Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer science education (7)
- Channel routing (6)
- Computer science (6)
- Area-universal networks (4)
- Parallel computation (4)
-
- Randomized routing (4)
- VLSI layout (4)
- Computer programming (3)
- Elderly (3)
- Exploring Computer Science (3)
- Robotics (3)
- Wormhole routing (3)
- Algorithms (2)
- Classification (2)
- Computer science attitudes (2)
- Computing (2)
- Data analysis (2)
- Engineering, Computer Science (2)
- Fat pyramid (2)
- Fat-trees (2)
- Game mechanics (2)
- Greedy routing (2)
- High school computer science (2)
- Hypercube (2)
- Interconnection networks (2)
- Layout algorithms (2)
- Lower bounds (2)
- Network analysis (2)
- Packet routing (2)
- Python (2)
- Publication
-
- Ronald Greenberg (45)
- Myounghoon Jeon (Philart) (13)
- Ashish Amresh (8)
- George K. Thiruvathukal (6)
- Saverio Perugini (6)
-
- Buenaventura "Ven" Basco (4)
- Dr. David M Cook (4)
- Manfred Minimair (4)
- Yuliya Lierler (4)
- Heng Ngee MOK (2)
- Kouider Mokhtari (2)
- Amber Settle (1)
- Andrew Harrington (1)
- Arshad M. Khan, Ph.D. (1)
- Barbara S. Chaparro (1)
- Daniel J Gervais (1)
- Elizabeth De Armond (1)
- Kathryn Wissel, MBA, MI (1)
- Laura B. Balzer (1)
- Marc Compere (1)
- NBA Finals Live Stream (1)
- Pedro J. Llanos (www.AstronauticsLlanos.com) (1)
- Ray Enke Ph.D. (1)
- Sirani Mututhanthrige Perera (1)
- Stephen E Henderson (1)
- Stephen Thompson (1)
- Sungsoon Hwang (1)
- Susan Acampora (1)
- Tony Wasserman (1)
Articles 1 - 30 of 116
Full-Text Articles in Physical Sciences and Mathematics
Machine Learning Projects With Python - Nba Finals Live Stream, Wilder Vs Breazeale
Machine Learning Projects With Python - Nba Finals Live Stream, Wilder Vs Breazeale
NBA Finals Live Stream
Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook
Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook
Dr. David M Cook
Cse: U: Mixed-Initiative Personal Assistant Agents, Joshua W. Buck, Saverio Perugini, Tam Nguyen
Cse: U: Mixed-Initiative Personal Assistant Agents, Joshua W. Buck, Saverio Perugini, Tam Nguyen
Saverio Perugini
Specification and implementation of flexible human-computer dialogs is challenging because of the complexity involved in rendering the dialog responsive to a vast number of varied paths through which users might desire to complete the dialog. To address this problem, we developed a toolkit for modeling and implementing task-based, mixed-initiative dialogs based on metaphors from lambda calculus. Our toolkit can automatically operationalize a dialog that involves multiple prompts and/or sub-dialogs, given a high-level dialog specification of it. The use of natural language with the resulting dialogs makes the flexibility in communicating user utterances commensurate with that in dialog completion paths—an aspect …
Intro To Command Line Coding (Fastqe & Fastp), Ray A. Enke
Intro To Command Line Coding (Fastqe & Fastp), Ray A. Enke
Ray Enke Ph.D.
Cross-Referencing Social Media And Public Surveillance Camera Data For Disaster Response, Chittayong Surakitbanharn,, Calvin Yau, Guizhen Wang, Aniesh Chawla, Yinuo Pan, Zhaoya Sun, Sam Yellin, David Ebert, Yung-Hsiang Lu, George K. Thiruvathukal
Cross-Referencing Social Media And Public Surveillance Camera Data For Disaster Response, Chittayong Surakitbanharn,, Calvin Yau, Guizhen Wang, Aniesh Chawla, Yinuo Pan, Zhaoya Sun, Sam Yellin, David Ebert, Yung-Hsiang Lu, George K. Thiruvathukal
George K. Thiruvathukal
Physical media (like surveillance cameras) and social media (like Instagram and Twitter) may both be useful in attaining on-the-ground information during an emergency or disaster situation. However, the intersection and reliability of both surveillance cameras and social media during a natural disaster are not fully understood. To address this gap, we tested whether social media is of utility when physical surveillance cameras went off-line during Hurricane Irma in 2017. Specifically, we collected and compared geo-tagged Instagram and Twitter posts in the state of Florida during times and in areas where public surveillance cameras went off-line. We report social media content …
Signal Flow Graph Approach To Efficient Dst I-Iv Algorithms, Sirani M. Perera
Signal Flow Graph Approach To Efficient Dst I-Iv Algorithms, Sirani M. Perera
Sirani Mututhanthrige Perera
In this paper, fast and efficient discrete sine transformation (DST) algorithms are presented based on the factorization of sparse, scaled orthogonal, rotation, rotation-reflection, and butterfly matrices. These algorithms are completely recursive and solely based on DST I-IV. The presented algorithms have low arithmetic cost compared to the known fast DST algorithms. Furthermore, the language of signal flow graph representation of digital structures is used to describe these efficient and recursive DST algorithms having (n1) points signal flow graph for DST-I and n points signal flow graphs for DST II-IV.
Setting Up A Low-Cost Lab Management System For A Multi-Purpose Computing Laboratory Using Virtualisation Technology, Heng Ngee Mok, Wee Kiat Tan
Setting Up A Low-Cost Lab Management System For A Multi-Purpose Computing Laboratory Using Virtualisation Technology, Heng Ngee Mok, Wee Kiat Tan
Heng Ngee MOK
This paper describes how a generic computer laboratory equipped with 52 workstations is set up for teaching IT-related courses and other general purpose usage. The authors have successfully constructed a lab management system based on decentralised, client-side software virtualisation technology using Linux and free software tools from VMware that fulfils the requirements of fast "switch over" time between consecutive lab sessions, the ability to support a wide range of IT courses and usage scenarios, low cost, easy maintenance, and a sandboxed environment for potentially disruptive IT security lab exercises. Sufficient implementation details are provided so that readers can build a …
Teaching Tip: The Flipped Classroom, Heng Ngee Mok
Teaching Tip: The Flipped Classroom, Heng Ngee Mok
Heng Ngee MOK
The flipped classroom has been gaining popularity in recent years. In theory, flipping the classroom appears sound: passive learning activities such as unidirectional lectures are pushed to outside class hours in the form of videos, and precious class time is spent on active learning activities. Yet the courses for information systems (IS) undergraduates at the university that the author is teaching at are still conducted in the traditional lecture-in-class, homework-after-class style. In order to increase students’ engagement with the course content and to improve their experience with the course, the author implemented a trial of the flipped classroom model for …
Separating Markup From Text, Ronald I. Greenberg, George K. Thiruvathukal
Separating Markup From Text, Ronald I. Greenberg, George K. Thiruvathukal
George K. Thiruvathukal
As more and more online versions of Humanities texts are created, it is becoming commonplace to embed elaborate formatting, for example, through the use of HTML. But this can interfere with computerized analyses of the original text. While it may seem, at first, straightforward to simply strip markup from text, this is not the reality. Many digital texts add things that appear to be legitimate content according to the markup syntax, for example, line numbers, and even apart from this issue, existing tools for stripping markup produce inconsistent results. Apart from adopting and enforcing strict conventions for adding markup to …
Chameleon: A Customizable Language For Teaching Programming Languages, Saverio Perugini, Jack L. Watkin
Chameleon: A Customizable Language For Teaching Programming Languages, Saverio Perugini, Jack L. Watkin
Saverio Perugini
ChAmElEoN is a programming language for teaching students the concepts and implementation of computer languages. We describe its syntax and semantics, the educational aspects involved in the implementation of a variety of interpreters for it, its malleability, and student feedback to inspire its use for teaching languages.
Natural Language, Mixed-Initiative Personal Assistant Agents, Joshua W. Buck, Saverio Perugini, Tam W. Nguyen
Natural Language, Mixed-Initiative Personal Assistant Agents, Joshua W. Buck, Saverio Perugini, Tam W. Nguyen
Saverio Perugini
The increasing popularity and use of personal voice assistant technologies, such as Siri and Google Now, is driving and expanding progress toward the long-term and lofty goal of using artificial intelligence to build human-computer dialog systems capable of understanding natural language. While dialog-based systems such as Siri support utterances communicated through natural language, they are limited in the flexibility they afford to the user in interacting with the system and, thus, support primarily action-requesting and information-seeking tasks. Mixed-initiative interaction, on the other hand, is a flexible interaction technique where the user and the system act as equal participants in an …
An Application Of The Actor Model Of Concurrency In Python: A Euclidean Rhythm Music Sequencer, Daniel P. Prince, Saverio Perugini
An Application Of The Actor Model Of Concurrency In Python: A Euclidean Rhythm Music Sequencer, Daniel P. Prince, Saverio Perugini
Saverio Perugini
We present a real-time sequencer, implementing the Euclidean rhythm algorithm, for creative generation of drum sequences by musicians or producers. We use the Actor model of concurrency to simplify the communication required for interactivity and musical timing, and generator comprehensions and higher-order functions to simplify the implementation of the Euclidean rhythm algorithm. The resulting application sends Musical Instrument Digital Interface (MIDI) data interactively to another application for sound generation.
Developing A Contemporary Operating Systems Course, Saverio Perugini, David J. Wright
Developing A Contemporary Operating Systems Course, Saverio Perugini, David J. Wright
Saverio Perugini
The objective of this tutorial presentation is to foster innovation in the teaching of operating systems (os) at the undergraduate level as part of a three-year NSF-funded IUSE (Improving Undergraduate STEM Education) project titled “Engaged Student Learning: Reconceptualizing and Evaluating a Core Computer Science Course for Active Learning and STEM Student Success” (2017–2020).
Research-Based Web Design & Usability Guidelines [2006 Edition], Michael O. Leavitt, Ben Shneiderman, Robert W. Bailey, Carol Barnum, John Bosley, Barbara Chaparro, Joseph Dumas, Melody Y. Ivory, Bonnie John, Hal Miller-Jacobs, Sanjay J. Koyani, James R. Lewis, Stanley Page, Judith Ramey, Janice (Ginny) Redish, Jean Scholtz, Steve Wigginton, Cari A. Wolfson, Larry E. Wood, Don Zimmerman
Research-Based Web Design & Usability Guidelines [2006 Edition], Michael O. Leavitt, Ben Shneiderman, Robert W. Bailey, Carol Barnum, John Bosley, Barbara Chaparro, Joseph Dumas, Melody Y. Ivory, Bonnie John, Hal Miller-Jacobs, Sanjay J. Koyani, James R. Lewis, Stanley Page, Judith Ramey, Janice (Ginny) Redish, Jean Scholtz, Steve Wigginton, Cari A. Wolfson, Larry E. Wood, Don Zimmerman
Barbara S. Chaparro
The new edition of the U.S. Department of Health and Human Services’ (HHS) Research-Based Web Design and Usability Guidelines. These guidelines reflect HHS’ commitment to identifying innovative, research-based approaches that result in highly responsive and easy-to-use Web sites for the public.
These guidelines help move us in that direction by providing practical, yet authoritative, guidance on a broad range of Web design and communication issues. Having access to the best available research helps to ensure we make the right decisions the first time around and reduces the possibility of errors and costly mistakes.
The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2017, Buenaventura "Ven" Basco
The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2017, Buenaventura "Ven" Basco
Buenaventura "Ven" Basco
No abstract provided.
The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2016, Ven Basco
The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2016, Ven Basco
Buenaventura "Ven" Basco
No abstract provided.
The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2016, Buenaventura "Ven" Basco
The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2016, Buenaventura "Ven" Basco
Buenaventura "Ven" Basco
No abstract provided.
The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2015, Ven Basco
The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2015, Ven Basco
Buenaventura "Ven" Basco
No abstract provided.
Smt-Based Constraint Answer Set Solver Ezsmt+ For Non-Tight Programs, Da Shen, Yuliya Lierler
Smt-Based Constraint Answer Set Solver Ezsmt+ For Non-Tight Programs, Da Shen, Yuliya Lierler
Yuliya Lierler
Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie M. Wissel, Lisa Deluca
Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie M. Wissel, Lisa Deluca
Kathryn Wissel, MBA, MI
Smt-Based Constraint Answer Set Solver Ezsmt, Yuliya Lierler
Smt-Based Constraint Answer Set Solver Ezsmt, Yuliya Lierler
Yuliya Lierler
No abstract provided.
Strong Equivalence And Conservative Extensions Hand In Hand For Arguing Correctness Of New Action Language C Formalization, Yuliya Lierler
Strong Equivalence And Conservative Extensions Hand In Hand For Arguing Correctness Of New Action Language C Formalization, Yuliya Lierler
Yuliya Lierler
Mathchat: Computational Mathematics Via A Social Machine, Manfred Minimair
Mathchat: Computational Mathematics Via A Social Machine, Manfred Minimair
Manfred Minimair
Knowledge Extraction From Metacognitive Reading Strategies Data Using Induction Trees, Christopher Taylor, Arun D. Kulkarni, Kouider Mokhtari
Knowledge Extraction From Metacognitive Reading Strategies Data Using Induction Trees, Christopher Taylor, Arun D. Kulkarni, Kouider Mokhtari
Kouider Mokhtari
The assessment of students’ metacognitive knowledge and skills about reading is critical in determining their ability to read academic texts and do so with comprehension. In this paper, we used induction trees to extract metacognitive knowledge about reading from a reading strategies dataset obtained from a group of 1636 undergraduate college students. Using a C4.5 algorithm, we constructed decision trees, which helped us classify participants into three groups based on their metacognitive strategy awareness levels consisting of global, problem-solving and support reading strategies. We extracted rules from these decision trees, and in order to evaluate accuracy of the extracted rules, …
Assessing Metacognitive Skills Using Adaptive Neural Networks, Anderson Justin, Kouider Mokhtari, Arun Kulkarni
Assessing Metacognitive Skills Using Adaptive Neural Networks, Anderson Justin, Kouider Mokhtari, Arun Kulkarni
Kouider Mokhtari
The assessment of student's levels of metacognitive knowledge and skills is critical in determining their ability to effectively perform complex cognitive tasks such as solving mathematics or reading comprehension problems. In this paper, we use an adaptive multiplayer perceptron model to categorize participants based on their metacognitive awareness and perceived use of reading strategies while reading. Eight hundred and sixty-five middle school students participated in the study. All participants completed a 30-item instrument- the Metacognitive Awareness-of-Reading Strategies Inventory (MARSI). We used adaptive multi-layer perceptron models to classify participants into three groups based on their metacognitive strategy awareness levels using thirteen …
Haptic Alternatives For Mobile Device Authentication By Older Technology Users, David M. Cook, Kulwinder Kaur
Haptic Alternatives For Mobile Device Authentication By Older Technology Users, David M. Cook, Kulwinder Kaur
Dr. David M Cook
The Efficacy Of Using Virtual Reality For Job Interviews And Its Effects On Mitigating Discrimination, David M. Cook, Rico Beti, Faris Al-Khatib
The Efficacy Of Using Virtual Reality For Job Interviews And Its Effects On Mitigating Discrimination, David M. Cook, Rico Beti, Faris Al-Khatib
Dr. David M Cook
Smt-Based Answer Set Solver Cmodels-Diff (System Description), Da Shen, Yuliya Lierler
Smt-Based Answer Set Solver Cmodels-Diff (System Description), Da Shen, Yuliya Lierler
Yuliya Lierler
Developing A Mathematical Social Machine For Computational Network Analysis, Manfred Minimair
Developing A Mathematical Social Machine For Computational Network Analysis, Manfred Minimair
Manfred Minimair
An Investigation Into Trust And Security In The Mandatory And Imposed Use Of Financial Icts Upon Older People, David Michael Cook
An Investigation Into Trust And Security In The Mandatory And Imposed Use Of Financial Icts Upon Older People, David Michael Cook
Dr. David M Cook
Care needs to be taken to reduce the number of people who are fearful and mistrustful of using ICT where that usage is forced upon them without choice or alternative. The growing incidence of mandatory and imposed online systems can result in confusion, misuse, fear, and rejection by people with only rudimentary ICT skills. A cohort where a high percentage of such people occur is older people, defined in this study as people over the age of 60 Examples of compulsory ICT interactions include some banks limiting bank statement access through online rather than paper-based options. Other examples include the …