Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

2016

Institution
Keyword
Publication

Articles 1 - 30 of 69

Full-Text Articles in Social and Behavioral Sciences

Rationality, Parapsychology, And Artificial Intelligence In Military And Intelligence Research By The United States Government In The Cold War, Guy M. Lomeo Dec 2016

Rationality, Parapsychology, And Artificial Intelligence In Military And Intelligence Research By The United States Government In The Cold War, Guy M. Lomeo

Theses and Dissertations

A study analyzing the roles of rationality, parapsychology, and artificial intelligence in military and intelligence research by the United States Government in the Cold War. An examination of the methodology behind the decisions to pursue research in two fields that were initially considered irrational.


Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur Dec 2016

Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur

Open Access Dissertations

There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding the nature of blacklisted hosts over time.

The analytical environment enables deep analysis of very large and complex datasets by exploiting the divide and recombine framework. The capability to analyse data in depth enables one to go beyond just summary statistics in research. This deep analysis is …


Towards Multipurpose Readability Assessment, Ion Madrazo Dec 2016

Towards Multipurpose Readability Assessment, Ion Madrazo

Boise State University Theses and Dissertations

Readability refers to the ease with which a reader can understand a text. Automatic readability assessment has been widely studied over the past 50 years. However, most of the studies focus on the development of tools that apply either to a single language, domain, or document type. This supposes duplicate efforts for both developers, who need to integrate multiple tools in their systems, and final users, who have to deal with incompatibilities among the readability scales of different tools. In this manuscript, we present MultiRead, a multipurpose readability assessment tool capable of predicting the reading difficulty of texts of varied …


Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi Dec 2016

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …


Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou Dec 2016

Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou

McKelvey School of Engineering Theses & Dissertations

Images are key to fighting sex trafficking. They are: (a) used to advertise for sex services,(b) shared among criminal networks, and (c) connect a person in an image to the place where the image was taken. This work explores the ability to link images to indoor places in order to support the investigation and prosecution of sex trafficking. We propose and develop a framework that includes a database of open-source information available on the Internet, a crowd-sourcing approach to gathering additional images, and explore a variety of matching approaches based both on hand-tuned features such as SIFT and learned features …


The Transition Experiences Of International Graduate Students In Clark University School Of Professional Studies, Xuesong Huang, Mingyang Lian, Dang Trung, Jay Sheth, Yuwei Yang, Irina Klimenko Dec 2016

The Transition Experiences Of International Graduate Students In Clark University School Of Professional Studies, Xuesong Huang, Mingyang Lian, Dang Trung, Jay Sheth, Yuwei Yang, Irina Klimenko

School of Professional Studies

In the last decade, the School of Professional Studies at Clark University has witnessed a sharp increase in international students. More and more international students in the millennial generation have entered the School of Professional Studies pursuing one of the two-year graduate programs: Master of Science in Professional Studies, Master of Science in Public Administration, and Master of Science in Information Technology. In the past, working adult student dominant the program. These students already had a career outside the classrooms before them came to study. The millennial international students have generated new adjustment problems. Some of the transition issues of …


Aiddata Gis International Fellowship: Ghana West-Africa, Jason N. Ready Dec 2016

Aiddata Gis International Fellowship: Ghana West-Africa, Jason N. Ready

International Development, Community and Environment (IDCE)

My internship, or fellowship as it was commonly referred to, was funded by a non-profit organization out of Williamsburg Virginia called AidData. This fellowship took place in in the country of Ghana, West-Africa beginning in May of 2016 and continued for 14 weeks with 40 hours each week. The objective of this internship was to provide in-depth training on the use of geographic Information Systems to Private and Public sectors within the country to allow for increased efficiency, and transparency through data visualization. In accordance with the requirement of Clark Universities GISDE master’s program this paper will delve into the …


Cultural Diversity In Artificial Societies: Case Studies Of The Maya Peoples, Roberto Ulloa Nov 2016

Cultural Diversity In Artificial Societies: Case Studies Of The Maya Peoples, Roberto Ulloa

Electronic Thesis and Dissertation Repository

The existence of cultural diversity in a connected world is paradoxical given that all individuals constantly interact and share information, and that individuals are all part of one giant network of connections. In the long term, it seems logical to assume that everybody should hold the same cultural information and, therefore, the same culture. Yet cultural diversity is still manifest around the globe. Cultural diversity as a phenomenon becomes even more puzzling when we take into account how it survives catastrophic events which regularly befall societies, such as invasions, natural disasters, and civil wars. In this thesis, agent-based computer simulations …


Personal Privacy: A Study To Determine Views On Privacy As It Relates To Technology Acceptance, Keith A. Wuotinen Nov 2016

Personal Privacy: A Study To Determine Views On Privacy As It Relates To Technology Acceptance, Keith A. Wuotinen

Master's Theses and Doctoral Dissertations

This descriptive correlation study sought to learn the relationships, if any, between a person’s concern for privacy and their acceptance of technology, in conjunction with the control factors of the Big Five personality factors. The study employed a modified Concern for Information Privacy (CFIP) scale and a modified Technology Acceptance Model (TAM) approach in conjunction with the Big Five personality factors using a 51-question survey.

The study surveyed students at Eastern Michigan University in Ypsilanti, Michigan, who were enrolled in the College of Technology. The results indicated that there was a significant positive relationship between the CFIP and the TAM. …


On The Promotion Of The Social Web Intelligence, Taraneh Khazaei Nov 2016

On The Promotion Of The Social Web Intelligence, Taraneh Khazaei

Electronic Thesis and Dissertation Repository

Given the ever-growing information generated through various online social outlets, analytical research on social media has intensified in the past few years from all walks of life. In particular, works on social Web intelligence foster and benefit from the wisdom of the crowds and attempt to derive actionable information from such data. In the form of collective intelligence, crowds gather together and contribute to solving problems that may be difficult or impossible to solve by individuals and single computers. In addition, the consumer insight revealed from social footprints can be leveraged to build powerful business intelligence tools, enabling efficient and …


Determining The Interruption Of Services While Performing V2i Communication Using The Spmd Prototype, Binaya Raj Joshi Nov 2016

Determining The Interruption Of Services While Performing V2i Communication Using The Spmd Prototype, Binaya Raj Joshi

Student Work

The use of Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Roadside Unit (V2R) and Vehicle to Other (V2X) communications are increasingly applied over existing and upcoming transportation means by the United States Department of Transportation (USDOT) and other federal agencies. From previous statistical data, these technologies would primarily avoid or mitigate vehicle crashes and would provide more safety, mobility and various other benefits on the roads (“Traffic Safety Facts 2012,” 2013; “Traffic Safety Facts 2013” 2014). During the communication processes between vehicles, infrastructures and roadside units’ various sensitive data such as positions and speed of the vehicles, …


Anxiolytic Effects Of Propranolol And Diphenoxylate On Mice And Automated Stretch-Attend Posture Analysis, Kevin Scott Holly Oct 2016

Anxiolytic Effects Of Propranolol And Diphenoxylate On Mice And Automated Stretch-Attend Posture Analysis, Kevin Scott Holly

Doctoral Dissertations

The prevention of social anxiety, performance anxiety, and social phobia via the combination of two generic drugs, diphenoxylate HC1 (opioid) plus atropine sulfate (anticholinergic) and propranolol HCl (beta blocker) was evaluated in mice through behavioral studies. A patent published on a September 8, 2011 by Benjamin D. Holly, US 2011/0218215 Al, prompted the research. The drug combination of diphenoxylate and atropine plus propranolol could be an immediate treatment for patients suffering from acute phobic and social anxiety disorders. Demonstrating the anxiolytic effects of the treatment on mice would validate a mouse model for neuroscientist to be used to detect the …


Multiple Imputation Of Missing Data In Structural Equation Models With Mediators And Moderators Using Gradient Boosted Machine Learning, Robert J. Milletich Ii Oct 2016

Multiple Imputation Of Missing Data In Structural Equation Models With Mediators And Moderators Using Gradient Boosted Machine Learning, Robert J. Milletich Ii

Psychology Theses & Dissertations

Mediation and moderated mediation models are two commonly used models for indirect effects analysis. In practice, missing data is a pervasive problem in structural equation modeling with psychological data. Multiple imputation (MI) is one method used to estimate model parameters in the presence of missing data, while accounting for uncertainty due to the missing data. Unfortunately, commonly used MI methods are not equipped to handle categorical variables or nonlinear variables such as interactions. In this study, we introduce a general MI framework that uses the Bayesian bootstrap (BB) method to generate posterior inferences for indirect effects and gradient boosted machine …


Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini Aug 2016

Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini

Economic Crime Forensics Capstones

Money laundering can be defined as any act or attempted act to conceal or disguise the identity of illegally obtained proceeds so that they appear to have originated from legitimate sources (Money Laundering, 2016). It is difficult to determine the magnitude of money laundering because these illicit financial flows remain hidden (Schott, 2006). A report issued by the United Nations Office on Drugs and Crime (UNODC) quoted that the total of all criminal proceeds amounted to $2.1 trillion in 2009. The study also shows that “Less than 1 percent of global illicit financial flows are currently seized and frozen” (Pietschmann …


A Study Of Information Security Awareness Program Effectiveness In Predicting End-User Security Behavior, James Michael Banfield Aug 2016

A Study Of Information Security Awareness Program Effectiveness In Predicting End-User Security Behavior, James Michael Banfield

Master's Theses and Doctoral Dissertations

As accessibility to data increases, so does the need to increase security. For organizations of all sizes, information security (IS) has become paramount due to the increased use of the Internet. Corporate data are transmitted ubiquitously over wireless networks and have increased exponentially with cloud computing and growing end-user demand. Both technological and human strategies must be employed in the development of an information security awareness (ISA) program. By creating a positive culture that promotes desired security behavior through appropriate technology, security policies, and an understanding of human motivations, ISA programs have been the norm for organizational end-user risk mitigation …


Study On The Application Of Information Technology In Inland Maritime Supervision, Chong He Aug 2016

Study On The Application Of Information Technology In Inland Maritime Supervision, Chong He

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Improving The Performance Of Ice Sheet Modeling Through Embedded Simulation, Christopher G. Dufour Aug 2016

Improving The Performance Of Ice Sheet Modeling Through Embedded Simulation, Christopher G. Dufour

Electronic Theses and Dissertations

Understanding the impact of global climate change is a critical concern for society at large. One important piece of the climate puzzle is how large-scale ice sheets, such as those covering Greenland and Antarctica, respond to a warming climate. Given such ice sheets are under constant change, developing models that can accurately capture their dynamics represents a significant challenge to researchers. The problem, however, is properly capturing the dynamics of an ice sheet model requires a high model resolution and simulating these models is intractable even for state-of-the-art supercomputers.

This thesis presents a revolutionary approach to accurately capture ice sheet …


Tool Comparison Of Semantic Parsers, Robert Hinh Aug 2016

Tool Comparison Of Semantic Parsers, Robert Hinh

Open Access Theses

Natural Language Processing (NLP) is a vital aspect for artificial intelligence systems to achieve integration into human lives, which has been a goal for researchers in this industry. While NLP focuses on an array of problems, semantic parsing will be specifically focused on throughout this paper. These parsers have been considerably targeted for improvement through the scientific community and demand for semantic parsers that achieve high accuracy has increased. There have been many approaches developed for this specific purpose and in this paper, a deep analysis was performed to compare the performance of semantic parsing systems. The implications of this …


Profiling Social Media Users With Selective Self-Disclosure Behavior, Wei Gong Aug 2016

Profiling Social Media Users With Selective Self-Disclosure Behavior, Wei Gong

Dissertations and Theses Collection

Social media has become a popular platform for millions of users to share activities and thoughts. Many applications are now tapping on social media to disseminate information (e.g., news), to promote products (e.g., advertisements), to manage customer relationship (e.g., customer feedback), and to source for investment (e.g., crowdfunding). Many of these applications require user profile knowledge to select the target social media users or to personalize messages to users. Social media user profiling is a task of constructing user profiles such as demographical labels, interests, and opinions, etc., using social media data. Among the social media user profiling research works, …


Magnopark, Smart Parking Detection Based On Cellphone Magnetic Sensor, Maryam Arab Jul 2016

Magnopark, Smart Parking Detection Based On Cellphone Magnetic Sensor, Maryam Arab

Computer Science Theses & Dissertations

We introduce a solution that uses the availability of heavy crowds and their smart devices, to gain more result as to where potential parking is possible. By leveraging the raw magnetometer, gyroscope, and accelerometer data, we are able to detect parking spots through the natural movement exerted by the walking pedestrians on the sidewalks beside the streets. Dating back as far as 2013, a very large portion of pedestrians composing the crowds on the sidewalk, possessed at least one smart device in their hand or pocket14]. It is this statistic that fuels our application, in which we depend on crowds …


Using Web Archives To Enrich The Live Web Experience Through Storytelling, Yasmin Alnoamany Jul 2016

Using Web Archives To Enrich The Live Web Experience Through Storytelling, Yasmin Alnoamany

Computer Science Theses & Dissertations

Much of our cultural discourse occurs primarily on the Web. Thus, Web preservation is a fundamental precondition for multiple disciplines. Archiving Web pages into themed collections is a method for ensuring these resources are available for posterity. Services such as Archive-It exists to allow institutions to develop, curate, and preserve collections of Web resources. Understanding the contents and boundaries of these archived collections is a challenge for most people, resulting in the paradox of the larger the collection, the harder it is to understand. Meanwhile, as the sheer volume of data grows on the Web, "storytelling" is becoming a popular …


Digital Integration, Jacob C. Boccio Jun 2016

Digital Integration, Jacob C. Boccio

USF Tampa Graduate Theses and Dissertations

Artificial intelligence is an emerging technology; something far beyond smartphones, cloud integration, or surgical microchip implantation. Utilizing the work of Ray Kurzweil, Nick Bostrom, and Steven Shaviro, this thesis investigates technology and artificial intelligence through the lens of the cinema. It does this by mapping contemporary concepts and the imagined worlds in film as an intersection of reality and fiction that examines issues of individual identity and alienation. I look at a non-linear timeline of films involving machine advancement, machine intelligence, and stages of post-human development; Elysium (2013) and Surrogates (2009) are about technology as an extension of the self, …


Data-Driven Synthesis And Evaluation Of Syntactic Facial Expressions In American Sign Language Animation, Hernisa Kacorri Jun 2016

Data-Driven Synthesis And Evaluation Of Syntactic Facial Expressions In American Sign Language Animation, Hernisa Kacorri

Dissertations, Theses, and Capstone Projects

Technology to automatically synthesize linguistically accurate and natural-looking animations of American Sign Language (ASL) would make it easier to add ASL content to websites and media, thereby increasing information accessibility for many people who are deaf and have low English literacy skills. State-of-art sign language animation tools focus mostly on accuracy of manual signs rather than on the facial expressions. We are investigating the synthesis of syntactic ASL facial expressions, which are grammatically required and essential to the meaning of sentences. In this thesis, we propose to: (1) explore the methodological aspects of evaluating sign language animations with facial expressions, …


Visual Code: Breaking The Binary, Jacob Johannesen, Andrew Adriance Jun 2016

Visual Code: Breaking The Binary, Jacob Johannesen, Andrew Adriance

Liberal Arts and Engineering Studies

This project seeks to create an accessible programming language that is more visually based. Although some solutions exist, namely MIT’s Scratch, nothing has caught up to the mobile age. This proj- ect aims to reframe creating a game or app into the context of tell- ing a story, putting character creation first. By researching sto- ry-telling and how people learn, and by applying technical and user interface design knowledge, this project intends to deliver a soft- ware solution that opens introductory coding education to more people.


Effect Of Deictic Gestures On Direction-Giving In Virtual Humans, Anthony Pham Jun 2016

Effect Of Deictic Gestures On Direction-Giving In Virtual Humans, Anthony Pham

Honors Theses

Virtual agents are animated characters that use speech and gesture to interact with human users. They can serve as an intuitive interface for a variety of purposes. I am investigating the use of deictic gestures by a direction-giving agent. Deictic gestures are pointing gestures that humans often use in direction-giving to help clarify the route and destination. In my experiment, I developed a virtual agent to give directions to people to six different locations with the following spatial relationships to the starting point: left, right, left behind, right behind, left up, and right up. Three versions of the virtual agent …


A Graph Based Departmental Spoken Dialogue System, Julia Isaac Jun 2016

A Graph Based Departmental Spoken Dialogue System, Julia Isaac

Honors Theses

Spoken dialogue systems are automatic, computer based systems that are a great way for people to receive important information. In this project, I created a spoken dialogue system that people can use to learn about the Computer Science Department at Union College. The system was built by populating an open source dialogue system using a graph based dialogue manager. I improved upon a previous working dialogue system by making the conversations sound more natural, improving the flexibility of the system and making the system more robust. To help with this process a corpus was created using about 200 different dialogues …


User Behavior Mining In Microblogging, Tuan Anh Hoang Jun 2016

User Behavior Mining In Microblogging, Tuan Anh Hoang

Dissertations and Theses Collection (Open Access)

This dissertation addresses the modeling of factors concerning microblogging users' content and behavior. We focus on two sets of factors. The first set includes behavioral factors of users and content items driving content propagation in microblogging. The second set consists of latent topics and communities of users as the users are engaged in content generation and behavior adoptions. These two sets of factors are extremely important in many applications, e.g., network monitoring and recommender systems. In the first part of this dissertation, we identify user virality, user susceptibility, and content virality as three behavioral factors that affect users' behaviors in …


The History Of Chinese Cybersecurity: Current Effects On Chinese Society Economy, And Foreign Relations, Vaughn C. Rogers May 2016

The History Of Chinese Cybersecurity: Current Effects On Chinese Society Economy, And Foreign Relations, Vaughn C. Rogers

Seton Hall University Dissertations and Theses (ETDs)

Chinese cybersecurity has become an infamous topic in the field of cybersecurity today, causing a great deal of controversy. The controversy stems from whether or not censorship is hindering Chinese economy, society, and relationships with other countries. The White Papers (中国政府白皮书), the Constitution of the People’s Republic of China (中华人民共和国宪法), and The Internet in China (中国互联网状况) all suggest that there is a free flow of Internet both within and without China that promotes peaceful socioeconomic development which the Chinese government seeks to promote. But is China sacrificing lucrative business prospects to secure …


Backend Challenges And Issues For Electronic Government, Salim Y. Alkindi May 2016

Backend Challenges And Issues For Electronic Government, Salim Y. Alkindi

Information Technology Master Theses

The term electronic government (also called e-government, or eGov) refers to multidisciplinary projects that are complex in nature. Since the beginning of the Internet revolution many countries have adopted e-government as a step toward enhancing the delivery of public or governmental services to citizens by what are called e-services. A typical request for a service is initiated and passes through an electronic service (“e-service”) portal, or a front office. The term front office application usually system can be defined as designates software seen and used directly by an end user. This software provides the capabilities needed to collect the user …


Charlton Fire Department Resident Expectations: Survey And Analysis, Natalie Omary, Jingxin Wen, Junchen Chen, Denis Kornev May 2016

Charlton Fire Department Resident Expectations: Survey And Analysis, Natalie Omary, Jingxin Wen, Junchen Chen, Denis Kornev

School of Professional Studies

The Town of Charlton is located in the heart of the Massachusetts with a resident population of just under 14,000 people. The Charlton Fire Department serves the town for needs related to fire fighting, fire prevention, burning permits and inspection services along with emergency medical services. The Department has requested the assistance of the Clark University COPACE Capstone students in creating and conducting survey in order to get a sense of what the resident of the town know about the fire department and to better gauge their expectations about what the department can provide for them. The survey was formulated …