Open Access. Powered by Scholars. Published by Universities.®

Cognitive Psychology Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 21 of 21

Full-Text Articles in Cognitive Psychology

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum May 2023

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman May 2023

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane May 2023

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Reference Frames In Human Sensory, Motor, And Cognitive Processing, Dongcheng He Mar 2023

Reference Frames In Human Sensory, Motor, And Cognitive Processing, Dongcheng He

Electronic Theses and Dissertations

Reference-frames, or coordinate systems, are used to express properties and relationships of objects in the environment. While the use of reference-frames is well understood in physical sciences, how the brain uses reference-frames remains a fundamental question. The goal of this dissertation is to reach a better understanding of reference-frames in human perceptual, motor, and cognitive processing. In the first project, we study reference-frames in perception and develop a model to explain the transition from egocentric (based on the observer) to exocentric (based outside the observer) reference-frames to account for the perception of relative motion. In a second project, we focus …


Manipulating Image Luminance To Improve Eye Gaze And Verbal Behavior In Autistic Children, Louanne Boyd, Vincent Berardi, Deanna Hughes, Franceli L. Cibrian, Jazette Johnson, Viseth Sean, Eliza Delpizzo-Cheng, Brandon Mackin, Ayra Tusneem, Riya Mody, Sara Jones, Karen Lotich Apr 2022

Manipulating Image Luminance To Improve Eye Gaze And Verbal Behavior In Autistic Children, Louanne Boyd, Vincent Berardi, Deanna Hughes, Franceli L. Cibrian, Jazette Johnson, Viseth Sean, Eliza Delpizzo-Cheng, Brandon Mackin, Ayra Tusneem, Riya Mody, Sara Jones, Karen Lotich

Engineering Faculty Articles and Research

Autism has been characterized by a tendency to attend to the local visual details over surveying an image to understand the gist–a phenomenon called local interference. This sensory processing trait has been found to negatively impact social communication. Although much work has been conducted to understand these traits, little to no work has been conducted to intervene to provide support for local interference. Additionally, recent understanding of autism now introduces the core role of sensory processing and its impact on social communication. However, no interventions to the end of our knowledge have been explored to leverage this relationship. This work …


Addressing Security And Privacy Issues By Analyzing Vulnerabilities In Iot Applications, Francsico Javier Candelario Burgoa Dec 2021

Addressing Security And Privacy Issues By Analyzing Vulnerabilities In Iot Applications, Francsico Javier Candelario Burgoa

Open Access Theses & Dissertations

The Internet of Things (IoT) environment has been expanding rapidly for the past few years into several areas of our lives, from factories, to stores and even into our own homes. All these new devices in our homes make our day-to-day lives easier and more comfortable with less effort on our part, converting our simple houses into smart homes. This increase in inter-connectivity brings multiple benefits including the improvement in energy efficiency in our homes, however it also brings with it some potential dangers since more points of connection mean more potential vulnerabilities in our grid. These vulnerabilities bring security …


What Is The Relationship Between Language And Thought?: Linguistic Relativity And Its Implications For Copyright, Christopher S. Yoo Sep 2021

What Is The Relationship Between Language And Thought?: Linguistic Relativity And Its Implications For Copyright, Christopher S. Yoo

All Faculty Scholarship

To date, copyright scholarship has almost completely overlooked the linguistics and cognitive psychology literature exploring the connection between language and thought. An exploration of the two major strains of this literature, known as universal grammar (associated with Noam Chomsky) and linguistic relativity (centered around the Sapir-Whorf hypothesis), offers insights into the copyrightability of constructed languages and of the type of software packages at issue in Google v. Oracle recently decided by the Supreme Court. It turns to modularity theory as the key idea unifying the analysis of both languages and software in ways that suggest that the information filtering associated …


Authentication Schemes' Impact On Working Memory, Janine D. Mator Apr 2021

Authentication Schemes' Impact On Working Memory, Janine D. Mator

Psychology Theses & Dissertations

Authentication is the process by which a computing system validates a user’s identity. Although this process is necessary for system security, users view authentication as a frequent disruption to their primary tasks. During this disruption, primary task information must be actively maintained in working memory. As a result, primary task information stored in working memory is at risk of being lost or corrupted while users authenticate. For over two decades, researchers have focused on developing more memorable passwords by replacing alphanumeric text with visual graphics (Biddle et al., 2012). However, very little attention has been given to the impact authentication …


How To Create And Maintain An Effective Information Architecture And Navigation System For Science Gateway Websites, Noreen Y. Whysel, Omni Marketing Interactive Oct 2019

How To Create And Maintain An Effective Information Architecture And Navigation System For Science Gateway Websites, Noreen Y. Whysel, Omni Marketing Interactive

Publications and Research

Whether you have an existing Science Gateway website or are creating your first one, this hands-on tutorial will show you, step by step, how to create and update gateway websites so that their content is easier to find and easier to use.

As a Science Gateway provides its web-based tools and resources, it is essential that these sites utilize specific usability tests and other research methods to ensure positive and productive experiences with the sites. Successful information architecture (IA), intuitive site navigation, and clear user interfaces (UIs) all rely on knowing where various users expect to find needed information.

Since …


Insulting Words: "They Are Animals!", Carolyn A. Ristau Jan 2018

Insulting Words: "They Are Animals!", Carolyn A. Ristau

Animal Sentience

As Chapman & Huffman state, creating divisive human categories has rationalized atrocities committed against the “other.” Labeling neighboring warring villagers as “animals” is considered a despicable insult. Yet contemporary scientific views of many animals grant them thinking and conscious faculties, and the capacity for impressive achievements, many unattainable by humans. Robots, too, can accomplish many similar feats. But the essential reason we must protect animals is not because of their admirable abilities, but their capacity for consciousness, for suffering. Robots are not conscious. Participants in the human-animal debate should not complain about changing criteria for determining human uniqueness. New and …


A Survey Of Addictive Software Design, Chauncey J. Neyman Jun 2017

A Survey Of Addictive Software Design, Chauncey J. Neyman

Computer Science and Software Engineering

The average smartphone owner checks their phone more than 150 times per day. As of 2015, 62% of smartphone users had used their phone to look up information about a health condition, while 57% had used their phone to do online banking. Mobile platforms have become the dominant medium of human-computer interaction. So how have these devices established themselves as our go to connection to the Internet? The answer lies in addictive design. Software designers have become well versed in creating software that captivates us at a primal level. In this article, we survey addictive software design strategies, their bases …


Spice: A Software Tool For Studying End-User’S Insecure Cyber Behavior And Personality-Traits, Anjila Tamrakar Aug 2016

Spice: A Software Tool For Studying End-User’S Insecure Cyber Behavior And Personality-Traits, Anjila Tamrakar

University of New Orleans Theses and Dissertations

Insecure cyber behavior of end users may expose their computers to cyber-attack. A first step to improve their cyber behavior is to identify their tendency toward insecure cyber behavior. Unfortunately, not much work has been done in this area. In particular, the relationship between end users cyber behavior and their personality traits is much less explored. This paper presents a comprehensive review of a newly developed, easily configurable, and flexible software SPICE for psychologist and cognitive scientists to study personality traits and insecure cyber behavior of end users. The software utilizes well-established cognitive methods (such as dot-probe) to identify number …


Successful Female Students In Undergraduate Computer Science And Computer Engineering: Motivation, Self-Regulation, And Qualitative Characteristics, Melissa Patterson Hazley Apr 2016

Successful Female Students In Undergraduate Computer Science And Computer Engineering: Motivation, Self-Regulation, And Qualitative Characteristics, Melissa Patterson Hazley

College of Education and Human Sciences: Dissertations, Theses, and Student Research

Computer Science (CS) and Computer Engineering (CE) fields typically have not been successful at recruiting or retaining women students. Research indicates several reasons for this shortage but mainly from three perspectives: social issues, exposure/prior knowledge and curriculum issues in K-12 settings. This mixed-methods research addresses a gap in the literature by investigating the motivation and self-regulation behaviors of successful female students who are studying computer science and computer engineering. The findings in phase one of this study indicated that learning and performance approach goals predicted adaptive strategic self-regulation behaviors including strategy use, knowledge building and engagement. Learning avoidance goals predicted …


“My Logic Is Undeniable”: Replicating The Brain For Ideal Artificial Intelligence, Samuel C. Adams Apr 2016

“My Logic Is Undeniable”: Replicating The Brain For Ideal Artificial Intelligence, Samuel C. Adams

Senior Honors Theses

Alan Turing asked if machines can think, but intelligence is more than logic and reason. I ask if a machine can feel pain or joy, have visions and dreams, or paint a masterpiece. The human brain sets the bar high, and despite our progress, artificial intelligence has a long way to go. Studying neurology from a software engineer’s perspective reveals numerous uncanny similarities between the functionality of the brain and that of a computer. If the brain is a biological computer, then it is the embodiment of artificial intelligence beyond anything we have yet achieved, and its architecture is advanced …


The Role Of Uncertainty In Categorical Perception Utilizing Statistical Learning In Robots, Nathaniel V. Powell Jan 2016

The Role Of Uncertainty In Categorical Perception Utilizing Statistical Learning In Robots, Nathaniel V. Powell

Graduate College Dissertations and Theses

At the heart of statistical learning lies the concept of uncertainty.

Similarly, embodied agents such as robots

and animals must likewise address uncertainty, as sensation

is always only a partial reflection of reality. This

thesis addresses the role that uncertainty can play in

a central building block of intelligence: categorization.

Cognitive agents are able to perform tasks like categorical perception

through physical interaction (active categorical perception; ACP),

or passively at a distance (distal categorical perception; DCP).

It is possible that the former scaffolds the learning of

the latter. However, it is unclear whether DCP indeed scaffolds

ACP in humans and …


Design, Programming, And User-Experience, Kaila G. Manca May 2015

Design, Programming, And User-Experience, Kaila G. Manca

Honors Scholar Theses

This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.

I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.

The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …


Emotional Speech Corpus Construction, Annotation And Distribution, Brian Vaughan, Charlie Cullen, Spyros Kousidis, John Mcauley May 2008

Emotional Speech Corpus Construction, Annotation And Distribution, Brian Vaughan, Charlie Cullen, Spyros Kousidis, John Mcauley

Conference papers

This paper details a process of creating an emotional speech corpus by collecting natural emotional speech assets, analysisng and tagging them (for certain acoustic and linguistic features) and annotating them within an on-line database. The definition of specific metadata for use with an emotional speech corpus is crucial, in that poorly (or inaccurately) annotated assets are of little use in analysis. This problem is compounded by the lack of standardisation for speech corpora, particularly in relation to emotion content. The ISLE Metadata Initiative (IMDI) is the only cohesive attempt at corpus metadata standardisation performed thus far. Although not a comprehensive …


Book Review: Reasoning Agents In A Dynamic World: The Frame Problem. Kenneth M. Ford And Patrick J. Hayes, Eds.,, Jozsef A. Toth Jan 1995

Book Review: Reasoning Agents In A Dynamic World: The Frame Problem. Kenneth M. Ford And Patrick J. Hayes, Eds.,, Jozsef A. Toth

Jozsef A Toth Ph.D.

No abstract provided.