehicles and sensing devices, their sensing and communication capabilities can be leveraged to achieve smart and intelligent transportation systems. We discuss how sensor technology can be integrated with the …
Leveraging Overhead Imagery For Localization, Mapping, And Understanding, Scott Workman
Leveraging Overhead Imagery For Localization, Mapping, And Understanding, Scott Workman
Theses and Dissertations--Computer Science
Ground-level and overhead images provide complementary viewpoints of the world. This thesis proposes methods which leverage dense overhead imagery, in addition to sparsely distributed ground-level imagery, to advance traditional computer vision problems, such as ground-level image localization and fine-grained urban mapping. Our work focuses on three primary research areas: learning a joint feature representation between ground-level and overhead imagery to enable direct comparison for the task of image geolocalization, incorporating unlabeled overhead images by inferring labels from nearby ground-level images to improve image-driven mapping, and fusing ground-level imagery with overhead imagery to enhance understanding. The ultimate contribution of this thesis …
Modeling And Mapping Location-Dependent Human Appearance, Zachary Bessinger
Modeling And Mapping Location-Dependent Human Appearance, Zachary Bessinger
Theses and Dissertations--Computer Science
Human appearance is highly variable and depends on individual preferences, such as fashion, facial expression, and makeup. These preferences depend on many factors including a person's sense of style, what they are doing, and the weather. These factors, in turn, are dependent upon geographic location and time. In our work, we build computational models to learn the relationship between human appearance, geographic location, and time. The primary contributions are a framework for collecting and processing geotagged imagery of people, a large dataset collected by our framework, and several generative and discriminative models that use our dataset to learn the relationship …
A Brief Overview Of Intelligent Mobility Management For Future Wireless Mobile Networks, Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song
A Brief Overview Of Intelligent Mobility Management For Future Wireless Mobile Networks, Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song
Information Science Faculty Publications
No abstract provided.
Single Versus Concurrent Systems: Nominal Classification In Mian, Greville G. Corbett, Sebastian Fedden, Raphael Finkel
Single Versus Concurrent Systems: Nominal Classification In Mian, Greville G. Corbett, Sebastian Fedden, Raphael Finkel
Computer Science Faculty Publications
The Papuan language Mian allows us to refine the typology of nominal classification. Mian has two candidate classification systems, differing completely in their formal realization but overlapping considerably in their semantics. To determine whether to analyse Mian as a single system or concurrent systems we adopt a canonical approach. Our criteria – orthogonality of the systems (we give a precise measure), semantic compositionality, morphosyntactic alignment, distribution across parts of speech, exponence, and interaction with other features – point mainly to an analysis as concurrent systems. We thus improve our analysis of Mian and make progress with the typology of nominal …
Cloud‐Based Text Analytics Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie
Cloud‐Based Text Analytics Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie
Commonwealth Computational Summit
No abstract provided.
Cloud-Based Text Analytics: Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie
Cloud-Based Text Analytics: Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie
Commonwealth Computational Summit
Does management language cohesion in earnings conference calls matter to the capital market? As a part of the research on the above question, and taking advantage of the modern IT technologies, this project:
- harvested 115,882 earnings conference call transcripts from SeekingAlpha.com
- parsed and structured 89,988 transcripts using regular expressions in Stata
- analyzed 179,976 text files using Amazon Elastic Compute Cloud (Amazon EC2), which
- saved almost 2 years (675 days) of the project time
Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur
Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur
Information Science Faculty Publications
The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network paradigm which is providing various types of solutions to the community and the individual user in various sectors including environmental monitoring, entertainment, transportation, security, and healthcare. We explore and compare the features of wireless sensor networks and ubiquitous sensor networks and based on the differences between these two types of systems, we classify the security-related challenges of ubiquitous sensor networks. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges that need to be addressed …
Ten Simple Rules For Responsible Big Data Research, Matthew Zook, Solon Barocas, Danah Boyd, Kate Crawford, Emily Keller, Seeta Peña Gangadharan, Alyssa Goodman, Rachelle Hollander, Barbara A. Koenig, Jacob Metcalf, Arvind Narayanan, Alondra Nelson, Frank Pasquale
Ten Simple Rules For Responsible Big Data Research, Matthew Zook, Solon Barocas, Danah Boyd, Kate Crawford, Emily Keller, Seeta Peña Gangadharan, Alyssa Goodman, Rachelle Hollander, Barbara A. Koenig, Jacob Metcalf, Arvind Narayanan, Alondra Nelson, Frank Pasquale
Geography Faculty Publications
No abstract provided.
Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li
Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li
Information Science Faculty Publications
Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will …
Is Security Sustainable?, Jeremy W. Crampton
Is Security Sustainable?, Jeremy W. Crampton
Geography Faculty Publications
No abstract provided.
Planning Flood Control Measures By Digital Computer, James Norris Cline, L. Douglas James
Planning Flood Control Measures By Digital Computer, James Norris Cline, L. Douglas James
KWRRI Research Reports
The purpose of this study was to develop adequate guidelines whereby those interested in flood control planning would be able to apply a pair of digital computer programs known as the University of Kentucky Flood Control Planning Programs to ease the computational burden of evaluating specific flood control situations. Program II determines the economically optimum combination of channel improvement, land use restriction, and flood proofing for flood damage abatement. Program III also incorporates reservoir storage into the planning process. The Programs are not intended to provide a finished design but rather to select the optimum combination of flood control measures …
Economic Analysis Of Flood Detention Storage By Digital Computer, James Ray Villines, L. Douglas James
Economic Analysis Of Flood Detention Storage By Digital Computer, James Ray Villines, L. Douglas James
KWRRI Research Reports
The objective of this study was to develop a digital computer procedure for preliminary analysis of the economic justification of reservoir detention storage for flood control and to present a sample study illustrating its application. A computer program called the University of Kentucky Flood Control Planning Program III was developed and tested on the flood plain of the South Fork of the Licking River in northeastern Kentucky.
Given a specified reservoir site and a downstream flood plain divided into planning units, Program III selects the economically efficient combination of reservoir detention storage and the associated combination of channel improvement, flood …
Economic Analysis Of Alternative Flood Control Measures By Digital Computer, Thomas M. Rachford
Economic Analysis Of Alternative Flood Control Measures By Digital Computer, Thomas M. Rachford
KWRRI Research Reports
The purpose of this project was to develop a digital computer program for selecting the optimum combination of flood proofing, flood-plain land use, channel improvement, and residual flood damage for a given floodplain. Based on economic efficiency, the optimum policy is selected for each planning unit of the total flood-plain for each period of time called a planning stage. The program was written in Fortran IV for the IBM 7040 and the University of Kentucky Computing Center compiler. The program requires about 23,000 words of core storage and about 30 seconds of execution time per planning-unit-stage for typical conditions. The …