Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Physical Sciences and Mathematics

Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James May 2022

Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James

Computer Science and Computer Engineering Undergraduate Honors Theses

The state-of-the-art for pruning neural networks is ambiguous due to poor experimental practices in the field. Newly developed approaches rarely compare to each other, and when they do, their comparisons are lackluster or contain errors. In the interest of stabilizing the field of pruning, this paper initiates a dive into reproducing prominent pruning algorithms across several architectures and datasets. As a first step towards this goal, this paper shows results for foresight weight pruning across 6 baseline pruning strategies, 5 modern pruning strategies, random pruning, and one legacy method (Optimal Brain Damage). All strategies are evaluated on 3 different architectures …


A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall May 2022

A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall

Computer Science and Computer Engineering Undergraduate Honors Theses

The ability to synthesize custom DNA molecules has led to the feasibility of DNA nanotechnology. Synthesis is time-consuming and expensive, so simulations of proposed DNA designs are necessary. Open-source simulators, such as oxDNA, are available but often difficult to configure and interface with. Packages such as oxdna-tile-binding pro- vide an interface for oxDNA which allows for the ability to create scripts that automate the configuration process. This project works to improve the scripts in oxdna-tile-binding to improve integration with job scheduling systems commonly used in high-performance computing environments, improve ease-of-use and consistency within the scripts compos- ing oxdna-tile-binding, and move …


An Investigation Into, And The Construction Of, An Operable Windows Notifier, Grey Hixson May 2022

An Investigation Into, And The Construction Of, An Operable Windows Notifier, Grey Hixson

Computer Science and Computer Engineering Undergraduate Honors Theses

The Office of Sustainability at the University of Arkansas identified that building occupants that have control over operable windows may open them at inappropriate times. Windows opened in a building with a temperature and air differential leads to increased HVAC operating costs and building occupant discomfort. This led the Associate Vice Chancellor of Facilities at the University of Arkansas to propose the construction of a mobile application that a building occupant can use to make an informed decision before opening their window. I have formulated a series of research objectives in conjunction with the Director of the Office of Sustainability …


Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan May 2022

Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan

Computer Science and Computer Engineering Undergraduate Honors Theses

The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.


Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague May 2022

Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague

Computer Science and Computer Engineering Undergraduate Honors Theses

The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor's Algorithm. NIST proposed a standardization effort in creating a new class of asymmetric cryptography named Post-Quantum Cryptography (PQC). These new algorithms will be resistant against both classical computers and sufficiently powerful quantum computers. Although the new algorithms seem mathematically secure, they can possibly be broken by a class of attacks known as side-channels attacks (SCA). Side-channel attacks involve exploiting the hardware that the algorithm runs on to figure out secret values that could break the security of the system. …


A Comparison Of Word Embedding Techniques For Similarity Analysis, Tyler Gerth May 2021

A Comparison Of Word Embedding Techniques For Similarity Analysis, Tyler Gerth

Computer Science and Computer Engineering Undergraduate Honors Theses

There have been a multitude of word embedding techniques developed that allow a computer to process natural language and compare the relationships between different words programmatically. In this paper, similarity analysis, or the testing of words for synonymic relations, is used to compare several of these techniques to see which performs the best. The techniques being compared all utilize the method of creating word vectors, reducing words down into a single vector of numerical values that denote how the word relates to other words that appear around it. In order to get a holistic comparison, multiple analyses were made, with …


Using Deep Learning For Children Brain Image Analysis, Rafael Toche Pizano May 2021

Using Deep Learning For Children Brain Image Analysis, Rafael Toche Pizano

Computer Science and Computer Engineering Undergraduate Honors Theses

Analyzing the correlation between brain volumetric/morphometry features and cognition/behavior in children is important in the field of pediatrics as identifying such relationships can help identify children who may be at risk for illnesses. Understanding these relationships can not only help identify children who may be at risk of illnesses, but it can also help evaluate strategies that promote brain development in children. Currently, one way to do this is to use traditional statistical methods such as a correlation analysis, but such an approach does not make it easy to generalize and predict how brain volumetric/morphometry will impact cognition/behavior. One of …


Improving Bayesian Graph Convolutional Networks Using Markov Chain Monte Carlo Graph Sampling, Aneesh Komanduri May 2021

Improving Bayesian Graph Convolutional Networks Using Markov Chain Monte Carlo Graph Sampling, Aneesh Komanduri

Computer Science and Computer Engineering Undergraduate Honors Theses

In the modern age of social media and networks, graph representations of real-world phenomena have become incredibly crucial. Often, we are interested in understanding how entities in a graph are interconnected. Graph Neural Networks (GNNs) have proven to be a very useful tool in a variety of graph learning tasks including node classification, link prediction, and edge classification. However, in most of these tasks, the graph data we are working with may be noisy and may contain spurious edges. That is, there is a lot of uncertainty associated with the underlying graph structure. Recent approaches to modeling uncertainty have been …


Using Large Pre-Trained Language Models To Track Emotions Of Cancer Patients On Twitter, Will Baker May 2021

Using Large Pre-Trained Language Models To Track Emotions Of Cancer Patients On Twitter, Will Baker

Computer Science and Computer Engineering Undergraduate Honors Theses

Twitter is a microblogging website where any user can publicly release a message, called a tweet, expressing their feelings about current events or their own lives. This candid, unfiltered feedback is valuable in the spaces of healthcare and public health communications, where it may be difficult for cancer patients to divulge personal information to healthcare teams, and randomly selected patients may decline participation in surveys about their experiences. In this thesis, BERTweet, a state-of-the-art natural language processing (NLP) model, was used to predict sentiment and emotion labels for cancer-related tweets collected in 2019 and 2020. In longitudinal plots, trends in …


Trunctrimmer: A First Step Towards Automating Standard Bioinformatic Analysis, Z. Gunner Lawless, Dana Dittoe, Dale R. Thompson, Steven C. Ricke May 2021

Trunctrimmer: A First Step Towards Automating Standard Bioinformatic Analysis, Z. Gunner Lawless, Dana Dittoe, Dale R. Thompson, Steven C. Ricke

Computer Science and Computer Engineering Undergraduate Honors Theses

Bioinformatic analysis is a time-consuming process for labs performing research on various microbiomes. Researchers use tools like Qiime2 to help standardize the bioinformatic analysis methods, but even large, extensible platforms like Qiime2 have drawbacks due to the attention required by researchers. In this project, we propose to automate additional standard lab bioinformatic procedures by eliminating the existing manual process of determining the trim and truncate locations for paired end 2 sequences. We introduce a new Qiime2 plugin called TruncTrimmer to automate the process that usually requires the researcher to make a decision on where to trim and truncate manually after …


Incorporating Word Order Explicitly In Glove Word Embedding, Brandon Cox Dec 2019

Incorporating Word Order Explicitly In Glove Word Embedding, Brandon Cox

Computer Science and Computer Engineering Undergraduate Honors Theses

Word embedding is the process of representing words from a corpus of text as real number vectors. These vectors are often derived from frequency statistics from the source corpus. In the GloVe model as proposed by Pennington et al., these vectors are generated using a word-word cooccurrence matrix. However, the GloVe model fails to explicitly take into account the order in which words appear within the contexts of other words. In this paper, multiple methods of incorporating word order in GloVe word embeddings are proposed. The most successful method involves directly concatenating several word vector matrices for each position in …


A Support Vector Machine Base Model For Predicting Heparin-Binding Proteins Using Biological Metrics And Xb Patterns As Features, Joseph W. Sirrianni May 2016

A Support Vector Machine Base Model For Predicting Heparin-Binding Proteins Using Biological Metrics And Xb Patterns As Features, Joseph W. Sirrianni

Computer Science and Computer Engineering Undergraduate Honors Theses

Heparin is a highly sulphated and negatively charged polysaccharides belonging to the glycosamino- glycans(GAGs) family. It is widely used in medical treatments as an injectable anticoagulant. Although many heparin-binding proteins have been identified through experimental studies, there are still many proteins needing to be classified as heparin-binding or not. Many studies have been aimed at prediction of heparin binding patterns or motifs in the primary structure of proteins. For example XBBXBX and XBBBXXBX are two well-known patterns or motifs. In spite of intensive studies, still no good model has emerged which reasonably predicts proteins in the protein database as heparin-binding …


Parallelizing Scale Invariant Feature Transform On A Distributed Memory Cluster, Stanislav Bobovych May 2011

Parallelizing Scale Invariant Feature Transform On A Distributed Memory Cluster, Stanislav Bobovych

Computer Science and Computer Engineering Undergraduate Honors Theses

Scale Invariant Feature Transform (SIFT) is a computer vision algorithm that is widely-used to extract features from images. We explored accelerating an existing implementation of this algorithm with message passing in order to analyze large data sets. We successfully tested two approaches to data decomposition in order to parallelize SIFT on a distributed memory cluster.


Understanding Sources And Consequences Of Variation In Self-Assembly, Arjun Dasgupta May 2009

Understanding Sources And Consequences Of Variation In Self-Assembly, Arjun Dasgupta

Computer Science and Computer Engineering Undergraduate Honors Theses

Self-assembly is the process of constructing a larger structure from small component parts that randomly collide and bond through weak interactions [2]. It is a potentially important method in the field of nanoscale manufacturing. However, because of the nature of self-assembly, randomness and the design of self-assembly compete with each other, and unforeseen things can be produced. In this thesis, the tiling assembly model of Winfree [7] was simulated. The tiling assembly model has two bonds which assemble planar nanostructures. The goal of the simulations was to determine what probabilities would produce an average degree of four (the ideal) for …