Open Access. Powered by Scholars. Published by Universities.®

Arts and Humanities Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Computer Sciences

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 91

Full-Text Articles in Arts and Humanities

Music Retrieval System Using Query-By-Humming, Parth Patel Dec 2019

Music Retrieval System Using Query-By-Humming, Parth Patel

Master's Projects

Music Information Retrieval (MIR) is a particular research area of great interest because there are various strategies to retrieve music. To retrieve music, it is important to find a similarity between the input query and the matching music. Several solutions have been proposed that are currently being used in the application domain(s) such as Query- by-Example (QBE) which takes a sample of an audio recording playing in the background and retrieves the result. However, there is no efficient approach to solve this problem in a Query-by-Humming (QBH) application. In a Query-by-Humming application, the aim is to retrieve music that is …


The Trolley Problem In Virtual Reality, Jungsu Pak, Ariane Guirguis, Nicholas Mirchandani, Scott Cummings, Uri Maoz Dec 2019

The Trolley Problem In Virtual Reality, Jungsu Pak, Ariane Guirguis, Nicholas Mirchandani, Scott Cummings, Uri Maoz

Student Scholar Symposium Abstracts and Posters

Would people react to the Trolley problem differently based on the medium? Immersive Virtual Reality Driving Simulator was used to examine participants respond to the trolley problem in a realistic and controlled simulated environment.


Rhetsec_ | Rhetorical Security, Jennifer Mead Dec 2019

Rhetsec_ | Rhetorical Security, Jennifer Mead

Culminating Projects in English

Rhetsec_ examines the rhetorical situation, the rhetorical appeals, and how phishing emails simulate "real" emails in five categories of phishing emails. While the first focus of cybersecurity is security, you must also understand the language of computers to know how to secure them. Phishing is one way to compromise security using computers, and so the computer becomes a tool for malicious language (phishing emails and malware) to be transmitted. Therefore to be concerned with securing computers, then you must also be concerned with language. Language is rhetoric's domain, and the various rhetorical elements which create an identity of the phisher …


Punctuation Prediction For Vietnamese Texts Using Conditional Random Fields, Hong Quang Pham, Binh T. Nguyen, Nguyen Viet Cuong Dec 2019

Punctuation Prediction For Vietnamese Texts Using Conditional Random Fields, Hong Quang Pham, Binh T. Nguyen, Nguyen Viet Cuong

Research Collection School Of Computing and Information Systems

We investigate the punctuation prediction for the Vietnamese language. This problem is crucial as it can be used to add suitable punctuation marks to machine-transcribed speeches, which usually do not have such information. Similar to previous works for English and Chinese languages, we formulate this task as a sequence labeling problem. After that, we apply the conditional random field model for solving the problem and propose a set of appropriate features that are useful for prediction. Moreover, we build two corpora from Vietnamese online news and movie subtitles and perform extensive experiments on these data. Finally, we ask four volunteers …


Virtual Wrap-Up Presentation: Digital Libraries, Intelligent Data Analytics, And Augmented Description, Elizabeth Lorang, Leen-Kiat Soh, Yi Liu, Chulwoo Pack Nov 2019

Virtual Wrap-Up Presentation: Digital Libraries, Intelligent Data Analytics, And Augmented Description, Elizabeth Lorang, Leen-Kiat Soh, Yi Liu, Chulwoo Pack

CSE Conference and Workshop Papers

Includes framing, overview, and discussion of the explorations pursued as part of the Digital Libraries, Intelligent Data Analytics, and Augmented Description demonstration project, pursued by members of the Aida digital libraries research team at the University of Nebraska-Lincoln through a research services contract with the Library of Congress. This presentation covered: Aida research team and background for the demonstration project; broad outlines of “Digital Libraries, Intelligent Data Analytics, and Augmented Description”; what changed for us as a research team over the collaboration and why; deliverables of our work; thoughts toward “What next”; and deep-dives into the explorations. The machine learning …


Augkit: An Augmented Drum Set System Designed For Live Performance, Mario A. Carvajal Nov 2019

Augkit: An Augmented Drum Set System Designed For Live Performance, Mario A. Carvajal

FIU Electronic Theses and Dissertations

Augkit is an augmented drum set system designed for live performance. Augkit consists of a drum kit, microphone, audio interface, MIDI pad controller with foot switches, set of speakers, and a computer. I designed the processing audio engine in the visual programming language Max. Max processes the audio signal in a variety of ways that include delays, flanger, reverb, and synthesis that depend on the frequency content of the signal. Foot switches and MIDI pads toggle and modify the parameters of Augkit. This approach to playing drum set proves to be very flexible and offers new aesthetic possibilities for live …


Collaborating On Machine Reading: Training Algorithms To Read Complex Collections, Carrie M. Pirmann, Brian R. King, Bhagawat Acharya, Katherine M. Faull Oct 2019

Collaborating On Machine Reading: Training Algorithms To Read Complex Collections, Carrie M. Pirmann, Brian R. King, Bhagawat Acharya, Katherine M. Faull

Bucknell University Digital Scholarship Conference

Interdisciplinary collaboration between two faculty members in the humanities and computer science, a research librarian, and an undergraduate student has led to remarkable results in an ongoing international DH research project that has at its core 18th century manuscripts. The corpus stems from a vast collection of archival materials held by the Moravian Church in the UK, Germany, and the US. The number of pages to be transcribed, differences in handwriting styles, paper quality, and original language pose enormous problems for the feasibility of human transcription. This presentation will review the hypothesis, process, and findings of a summer research project …


Designing Women: Essentializing Femininity In Ai Linguistics, Ellianie S. Vega Oct 2019

Designing Women: Essentializing Femininity In Ai Linguistics, Ellianie S. Vega

Student Publications

Since the eighties, feminists have considered technology a force capable of subverting sexism because of technology’s ability to produce unbiased logic. Most famously, Donna Haraway’s “A Cyborg Manifesto” posits that the cyborg has the inherent capability to transcend gender because of its removal from social construct and lack of loyalty to the natural world. But while humanoids and artificial intelligence have been imagined as inherently subversive to gender, current artificial intelligence perpetuates gender divides in labor and language as their programmers imbue them with traits considered “feminine.” A majority of 21st century AI and humanoids are programmed to fit female …


Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez Oct 2019

Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez

Independent Study Project (ISP) Collection

Este documento es un estudio de caso sobre la privacidad digital en Ecuador, cómo se protege y cómo se debe mejorar las protecciones. Comienzo presentando la falta de privacidad de la persona en Ecuador, a través de la reciente violación de datos y las tecnologías de vigilancia en todo el país desde China. Luego, para analizar la jurisprudencia y la falta de protección de la privacidad en la ley, hago la transición a un análisis legal de la privacidad de datos en Ecuador a través de la Constitución de 2008. Cuando establezco que falta privacidad digital en Ecuador, demuestro una …


Is Ai Intelligent, Really?, Bruce D. Baker Aug 2019

Is Ai Intelligent, Really?, Bruce D. Baker

SPU Works

The question of intelligence opens up a bouquet of interrelated questions:

Suppose that some future AGI systems (on-screen or robots) equaled human performance. Would they have real intelligence, real understanding, real creativity? Would they have selves, moral standing, free choice? Would they be conscious? And without consciousness, could they have any of those other properties?[1]

The only way out of the morass is to recognize that truth claims do not stand on their own, aloof and cut off from the sea of meaning which grants epistemic access. In other words, truth presumes access to: (1) a way of knowing, …


Document Images And Machine Learning: A Collaboratory Between The Library Of Congress And The Image Analysis For Archival Discovery (Aida) Lab At The University Of Nebraska, Lincoln, Ne, Yi Liu, Chulwoo Pack, Leen-Kiat Soh, Elizabeth Lorang Aug 2019

Document Images And Machine Learning: A Collaboratory Between The Library Of Congress And The Image Analysis For Archival Discovery (Aida) Lab At The University Of Nebraska, Lincoln, Ne, Yi Liu, Chulwoo Pack, Leen-Kiat Soh, Elizabeth Lorang

CSE Conference and Workshop Papers

This presentation summarized and presented preliminary results from the first weeks of work conducted by the Aida research team in response to Library of Congress funding notice ID 030ADV19Q0274, “The Library of Congress – Pre-processing Pilot.” It includes overviews of projects on historic document segmentation, document classification, document quality assessment, figure and graph extraction from historic documents, text-line extraction from figures, subject and objective quality assesments, and digitization type differentiation.


Publication And Evaluation Challenges In Games & Interactive Media, Elizabeth L. Lawley Aug 2019

Publication And Evaluation Challenges In Games & Interactive Media, Elizabeth L. Lawley

Presentations and other scholarship

Faculty in the fields of games and interactive media face significant challenges in publishing and documenting their scholarly work for evaluation in the tenure and promotion process. These challenges include selecting appropriate publication venues and assigning authorship for works spanning multiple disciplines; archiving and accurately citing collaborative digital projects; and redefining “peer review,” impact, and dissemination in the context of creative digital works. In this paper I describe many of these challenges, and suggest several potential solutions.


A Pedagogy Of Techno-Social Relationality: Ethics And Digital Multimodality In The Composition Classroom, Kristin M. Ravel Aug 2019

A Pedagogy Of Techno-Social Relationality: Ethics And Digital Multimodality In The Composition Classroom, Kristin M. Ravel

Theses and Dissertations

I bring together the relational ethics of feminist critical theory with approaches of multimodal rhetoric to examine the ethical implications of composing on social media platforms. Most social media platforms are designed to value consumerism, efficiency, quantity of web traffic, and constant synchronous response over concerns of responsible and critical communication. I propose a rhetorical approach of techno-social relationality (TSR) as an intervention against such corporate-minded design. Through this approach, I argue that civil engagement is not limited to people’s social responsibilities but rather is entwined in complex, material-technical contexts. By considering the responsibility of our machines as much as …


The Design And Implementation Of Aida: Ancient Inscription Database And Analytics System, M Parvez Rashid Jul 2019

The Design And Implementation Of Aida: Ancient Inscription Database And Analytics System, M Parvez Rashid

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

AIDA, the Ancient Inscription Database and Analytic system can be used to translate and analyze ancient Minoan language. The AIDA system currently stores three types of ancient Minoan inscriptions: Linear A, Cretan Hieroglyph and Phaistos Disk inscriptions. In addition, AIDA provides candidate syllabic values and translations of Minoan words and inscriptions into English. The AIDA system allows the users to change these candidate phonetic assignments to the Linear A, Cretan Hieroglyph and Phaistos symbols. Hence the AIDA system provides for various scholars not only a convenient online resource to browse Minoan inscriptions but also provides an analysis tool to explore …


Nsf High Performance Computing Community Event Hosted In Tulsa, Dillon Martone Jul 2019

Nsf High Performance Computing Community Event Hosted In Tulsa, Dillon Martone

Student Research

No abstract provided.


Enhancing The Study Of Art History Utilizing Computational Thinking: Focus, Abstraction In Art (Modern), Douglas L. Moody, Sandra Cheng Jun 2019

Enhancing The Study Of Art History Utilizing Computational Thinking: Focus, Abstraction In Art (Modern), Douglas L. Moody, Sandra Cheng

Open Educational Resources

No abstract provided.


Closing Banquet Eulogies, Russell Howell, C. Ray Rosentrater Jun 2019

Closing Banquet Eulogies, Russell Howell, C. Ray Rosentrater

ACMS Conference Proceedings 2019

A tribute to David Lay; A tribute to John Roe


From Perfect Shuffles To Landau's Function, Brian D. Beasley May 2019

From Perfect Shuffles To Landau's Function, Brian D. Beasley

ACMS Conference Proceedings 2019

If we view a given shuffle of a deck of cards as a permutation, then repeatedly applying this same shuffle will eventually return the deck to its original order. In general, how many steps will that take? What happens in the case of so-called perfect shuffles? What type of shuffle will require the greatest number of applications before restoring the original deck? This talk will address those questions and provide a brief history of the work of Edmund Landau on the maximal order of a permutation in the symmetric group on n objects. It will also note some recent progress …


Developing Mathematicians: The Benefits Of Weaving Spiritual And Disciplinary Discipleship, Patrick Eggleton May 2019

Developing Mathematicians: The Benefits Of Weaving Spiritual And Disciplinary Discipleship, Patrick Eggleton

ACMS Conference Proceedings 2019

Part of the goal of discipleship at the Christian university is for faith development to seep into the hearts of the students. Similarly, the goal of the development of future mathematicians is for the mathematical proficiencies, the practices like problem solving and analytical reasoning that permeate each of the courses, to seep into the hearts of our majors. This presentation shares how the weaving of our spiritual and disciplinary discipleship efforts benefits the faith development of our students while also helping them to think like a mathematician.


The Applicability Of Mathematics And The Naturalist Die, Ricardo J. Cordero-Soto May 2019

The Applicability Of Mathematics And The Naturalist Die, Ricardo J. Cordero-Soto

ACMS Conference Proceedings 2019

Philosopher and Christian apologist William Lane Craig has proposed a valid deductive argument for God’s existence that is rooted in the applicability of mathematics to the physical universe. This argument was presented by Craig during a debate with philosopher and atheist Alex Rosenberg. During the debate, Rosenberg presented a rebuttal to the soundness of this argument by appealing to chance as an explanation to the applicability of mathematics to the physical universe. In this talk, the presenter will discuss how the naturalist die is unable to produce “chance application” of mathematics while defending the soundness of the argument in light …


Analyzing The Impact Of Active Learning In General Education Mathematics Courses, Amanda Harsy, Marie Meyer, Michael Smith, Brittany Stephenson May 2019

Analyzing The Impact Of Active Learning In General Education Mathematics Courses, Amanda Harsy, Marie Meyer, Michael Smith, Brittany Stephenson

ACMS Conference Proceedings 2019

This talk shares the preliminary results of a study that explores the general perceptions and attitudes of students in general education mathematics courses taught using primarily active learning- based methods (like group work, projects, and discovery learning), and compares them with those enrolled in a general education mathematics course taught in a more traditional and lecture-based method. We present an analysis of survey data collected throughout the semester, which explores the disposition and mindset of students, their mathematical confidence and anxiety, and perceptions of pedagogical methods used for the teaching of mathematics. We also explored how these perceptions and dispositions …


Faith, Mathematics, And Science: The Priority Of Scripture In The Pursuit And Acquisition Of Truth, Bob Mallison May 2019

Faith, Mathematics, And Science: The Priority Of Scripture In The Pursuit And Acquisition Of Truth, Bob Mallison

ACMS Conference Proceedings 2019

This research will examine some approaches for identifying truth as well as some issues involved in recognizing reliable sources of information. We will proceed from a decidedly Christian perspective including the conviction that God created an orderly universe (and that studying nature provides valuable information about Him) and that His Word, the Bible, even more clearly expresses in- formation about Him. We will discuss some of the essential tools used by mathematicians and scientists for the discovery of truth – namely, models. We will examine some valuable models from history, and briefly discuss that as additional scientific information became available, …


Lagrange's Interpolation, Chinese Remainder, And Linear Equations, Jesús Jiménez May 2019

Lagrange's Interpolation, Chinese Remainder, And Linear Equations, Jesús Jiménez

ACMS Conference Proceedings 2019

Consider a finite set of points {(x1, y1), (x2, y2), . . . , (xk , yk )} in R2. The Lagrange’s interpolation problem is to find a polynomial p(x) of degree k − 1 satisfying p(xi) = yi for 1 ≤ i ≤ k. We will recall the solution to Lagrange’s interpolation problems as an instance of the Chinese Remainder Theorem. Next, we will show that a similar approach can be used to construct solutions to a system of linear equations.


Factors That Motivate Students To Learn Mathematics, Dave Klanderman, Sarah Klanderman, Benjamin Gliesmann, Josh Wilkerson, Patrick Eggleton May 2019

Factors That Motivate Students To Learn Mathematics, Dave Klanderman, Sarah Klanderman, Benjamin Gliesmann, Josh Wilkerson, Patrick Eggleton

ACMS Conference Proceedings 2019

What motivates some students to want to learn mathematics while others do not share similar motivation? Are these factors intrinsic, extrinsic, or a combination of both? To answer these questions, we adapted a survey originally developed by Tapia (1996) and later shortened by Lim and Chapman (2015). We administered the survey in multiple middle schools, a high school, and multiple colleges and universities. We obtained over 100 completed surveys for each of these educational levels. This presentation offers an analysis of these data, including descriptive statistics and confidence intervals for each educational level. For the college and university sample, we …


Marin Mersenne: Minim Monk And Messenger; Monotheism, Mathematics, And Music, Karl-Dieter Crisman May 2019

Marin Mersenne: Minim Monk And Messenger; Monotheism, Mathematics, And Music, Karl-Dieter Crisman

ACMS Conference Proceedings 2019

If you have taught a number theory course or even watched the mathematical news, you know that occasionally a new (and enormous) “Mersenne prime” is discovered. Those who have introduced students to the prehistory of calculus may know of a certain Marin Mersenne as the interlocutor who drew Fermat and Descartes (and others) out to discuss their methods of tangents (and more). But who was Mersenne, and what did he actually do? This presentation will give an overview of his times, his role in the history of science, and his own writings. We’ll especially look into why a monk from …


Addressing Challenges In Creating Math Presentations, David Schweitzer May 2019

Addressing Challenges In Creating Math Presentations, David Schweitzer

ACMS Conference Proceedings 2019

When it comes to composing presentation slides with extensive mathematical content, each of the slide creation platforms has at least one significant drawback. Whether it is Beamer and its steep learning curve, PowerPoint and its relative inefficiency with math, Google Slides and its complete lack of math capabilities, or some other platform, no one tool single-handedly offers an ideal solution. Additionally, if users desire creative flexibility, such as the ability to easily change fonts or colors, the platforms’ respective limitations can become even more pronounced. In a project that has been well suited for undergraduate research, the presenter and his …


Is Mathematical Truth Time Dependent? Comments From A Paper By Judith Grabiner, Richard Stout May 2019

Is Mathematical Truth Time Dependent? Comments From A Paper By Judith Grabiner, Richard Stout

ACMS Conference Proceedings 2019

Judith Grabiner, a renowned historian of mathematics, has written many papers related to signifi- cant changes in the content and nature of analysis, from the 17th through the 19th century. In her paper “Is Mathematical Truth Time Dependent?” Professor Grabiner gives several reasons for the changing nature and requirements in rigor that occurred over this period of two hundred years. In this talk I will briefly summarize her conclusions, particularly in light of how they might influence a Christian perspective on mathematics.


Numerical Range Of Toeplitz Matrices Over Finite Fields, Derek Thompson, Maddison Guillaume Baker, Amish Mishra May 2019

Numerical Range Of Toeplitz Matrices Over Finite Fields, Derek Thompson, Maddison Guillaume Baker, Amish Mishra

ACMS Conference Proceedings 2019

We characterize the kth numerical range of all n×n Toeplitz matrices with a constant main diagonal and another single, non-zero diagonal, where the matrices are over the field Zp[i], with p a prime congruent to 3 mod 4. We find that, for k ∈ Z∗, the kth numerical range is always equal to Zp[i] with the exception of the scaled identity. We also use similar techniques to discover a general connection between the 0th numerical range and the kth numerical range. Lastly, we conclude with a conjecture regarding the general numerical range of all triangular Toeplitz matrices.


Charles Babbage And Mathematical Aspects Of The Miraculous, Courtney K. Taylor May 2019

Charles Babbage And Mathematical Aspects Of The Miraculous, Courtney K. Taylor

ACMS Conference Proceedings 2019

Charles Babbage is widely known as the father of the computer, but he is lesser known for his contributions to natural theology and apologetics. In 1837 Babbage wrote the Ninth Bridgewater Treatise in response to a series of writings concerning faith and science that had been commissioned by the Royal Society. Among the remarkable features of the Ninth Bridgewater are mathematical analogies concerning the miraculous. We will explore these ideas, which range from the difference engine to a family of fourth degree curves, illustrating that for Babbage, miracles are not exceptions to natural law, but rather instances of a larger …


Replacing Remedial Mathematics With Corequisites In General Education Mathematics Courses, Alana Unfried May 2019

Replacing Remedial Mathematics With Corequisites In General Education Mathematics Courses, Alana Unfried

ACMS Conference Proceedings 2019

Many colleges and universities offer courses, such as Remedial Mathematics or Elementary Algebra, that underprepared students must complete before they can take a college-level mathematics course. However, nationally there is a push to replace remedial mathematics courses with corequisite courses instead. This design allows students to enter directly into their general education mathematics course instead of first overcoming the barrier of a remedial course. Corequisite mathematics courses were implemented across the 23-campus California State University system during the 2018-19 academic year. I will discuss the design and implementation of a corequisite structure at California State University, Monterey Bay, in particular …