Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (6)
- City University of New York (CUNY) (3)
- San Jose State University (3)
- Bard College (2)
- Boise State University (2)
-
- East Tennessee State University (2)
- Eastern Washington University (2)
- Georgia Southern University (2)
- Kennesaw State University (2)
- Louisiana State University (2)
- Rollins College (2)
- The University of Akron (2)
- University of Louisville (2)
- Western University (2)
- Chapman University (1)
- Dakota State University (1)
- James Madison University (1)
- La Salle University (1)
- Louisiana Tech University (1)
- Southern Methodist University (1)
- The College of Wooster (1)
- The University of Maine (1)
- University of Massachusetts Amherst (1)
- University of Missouri, St. Louis (1)
- University of New Mexico (1)
- University of New Orleans (1)
- University of North Florida (1)
- Utah State University (1)
- Virginia Commonwealth University (1)
- Western Michigan University (1)
- Keyword
-
- Machine Learning (5)
- Machine learning (5)
- Computer Science (4)
- Algorithm (2)
- Mobile (2)
-
- Neural Networks (2)
- Social Media (2)
- 360-Degree Images (1)
- Academic -- UNF -- Computing; trust; trustworthiness; website design (1)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (1)
- Acceleration (1)
- Activity recognition (1)
- Adaboost (1)
- Alpha Values (1)
- Alternative futures analysis (1)
- Android (1)
- Anonymity networks (1)
- Arbitrage (1)
- Archives (1)
- Assistive Technology (1)
- Basketball (1)
- Bentham (1)
- Binding Sites (1)
- Blended Images (1)
- Blindness accessibility (1)
- Blocking (1)
- Bot (1)
- Bot Detection (1)
- Brain-Computer Interfaces (1)
- Case Study (1)
- Publication
-
- Electronic Theses and Dissertations (5)
- Master's Theses (5)
- Master's Projects (3)
- Boise State University Theses and Dissertations (2)
- Computer Science (2)
-
- Dissertations, Theses, and Capstone Projects (2)
- Doctoral Dissertations (2)
- EWU Masters Thesis Collection (2)
- Electronic Thesis and Dissertation Repository (2)
- LSU Master's Theses (2)
- Master of Science in Computer Science Theses (2)
- Senior Projects Spring 2018 (2)
- Williams Honors College, Honors Research Projects (2)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (1)
- Computer Science ETDs (1)
- Computer Science and Engineering Theses and Dissertations (1)
- Computer Science and Software Engineering (1)
- English (MA) Theses (1)
- Honors College Theses (1)
- Honors Theses (1)
- Masters Theses & Doctoral Dissertations (1)
- Mathematics and Computer Science Capstones (1)
- Senior Honors Projects, 2010-2019 (1)
- Senior Independent Study Theses (1)
- Student Theses (1)
- Theses (1)
- Theses and Dissertations (1)
- UNF Graduate Theses and Dissertations (1)
- Undergraduate Honors Theses (1)
- University of New Orleans Theses and Dissertations (1)
Articles 1 - 30 of 50
Full-Text Articles in Physical Sciences and Mathematics
Predicting Post-Procedural Complications Using Neural Networks On Mimic-Iii Data, Namratha Mohan
Predicting Post-Procedural Complications Using Neural Networks On Mimic-Iii Data, Namratha Mohan
LSU Master's Theses
The primary focus of this paper is the creation of a Machine Learning based algorithm for the analysis of large health based data sets. Our input was extracted from MIMIC-III, a large Health Record database of more than 40,000 patients. The main question was to predict if a patient will have complications during certain specified procedures performed in the hospital. These events are denoted by the icd9 code 996 in the individuals' health record. The output of our predictive model is a binary variable which outputs the value 1 if the patient is diagnosed with the specific complication or 0 …
Proposing An Optimized Algorithm For Consolidating Electric-Powered Shared Scooters Into Hubs For Efficiently Managing Their Charging And Maintenance Operations, Ojen Goshtasb
Master's Projects
The use of vehicles other than ones containing combustion engines have been adopted significantly over the past few years and the direction it’s taking seems to be the future of urban transportation. The hottest vehicle of choice currently is the electric scooter. They are small and portable, fast, and less costly compared to getting in a cab from Lyft or Uber to get around town. The goal of this paper is to make a proposal to drive the creation of a safe, efficient system for these scooters’ management. This must be beneficial to all parties involved; the rider, non-riders, and …
The Evolution Of Computational Propaganda: Trends, Threats, And Implications Now And In The Future, Holly Schnader
The Evolution Of Computational Propaganda: Trends, Threats, And Implications Now And In The Future, Holly Schnader
Senior Honors Projects, 2010-2019
Computational propaganda involves the use of selected narratives, social networks, and complex algorithms in order to develop and conduct influence operations (Woolley and Howard, 2017). In recent years the use of computational propaganda as an arm of cyberwarfare has increased in frequency. I aim to explore this topic to further understand the underlying forces behind the implementation of this tactic and then conduct a futures analysis to best determine how this topic will change over time. Additionally, I hope to gain insights on the implications of the current and potential future trends that computational propaganda has.
My preliminary assessment shows …
Variations On A Theme: Using Amino Acid Sequences To Generate Music, Aaron Kosmatin
Variations On A Theme: Using Amino Acid Sequences To Generate Music, Aaron Kosmatin
Master's Projects
In this project, we explore using a musical space to represent the properties of amino acids. We consider previous mappings and explore the limitations of these mappings. In this exploration, we will propose a new method of mapping into musical spaces that extends the properties that can be represented. For this work, we will use amino acid sequences as our example mapping. The amino acid properties we will use include mass, charge, structure, and hydrophobicity. Finally, we will show how the different musical properties can be compared for similarity.
Intra-Exchange Cryptocurrency Arbitrage Bot, Eric Han
Intra-Exchange Cryptocurrency Arbitrage Bot, Eric Han
Master's Projects
Cryptocurrencies are defined as a digital currency in which encryption techniques are utilized to regulate generation of units of currency and verify the transfer of funds, independent of a central governing body such as a bank. Due to the large number of cryptocurrencies currently available, there inherently exists many price discrepancies due to market inefficiencies. Market inefficiencies occur when the price of assets do not reflect their true value. In fact, these types of pricing discrepancies exist in other financial markets, including fiat currency exchanges and stock exchanges. However, these discrepancies are more significant in the cryptocurrency domain due to …
Using Dna For Data Storage: Encoding And Decoding Algorithm Development, Kelsey Suyehira
Using Dna For Data Storage: Encoding And Decoding Algorithm Development, Kelsey Suyehira
Boise State University Theses and Dissertations
The recent explosion of digital data has created an increasing need for improved data storage architectures with the ability to store large amounts of data over extensive periods of time. DNA as a data storage solution shows promise with a thousand times greater increase in information density and information retention times ranging from hundreds to thousands of years. This thesis explores the challenges and potential approaches in developing an encoding and decoding algorithm for use in a DNA data storage architecture. When encoding binary data into sequences representing DNA strands, the algorithms should account for biological constraints representing the idiosyncrasies …
Cleaver: Classification Of Everyday Activities Via Ensemble Recognizers, Samantha Hsu
Cleaver: Classification Of Everyday Activities Via Ensemble Recognizers, Samantha Hsu
Master's Theses
Physical activity can have immediate and long-term benefits on health and reduce the risk for chronic diseases. Valid measures of physical activity are needed in order to improve our understanding of the exact relationship between physical activity and health. Activity monitors have become a standard for measuring physical activity; accelerometers in particular are widely used in research and consumer products because they are objective, inexpensive, and practical. Previous studies have experimented with different monitor placements and classification methods. However, the majority of these methods were developed using data collected in controlled, laboratory-based settings, which is not reliably representative of real …
A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab
A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab
Electronic Theses and Dissertations
The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order …
Multidimensional Feature Engineering For Post-Translational Modification Prediction Problems, Norman Mapes Jr.
Multidimensional Feature Engineering For Post-Translational Modification Prediction Problems, Norman Mapes Jr.
Doctoral Dissertations
Protein sequence data has been produced at an astounding speed. This creates an opportunity to characterize these proteins for the treatment of illness. A crucial characterization of proteins is their post translational modifications (PTM). There are 20 amino acids coded by DNA after coding (translation) nearly every protein is modified at an amino acid level. We focus on three specific PTMs. First is the bonding formed between two cysteine amino acids, thus introducing a loop to the straight chain of a protein. Second, we predict which cysteines can generally be modified (oxidized). Finally, we predict which lysine amino acids are …
Leveraging Eye Structure And Motion To Build A Low-Power Wearable Gaze Tracking System, Addison Mayberry
Leveraging Eye Structure And Motion To Build A Low-Power Wearable Gaze Tracking System, Addison Mayberry
Doctoral Dissertations
Clinical studies have shown that features of a person's eyes can function as an effective proxy for cognitive state and neurological function. Technological advances in recent decades have allowed us to deepen this understanding and discover that the actions of the eyes are in fact very tightly coupled to the operation of the brain. Researchers have used camera-based eye monitoring technology to exploit this connection and analyze mental state across across many different metrics of interest. These range from simple things like attention and scene processing, to impairments such as a fatigue or substance use, and even significant mental disorders …
Rationality And Efficient Verifiable Computation, Matteo Campanelli
Rationality And Efficient Verifiable Computation, Matteo Campanelli
Dissertations, Theses, and Capstone Projects
In this thesis, we study protocols for delegating computation in a model where one of the parties is rational. In our model, a delegator outsources the computation of a function f on input x to a worker, who receives a (possibly monetary) reward. Our goal is to design very efficient delegation schemes where a worker is economically incentivized to provide the correct result f(x). In this work we strive for not relying on cryptographic assumptions, in particular our results do not require the existence of one-way functions.
We provide several results within the framework of rational proofs introduced by Azar …
Principles And Guidelines For Advancement Of Touchscreen-Based Non-Visual Access To 2d Spatial Information, Hari Prasath Palani
Principles And Guidelines For Advancement Of Touchscreen-Based Non-Visual Access To 2d Spatial Information, Hari Prasath Palani
Electronic Theses and Dissertations
Graphical materials such as graphs and maps are often inaccessible to millions of blind and visually-impaired (BVI) people, which negatively impacts their educational prospects, ability to travel, and vocational opportunities. To address this longstanding issue, a three-phase research program was conducted that builds on and extends previous work establishing touchscreen-based haptic cuing as a viable alternative for conveying digital graphics to BVI users. Although promising, this approach poses unique challenges that can only be addressed by schematizing the underlying graphical information based on perceptual and spatio-cognitive characteristics pertinent to touchscreen-based haptic access. Towards this end, this dissertation empirically identified a …
Improvement Of Decision On Coding Unit Split Mode And Intra-Picture Prediction By Machine Learning, Wenchan Jiang
Improvement Of Decision On Coding Unit Split Mode And Intra-Picture Prediction By Machine Learning, Wenchan Jiang
Master of Science in Computer Science Theses
High efficiency Video Coding (HEVC) has been deemed as the newest video coding standard of the ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group. The reference software (i.e., HM) have included the implementations of the guidelines in appliance with the new standard. The software includes both encoder and decoder functionality.
Machine learning (ML) works with data and processes it to discover patterns that can be later used to analyze new trends. ML can play a key role in a wide range of critical applications, such as data mining, natural language processing, image recognition, and expert systems. …
Assessing Apache Spark Streaming With Scientific Data, Janak Dahal
Assessing Apache Spark Streaming With Scientific Data, Janak Dahal
University of New Orleans Theses and Dissertations
Processing real-world data requires the ability to analyze data in real-time. Data processing engines like Hadoop come short when results are needed on the fly. Apache Spark's streaming library is increasingly becoming a popular choice as it can stream and analyze a significant amount of data. To showcase and assess the ability of Spark various metrics were designed and operated using data collected from the USGODAE data catalog. The latency of streaming in Apache Spark was measured and analyzed against many nodes in the cluster. Scalability was monitored by adding and removing nodes in the middle of a streaming job. …
Fostering The Retrieval Of Suitable Web Resources In Response To Children's Educational Search Tasks, Oghenemaro Deborah Anuyah
Fostering The Retrieval Of Suitable Web Resources In Response To Children's Educational Search Tasks, Oghenemaro Deborah Anuyah
Boise State University Theses and Dissertations
Children regularly turn to search engines (SEs) to locate school-related materials. Unfortunately, research has shown that when utilizing SEs, children do not always access resources that specifically target them. To support children, popular and child-oriented SEs make available a safe search filter, which is meant to eliminate inappropriate resources. Safe search is, however, not always the perfect deterrent as pornographic and hate-based resources may slip through the filter, while resources relevant to an educational search context may be misconstrued and filtered out. Moreover, filtering inappropriate resources in response to children searches is just one perspective to consider in offering them …
Building Test Anonymity Networks In A Cybersecurity Lab Environment, John Schriner
Building Test Anonymity Networks In A Cybersecurity Lab Environment, John Schriner
Student Theses
This paper explores current methods for creating test anonymity networks in a laboratory environment for the purpose of improving these networks while protecting user privacy. We first consider how each of these networks is research-driven and interested in helping researchers to conduct their research ethically. We then look to the software currently available for researchers to set up in their labs. Lastly we explore ways in which digital forensics and cybersecurity students could get involved with these projects and look at several class exercises that help students to understand particular attacks on these networks and ways they can help to …
An Algorithmic Approach To Creating Effective Study Groups Using A Smart Phone App, Kelvin J. Rosado-Ayala
An Algorithmic Approach To Creating Effective Study Groups Using A Smart Phone App, Kelvin J. Rosado-Ayala
Honors College Theses
For many students entering college, meeting new people and studying are a common struggle. Study groups are generally recommended, especially if the groups are comprised of members with complementary personality traits. But the challenge still remains, how do freshmen or transfer students find and form these heterogeneous study groups. In order to help alleviate this issue, an Android application was developed to automatically create study groups for students. Using basic information provided by students upon registration, the algorithm is able to automatically find matching group members. The application was designed using an agile life cycle model over the course of …
Mining Temporal Activity Patterns On Social Media, Nikan Chavoshi
Mining Temporal Activity Patterns On Social Media, Nikan Chavoshi
Computer Science ETDs
Social media provide communication networks for their users to easily create and share content. Automated accounts, called bots, abuse these platforms by engaging in suspicious and/or illegal activities. Bots push spam content and participate in sponsored activities to expand their audience. The prevalence of bot accounts in social media can harm the usability of these platforms, and decrease the level of trustworthiness in them. The main goal of this dissertation is to show that temporal analysis facilitates detecting bots in social media. I introduce new bot detection techniques which exploit temporal information. Since automated accounts are controlled by computer programs, …
Finding Spanning Trees In Strongly Connected Graphs With Per-Vertex Degree Constraints, Samuel Benjamin Chase
Finding Spanning Trees In Strongly Connected Graphs With Per-Vertex Degree Constraints, Samuel Benjamin Chase
Computer Science and Software Engineering
In this project, I sought to develop and prove new algorithms to create spanning trees on general graphs with per-vertex degree constraints. This means that each vertex in the graph would have some additional value, a degree constraint d. For a spanning tree to be correct, every vertex vi in the spanning tree must have a degree exactly equal to a degree constraint di. This poses an additional constraint on what would otherwise be a trivial spanning tree problem. In this paper, two proofs related to my studies will be discussed and analyzed, leading to my algorithm …
Acceleration Of Jaccard's Index Algorithm For Training To Tag Damage On Post-Earthquake Images, Kyle John Mulligan
Acceleration Of Jaccard's Index Algorithm For Training To Tag Damage On Post-Earthquake Images, Kyle John Mulligan
Master's Theses
There are currently different efforts to use Supervised Neural Networks (NN) to automatically label damages on images of above ground infrastructure (buildings made of concrete) taken after an earthquake. The goal of the supervised NN is to classify raw input data according to the patterns learned from an input training set. This input training data set is usually supplied by experts in the field, and in the case of this project, structural engineers carefully and mostly manually label these images for different types of damage. The level of expertise of the professionals labeling the training set varies widely, and some …
Topographic Maps: Image Processing And Path-Finding, Calin Washington
Topographic Maps: Image Processing And Path-Finding, Calin Washington
Master's Theses
Topographic maps are an invaluable tool for planning routes through unfamiliar terrain. However, accurately planning routes on topographic maps is a time- consuming and error-prone task. One factor is the difficulty of interpreting the map itself, which requires prior knowledge and practice. Another factor is the difficulty of making choices between possible routes that have different trade-offs between length and the terrain they traverse.
To alleviate these difficulties, this thesis presents a system to automate the process of finding routes on scanned images of topographic maps. The system allows users to select any two points on a topographic map and …
Rcon Administration Tool Designed For Use With Garry’S Mod And Source Servers, John Gibbons
Rcon Administration Tool Designed For Use With Garry’S Mod And Source Servers, John Gibbons
Mathematics and Computer Science Capstones
The proposed project is an Android application designed to interact with the Source RCON protocol. Defined below: The Source RCON Protocol is a TCP/IP-based communication protocol used by Source Dedicated Server, which allows console commands to be issued to the server via a "remote console", or RCON. The most common use of RCON is to allow server owners to control their game servers without direct access to the machine the server is running on. In order for commands to be accepted, the connection must first be authenticated using the server's RCON password, which can be set using the console variablercon_password.
Player-Response: On The Nature Of Interactive Narratives As Literature, Lee Feldman
Player-Response: On The Nature Of Interactive Narratives As Literature, Lee Feldman
English (MA) Theses
In recent years, having evolved beyond solely play-based interactions, it is now possible to analyze video games alongside other narrative forms, such as novels and films. Video games now involve rich stories that require input and interaction on behalf of the player. This level of agency likens video games to a kind of modern hypertext, networking and weaving various narrative threads together, something which traditional modes of media lack. When examined from the lens of reader-response criticism, this interaction deepens even further, acknowledging the player’s experience as a valid interpretation of a video game’s plot. The wide freedom of choice …
A Multiple Classifier System For Predicting Best-Selling Amazon Products, Michael Kranzlein
A Multiple Classifier System For Predicting Best-Selling Amazon Products, Michael Kranzlein
Master of Science in Computer Science Theses
In this work, I examine a dataset of Amazon product metadata and propose a heterogeneous multiple classifier system for the task of identifying best-selling products in multiple categories. This system of classifiers consumes the product description and the featured product image as input and feeds them through binary classifiers of the following types: Convolutional Neural Network, Na¨ıve Bayes, Random Forest, Ridge Regression, and Support Vector Machine. While each individual model is largely successful in identifying best-selling products from non best-selling products and from worst-selling products, the multiple classifier system is shown to be stronger than any individual model in the …
Investigation Of Alternatives For Migrating The One-Stop-Shop (Oss) Application To A Single, Web-Based Offering That Is Conducive For Both Desktop And Mobile Use., Sahiti Katragadda
Investigation Of Alternatives For Migrating The One-Stop-Shop (Oss) Application To A Single, Web-Based Offering That Is Conducive For Both Desktop And Mobile Use., Sahiti Katragadda
All Graduate Plan B and other Reports, Spring 1920 to Spring 2023
The One-Stop-Shop (OSS) application provides real-time data which is helpful for travelers in the Western United States in planning their travel. Included is traditional information (routing, imagery, weather), as well as points of interest and other route-specific information (elevations, rest areas, etc.). The system displays real-time data streams in a web-based application and in a separate mobile web application, which are presented to end users in a user-friendly format.
OSS web application and OSS mobile web application features have been examined and the best design features for the mobile application have been identified. Along with that, additional design features are …
Improving Swarm Performance By Applying Machine Learning To A New Dynamic Survey, John Taylor Jackson
Improving Swarm Performance By Applying Machine Learning To A New Dynamic Survey, John Taylor Jackson
Master's Theses
A company, Unanimous AI, has created a software platform that allows individuals to come together as a group or a human swarm to make decisions. These human swarms amplify the decision-making capabilities of both the individuals and the group. One way Unanimous AI increases the swarm’s collective decision-making capabilities is by limiting the swarm to more informed individuals on the given topic. The previous way Unanimous AI selected users to enter the swarm was improved upon by a new methodology that is detailed in this study. This new methodology implements a new type of survey that collects data that is …
Region Based Gene Expression Via Reanalysis Of Publicly Available Microarray Data Sets., Ernur Saka
Region Based Gene Expression Via Reanalysis Of Publicly Available Microarray Data Sets., Ernur Saka
Electronic Theses and Dissertations
A DNA microarray is a high-throughput technology used to identify relative gene expression. One of the most widely used platforms is the Affymetrix® GeneChip® technology which detects gene expression levels based on probe sets composed of a set of twenty-five nucleotide probes designed to hybridize with specific gene targets. Given a particular Affymetrix® GeneChip® platform, the design of the probes is fixed. However, the method of analysis is dynamic in nature due to the ability to annotate and group probes into uniquely defined groupings. This is particularly important since publicly available repositories of microarray datasets, such as ArrayExpress and NCBI’s …
Fm Radio Signal Propagation Evaluation And Creating Statistical Models For Signal Strength Prediction In Differing Topographic Environments, Timothy Land
Electronic Theses and Dissertations
Radio wave signal strength and associated propagation models are rarely analyzed across individual geographic provinces. This study evaluates the effectiveness of the Radio Mobile model to predict radio wave signal strength in the Blue Ridge and Valley and Ridge physiographic provinces. A spectrum analyzer was used on 19 FM transmitters to determine model accuracy. Statistical analysis determined the significance between different terrain factors and signal strength. Field signal strength was found to be related to test site elevation, transmitter azimuth, elevation angle, transmitter elevation, path loss, and distance. Using 76 signal strength receiver sites, Ordinary Least Square regression models predicted …
File Fragment Classification Using Neural Networks With Lossless Representations, Luke Hiester
File Fragment Classification Using Neural Networks With Lossless Representations, Luke Hiester
Undergraduate Honors Theses
This study explores the use of neural networks as universal models for classifying file fragments. This approach differs from previous work in its lossless feature representation, with fragments’ bits as direct input, and its use of feedforward, recurrent, and convolutional networks as classifiers, whereas previous work has only tested feedforward networks. Due to the study’s exploratory nature, the models were not directly evaluated in a practical setting; rather, easily reproducible experiments were performed to attempt to answer the initial question of whether this approach is worthwhile to pursue further, especially due to its high computational cost. The experiments tested classification …
Putting Fürer's Algorithm Into Practice With The Bpas Library, Linxiao Wang
Putting Fürer's Algorithm Into Practice With The Bpas Library, Linxiao Wang
Electronic Thesis and Dissertation Repository
Fast algorithms for integer and polynomial multiplication play an important role in scientific computing as well as other disciplines. In 1971, Schönhage and Strassen designed an algorithm that improved the multiplication time for two integers of at most n bits to O(log n log log n). In 2007, Martin Fürer presented a new algorithm that runs in O (n log n · 2 ^O(log* n)) , where log*n is the iterated logarithm of n. We explain how we can put Fürer’s ideas into practice for multiplying polynomials over a prime field Z/pZ, which characteristic is a Generalized Fermat prime of …