Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

2019

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 72

Full-Text Articles in Social and Behavioral Sciences

On The Human Factors Impact Of Polyglot Programming On Programmer Productivity, Phillip Merlin Uesbeck Dec 2019

On The Human Factors Impact Of Polyglot Programming On Programmer Productivity, Phillip Merlin Uesbeck

UNLV Theses, Dissertations, Professional Papers, and Capstones

Polyglot programming is a common practice in modern software development. This practice is often considered useful to create software by allowing developers to use whichever language they consider most well suited for the different parts of their software. Despite this ubiquity of polyglot programming there is no empirical research into how this practice affects software developers and their productivity. In this dissertation, after reviewing the state of the art in programming language and linguistic research pertaining to the topic, this matter is investigated by way of two empirical studies with 109 and 171 participants solving programming tasks. Based on the …


A Desire Fulfillment Theory Of Digital Game Enjoyment, Owen M. Schaffer Dec 2019

A Desire Fulfillment Theory Of Digital Game Enjoyment, Owen M. Schaffer

College of Computing and Digital Media Dissertations

Empirical research on what makes digital games enjoyable is critical for practitioners who want to design for enjoyment, including for Game Design, Gamification, and Serious Games. But existing theories of what leads to digital game enjoyment have been incomplete or lacking in empirical support showing their impact on enjoyment.

Desire Fulfillment Theory is proposed as a new theory of what leads to digital game enjoyment and tested through research with people who have recently played a digital game. This theory builds on three established theories: Expectancy Disconfirmation Theory, Theory of Basic Human Desires, and Flow Theory. These three theories are …


Rhetsec_ | Rhetorical Security, Jennifer Mead Dec 2019

Rhetsec_ | Rhetorical Security, Jennifer Mead

Culminating Projects in English

Rhetsec_ examines the rhetorical situation, the rhetorical appeals, and how phishing emails simulate "real" emails in five categories of phishing emails. While the first focus of cybersecurity is security, you must also understand the language of computers to know how to secure them. Phishing is one way to compromise security using computers, and so the computer becomes a tool for malicious language (phishing emails and malware) to be transmitted. Therefore to be concerned with securing computers, then you must also be concerned with language. Language is rhetoric's domain, and the various rhetorical elements which create an identity of the phisher …


Sentiment Analysis, Quantification, And Shift Detection, Kevin Labille Dec 2019

Sentiment Analysis, Quantification, And Shift Detection, Kevin Labille

Graduate Theses and Dissertations

This dissertation focuses on event detection within streams of Tweets based on sentiment quantification. Sentiment quantification extends sentiment analysis, the analysis of the sentiment of individual documents, to analyze the sentiment of an aggregated collection of documents. Although the former has been widely researched, the latter has drawn less attention but offers greater potential to enhance current business intelligence systems. Indeed, knowing the proportion of positive and negative Tweets is much more valuable than knowing which individual Tweets are positive or negative. We also extend our sentiment quantification research to analyze the evolution of sentiment over time to automatically detect …


Using Visual Media To Empower Citizen Scientists: A Case Study Of The Outsmart App, Megan E. Kierstead Oct 2019

Using Visual Media To Empower Citizen Scientists: A Case Study Of The Outsmart App, Megan E. Kierstead

Masters Theses

To be successful citizen science projects need to do two key things: (1) they need to meaningfully engage the public and they must also provide people with the tools, expertise, and/or training needed to participate in rigorous research that can be used by the scientific community. In some ways, these requirements are potentially at odds. Emphasis on rigor and expertise risks excluding members of the public who do not feel qualified to participate in esoteric or technically difficult scientific research. Conversely, projects that eschew rigorous methods in favor of wider participation might lead to bad data that cannot be used …


Do It Like A Syntactician: Using Binary Gramaticality Judgements To Train Sentence Encoders And Assess Their Sensitivity To Syntactic Structure, Pablo Gonzalez Martinez Sep 2019

Do It Like A Syntactician: Using Binary Gramaticality Judgements To Train Sentence Encoders And Assess Their Sensitivity To Syntactic Structure, Pablo Gonzalez Martinez

Dissertations, Theses, and Capstone Projects

The binary nature of grammaticality judgments and their use to access the structure of syntax are a staple of modern linguistics. However, computational models of natural language rarely make use of grammaticality in their training or application. Furthermore, developments in modern neural NLP have produced a myriad of methods that push the baselines in many complex tasks, but those methods are typically not evaluated from a linguistic perspective. In this dissertation I use grammaticality judgements with artificially generated ungrammatical sentences to assess the performance of several neural encoders and propose them as a suitable training target to make models learn …


Applied Deep Learning In Intelligent Transportation Systems And Embedding Exploration, Xiaoyuan Liang Aug 2019

Applied Deep Learning In Intelligent Transportation Systems And Embedding Exploration, Xiaoyuan Liang

Dissertations

Deep learning techniques have achieved tremendous success in many real applications in recent years and show their great potential in many areas including transportation. Even though transportation becomes increasingly indispensable in people’s daily life, its related problems, such as traffic congestion and energy waste, have not been completely solved, yet some problems have become even more critical. This dissertation focuses on solving the following fundamental problems: (1) passenger demand prediction, (2) transportation mode detection, (3) traffic light control, in the transportation field using deep learning. The dissertation also extends the application of deep learning to an embedding system for visualization …


Cooperation In Maritime Search And Rescue Between Democratic People’S Republic Of Korea, The People’S Republic Of China And The Russian Federation, Kwangmyong Ri Aug 2019

Cooperation In Maritime Search And Rescue Between Democratic People’S Republic Of Korea, The People’S Republic Of China And The Russian Federation, Kwangmyong Ri

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Study On The Development Of Mass Based On Safety, Qiyu Yu Aug 2019

Study On The Development Of Mass Based On Safety, Qiyu Yu

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Blocks' Network: Redesign Architecture Based On Blockchain Technology, Moataz Hanif Aug 2019

Blocks' Network: Redesign Architecture Based On Blockchain Technology, Moataz Hanif

Doctoral Dissertations and Master's Theses

The Internet is a global network that uses communication protocols. It is considered the most important system reached by humanity, which no one can abandon. However, this technology has become a weapon that threatens the privacy of users, especially in the client-server model, where data is stored and managed privately. Additionally, users have no power over their data that store in a private server, which means users’ data may interrupt by government or might be sold via service provider for-profit purposes. Furthermore, blockchain is a technology that we can rely on to solve issues related to client-server model if appropriately …


A Multimodal Approach To Sarcasm Detection On Social Media, Dipto Das Aug 2019

A Multimodal Approach To Sarcasm Detection On Social Media, Dipto Das

MSU Graduate Theses

In recent times, a major share of human communication takes place online. The main reason being the ease of communication on social networking sites (SNSs). Due to the variety and large number of users, SNSs have drawn the attention of the computer science (CS) community, particularly the affective computing (also known as emotional AI), information retrieval, natural language processing, and data mining groups. Researchers are trying to make computers understand the nuances of human communication including sentiment and sarcasm. Emotion or sentiment detection requires more insights about the communication than it does for factual information retrieval. Sarcasm detection is particularly …


Allocative Poisson Factorization For Computational Social Science, Aaron Schein Jul 2019

Allocative Poisson Factorization For Computational Social Science, Aaron Schein

Doctoral Dissertations

Social science data often comes in the form of high-dimensional discrete data such as categorical survey responses, social interaction records, or text. These data sets exhibit high degrees of sparsity, missingness, overdispersion, and burstiness, all of which present challenges to traditional statistical modeling techniques. The framework of Poisson factorization (PF) has emerged in recent years as a natural way to model high-dimensional discrete data sets. This framework assumes that each observed count in a data set is a Poisson random variable $y ~ Pois(\mu)$ whose rate parameter $\mu$ is a function of shared model parameters. This thesis examines a specific …


Probabilistic Models For Identifying And Explaining Controversy, Myungha Jang Jul 2019

Probabilistic Models For Identifying And Explaining Controversy, Myungha Jang

Doctoral Dissertations

Navigating controversial topics on the Web encourages social awareness, supports civil discourse, and promotes critical literacy. While search of controversial topics particularly requires users to use their critical literacy skills on the content, educating people to be more critical readers is known to be a complex and long-term process. Therefore, we are in need of search engines that are equipped with techniques to help users to understand controversial topics by identifying them and explaining why they are controversial. A few approaches for identifying controversy have worked reasonably well in practice, but they are narrow in scope and exhibit limited performance. …


Aggregating Private And Public Web Archives Using The Mementity Framework, Matthew R. Kelly Jul 2019

Aggregating Private And Public Web Archives Using The Mementity Framework, Matthew R. Kelly

Computer Science Theses & Dissertations

Web archives preserve the live Web for posterity, but the content on the Web one cares about may not be preserved. The ability to access this content in the future requires the assurance that those sites will continue to exist on the Web until the content is requested and that the content will remain accessible. It is ultimately the responsibility of the individual to preserve this content, but attempting to replay personally preserved pages segregates archived pages by individuals and organizations of personal, private, and public Web content. This is misrepresentative of the Web as it was. While the Memento …


Developing Algorithms To Detect Incidents On Freeways From Loop Detector And Vehicle Re-Identification Data, Biraj Adhikari Jul 2019

Developing Algorithms To Detect Incidents On Freeways From Loop Detector And Vehicle Re-Identification Data, Biraj Adhikari

Civil & Environmental Engineering Theses & Dissertations

A new approach for testing incident detection algorithms has been developed and is presented in this thesis. Two new algorithms were developed and tested taking California #7, which is the most widely used algorithm to date, and SVM (Support Vector Machine), which is considered one of the best performing classifiers, as the baseline for comparisons. Algorithm #B in this study uses data from Vehicle Re-Identification whereas the other three algorithms (California #7, SVM and Algorithm #A) use data from a double loop detector for detection of an incident. A microscopic traffic simulator is used for modeling three types of incident …


Exploiting Mobility For Predictive Urban Analytics & Operations, Kasthuri Jayarajah Jul 2019

Exploiting Mobility For Predictive Urban Analytics & Operations, Kasthuri Jayarajah

Dissertations and Theses Collection (Open Access)

As cities worldwide invest heavily in smart city infrastructure, it invites opportunities for a next wave of urban analytics. Unlike its predecessors, urban analytics applications and services can now be real-time and proactive -- they can (a) leverage situational data from large deployments of connected sensors, (b) capture attributes of a variety of entities that make up the urban fabric (e.g., people and their social relationships, transport nodes, utilities, etc.), and (c) use predictive insights to both proactively optimize urban operations (e.g., HVAC systems in smart buildings, buses in the transportation network, crowd-workers, etc.) and promote smarter policy decisions (e.g., …


Outcasts – In Search Of Identity, Syed Hasan Haider Jun 2019

Outcasts – In Search Of Identity, Syed Hasan Haider

MSJ Capstone Projects

The idea for this documentary came from a story published in the express tribune which talked about the people who are unable to vote in 2018 elections due to having Computerized National Identity Cards (CNICs) in the Ibrahim Hyderi locality in Karachi.

Not having a CNIC in Pakistan means that you are not able to participate in civic life and also not subscribe to basic facilitates like housing, water, gas and employment.

This documentary film looks at different cases and through the experience of some journalists what it is like to live as an undocumented citizen. The film also explores …


The Challenges Of Digital Legacy Management On The Value Of Digital Objects To Older Australians, Derani Nathasha Dissanayake Jun 2019

The Challenges Of Digital Legacy Management On The Value Of Digital Objects To Older Australians, Derani Nathasha Dissanayake

Theses: Doctorates and Masters

People spend a considerable amount of time and money in collecting digital objects. Nine out of ten Australians have a social media account but 83% of them have not discussed with their family members what should happen to their social media accounts when they die (Steen, D’Alessandro, Graves, Perkins, Genders, Barbera, Shi, McGrath & Davis, 2017). Only 3% of Australians who had a Will included social media accounts in their Wills. People collect digital objects yet little attention is paid to their preservation. 71% of Australians are unaware of what happens to their digital assets when they die (Ibid, 2017). …


Classifying Challenging Behaviors In Autism Spectrum Disorder With Neural Document Embeddings, Abigail Atchison May 2019

Classifying Challenging Behaviors In Autism Spectrum Disorder With Neural Document Embeddings, Abigail Atchison

Computational and Data Sciences (MS) Theses

The understanding and treatment of challenging behaviors in individuals with Autism Spectrum Disorder is paramount to enabling the success of behavioral therapy; an essential step in this process being the labeling of challenging behaviors demonstrated in therapy sessions. These manifestations differ across individuals and within individuals over time and thus, the appropriate classification of a challenging behavior when considering purely qualitative factors can be unclear. In this thesis we seek to add quantitative depth to this otherwise qualitative task of challenging behavior classification. We do so through the application of natural language processing techniques to behavioral descriptions extracted from the …


Cybersecurity For Critical Infrastructure: Addressing Threats And Vulnerabilities In Canada, Samuel A. Cohen May 2019

Cybersecurity For Critical Infrastructure: Addressing Threats And Vulnerabilities In Canada, Samuel A. Cohen

MSU Graduate Theses

The aim of this thesis is to assess the unique technical and policy-based cybersecurity challenges facing Canada’s critical infrastructure environment and to analyze how current government and industry practices are not equipped to remediate or offset associated strategic risks to the country. Further, the thesis also provides cases and evidence demonstrating that Canada’s critical infrastructure has been specifically targeted by foreign and domestic cyber threat actors to pressure the country’s economic, safety and national security interests. Essential services that Canadians and Canadian businesses rely on daily are intricately linked to the availability and integrity of vital infrastructure sectors, such as …


3d Canopy Model Reconstruction From Unmanned Aerial System And Automated Single Tree Extraction, Hai Ha Duong May 2019

3d Canopy Model Reconstruction From Unmanned Aerial System And Automated Single Tree Extraction, Hai Ha Duong

MSU Graduate Theses

This project aims to develop and assess methodology for spatial modeling and extracting individual trees from high spatial resolution Digital Surface Model (DSMs) derived from unmanned aerial system (UAS) or drone-based aerial photos. Those results could be used for monitoring of vegetative response of forests, grasslands and vineyards to regional and localized fluctuations in climate and seasonality. The primary objective of this research is to extract 3D spatial information using drone-based aerial imagery through photogrammetric methods. UAS flights were taken place at phenologically critical times over several locations owned and managed by Missouri State University (MSU). The 3D DSM can …


A Visual Political World: Determinants And Effects Of Visual Content, Silvia Michelle Torres Pacheco May 2019

A Visual Political World: Determinants And Effects Of Visual Content, Silvia Michelle Torres Pacheco

Arts & Sciences Electronic Theses and Dissertations

Political communication is a central element of several political dynamics. Its visual component is crucial in understanding the origin, characteristics and consequences of the messages sent between political figures, media and citizens. However, visual features have been largely overlooked in Political Science. Thus, in this dissertation, I introduce, describe and apply computer vision techniques for the analysis and processing of visual material, in order to not only improve data collection and visual content extraction, but also the understanding of the effects that visual components have on relevant political variables. In the first main chapter of this project, I implement computer …


Every Data Point Counts: Political Elections In The Age Of Digital Analytics, Julian Kehle, Samir Naimi May 2019

Every Data Point Counts: Political Elections In The Age Of Digital Analytics, Julian Kehle, Samir Naimi

Honors Thesis

Synthesizing the investigative research and cautionary messages from experts in the fields of technology, political science, and behavioral science, this project explores the ways in which digital analytics has begun to influence the American political arena. Historically, political parties have constructed systems to target voters and win elections. However, rapid changes in the field of technology (such as big data, artificial intelligence, and the prevalence of social media) threaten to undermine the integrity of elections themselves. Future political campaigns will utilize profiling to micro-target individuals in order to manipulate and persuade them with hyper-personalized political content. Most dangerously, the average …


Changing The Current Perception Of Affordable Housing In Worcester, Simone Mcguinness, William Roberts, Vaske Gjino, Tong Zhou, Mengxin Ma, Sarawadee Sonpuak May 2019

Changing The Current Perception Of Affordable Housing In Worcester, Simone Mcguinness, William Roberts, Vaske Gjino, Tong Zhou, Mengxin Ma, Sarawadee Sonpuak

School of Professional Studies

One of Worcester Interfaith’s goals is to eradicate the stigma of affordable housing in Worcester. Currently, the perception of affordable housing is of an image of unkept and old residences filled with destitute citizens who cannot afford basic needs to live in a city, let alone housing. This image is perpetuated by media, stigma, and a lack of education of the true reality of affordable housing and who its recipients are. Affordable housing-qualified citizens represent a range of educations, professions, age, race, and income levels. Affordable housing units, too, represent a variety of homes, many of which are extremely well-kept …


Worcester Chamber Of Commerce: Recruiting Minority Business Owners, Ryan Dimaria, Alexander Hull, Xikun Lu, Haopeng Wang, Jiacheng Hou, Danning Zhao May 2019

Worcester Chamber Of Commerce: Recruiting Minority Business Owners, Ryan Dimaria, Alexander Hull, Xikun Lu, Haopeng Wang, Jiacheng Hou, Danning Zhao

School of Professional Studies

Our capstone project was to help the Worcester Regional Chamber of Commerce identify how to re-frame their marketing so it would be appealing to immigrant and minority owned businesses. Based on interviews and external research, our group was able to create a tangible and resourceful data set that provided justified recommendations and ideas on how the Chamber could make adjustments to their marketing plan to attract more businesses of this particular demographic in the city of Worcester. By implementing these recommendations, we believe the Chamber has the opportunity to create a more diverse group of Chamber members, add value to …


Culture And Code: The Evolution Of Digital Architecture And The Formation Of Networked Publics, Geoffrey Gimse May 2019

Culture And Code: The Evolution Of Digital Architecture And The Formation Of Networked Publics, Geoffrey Gimse

Theses and Dissertations

Culture and Code traces the construction of the modern idea of the Internet and offers a potential glimpse of how that idea may change in the near future. Developed through a theoretical framework that links Sheila Jasanoff and Sang-Hyun Kim’s theory of the sociotechnical imaginary to broader theories on publics and counterpublics, Culture and Code offers a way to reframe the evolution of Internet technology and its culture as an enmeshed part of larger socio-political shifts within society. In traveling the history of the modern Internet as detailed in its technical documentation, legal documents, user created content, and popular media …


Commonsense Knowledge In Sentiment Analysis Of Ordinance Reactions For Smart Governance, Manish Puri May 2019

Commonsense Knowledge In Sentiment Analysis Of Ordinance Reactions For Smart Governance, Manish Puri

Theses, Dissertations and Culminating Projects

Smart Governance is an emerging research area which has attracted scientific as well as policy interests, and aims to improve collaboration between government and citizens, as well as other stakeholders. Our project aims to enable lawmakers to incorporate data driven decision making in enacting ordinances. Our first objective is to create a mechanism for mapping ordinances (local laws) and tweets to Smart City Characteristics (SCC). The use of SCC has allowed us to create a mapping between a huge number of ordinances and tweets, and the use of Commonsense Knowledge (CSK) has allowed us to utilize human judgment in mapping. …


Federal, State And Local Law Enforcement Agency Interoperability Capabilities And Cyber Vulnerabilities, Tyrone Trapnell May 2019

Federal, State And Local Law Enforcement Agency Interoperability Capabilities And Cyber Vulnerabilities, Tyrone Trapnell

Electronic Theses and Dissertations

The National Data Exchange (N-DEx) System is the central informational hub located at the Federal Bureau of Investigation (FBI). Its purpose is to provide network subscriptions to all Federal, state and local level law enforcement agencies while increasing information collaboration across all domains. The National Data Exchange users must satisfy the Advanced Permission Requirements, confirming the terms of N-DEx information use, and the Verification Requirement (verifying the completeness, timeliness, accuracy, and relevancy of N-DEx information) through coordination with the record-owning agency (Management, 2018). A network infection model is proposed to simulate the spread impact of various cyber-attacks within Federal, state …


Design Of Artificial Swarms Using Network Motifs: A Simulation Study, Khoinguyen Trinh May 2019

Design Of Artificial Swarms Using Network Motifs: A Simulation Study, Khoinguyen Trinh

Mechanical Engineering Undergraduate Honors Theses

The objective of this research is to develop a new approach in engineering complex swarm systems with desired characteristics based on the theory of network motifs – subgraphs that repeat themselves (patterns) among various networks. System engineering has traditionally followed a top-down methodology which creates a framework for the system and adds additional features to meet specific design requirements. Meanwhile, complex swarm systems, such as ant colonies and bird flocks, are formed via a bottom-up manner where the system-level structure directly emerges from the interactions and behaviors among individuals. The behaviors of these individuals cannot be directly controlled, which makes …


Applications Of Fog Computing In Video Streaming, Kyle Smith May 2019

Applications Of Fog Computing In Video Streaming, Kyle Smith

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this paper is to show the viability of fog computing in the area of video streaming in vehicles. With the rise of autonomous vehicles, there needs to be a viable entertainment option for users. The cloud fails to address these options due to latency problems experienced during high internet traffic. To improve video streaming speeds, fog computing seems to be the best option. Fog computing brings the cloud closer to the user through the use of intermediary devices known as fog nodes. It does not attempt to replace the cloud but improve the cloud by allowing faster …