Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

2014

Institution
Keyword
Publication

Articles 1 - 30 of 52

Full-Text Articles in Social and Behavioral Sciences

An Empirical Study Of Semantic Similarity In Wordnet And Word2vec, Abram Handler Dec 2014

An Empirical Study Of Semantic Similarity In Wordnet And Word2vec, Abram Handler

University of New Orleans Theses and Dissertations

This thesis performs an empirical analysis of Word2Vec by comparing its output to WordNet, a well-known, human-curated lexical database. It finds that Word2Vec tends to uncover more of certain types of semantic relations than others -- with Word2Vec returning more hypernyms, synonomyns and hyponyms than hyponyms or holonyms. It also shows the probability that neighbors separated by a given cosine distance in Word2Vec are semantically related in WordNet. This result both adds to our understanding of the still-unknown Word2Vec and helps to benchmark new semantic tools built from word vectors.


Text Mining Of Patient Demographics And Diagnoses From Psychiatric Assessments, Eric James Klosterman Dec 2014

Text Mining Of Patient Demographics And Diagnoses From Psychiatric Assessments, Eric James Klosterman

Theses and Dissertations

Automatic extraction of patient demographics and psychiatric diagnoses from clinical notes allows for the collection of patient data on a large scale. This data could be used for a variety of research purposes including outcomes studies or developing clinical trials. However, current research has not yet discussed the automatic extraction of demographics and psychiatric diagnoses in detail. The aim of this study is to apply text mining to extract patient demographics - age, gender, marital status, education level, and admission diagnoses from the psychiatric assessments at a mental health hospital and also assign codes to each category. Gender is coded …


Mind & Matter: The Discursive Construction Of The Iphone In Apple's Advertising, Nicholas Stratton Dec 2014

Mind & Matter: The Discursive Construction Of The Iphone In Apple's Advertising, Nicholas Stratton

Theses and Dissertations

The widespread adoption of smartphone technology in the contemporary United States requires critical reflection on its role within society. This thesis compares the way Apple's television advertising discourse, from 2007 to 2011, frames the iPhone to consumers with the way Apple's iAd promotional material frames the iPhone to advertisers, and considers what the disparity between these two frameworks says about the still-evolving role of smartphone technology in society. It argues that the disparity between these two frameworks is indicative of a fundamental tension within smartphone technology. This tension is reflected in Apple's ability to discursively construct the iPhone as a …


Data Preparation For Social Network Mining And Analysis, Yazhe Wang Dec 2014

Data Preparation For Social Network Mining And Analysis, Yazhe Wang

Dissertations and Theses Collection (Open Access)

This dissertation studies the problem of preparing good-quality social network data for data analysis and mining. Modern online social networks such as Twitter, Facebook, and LinkedIn have rapidly grown in popularity. The consequent availability of a wealth of social network data provides an unprecedented opportunity for data analysis and mining researchers to determine useful and actionable information in a wide variety of fields such as social sciences, marketing, management, and security. However, raw social network data are vast, noisy, distributed, and sensitive in nature, which challenge data mining and analysis tasks in storage, efficiency, accuracy, etc. Many mining algorithms cannot …


Computational Communication Intelligence: Exploring Linguistic Manifestation And Social Dynamics In Online Communication, Xiaoxi Xu Nov 2014

Computational Communication Intelligence: Exploring Linguistic Manifestation And Social Dynamics In Online Communication, Xiaoxi Xu

Doctoral Dissertations

We now live in an age of online communication. As social media becomes an integral part of our life, online communication becomes an essential life skill. In this dissertation, we aim to understand how people effectively communicate online. We research components of success in online communication and present scientific methods to study the skill of effective communication. This research advances the state of art in machine learning and communication studies. For communication studies, we pioneer the study of a communication phenomenon we call Communication Intelligence in online interactions. We create a theory about communication intelligence that measures participants’ ten high-order …


Serving Military Families: Perceptions Of Educational Counseling In A Virtual Environment, Taryn Stevenson Nov 2014

Serving Military Families: Perceptions Of Educational Counseling In A Virtual Environment, Taryn Stevenson

CCE Theses and Dissertations

The advances in communication technology over the past 20 years have significant implications for the delivery of psycho-educational therapeutic services to populations that have been historically underserved due to remote locations lacking trained providers. One such population is military families, who also suffer from a negative stigma of asking for outside help or education for personal growth. This population also faces increasing mental health needs due to military deployment in Operation Iraqi Freedom (OIF) and Operation Enduring Freedom (OEF). These operations have increased the number of returning service members who have been physically and mentally injured. The effect that these …


A Causal Model To Predict Organizational Knowledge Sharing Via Information And Communication Technologies, Simon Cleveland Oct 2014

A Causal Model To Predict Organizational Knowledge Sharing Via Information And Communication Technologies, Simon Cleveland

CCE Theses and Dissertations

Knowledge management literature identifies numerous barriers that inhibit employees' knowledge seeking and knowledge contributing practices via information and communication technologies (ICTs). Presently, there is a significant gap in the literature that explains what factors promote common knowledge sharing barriers. To bridge this gap, this study examined two research questions: 1) What are the potential factors that contribute to the commonly accepted barriers to knowledge sharing?, and 2) How do these factors impact employees' use of ICTs for knowledge seeking and knowledge contributing? Literature review of 103 knowledge management articles identified three major barriers to knowledge sharing practices (lack of time, …


Integration Of Z-Depth In Compositing, Kayla Steckel Oct 2014

Integration Of Z-Depth In Compositing, Kayla Steckel

Open Access Theses

It is important for video compositors to be able to complete their jobs quickly and efficiently. One of the tasks they might encounter is to insert assets such as characters into a 3D rendered environment that has depth information embedded into the image sequence. Currently, a plug-in that facilitates this task (Depth Matte®) functions by looking at the depth information of the layer it's applied to and showing or hiding pixels of that layer. In this plug-in, the Z-Depth used is locked to the layer the plug-in is applied. This research focuses on comparing Depth Matte® to a custom-made plug-in …


Optimization Of Switch Virtual Keyboard By Using Computational Modelling, Xiao Zhang Oct 2014

Optimization Of Switch Virtual Keyboard By Using Computational Modelling, Xiao Zhang

Open Access Theses

In this thesis, I first reviewed some keyboard technologies used by people with motor difficulties, and described design elements that influence efficiency. I cast the design of a switch keyboard as an optimization problem, and arrangement of keys on such a keyboard as a Mixed Integer Programming problem. One significant variable in the MIP problem, the error rate, is related to several other variables. I treated modeling of the error rate as a parameter estimation problem, and used a data mining method. I designed HCI experiments to gather data for parameter estimation, using Bayesian logistic regression model. The empirical data …


Security Policies That Make Sense For Complex Systems: Comprehensible Formalism For The System Consumer, Rhonda R. Henning Oct 2014

Security Policies That Make Sense For Complex Systems: Comprehensible Formalism For The System Consumer, Rhonda R. Henning

CCE Theses and Dissertations

Information Systems today rarely are contained within a single user workstation, server, or networked environment. Data can be transparently accessed from any location, and maintained across various network infrastructures. Cloud computing paradigms commoditize the hardware and software environments and allow an enterprise to lease computing resources by the hour, minute, or number of instances required to complete a processing task. An access control policy mediates access requests between authorized users of an information system and the system's resources. Access control policies are defined at any given level of abstraction, such as the file, directory, system, or network, and can be …


Canvas: A Fast And Accurate Geometric Sentence Alignment System Using Lexical Cues Within Complex Misalignment Settings, Hussein M. Ghaly Oct 2014

Canvas: A Fast And Accurate Geometric Sentence Alignment System Using Lexical Cues Within Complex Misalignment Settings, Hussein M. Ghaly

Dissertations, Theses, and Capstone Projects

In this paper, we present a new sentence alignment system (Canvas), which is a Python implementation of a geometric approach to sentence alignment, based on lexical cues. Canvas system is designed mainly to handle parallel texts exhibiting complex misalignment patterns, namely within English-Arabic pairs for United Nations documents. The system relies heavily on pre-indexing words/tokens in the source and target texts, and it creates correspondences between the token indexes. From this point onward, the alignment problem is reduced to a geometric problem of finding the path that runs through the True Correspondence Points (TCPs). The likelihood of a point being …


Systematic Comparison Of Cross-Lingual Projection Techniques For Low-Density Nlp Under Strict Resource Constraints, Joshua Waxman Oct 2014

Systematic Comparison Of Cross-Lingual Projection Techniques For Low-Density Nlp Under Strict Resource Constraints, Joshua Waxman

Dissertations, Theses, and Capstone Projects

The field of low-density NLP is often approached from an engineering perspective, and evaluations are typically haphazard - considering different architectures, given different languages, and different available resources - without a systematic comparison. The resulting architectures are then tested on the unique corpus and language for which this approach has been designed. This makes it difficult to truly evaluate which approach is truly the "best," or which approaches are best for a given language.

In this dissertation, several state-of-the-art architectures and approaches to low-density language Part-Of-Speech Tagging are reimplemented; all of these techniques exploit a relationship between a high-density (HD) …


Using Gist Features To Constrain Search In Object Detection, Joanna Browne Solmon Aug 2014

Using Gist Features To Constrain Search In Object Detection, Joanna Browne Solmon

Dissertations and Theses

This thesis investigates the application of GIST features [13] to the problem of object detection in images. Object detection refers to locating instances of a given object category in an image. It is contrasted with object recognition, which simply decides whether an image contains an object, regardless of the object's location in the image.

In much of computer vision literature, object detection uses a "sliding window" approach to finding objects in an image. This requires moving various sizes of windows across an image and running a trained classifier on the visual features of each window. This brute force method can …


Identification Of Informativeness In Text Using Natural Language Stylometry, Rushdi Shams Aug 2014

Identification Of Informativeness In Text Using Natural Language Stylometry, Rushdi Shams

Electronic Thesis and Dissertation Repository

In this age of information overload, one experiences a rapidly growing over-abundance of written text. To assist with handling this bounty, this plethora of texts is now widely used to develop and optimize statistical natural language processing (NLP) systems. Surprisingly, the use of more fragments of text to train these statistical NLP systems may not necessarily lead to improved performance. We hypothesize that those fragments that help the most with training are those that contain the desired information. Therefore, determining informativeness in text has become a central issue in our view of NLP. Recent developments in this field have spawned …


Complex Network Analysis For Scientific Collaboration Prediction And Biological Hypothesis Generation, Qing Zhang Aug 2014

Complex Network Analysis For Scientific Collaboration Prediction And Biological Hypothesis Generation, Qing Zhang

Theses and Dissertations

With the rapid development of digitalized literature, more and more knowledge has been discovered by computational approaches. This thesis addresses the problem of link prediction in co-authorship networks and protein--protein interaction networks derived from the literature. These networks (and most other types of networks) are growing over time and we assume that a machine can learn from past link creations by examining the network status at the time of their creation. Our goal is to create a computationally efficient approach to recommend new links for a node in a network (e.g., new collaborations in co-authorship networks and new interactions in …


Opinion Mining Of Sociopolitical Comments From Social Media, Swapna Gottipati Aug 2014

Opinion Mining Of Sociopolitical Comments From Social Media, Swapna Gottipati

Dissertations and Theses Collection (Open Access)

Opinions are central to almost all human activities by influencing greatly the decision making process. In this thesis, we present the problems of mining issues, extracting entities and suggestive opinions towards the entities, detecting thoughtful comments, and extracting stances and ideological expressions from online comments in the sociopolitical domain. This study is essential for opinion mining applications that are beneficial for policy makers, government sectors and social organizations. Much work has been done to try to uncover consumer sentiments from online comments to help businesses improve their products and services. However, sociopolitical opinion mining poses new challenges due to complex …


Integrating Visual Mnemonics And Input Feedback With Passphrases To Improve The Usability And Security Of Digital Authentication, Kevin Juang Aug 2014

Integrating Visual Mnemonics And Input Feedback With Passphrases To Improve The Usability And Security Of Digital Authentication, Kevin Juang

All Dissertations

The need for both usable and secure authentication is more pronounced than ever before. Security researchers and professionals will need to have a deep understanding of human factors to address these issues. Due to their ubiquity, recoverability, and low barrier of entry, passwords remain the most common means of digital authentication. However, fundamental human nature dictates that it is exceedingly difficult for people to generate secure passwords on their own. System-generated random passwords can be secure but are often unusable, which is why most passwords are still created by humans. We developed a simple system for automatically generating mnemonic phrases …


#Mplp: A Comparison Of Domain Novice And Expert User-Generated Tags In A Minimally Processed Digital Archive, Edward A. Benoit Iii Aug 2014

#Mplp: A Comparison Of Domain Novice And Expert User-Generated Tags In A Minimally Processed Digital Archive, Edward A. Benoit Iii

Theses and Dissertations

The high costs of creating and maintaining digital archives precluded many archives from providing users with digital content or increasing the amount of digitized materials. Studies have shown users increasingly demand immediate online access to archival materials with detailed descriptions (access points). The adoption of minimal processing to digital archives limits the access points at the folder or series level rather than the item-level description users' desire. User-generated content such as tags, could supplement the minimally processed metadata, though users are reluctant to trust or use unmediated tags. This dissertation project explores the potential for controlling/mediating the supplemental metadata from …


Overcoming Roadblocks In Introducing Virtual World Technology To High Schools, Casey Dylan Bailey Aug 2014

Overcoming Roadblocks In Introducing Virtual World Technology To High Schools, Casey Dylan Bailey

Graduate Theses and Dissertations

The EAST (Environmental And Spatial Technology) Initiative is a non-profit educational organization that provides students in over two hundred schools in eight states with access to advanced computing technologies for the purpose of enabling students to develop technical skills early and to produce solutions to local community problems. Although many high-end technologies are available through EAST, they are desktop solutions that individual students use and there are none that enable students within a school or between schools to collaborate.

This thesis is a saga that documents the identification and removal of many roadblocks to introducing a 3D multi-user virtual simulation …


Multi-Sensory Emotion Recognition With Speech And Facial Expression, Qingmei Yao Aug 2014

Multi-Sensory Emotion Recognition With Speech And Facial Expression, Qingmei Yao

Dissertations

Emotion plays an important role in human beings’ daily lives. Understanding emotions and recognizing how to react to others’ feelings are fundamental to engaging in successful social interactions. Currently, emotion recognition is not only significant in human beings’ daily lives, but also a hot topic in academic research, as new techniques such as emotion recognition from speech context inspires us as to how emotions are related to the content we are uttering.

The demand and importance of emotion recognition have highly increased in many applications in recent years, such as video games, human computer interaction, cognitive computing, and affective computing. …


Systems For Delivering Electric Vehicle Data Analytics, Vamshi Krishna Bolly Jul 2014

Systems For Delivering Electric Vehicle Data Analytics, Vamshi Krishna Bolly

Open Access Theses

n the recent times, advances in scientific research related to electric vehicles led to generation of large amounts of data. This data is majorly logger data collected from various sensors in the vehicle. It is predominantly unstructured and non-relational in nature, also called Big Data. Analysis of such data needs a high performance information technology infrastructure that provides superior computational efficiency and storage capacity. It should be scalable to accommodate the growing data and ensure its security over a network. This research proposes an architecture built over Hadoop to effectively support distributed data management over a network for real-time data …


Online Naturalization: Evolving Roles In Online Knowledge Production Communities, Jeremy David Foote Jul 2014

Online Naturalization: Evolving Roles In Online Knowledge Production Communities, Jeremy David Foote

Open Access Theses

Web-based peer production communities, like Wikipedia and open source software, have created digital artifacts of growing cultural, financial, and technological importance. Understanding how and why people choose to join these communities, and why they eventually leave them, is therefore an important topic.

We take all of the edit data from six years of activity on the online genealogy wiki WeRelate, and create monthly snapshots of behavior and interaction networks for all 9,570 users who edited the site. We use machine learning to cluster these behavioral snapshots into four "behavioral roles". We identify one of these roles as being indicative of …


The Use Of Business Intelligence Techniques In Supply Chain Performance, Jue Gu Jul 2014

The Use Of Business Intelligence Techniques In Supply Chain Performance, Jue Gu

Open Access Theses

Who likes data? Businesses are always loyal data followers. Companies analyze various forms of data to maintain businesses and identify their current performance in different areas so they can find business opportunities to improve and obtain more market share in advance (Qrunfleh & Tarafdar, 2012). When Big Data comes to businesses, companies who can take advantage of data the best tend to regularly get more business and customers (Waller & Fawcett, 2013). Collecting, analyzing, and demonstrating data could be essential to a single business, a company's supply chain performance and its sustainability. As an intelligent data processing product in terms …


Assessing The Fit Between Child Welfare Information Systems And Frontline Workers: Development Of A Task-Technology Fit Instrument, Kurt William Heisler Jul 2014

Assessing The Fit Between Child Welfare Information Systems And Frontline Workers: Development Of A Task-Technology Fit Instrument, Kurt William Heisler

Health Services Research Dissertations

States and the federal government continue to invest heavily in child welfare information systems (CWIS) to improve caseworkers' performance, but the extent to which these systems meet caseworkers' needs is unclear. In the field of child welfare there are no reliable user-evaluation measures states can use to assess the degree to which a CWIS meets caseworkers' needs, and identify which specific features of the CWIS most need improvement. The study developed such a measure based on the task-technology fit (TTF) framework, which posits that users will evaluate the usefulness of a technology based on how well it meets their tasks …


Cosine Similarity For Article Section Classification: Using Structured Abstracts As A Proxy For An Annotated Corpus, Arthur T. Bugorski Jun 2014

Cosine Similarity For Article Section Classification: Using Structured Abstracts As A Proxy For An Annotated Corpus, Arthur T. Bugorski

Electronic Thesis and Dissertation Repository

During the last decade, the amount of research published in biomedical journals has grown significantly and at an accelerating rate. To fully explore all of this literature, new tools and techniques are needed for both information retrieval and processing. One such tool is the identification and extraction of key claims. In an e ort to work toward claim-extraction, we aim to identify the key areas in the body of the article referred to by text in the abstract. In this project, our work is preliminary to that goal in that we attempt to match specific clauses in the abstract with …


Bass In Your Face: A Case-Study Exploration Of Networked Culture, Samantha Phyllis Kretmar Jun 2014

Bass In Your Face: A Case-Study Exploration Of Networked Culture, Samantha Phyllis Kretmar

Dissertations, Theses, and Capstone Projects

Using dubstep DJ Bassnectar as a case-study example, this thesis explores the impact of social networks and mobile connectivity. As evidenced by Bassnectar's digitally based approach to experiencing, distributing, and consuming music, these developments have contributed to the shift to a new model I describe as Networked Culture.

Figure 1 is a video highlighting the Bassnectar concert experience. Figure 2 is an audio clip illustrating the "drop" in dubstep. Figure 3 is another audio clip demonstrating the dubstep sound. Figure 4 is an image of an Ableton Live sound library. Figure 5 is an image of Ableton Live's functionality. Figure …


Echolocation: Using Word-Burst Analysis To Rescore Keyword Search Candidates In Low-Resource Languages, Justin Richards Jun 2014

Echolocation: Using Word-Burst Analysis To Rescore Keyword Search Candidates In Low-Resource Languages, Justin Richards

Dissertations, Theses, and Capstone Projects

State of the art technologies for speech recognition are very accurate for heavily studied languages like English. They perform poorly, though, for languages wherein the recorded archives of speech data available to researchers are relatively scant. In the context of these low-resource languages, the task of keyword search within recorded speech is formidable. We demonstrate a method that generates more accurate keyword search results on low-resource languages by studying a pattern not exploited by the speech recognizer. The word-burst, or burstiness, pattern is the tendency for word utterances to appear together in bursts as conversational topics fluctuate. We give evidence …


Temporal Information Extraction And Knowledge Base Population, Taylor Cassidy Jun 2014

Temporal Information Extraction And Knowledge Base Population, Taylor Cassidy

Dissertations, Theses, and Capstone Projects

Temporal Information Extraction (TIE) from text plays an important role in many Natural Language Processing and Database applications. Many features of the world are time-dependent, and rich temporal knowledge is required for a more complete and precise understanding of the world. In this thesis we address aspects of two core tasks in TIE. First, we provide a new corpus of labeled temporal relations between events and temporal expressions, dense enough to facilitate a change in research directions from relation classification to identification, and present a system designed to address corresponding new challenges. Second, we implement a novel approach for the …


Automated Classification Of Argument Stance In Student Essays: A Linguistically Motivated Approach With An Application For Supporting Argument Summarization, Adam Robert Faulkner Jun 2014

Automated Classification Of Argument Stance In Student Essays: A Linguistically Motivated Approach With An Application For Supporting Argument Summarization, Adam Robert Faulkner

Dissertations, Theses, and Capstone Projects

This study describes a set of document- and sentence-level classification models designed to automate the task of determining the argument stance (for or against) of a student argumentative essay and the task of identifying any arguments in the essay that provide reasons in support of that stance. A suggested application utilizing these models is presented which involves the automated extraction of a single-sentence summary of an argumentative essay. This summary sentence indicates the overall argument stance of the essay from which the sentence was extracted and provides a representative argument in support of that stance.

A novel set …


The Lived Experience Of Young Adult Burn Survivors' Use Of Social Media, Marie S. Giordano Jun 2014

The Lived Experience Of Young Adult Burn Survivors' Use Of Social Media, Marie S. Giordano

Dissertations, Theses, and Capstone Projects

The purpose of this phenomenological study was to illuminate the meaning of social media use by young adult burn survivors. Five females and four males, aged 20-25, who sustained burns > 25%, were interviewed. Van Manen's (1999) phenomenological methodology provided the framework for this study. The meaning of the context of the lived experience is described in the five essential themes of identity, connectivity, social support, making meaning, and privacy. These young adult burn survivors, having experienced the traumatic effects of a burn during adolescence, use social media as a way of expressing their identity, while being cautious about privacy. Part …