Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of South Florida (5)
- University of Nebraska - Lincoln (2)
- California Polytechnic State University, San Luis Obispo (1)
- Chapman University (1)
- City University of New York (CUNY) (1)
-
- Liberty University (1)
- Old Dominion University (1)
- SelectedWorks (1)
- Technological University Dublin (1)
- University of Connecticut (1)
- University of Denver (1)
- University of New Orleans (1)
- University of Pennsylvania Carey Law School (1)
- University of Texas at El Paso (1)
- University of Vermont (1)
- WellBeing International (1)
- Keyword
-
- Cybersecurity (4)
- Neural Networks (2)
- Psychology (2)
- Robotics (2)
- AI (1)
-
- Abstraction (1)
- Active Categorical Perception (1)
- Addictive (1)
- Aesthetics (1)
- Affective Computing (1)
- Animal consciousness (1)
- Animal suffering (1)
- Annotation (1)
- Artificial Intelligence (1)
- Artificial Intelligence (AI) (1)
- Artificial Intelligence and Cognitive Theory (1)
- Authentication (1)
- BLAKE (1)
- Battleverse (1)
- Benefits of AI (1)
- Bias in AI Systems (1)
- Binocular combination (1)
- Biomanufacturing (1)
- Bootstrap (1)
- Brain (1)
- CSS3 (1)
- Canonical theory (1)
- Cell Therapy (1)
- China (1)
- Chomsky (1)
- Publication Year
- Publication
-
- Military Cyber Affairs (5)
- All Faculty Scholarship (1)
- Animal Sentience (1)
- College of Education and Human Sciences: Dissertations, Theses, and Student Research (1)
- Computer Science and Software Engineering (1)
-
- Conference papers (1)
- Electronic Theses and Dissertations (1)
- Engineering Faculty Articles and Research (1)
- Graduate College Dissertations and Theses (1)
- Honors Scholar Theses (1)
- Jozsef A Toth Ph.D. (1)
- Library Philosophy and Practice (e-journal) (1)
- Open Access Theses & Dissertations (1)
- Psychology Theses & Dissertations (1)
- Publications and Research (1)
- Senior Honors Theses (1)
- University of New Orleans Theses and Dissertations (1)
- Publication Type
Articles 1 - 21 of 21
Full-Text Articles in Cognitive Psychology
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Military Cyber Affairs
Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Military Cyber Affairs
No abstract provided.
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Military Cyber Affairs
No abstract provided.
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Reference Frames In Human Sensory, Motor, And Cognitive Processing, Dongcheng He
Reference Frames In Human Sensory, Motor, And Cognitive Processing, Dongcheng He
Electronic Theses and Dissertations
Reference-frames, or coordinate systems, are used to express properties and relationships of objects in the environment. While the use of reference-frames is well understood in physical sciences, how the brain uses reference-frames remains a fundamental question. The goal of this dissertation is to reach a better understanding of reference-frames in human perceptual, motor, and cognitive processing. In the first project, we study reference-frames in perception and develop a model to explain the transition from egocentric (based on the observer) to exocentric (based outside the observer) reference-frames to account for the perception of relative motion. In a second project, we focus …
Manipulating Image Luminance To Improve Eye Gaze And Verbal Behavior In Autistic Children, Louanne Boyd, Vincent Berardi, Deanna Hughes, Franceli L. Cibrian, Jazette Johnson, Viseth Sean, Eliza Delpizzo-Cheng, Brandon Mackin, Ayra Tusneem, Riya Mody, Sara Jones, Karen Lotich
Manipulating Image Luminance To Improve Eye Gaze And Verbal Behavior In Autistic Children, Louanne Boyd, Vincent Berardi, Deanna Hughes, Franceli L. Cibrian, Jazette Johnson, Viseth Sean, Eliza Delpizzo-Cheng, Brandon Mackin, Ayra Tusneem, Riya Mody, Sara Jones, Karen Lotich
Engineering Faculty Articles and Research
Autism has been characterized by a tendency to attend to the local visual details over surveying an image to understand the gist–a phenomenon called local interference. This sensory processing trait has been found to negatively impact social communication. Although much work has been conducted to understand these traits, little to no work has been conducted to intervene to provide support for local interference. Additionally, recent understanding of autism now introduces the core role of sensory processing and its impact on social communication. However, no interventions to the end of our knowledge have been explored to leverage this relationship. This work …
Addressing Security And Privacy Issues By Analyzing Vulnerabilities In Iot Applications, Francsico Javier Candelario Burgoa
Addressing Security And Privacy Issues By Analyzing Vulnerabilities In Iot Applications, Francsico Javier Candelario Burgoa
Open Access Theses & Dissertations
The Internet of Things (IoT) environment has been expanding rapidly for the past few years into several areas of our lives, from factories, to stores and even into our own homes. All these new devices in our homes make our day-to-day lives easier and more comfortable with less effort on our part, converting our simple houses into smart homes. This increase in inter-connectivity brings multiple benefits including the improvement in energy efficiency in our homes, however it also brings with it some potential dangers since more points of connection mean more potential vulnerabilities in our grid. These vulnerabilities bring security …
What Is The Relationship Between Language And Thought?: Linguistic Relativity And Its Implications For Copyright, Christopher S. Yoo
What Is The Relationship Between Language And Thought?: Linguistic Relativity And Its Implications For Copyright, Christopher S. Yoo
All Faculty Scholarship
To date, copyright scholarship has almost completely overlooked the linguistics and cognitive psychology literature exploring the connection between language and thought. An exploration of the two major strains of this literature, known as universal grammar (associated with Noam Chomsky) and linguistic relativity (centered around the Sapir-Whorf hypothesis), offers insights into the copyrightability of constructed languages and of the type of software packages at issue in Google v. Oracle recently decided by the Supreme Court. It turns to modularity theory as the key idea unifying the analysis of both languages and software in ways that suggest that the information filtering associated …
Authentication Schemes' Impact On Working Memory, Janine D. Mator
Authentication Schemes' Impact On Working Memory, Janine D. Mator
Psychology Theses & Dissertations
Authentication is the process by which a computing system validates a user’s identity. Although this process is necessary for system security, users view authentication as a frequent disruption to their primary tasks. During this disruption, primary task information must be actively maintained in working memory. As a result, primary task information stored in working memory is at risk of being lost or corrupted while users authenticate. For over two decades, researchers have focused on developing more memorable passwords by replacing alphanumeric text with visual graphics (Biddle et al., 2012). However, very little attention has been given to the impact authentication …
How To Create And Maintain An Effective Information Architecture And Navigation System For Science Gateway Websites, Noreen Y. Whysel, Omni Marketing Interactive
How To Create And Maintain An Effective Information Architecture And Navigation System For Science Gateway Websites, Noreen Y. Whysel, Omni Marketing Interactive
Publications and Research
Whether you have an existing Science Gateway website or are creating your first one, this hands-on tutorial will show you, step by step, how to create and update gateway websites so that their content is easier to find and easier to use.
As a Science Gateway provides its web-based tools and resources, it is essential that these sites utilize specific usability tests and other research methods to ensure positive and productive experiences with the sites. Successful information architecture (IA), intuitive site navigation, and clear user interfaces (UIs) all rely on knowing where various users expect to find needed information.
Since …
Insulting Words: "They Are Animals!", Carolyn A. Ristau
Insulting Words: "They Are Animals!", Carolyn A. Ristau
Animal Sentience
As Chapman & Huffman state, creating divisive human categories has rationalized atrocities committed against the “other.” Labeling neighboring warring villagers as “animals” is considered a despicable insult. Yet contemporary scientific views of many animals grant them thinking and conscious faculties, and the capacity for impressive achievements, many unattainable by humans. Robots, too, can accomplish many similar feats. But the essential reason we must protect animals is not because of their admirable abilities, but their capacity for consciousness, for suffering. Robots are not conscious. Participants in the human-animal debate should not complain about changing criteria for determining human uniqueness. New and …
A Survey Of Addictive Software Design, Chauncey J. Neyman
A Survey Of Addictive Software Design, Chauncey J. Neyman
Computer Science and Software Engineering
The average smartphone owner checks their phone more than 150 times per day. As of 2015, 62% of smartphone users had used their phone to look up information about a health condition, while 57% had used their phone to do online banking. Mobile platforms have become the dominant medium of human-computer interaction. So how have these devices established themselves as our go to connection to the Internet? The answer lies in addictive design. Software designers have become well versed in creating software that captivates us at a primal level. In this article, we survey addictive software design strategies, their bases …
Spice: A Software Tool For Studying End-User’S Insecure Cyber Behavior And Personality-Traits, Anjila Tamrakar
Spice: A Software Tool For Studying End-User’S Insecure Cyber Behavior And Personality-Traits, Anjila Tamrakar
University of New Orleans Theses and Dissertations
Insecure cyber behavior of end users may expose their computers to cyber-attack. A first step to improve their cyber behavior is to identify their tendency toward insecure cyber behavior. Unfortunately, not much work has been done in this area. In particular, the relationship between end users cyber behavior and their personality traits is much less explored. This paper presents a comprehensive review of a newly developed, easily configurable, and flexible software SPICE for psychologist and cognitive scientists to study personality traits and insecure cyber behavior of end users. The software utilizes well-established cognitive methods (such as dot-probe) to identify number …
Successful Female Students In Undergraduate Computer Science And Computer Engineering: Motivation, Self-Regulation, And Qualitative Characteristics, Melissa Patterson Hazley
Successful Female Students In Undergraduate Computer Science And Computer Engineering: Motivation, Self-Regulation, And Qualitative Characteristics, Melissa Patterson Hazley
College of Education and Human Sciences: Dissertations, Theses, and Student Research
Computer Science (CS) and Computer Engineering (CE) fields typically have not been successful at recruiting or retaining women students. Research indicates several reasons for this shortage but mainly from three perspectives: social issues, exposure/prior knowledge and curriculum issues in K-12 settings. This mixed-methods research addresses a gap in the literature by investigating the motivation and self-regulation behaviors of successful female students who are studying computer science and computer engineering. The findings in phase one of this study indicated that learning and performance approach goals predicted adaptive strategic self-regulation behaviors including strategy use, knowledge building and engagement. Learning avoidance goals predicted …
“My Logic Is Undeniable”: Replicating The Brain For Ideal Artificial Intelligence, Samuel C. Adams
“My Logic Is Undeniable”: Replicating The Brain For Ideal Artificial Intelligence, Samuel C. Adams
Senior Honors Theses
Alan Turing asked if machines can think, but intelligence is more than logic and reason. I ask if a machine can feel pain or joy, have visions and dreams, or paint a masterpiece. The human brain sets the bar high, and despite our progress, artificial intelligence has a long way to go. Studying neurology from a software engineer’s perspective reveals numerous uncanny similarities between the functionality of the brain and that of a computer. If the brain is a biological computer, then it is the embodiment of artificial intelligence beyond anything we have yet achieved, and its architecture is advanced …
The Role Of Uncertainty In Categorical Perception Utilizing Statistical Learning In Robots, Nathaniel V. Powell
The Role Of Uncertainty In Categorical Perception Utilizing Statistical Learning In Robots, Nathaniel V. Powell
Graduate College Dissertations and Theses
At the heart of statistical learning lies the concept of uncertainty.
Similarly, embodied agents such as robots
and animals must likewise address uncertainty, as sensation
is always only a partial reflection of reality. This
thesis addresses the role that uncertainty can play in
a central building block of intelligence: categorization.
Cognitive agents are able to perform tasks like categorical perception
through physical interaction (active categorical perception; ACP),
or passively at a distance (distal categorical perception; DCP).
It is possible that the former scaffolds the learning of
the latter. However, it is unclear whether DCP indeed scaffolds
ACP in humans and …
Design, Programming, And User-Experience, Kaila G. Manca
Design, Programming, And User-Experience, Kaila G. Manca
Honors Scholar Theses
This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.
I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.
The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …
Emotional Speech Corpus Construction, Annotation And Distribution, Brian Vaughan, Charlie Cullen, Spyros Kousidis, John Mcauley
Emotional Speech Corpus Construction, Annotation And Distribution, Brian Vaughan, Charlie Cullen, Spyros Kousidis, John Mcauley
Conference papers
This paper details a process of creating an emotional speech corpus by collecting natural emotional speech assets, analysisng and tagging them (for certain acoustic and linguistic features) and annotating them within an on-line database. The definition of specific metadata for use with an emotional speech corpus is crucial, in that poorly (or inaccurately) annotated assets are of little use in analysis. This problem is compounded by the lack of standardisation for speech corpora, particularly in relation to emotion content. The ISLE Metadata Initiative (IMDI) is the only cohesive attempt at corpus metadata standardisation performed thus far. Although not a comprehensive …
Book Review: Reasoning Agents In A Dynamic World: The Frame Problem. Kenneth M. Ford And Patrick J. Hayes, Eds.,, Jozsef A. Toth
Book Review: Reasoning Agents In A Dynamic World: The Frame Problem. Kenneth M. Ford And Patrick J. Hayes, Eds.,, Jozsef A. Toth
Jozsef A Toth Ph.D.
No abstract provided.