How The National Library Of Medicine Can Add Evidence To Your Mhealth App, 2017 University of Massachusetts Medical School
How The National Library Of Medicine Can Add Evidence To Your Mhealth App, Susan Halpin, Sherry Pagoto
National Network of Libraries of Medicine New England Region (NNLM NER) Repository
Numerous systematic reviews of health-related mobile apps reveal they lack evidence based content. A major challenge to including evidence based content in apps is how to efficiently find accurate, credible, and vetted content. The National Library of Medicine houses the largest biomedical library in the world and provides numerous expert-developed online resources on disease and health education. In this webinar, Susan Halpin of the National Library of Medicine will introduce attendees to those resources, give examples of how they can and have been used in mobile apps, and discuss funding opportunities offered by the NLM.
2fly With Rpi - Evaluating The Raspberry Pi For Glass Cockpit Applications, 2017 Southern Illinois University Carbondale
2fly With Rpi - Evaluating The Raspberry Pi For Glass Cockpit Applications, Donald R. Morris
ASA Multidisciplinary Research Symposium
Evaluating the capabilities of Raspberry Pi computers to be used in embedded glass cockpit applications for experimental aircraft. This includes details of what is required for these applications as well as how well the Raspberry Pi 3B can perform in this role.
Priority Based Dynamic Resource Allocation In Cloud Computing, 2017 North Maharashtra University
Priority Based Dynamic Resource Allocation In Cloud Computing, Chandrashekhar Pawar
In Search Of Homo Sociologicus, 2017 The Graduate Center, City University of New York
In Search Of Homo Sociologicus, Yunqi Xue
All Graduate Works by Year: Dissertations, Theses, and Capstone Projects
The subject of this dissertation is to build an epistemic logic system that is able to show the spreading of knowledge and beliefs in a social network that contains multiple subgroups. Epistemic logic is the study of logical systems that express mathematical properties of knowledge and belief. In recent years, there have been increasing number of new epistemic logic systems that are focused on community properties such as knowledge and belief adoption among friends.
We are interested in revisable and actionable social knowledge/belief that leads to a large group action. Instead of centralized coordination, bottom-up approach is our focus ...
Natural Language Processing Based Generator Of Testing Instruments, 2017 California State University, San Bernardino
Natural Language Processing Based Generator Of Testing Instruments, Qianqian Wang
Electronic Theses, Projects, and Dissertations
Natural Language Processing (NLP) is the field of study that focuses on the interactions between human language and computers. By “natural language” we mean a language that is used for everyday communication by humans. Different from programming languages, natural languages are hard to be defined with accurate rules. NLP is developing rapidly and it has been widely used in different industries. Technologies based on NLP are becoming increasingly widespread, for example, Siri or Alexa are intelligent personal assistants using NLP build in an algorithm to communicate with people. “Natural Language Processing Based Generator of Testing Instruments” is a stand-alone program ...
The Tax Treatment Of Tokens: What Does It Betoken?, 2017 University of Pennsylvania Law School
The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow
Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.
Compiler And Runtime Optimization Techniques For Implementation Scalable Parallel Applications, 2017 Louisiana State University and Agricultural and Mechanical College
Compiler And Runtime Optimization Techniques For Implementation Scalable Parallel Applications, Zahra Khatami
LSU Doctoral Dissertations
The compiler is able to detect the data dependencies in an application and is able to analyze the specific sections of code for parallelization potential. However, all of these techniques provided by a compiler are usually applied at compile time, so they rely on static analysis, which is insufficient for achieving maximum parallelism and desired application scalability. These compiler techniques should consider both the static information gathered at compile time and dynamic analysis captured at runtime about the system to generate a safe parallel application. On the other hand, runtime information is often speculative. Solely relying on it doesn't ...
Computer-Aided Detection Of Pathologically Enlarged Lymph Nodes On Non-Contrast Ct In Cervical Cancer Patients For Low-Resource Settings, 2017 The University of Texas MD Anderson Cancer Center UTHealth Graduate School of Biomedical Sciences
Computer-Aided Detection Of Pathologically Enlarged Lymph Nodes On Non-Contrast Ct In Cervical Cancer Patients For Low-Resource Settings, Brian M. Anderson, Laurence E. Court, Ann Klopp, Stephen F. Kry, Jennifer Johnson, Erik Cressman, Arvind Rao, Jinzhong Yang
UT GSBS Dissertations and Theses (Open Access)
The mortality rate of cervical cancer is approximately 266,000 people each year, and 70% of the burden occurs in Low- and Middle- Income Countries (LMICs). Radiation therapy is the primary modality for treatment of locally advanced cervical cancer cases. In the absence of high quality diagnostic imaging needed to identify nodal metastasis, many LMIC sites treat standard pelvic fields, failing to include node metastasis outside of the field and/or to boost lymph nodes in the abdomen and pelvis. The first goal of this project was to create a program which automatically identifies positive cervical cancer lymph nodes on ...
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., 2017 University of Louisville
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Electronic Theses and Dissertations
While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race ...
Hyper-Connectivity: Intricacies Of National And International Cyber Securities (Part 1), 2017 University of Missouri - St Louis
Hyper-Connectivity: Intricacies Of National And International Cyber Securities (Part 1), Maurice Dawson
Prediction Of Graduation Delay Based On Student Characterisitics And Performance, 2017 University of New Mexico - Main Campus
Prediction Of Graduation Delay Based On Student Characterisitics And Performance, Tushar Ojha
Electrical and Computer Engineering ETDs
A college student's success depends on many factors including pre-university characteristics and university student support services. Student graduation rates are often used as an objective metric to measure institutional effectiveness. This work studies the impact of such factors on graduation rates, with a particular focus on delay in graduation. In this work, we used feature selection methods to identify a subset of the pre-institutional features with the highest discriminative power. In particular, Forward Selection with Linear Regression, Backward Elimination with Linear Regression, and Lasso Regression were applied. The feature sets were selected in a multivariate fashion. High school GPA ...
Large-Scale Flexible Membrane For Automatic Strain Monitoring Of Transportation Infrastructure, 2017 Iowa State University
Large-Scale Flexible Membrane For Automatic Strain Monitoring Of Transportation Infrastructure, Simon Laflamme, Venkata D. Kolipara, Hussam S. Saleem, Randall L. Geiger
Structural Health Monitoring (SHM) of transportation infrastructures is a complex task, typically conducted by visual inspection due to the technical and economical constrains of existing health monitoring technologies. It results that health monitoring is highly dependent on scheduling and on the judgment of the inspectors, which can be costly and ineffective. Thus, it is fundamental to automate the SHM process to allow timely inspection, maintenance, and management of transportation infrastructure. The authors propose a flexible membrane that can be deployed over large surfaces, at low cost, for automatic and continuous monitoring of strains. The membrane, termed sensing skin, is constituted ...
One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, 2017 Dublin Institute of Technology
One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge Professor
In this paper, we examine the design and application of a one-time pad encryption system for protecting data stored in the Cloud. Personalising security using a one-time pad generator at the client-end protects data from break-ins, side-channel attacks and backdoors in public encryption algorithms. The one-time pad binary sequences were obtained from modified analogue chaos oscillators initiated by noise and encoded client data locally. Specific ``one-to-Cloud'' storage applications returned control back to the end user but without the key distribution problem normally associated with one-time pad encryption. Development of the prototype was aided by ``Virtual Prototyping'' in the latest version ...
The Engineering Admissions Partnership Program: A Navigation Strategy For Community College Students Seeking A Pathway Into Engineering, Marcia R. Laugerman, Mack C. Shelley, Steven K. Mickelson, Diane T. Rover
This paper presents the evaluation of a program designed to improve transfer outcomes for community college students pursuing an engineering degree. The program, the Engineering Admissions Partnership Program (E-APP), was designed to improve the navigational success of community college transfer students through connections to the university. These connections include coordinated academic advising, peer-mentoring, campus visits, and online social and professional networks. The objective of the study is to determine the efficacy of the E-APP and its interventions, which will be measured by increased participation rates and increased university retention rates for E-APP participants. Outcome data for the students are analyzed ...
Daily Dose, 2017 California Polytechnic State University, San Luis Obispo
Daily Dose, Ken H. Yasui, Joey M. Angeja
The project goal is to develop a medication and vitamin management device that will sort and dispense pre-configured amounts of pills at designated times . The main clientele of this device is the elderly community with a secondary client base of the general public. The entire system is designed from scratch, powered by US standard line voltage. The main functionalities of the device are the ability to store multiple types of pills and the ability to accurately handle user input and data transfer. The two engineering specifications that were not met included the desired pill pick up rate and dimensions of ...
Underwater Computer Vision - Fish Recognition, 2017 California Polytechnic State University, San Luis Obispo
Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto
The Underwater Computer Vision – Fish Recognition project includes the design and implementation of a device that can withstand staying underwater for a duration of time, take pictures of underwater creatures, such as fish, and be able to identify certain fish. The system is meant to be cheap to create, yet still able to process the images it takes and identify the objects in the pictures with some accuracy. The device can output its results to another device or an end user.
Sublimesurf, 2017 California Polytechnic State University, San Luis Obispo
Sublimesurf, Nathan Sfard, Karis Russell
Surf conditions change rapidly day to day and location to location, which forces modern day surfers to utilize online forecasts and obtain a detailed knowledge of the places they want to surf. To ease this pain, we are developing SublimeSurf, an iOS application that will keep track of the current surf conditions and allow users to rate aspects of the surf. We plan to use this rating data in combination with surf forecast data available online to notify a user when conditions look favorable, based on their previous ratings. We also intend to mine the data submitted by all users ...
Slither.Io Deep Learning Bot, 2017 California Polytechnic State University, San Luis Obispo
Slither.Io Deep Learning Bot, James Caudill
Recent advances in deep learning and computer vision techniques and algorithms have inspired me to create a model application. The game environment used is Slither.io. The system has no previous understanding of the game and is able to learn its surroundings through feature detection and deep learning. Contrary to other agents, my bot is able to dynamically learn and react to its environment. It operates extremely well in early game, with little enemy encounters. It has difficulty transitioning to middle and late game due to limited training time. I will continue to develop this algorithm.
Multispectral Identification Array, 2017 California Polytechnic State University, San Luis Obispo
Multispectral Identification Array, Zachary D. Eagan
The Multispectral Identification Array is a device for taking full image spectroscopy data via the illumination of a subject with sixty-four unique spectra. The array combines images under the illumination spectra to produce an approximate reflectance graph for every pixel in a scene. Acquisition of an entire spectrum allows the array to differentiate objects based on surface material. Spectral graphs produced are highly approximate and should not be used to determine material properties, however the output is sufficiently consistent to allow differentiation and identification of previously sampled subjects. While not sufficiently advanced for use as a replacement to spectroscopy the ...
Cpu Db Data Visualization, 2017 California Polytechnic State University, San Luis Obispo
Cpu Db Data Visualization, Ruchita Patel, Marek Moreno
Given the CPU database from Stanford, we wanted to create something that portrayed the data in a more visually pleasing way. The CPU database website wanted a web page that would allow users to create graphs based on the processor data from the database. The web page would allow users to select different data from the database and create the graphs they wanted to gain insight into the decades of processor data.