Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

2022

Computer science

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 51

Full-Text Articles in Entire DC Network

Randomized Algorithms For Resource Allocation In Device To Device Communication., Subhankar Ghosal Dr. Dec 2022

Randomized Algorithms For Resource Allocation In Device To Device Communication., Subhankar Ghosal Dr.

Doctoral Theses

In device to device (D2D) communication, two users residing in close proximity can directly communicate between them, through a common channel, without the need of a base station. A pair of D2D users forms a link and a channel needs to be allocated to it. The interference relationship among the active links at time t is modelled as an interference graph g(t). To establish interference-free communication, we have to assign a channel vector C(t) and a power vector corresponding to the active links such that the required signal to interference plus noise ratio (SINR) is satisfied for each link. Since …


Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht Dec 2022

Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht

Theses/Capstones/Creative Projects

Algorithm run-time complexity analysis is an important topic in data structures and algorithms courses, but it is also a topic that many students struggle with. Commonly cited difficulties include the necessary mathematical background knowledge, the abstract nature of the topic, and the presentation style of the material. Analyzing the subject of algorithm analysis using multiple learning theories shows that course materials often leave out key steps in the learning process and neglect certain learning styles. Students can be more successful at learning algorithm run-time complexity analysis if these missing stages and learning styles are addressed.


Chicago Alliance For Equity In Computer Science, Steven Mcgee, Lucia Dettori, Ronald I. Greenberg, Andrew M. Rasmussen, Dale F. Reed, Don Yanek Dec 2022

Chicago Alliance For Equity In Computer Science, Steven Mcgee, Lucia Dettori, Ronald I. Greenberg, Andrew M. Rasmussen, Dale F. Reed, Don Yanek

Computer Science: Faculty Publications and Other Works

Each year, about 14,000 Chicago Public Schools (CPS) students graduate with one year of high school computer science (CS) in fulfillment of the district’s CS graduation requirement. This accomplishment was the culmination of a decade of work by the Chicago Alliance for Equity in Computer Science (CAFÉCS), which includes CPS teachers and administrators, university CS faculty, and educational researchers. CAFÉCS research indicates that CPS significantly increased the capacity of schools to offer the Exploring Computer Science (ECS) introductory course, resulting in a rapid, equitable increase in students’ participation in CS. Making CS mandatory did not negatively impact performance in ECS. …


The Minority In The Minority, Black Women In Computer Science Fields: A Phenomenological Study, Blanche' D. Anderson Nov 2022

The Minority In The Minority, Black Women In Computer Science Fields: A Phenomenological Study, Blanche' D. Anderson

Doctoral Dissertations and Projects

The purpose of this transcendental phenomenological study was to describe the lived experiences of Black women with a bachelor’s, master’s, or doctoral degree in computer science, currently employed in the United States. The theory guiding this study was Krumboltz’s social learning theory of career decision-making, as it provides a foundation for understanding how a combination of factors leads to an individual’s educational and occupational preferences and skills. This qualitative study answered the following central research question: What are the lived experiences of Black women with a bachelor’s, master’s, or doctoral degree in computer science, currently employed in the United States? …


Serverless Enabled Framework For Machine Learning Applications: Architecture, Solutions, And Evaluations, Boyuan Guan Nov 2022

Serverless Enabled Framework For Machine Learning Applications: Architecture, Solutions, And Evaluations, Boyuan Guan

FIU Electronic Theses and Dissertations

Over the past decade, the popularity of machine learning applications such as recommendation systems, image recognition, real-time alerts, event detection, natural language processing, and online streaming analytics has increased dramatically. However, there is a long-tail problem has been identified for the ML application. The majority of ML applications are concentrated in high-tech and high-profit areas while ML applications are still difficult to reach for local and low-profit businesses. The two factors that cause this slow growth are the domain problem barrier and the rigid infrastructure environment. Since ML application development is different than the traditional software application which consists of …


Bridging The Computer Science – Law Divide, Azer Bestavros, Stacey Dogan, Paul Ohm, Andrew Sellars Nov 2022

Bridging The Computer Science – Law Divide, Azer Bestavros, Stacey Dogan, Paul Ohm, Andrew Sellars

Faculty Scholarship

Many pressing societal questions can be answered only by bringing experts from different disciplines together. Questions around misinformation and disinformation, platform power, surveillance capitalism, information privacy, and algorithmic bias, among many others, reside at the intersection of computer science and law. We need to develop institutions that bring together computer scientists and legal scholars to work together on issues like these, and to train new innovators, thought leaders, counselors, and policymakers with hybrid training in both disciplines. In Universities, the disciplines of Computer Science (CS) and Law are separated by many wide chasms. Differences in standards, language, methods, and culture …


Promoting Computational Thinking To Impact The Implementation Of Computer Science, Mikayla Westhoff Oct 2022

Promoting Computational Thinking To Impact The Implementation Of Computer Science, Mikayla Westhoff

Master's Theses & Capstone Projects

The researchers drove this action research project to integrate Computer Science into the classroom and the effect it can have on computational thinking. The researcher, a fifth-grade teacher in her third year of teaching, utilized Computer Science activities in a science class of 24 students for two weeks while monitoring their progress through Code.org. The study analyzed the correlation between Computer Science and computational thinking. The findings revealed no correlation between the two variables among students with or without a Computer Science background. This project conducted this research to impact the future classroom practices that may implement Computer Science into …


The Effects Of Project-Based Game Development On Student Learning And Attitudes: Action Research In An 8Th Grade Introductory Computer Science Course, Theodore G. Jenks Oct 2022

The Effects Of Project-Based Game Development On Student Learning And Attitudes: Action Research In An 8Th Grade Introductory Computer Science Course, Theodore G. Jenks

Theses and Dissertations

The purpose of this action research was to implement a digital game development project and describe its effects on the performance and attitudes of eighth-grade students in a required computer science course at South Carolina School District Alpha. The following research questions were explored: (1) How does the game development project impact participants’ ability to analyze and develop algorithms? (2) What is the effect of the game development project on participants’ attitudes toward computer science? and (3) What is the relationship between participants’ attitudes toward computer science and their performance?

There were 28 participants composed of students in a science, …


Morphological Network: Network With Morphological Neurons., Ranjan Mondal Dr. Aug 2022

Morphological Network: Network With Morphological Neurons., Ranjan Mondal Dr.

Doctoral Theses

Image processing with traditional approaches mainly use the tools of linear systems. However, linear approaches are not well suited and may even fail to solve problems involving geometrical aspects of the image. Thus, nonlinear geometric approaches like morphological operations are very popular in those cases. Morphological operations are nonlinear operations based on a set and lattice-theoretic methodology for image analysis that are capable of describing the geometrical structure of image objects quantitatively. It is suitable for various problems in image processing, computer vision, and pattern recognition. While solving problems with morphology, a particular structuring element is defined. Structuring elements have …


Constructions And Analyses Of Efficient Symmetric-Key Primitives For Authentication And Encryption., Sebati Ghosh Dr. Aug 2022

Constructions And Analyses Of Efficient Symmetric-Key Primitives For Authentication And Encryption., Sebati Ghosh Dr.

Doctoral Theses

In symmetric key cryptography there are two fundamental objectives, viz. 1. confidentiality or secrecy of message from unexpected party and 2. authentication of message which includes authenticating the source of the message as well as integrity of the message against any unwanted modification. Let us first concentrate on confidentiality. In classical symmetric key cryptography two parties, say Alice and Bob, first secretly exchange a key-pair (e, d). Later, if Alice wishes to send a secret message m ∈ M to Bob, she computes c = Ee(m) and transmits c to Bob. Upon receiving c, Bob computes Dd(c) = m and …


Generalization In Quantum Machine Learning From Few Training Data, Matthias C Caro, Hsin-Yuan Huang, M Cerezo, Kunal Sharma, Andrew Sornborger, Lukasz Cincio, Patrick J Coles Aug 2022

Generalization In Quantum Machine Learning From Few Training Data, Matthias C Caro, Hsin-Yuan Huang, M Cerezo, Kunal Sharma, Andrew Sornborger, Lukasz Cincio, Patrick J Coles

Student and Faculty Publications

Modern quantum machine learning (QML) methods involve variationally optimizing a parameterized quantum circuit on a training data set, and subsequently making predictions on a testing data set (i.e., generalizing). In this work, we provide a comprehensive study of generalization performance in QML after training on a limited number N of training data points. We show that the generalization error of a quantum machine learning model with T trainable gates scales at worst as [Formula: see text]. When only K ≪ T gates have undergone substantial change in the optimization process, we prove that the generalization error improves to [Formula: see …


"Design For Co-Design" In A Computer Science Curriculum Research-Practice Partnership, Victor R. Lee, Jody Clarke-Midura, Jessica F. Shumway, Mimi Recker Aug 2022

"Design For Co-Design" In A Computer Science Curriculum Research-Practice Partnership, Victor R. Lee, Jody Clarke-Midura, Jessica F. Shumway, Mimi Recker

Publications

This paper reports on a study of the dynamics of a Research-Practice Partnership (RPP) oriented around design, specifically the co-design model. The RPP is focused on supporting elementary school computer science (CS) instruction by involving paraprofessional educators and teachers in curricular co-design. A problem of practice addressed is that few elementary educators have backgrounds in teaching CS and have limited available instructional time and budget for CS. The co-design strategy entailed highlighting CS concepts in the mathematics curriculum during classroom instruction and designing computer lab lessons that explored related ideas through programming. Analyses focused on tensions within RPP interaction dynamics …


Ontology-Based Formal Approach For Safety And Security Verification Of Industrial Control Systems, Ramesh Neupane Aug 2022

Ontology-Based Formal Approach For Safety And Security Verification Of Industrial Control Systems, Ramesh Neupane

Boise State University Theses and Dissertations

Control logics, as part of the Industrial Control Systems (ICS), are used to control the physical processes of the critical infrastructures such as power plants, water, and gas distribution, etc. Most commonly, the Programmable Logic Controller (PLC) manages these processes through actuators based on information received from sensor readings. Any safety issues or cyberattacks on these systems may have catastrophic consequences on human lives and the environment. In an effort to improve the resilience and security of control logics, this thesis provides algorithms and tools to formally define the safety and security requirements w.r.t. the physical processes, and the industrial …


Mining The Soma Cube For Gems: Isomorphic Subgraphs Reveal Equivalence Classes, Edward Vogel, My Tram Jul 2022

Mining The Soma Cube For Gems: Isomorphic Subgraphs Reveal Equivalence Classes, Edward Vogel, My Tram

Journal of Humanistic Mathematics

Soma cubes are an example of a dissection puzzle, where an object is broken down into pieces, which must then be reassembled to form either the original shape or some new design. In this paper, we present some interesting discoveries regarding the Soma Cube. Equivalence classes form aesthetically pleasing shapes in the solution set of the puzzle. These gems are identified by subgraph isomorphisms using SNAP!/Edgy, a simple block-based computer programming language. Our preliminary findings offer several opportunities for researchers from middle school to undergraduate to utilize graphs, group theory, topology, and computer science to discover connections between computation and …


Computing Well-Structured Subgraphs In Geometric Intersection Graphs., Satyabrata Jana Dr. Jul 2022

Computing Well-Structured Subgraphs In Geometric Intersection Graphs., Satyabrata Jana Dr.

Doctoral Theses

For a set of geometric objects, the associative geometric intersection graph is the graph with a vertex for each object and an edge between two vertices if and only if the corresponding objects intersect. Geometric intersection graphs are very important due to their theoretical properties and applicability. Based on the different geometric objects, several types of geometric intersection graphs are defined. Given a graph G, an induced (either vertex or edge) subgraph H ⊆ G is said to be an well-structured subgraph if H satisfies certain properties among the vertices in H. This thesis studies some well-structured subgraphs finding problems …


Temporal Sentiment Mapping System For Time-Synchronized Data, Jiachen Ma Jul 2022

Temporal Sentiment Mapping System For Time-Synchronized Data, Jiachen Ma

Dissertations (1934 -)

Temporal sentiment labels are used in various multimedia studies. They are useful for numerous classification and detection tasks such as video tagging, segmentation, and labeling. However, generating a large-scale sentiment dataset through manual labeling is usually expensive and challenging. Some recent studies explored the possibility of using online Time-Sync Comments (TSCs) as the primary source of their sentiment maps. Although the approach has positive results, existing TSCs datasets are limited in scale and content categories. Guidelines for generating such data within a constrained budget are yet to be developed and discussed. This dissertation tries to address the above issues by …


Augmented: Design And Ethnography In/Of An Architecture, Computer Science, And Textile Research-Creative Collective, Claire Nicholas, James Forren, Derek Reilly Jun 2022

Augmented: Design And Ethnography In/Of An Architecture, Computer Science, And Textile Research-Creative Collective, Claire Nicholas, James Forren, Derek Reilly

DRS Biennial Conference Series

This paper introduces a multi-disciplinary research-creation project that examines the embodied and social nature of textile design and making at different structural scales – from beaded accessories to architectural components. Bringing together anthropology, architecture, computer science, and textile craft, “Gesture and Form” seeks to develop effective and ethical pedagogies for teaching design and handcraft with new materials and technologies. Specifically, the project explores the potentialities and limitations of a head-worn augmented reality (AR) system that documents, encodes, and later guides making practices. The discussion first introduces different disciplinary frameworks for understanding and researching embodied knowledge, before sketching the multi-disciplinary research …


Innovations In The Educational Process And Its Criteria Of Efficiency, Utkir Mirzaqobilovich Farmonov, Nizom Abdurazzakovich Taylanov May 2022

Innovations In The Educational Process And Its Criteria Of Efficiency, Utkir Mirzaqobilovich Farmonov, Nizom Abdurazzakovich Taylanov

Mental Enlightenment Scientific-Methodological Journal

Today, innovative pedagogical processes are becoming one of the important components of the educational activity. Because innovative pedagogical processes not only create the basis for the competitiveness of any educational institution in the market of educational services, but also the intensive development of teacher and student personality, democratization of teacher-student interaction and communication, humanization of the educational process, orientation of students to active learning and self-formation, modernization of educational technologies, methods and tools, as well as the material and technical base of education, professionalism of teachers, their creativity determines the direction of development of their quest, plays an important role …


Comparative Analysis Of Imputation Methods In Real Estate Data, Connor Donlen May 2022

Comparative Analysis Of Imputation Methods In Real Estate Data, Connor Donlen

Honors Theses

This project involves comparing different methods of missing data imputation in the context of predicting real estate listing prices. These methods are compared against each other in both their ability to recreate the original data and their effects on a final predictive model. In order to evaluate their effectiveness, first, a predictive model is made using the complete dataset to use as a benchmark for the imputed datasets. Then, a complete dataset is split into 80% training and 20% testing datasets, and missing values are created in the training data using two different missing data mechanisms, missing completely at random …


The School Of Engineering And Computer Science Class Of 2022 Academic Celebration Program, Cedarville University May 2022

The School Of Engineering And Computer Science Class Of 2022 Academic Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Simulating Polistes Dominulus Nest-Building Heuristics With Deterministic And Markovian Properties, Benjamin Pottinger May 2022

Simulating Polistes Dominulus Nest-Building Heuristics With Deterministic And Markovian Properties, Benjamin Pottinger

Undergraduate Honors Theses

European Paper Wasps (Polistes dominula) are social insects that build round, symmetrical nests. Current models indicate that these wasps develop colonies by following simple heuristics based on nest stimuli. Computer simulations can model wasp behavior to imitate natural nest building. This research investigated various building heuristics through a novel Markov-based simulation. The simulation used a hexagonal grid to build cells based on the building rule supplied to the agent. Nest data was compared with natural data and through visual inspection. Larger nests were found to be less compact for the rules simulated.


Insurance Fraud Detection, Senior Design Enhanced Project, Nischal Rana May 2022

Insurance Fraud Detection, Senior Design Enhanced Project, Nischal Rana

2022 Spring Honors Capstone Projects

Insurance is a major service provided to consumers that provides some relief concerning their valuable assets in the modern world. With so many valuable objects on the market, insurance claims are at an all-time peak, and with this comes attention, both wanted and unwanted. Insurance Fraud Detection is a sophisticated web application integrated with various modules that help insurance agents determine whether a claim by a client is fraudulent or not. Insurance agents can utilize this application to web scrape the internet for clues about the item in question to determine if it is still in the original owner's possession. …


Understanding User Perceptions Of Voice Personal Assistants, Ha Young Kim May 2022

Understanding User Perceptions Of Voice Personal Assistants, Ha Young Kim

All Theses

As the artificial intelligence (AI) technique improves, voice assistant (smart speaker) such as Amazon Alexa and Google Assistant are quickly, surely permeating into people's daily lives. With its powerful and convenient benefits and the circumstances that people started to stay at their home longer due to the pandemic, reliance on smart speakers has increased rapidly. But at the same time, concerns of security on smart speakers have increased.

In this thesis, we conducted an online user survey of smart speaker users with five different perspectives – 1) Users’ engagement with privacy policy; 2) Awareness of different policy requirements defined by …


Efficient Handover Mechanisms For Heterogeneous Networks., Shankar Kumar Ghosh Dr. Apr 2022

Efficient Handover Mechanisms For Heterogeneous Networks., Shankar Kumar Ghosh Dr.

Doctoral Theses

In this thesis, some analytical frameworks have been developed to analyze the effect of different system parameters on handover performances in heterogeneous network (HetNet) and based on such frameworks, some efficient handover algorithms have been proposed. The study starts with an analytical framework to investigate the effect of resource allocation mechanisms, upper layer mobility management protocols (MMPs) and handover decision metrics on user perceived throughput. This analysis reveals that among other factors, handover decision metric plays a crucial role in determining user perceived throughput in HetNet. Subsequently, we develop two handover decision metrics for ultra dense networks (UDN) and unlicensed …


Einstein-Roscoe Regression For The Slag Viscosity Prediction Problem In Steelmaking, Hiroto Saigo, Dukka Kc, Noritaka Saito Apr 2022

Einstein-Roscoe Regression For The Slag Viscosity Prediction Problem In Steelmaking, Hiroto Saigo, Dukka Kc, Noritaka Saito

Michigan Tech Publications

In classical machine learning, regressors are trained without attempting to gain insight into the mechanism connecting inputs and outputs. Natural sciences, however, are interested in finding a robust interpretable function for the target phenomenon, that can return predictions even outside of the training domains. This paper focuses on viscosity prediction problem in steelmaking, and proposes Einstein-Roscoe regression (ERR), which learns the coefficients of the Einstein-Roscoe equation, and is able to extrapolate to unseen domains. Besides, it is often the case in the natural sciences that some measurements are unavailable or expensive than the others due to physical constraints. To this …


The Past, Present, And Future Direction Of Computer Science Curriculum In K-12 Education, Steven Floyd Apr 2022

The Past, Present, And Future Direction Of Computer Science Curriculum In K-12 Education, Steven Floyd

Electronic Thesis and Dissertation Repository

This integrated article thesis provides an analysis of the past, present, and potential future state of Computer Science (CS) in K-12 education. Once implemented in optional courses at the secondary level, CS concepts and skills are now being integrated into other subject areas such as mathematics, science, and technology and other grades including K-8. This new state of K-12 CS education is explored through an analysis of 1) related theory reflected in the literature, 2) historical secondary school CS curriculum, 3) enrolment data and important issues related to equity, diversity, and inclusion, and 4) K-8 CS-related curriculum approaches currently being …


Deep Learning For Embedding And Integrating Multimodal Biomedical Data, Matthew Amodio Apr 2022

Deep Learning For Embedding And Integrating Multimodal Biomedical Data, Matthew Amodio

Yale Graduate School of Arts and Sciences Dissertations

Biomedical data is being generated in extremely high throughput and high dimension by technologies in areas ranging from single-cell genomics, proteomics, and transcriptomics (cytometry, single-cell RNA and ATAC sequencing) to neuroscience and cognition (fMRI and PET) to pharmaceuticals (drug perturbations and interactions). These new and emerging technologies and the datasets they create give an unprecedented view into the workings of their respective biological entities. However, there is a large gap between the information contained in these datasets and the insights that current machine learning methods can extract from them. This is especially the case when multiple technologies can measure the …


Automated Approaches For Program Verification And Repair, William Triest Hallahan Apr 2022

Automated Approaches For Program Verification And Repair, William Triest Hallahan

Yale Graduate School of Arts and Sciences Dissertations

Formal methods techniques, such as verification, analysis, and synthesis,allow programmers to prove properties of their programs, or automatically derive programs from specifications. Making such techniques usable requires care: they must provide useful debugging information, be scalable, and enable automation. This dissertation presents automated analysis and synthesis techniques to ease the debugging of modular verification systems and allow easy access to constraint solvers from functional code. Further, it introduces machine learning based techniques to improve the scalability of off-the-shelf syntax-guided synthesis solvers and techniques to reduce the burden of network administrators writing and analyzing firewalls. We describe the design and implementationof …


Neural Graph Transfer Learning In Natural Language Processing Tasks, Irene Li Apr 2022

Neural Graph Transfer Learning In Natural Language Processing Tasks, Irene Li

Yale Graduate School of Arts and Sciences Dissertations

Natural language is essential in our daily lives as we rely on languages to communicate and exchange information. A fundamental goal for natural language processing (NLP) is to let the machine understand natural language to help or replace human experts to mine knowledge and complete tasks. Many NLP tasks deal with sequential data. For example, a sentence is considered as a sequence of works. Very recently, deep learning-based language models (i.e.,BERT \citep{devlin2018bert}) achieved significant improvement in many existing tasks, including text classification and natural language inference. However, not all tasks can be formulated using sequence models. Specifically, graph-structured data is …


System Abstractions For Scalable Application Development At The Edge, Bo Hu Apr 2022

System Abstractions For Scalable Application Development At The Edge, Bo Hu

Yale Graduate School of Arts and Sciences Dissertations

Recent years have witnessed an explosive growth of Internet of Things (IoT) devices, which collect or generate huge amounts of data. Given diverse device capabilities and application requirements, data processing takes place across a range of settings, from on-device to a nearby edge server/cloud and remote cloud. Consequently, edge-cloud coordination has been studied extensively from the perspectives of job placement, scheduling and joint optimization. Typical approaches focus on performance optimization for individual applications. This often requires domain knowledge of the applications, but also leads to application-specific solutions. Application development and deployment over diverse scenarios thus incur repetitive manual efforts. There …