Matching Items (6)
Filtering by

Clear all filters

150382-Thumbnail Image.png
Description
This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate

This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate between each two users. The whole trust checking process is divided into two steps: local checking and remote checking. Local checking directly contacts the email server to calculate the trust rate based on user's own email communication history. Remote checking is a distributed computing process to get help from user's social network friends and built the trust rate together. The email-based trust model is built upon a cloud computing framework called MobiCloud. Inside MobiCloud, each user occupies a virtual machine which can directly communicate with others. Based on this feature, the distributed trust model is implemented as a combination of local analysis and remote analysis in the cloud. Experiment results show that the trust evaluation model can give accurate trust rate even in a small scale social network which does not have lots of social connections. With this trust model, the security in both social network services and email communication could be improved.
ContributorsZhong, Yunji (Author) / Huang, Dijiang (Thesis advisor) / Dasgupta, Partha (Committee member) / Syrotiuk, Violet (Committee member) / Arizona State University (Publisher)
Created2011
136409-Thumbnail Image.png
Description
Twitter, the microblogging platform, has grown in prominence to the point that the topics that trend on the network are often the subject of the news and other traditional media. By predicting trends on Twitter, it could be possible to predict the next major topic of interest to the public.

Twitter, the microblogging platform, has grown in prominence to the point that the topics that trend on the network are often the subject of the news and other traditional media. By predicting trends on Twitter, it could be possible to predict the next major topic of interest to the public. With this motivation, this paper develops a model for trends leveraging previous work with k-nearest-neighbors and dynamic time warping. The development of this model provides insight into the length and features of trends, and successfully generalizes to identify 74.3% of trends in the time period of interest. The model developed in this work provides understanding into why par- ticular words trend on Twitter.
ContributorsMarshall, Grant A (Author) / Liu, Huan (Thesis director) / Morstatter, Fred (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2015-05
134809-Thumbnail Image.png
Description
Social media has become a direct and effective means of transmitting personal opinions into the cyberspace. The use of certain key-words and their connotations in tweets portray a meaning that goes beyond the screen and affects behavior. During terror attacks or worldwide crises, people turn to social media as a

Social media has become a direct and effective means of transmitting personal opinions into the cyberspace. The use of certain key-words and their connotations in tweets portray a meaning that goes beyond the screen and affects behavior. During terror attacks or worldwide crises, people turn to social media as a means of managing their anxiety, a mechanism of Terror Management Theory (TMT). These opinions have distinct impacts on the emotions that people express both online and offline through both positive and negative sentiments. This paper focuses on using sentiment analysis on twitter hash-tags during five major terrorist attacks that created a significant response on social media, which collectively show the effects that 140-character tweets have on perceptions in social media. The purpose of analyzing the sentiments of tweets after terror attacks allows for the visualization of the effect of key-words and the possibility of manipulation by the use of emotional contagion. Through sentiment analysis, positive, negative and neutral emotions were portrayed in the tweets. The keywords detected also portray characteristics about terror attacks which would allow for future analysis and predictions in regards to propagating a specific emotion on social media during future crisis.
ContributorsHarikumar, Swathikrishna (Author) / Davulcu, Hasan (Thesis director) / Bodford, Jessica (Committee member) / Computer Science and Engineering Program (Contributor) / Department of Information Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
132669-Thumbnail Image.png
Description
If you’ve ever found yourself uttering the words “Honey, I forgot the—” or “how did I miss the—" when coming home from the grocery store, then you’re not alone. This everyday problem that we disregard as part of life may not seem like much, but it is the driving force

If you’ve ever found yourself uttering the words “Honey, I forgot the—” or “how did I miss the—" when coming home from the grocery store, then you’re not alone. This everyday problem that we disregard as part of life may not seem like much, but it is the driving force behind my honors thesis.
Shopping Buddy is a complete Amazon Web Services solution to this problem which is so innate to the human condition. Utilizing Alexa to keep track of your pantry, this web application automates the daunting task of creating your shopping list, putting the power of the cloud at your fingertips while keeping your complete shopping list only a click away.
Say goodbye to the nights of spaghetti without the parmesan that you left on the store shelf or the strawberries that you forgot for the strawberry shortcake. With this application, you will no longer need to rely on your memory of what you think is in the back of your fridge nor that pesky shopping list that you always end up losing when you need it the most. Accessible from any web enabled device, Shopping Buddy has got your back through all your shopping adventures to come.
ContributorsMathews, Nicolle (Author) / Meuth, Ryan (Thesis director) / Chen, Yinong (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
Description
This work focuses on combining multiple different technologies to produce a scalable, full-stack music generation and sharing application meant to be deployed to a cloud environment while keeping operating costs as low as possible. The key feature of this app is that it allows users to generate tracks from scratch

This work focuses on combining multiple different technologies to produce a scalable, full-stack music generation and sharing application meant to be deployed to a cloud environment while keeping operating costs as low as possible. The key feature of this app is that it allows users to generate tracks from scratch by providing a text description, or customize existing tracks by supplying both an audio file and a track description. Users will be able to share these tracks with other users, via this app, so that they can collaborate with others and jumpstart their creative process, allowing creators to produce more content for their fans. A web app was developed; Contak. This application requires a database, REST API, object storage, music generation artificial intelligence models, and a web application (GUI) to interact with the user. In order to define the best music generation model, a small exploratory study was conducted to compare the quality of different music generation models, including MusicGen, MusicLM, and Riffusion. Results found that the MusicGen model, selected for this work, outperformed the competing models: MusicLM and Riffusion. This exploratory study includes rankings of the three models based on how well each one adhered to a text description of a track. The purpose was to test the hypothesis that MusicGen produces higher quality music that adheres to text descriptions better than other models because it encodes audio at a higher bit rate (32 kHz). While the web app generates high quality tracks with above average text adherence, the main limitation of this work is the response time needed to generate tracks from existing audio using the currently available backend infrastructure, as this can take up to 7 minutes to complete. In the future, this app can be deployed to a cloud environment with GPU acceleration to improve response times and throughput. Additionally, new methods of input besides text and audio input can be implemented using MIDI instructions and the Magenta music model, providing increased track generation precision for advanced music creators with MIDI experience.
ContributorsZamora, Michael (Author) / Chavez Echeagaray, Maria (Thesis director) / Prim, Tadi (Committee member) / Day, Kimberly (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2023-12
Description
Nations censor specific information in accordance with their political, legal, and cultural standards. Each country adopts unique approaches and regulations for censorship, whether it involves moderating online content or prohibiting protests. This paper seeks to study the underlying motivations for the disparate behaviors exhibited by authorities and individuals. To achieve

Nations censor specific information in accordance with their political, legal, and cultural standards. Each country adopts unique approaches and regulations for censorship, whether it involves moderating online content or prohibiting protests. This paper seeks to study the underlying motivations for the disparate behaviors exhibited by authorities and individuals. To achieve this, we develop a mathematical model designed to understand the dynamics between authority figures and individuals, analyzing their behaviors under various conditions. We argue that individuals essentially act in three phases - compliance, self-censoring, and defiance when faced with different situations under their own desires and the authority's parameters. We substantiate our findings by conducting different simulations on the model and visualizing the outcomes. Through these simulations, we realize why individuals exhibit behaviors falling into one of three categories, who are influenced by factors such as the level of surveillance imposed by the authority, the severity of punishments, the tolerance for dissent, or the individuals' boldness. This also helped us to understand why certain populations in a country exhibit defiance, self-censoring behavior, or compliance as they interact with each other and behave under specific conditions within a small network world.
ContributorsNahar, Anish Ashish (Author) / Daymude, Joshua (Thesis director) / Forrest, Stephanie (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2024-05