Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences

2017

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 123

Full-Text Articles in Physical Sciences and Mathematics

Kodysynth, Ryan Kody Dec 2017

Kodysynth, Ryan Kody

Williams Honors College, Honors Research Projects

KodySynth is a VST digital synthesizer that can be loaded into any digital audio workstation such as FL Studio, Ableton, or Garageband. The program was made using the JUCE library which helped with streamlining the process and making it easier to create clean and intuitive looking graphics. The project also needs the Maximilian Library of sounds to create the sound waves that listeners will hear when playing the synthesizer. Users will also be able to plug in a MIDI keyboard to play KodySynth. The functionalities include a choice of 5 oscillator wave types, as well as an attack, decay, sustain, …


Analisis Desain Website Bni, Bukopin, J.Co Donuts Dan Mcdonals Menurut Buku "The Principles Of Beautiful Web Design", Fitria Ekarini Dec 2017

Analisis Desain Website Bni, Bukopin, J.Co Donuts Dan Mcdonals Menurut Buku "The Principles Of Beautiful Web Design", Fitria Ekarini

Elinvo (Electronics, Informatics, and Vocational Education)

Paper ini bertujuan untuk mengetahui hasil analisis desain beberapa tampilan website berdasarkan teori "The Principle Beautiful Web Design" menggunakan tujuh variabel antara lain Defining good Design, Web Page Anatomy, Grid Theory, Balance, Unity, Bread and Butter Layout dan Fresh Trends. Penelitian ini membandingkan empat website yang terdiri 2 jenis website perbankan dan 2 jenis food company. yaitu website BNI, website Bank BUKOPIN, website Jco Donuts, dan website McDonals. Hasilnya didapatkan bahwa website food company lebih baik dalam desain tampilan websitenya dibandingan dengan website perbankan. Dalam website food company hampir seluruh variabel digunakan dalam mendesain tampilan websitenya.


Atomistic Simulations And Network-Based Modeling Of The Hsp90-Cdc37 Chaperone Binding With Cdk4 Client Protein: A Mechanism Of Chaperoning Kinase Clients By Exploiting Weak Spots Of Intrinsically Dynamic Kinase Domains, John Czemeres, Kurt Buse, Gennady M. Verkhivker Dec 2017

Atomistic Simulations And Network-Based Modeling Of The Hsp90-Cdc37 Chaperone Binding With Cdk4 Client Protein: A Mechanism Of Chaperoning Kinase Clients By Exploiting Weak Spots Of Intrinsically Dynamic Kinase Domains, John Czemeres, Kurt Buse, Gennady M. Verkhivker

Mathematics, Physics, and Computer Science Faculty Articles and Research

A fundamental role of the Hsp90 and Cdc37 chaperones in mediating conformational development and activation of diverse protein kinase clients is essential in signal transduction. There has been increasing evidence that the Hsp90-Cdc37 system executes its chaperoning duties by recognizing conformational instability of kinase clients and modulating their folding landscapes. The recent cryo-electron microscopy structure of the Hsp90-Cdc37- Cdk4 kinase complex has provided a framework for dissecting regulatory principles underlying differentiation and recruitment of protein kinase clients to the chaperone machinery. In this work, we have combined atomistic simulations with protein stability and network-based rigidity decomposition analyses to characterize dynamic …


Virtual Reality As A Training Tool To Treat Physical Inactivity In Children, Adam W. Kiefer, David Pincus, Michael J. Richardson, Gregory D. Myer Dec 2017

Virtual Reality As A Training Tool To Treat Physical Inactivity In Children, Adam W. Kiefer, David Pincus, Michael J. Richardson, Gregory D. Myer

Psychology Faculty Articles and Research

Lack of adequate physical activity in children is an epidemic that can result in obesity and other poor health outcomes across the lifespan. Physical activity interventions focused on motor skill competence continue to be developed, but some interventions, such as neuromuscular training (NMT), may be limited in how early they can be implemented due to dependence on the child’s level of cognitive and perceptual-motor development. Early implementation of motor-rich activities that support motor skill development in children is critical for the development of healthy levels of physical activity that carry through into adulthood. Virtual reality (VR) training may be beneficial …


The Official Rulebook For Choice In Video Games: An Examination Of Choice In Modern Narrative Games, Tyler Paulley Dec 2017

The Official Rulebook For Choice In Video Games: An Examination Of Choice In Modern Narrative Games, Tyler Paulley

Undergraduate Theses

Film, drama, and novels are each capable of telling stories in a specialized way. This thesis makes the claim that video games are the newest means of storytelling and that they can tell stories in unique and engaging ways by using choice. The first goal of this thesis is to determine how and why choice is being used by game developers by examining several modern narrative games. After this examination, it is determined that the increase of choice-driven and narrative games have had an impact on the expectations of players, the goals of video games, and on game culture itself. …


Statistical Analysis Of Momentum In Basketball, Mackenzi Stump Dec 2017

Statistical Analysis Of Momentum In Basketball, Mackenzi Stump

Honors Projects

The “hot hand” in sports has been debated for as long as sports have been around. The debate involves whether streaks and slumps in sports are true phenomena or just simply perceptions in the mind of the human viewer. This statistical analysis of momentum in basketball analyzes the distribution of time between scoring events for the BGSU Women’s Basketball team from 2011-2017. We discuss how the distribution of time between scoring events changes with normal game factors such as location of the game, game outcome, and several other factors. If scoring events during a game were always randomly distributed, or …


Self-Assembly Of Tiles: Theoretical Models, The Power Of Signals, And Local Computing, Amirhossein Simjour Dec 2017

Self-Assembly Of Tiles: Theoretical Models, The Power Of Signals, And Local Computing, Amirhossein Simjour

Electronic Thesis and Dissertation Repository

DNA-based self-assembly is an autonomous process whereby a disordered system of DNA sequences forms an organized structure or pattern as a consequence of Watson-Crick complementarity of DNA sequences, without external direction.

Here, we propose self-assembly (SA) hypergraph automata as an automata-theoretic model for patterned self-assembly. We investigate the computational power of SA-hypergraph automata and show that for every recognizable picture language, there exists an SA-hypergraph automaton that accepts this language. Conversely, we prove that for any restricted SA-hypergraph automaton, there exists a Wang Tile System, a model for recognizable picture languages, that accepts the same language.

Moreover, we investigate the …


A Restful Framework For Writing, Running, And Evaluating Code In Multiple Academic Settings, Christopher Ban Dec 2017

A Restful Framework For Writing, Running, And Evaluating Code In Multiple Academic Settings, Christopher Ban

MS in Computer Science Project Reports

In academia, students and professors want a well-structured and implemented framework for writing and running code in both testing and learning environments. The current limitations of the paper and pencil medium have led to the creation of many different online grading systems. However, no known system provides all of the essential features our client is interested in. Our system, developed in conjunction with Doctor Halterman, offers the ability to build modules from flat files, allow code to be compiled and run in the browser, provide users with immediate feedback, support multiple languages, and offer a module designed specifically for an …


3d Printing Concrete Structures And Verifying Integrity Of Their G-Code Instructions: Border Wall A Case Study, Jason Breland Dec 2017

3d Printing Concrete Structures And Verifying Integrity Of Their G-Code Instructions: Border Wall A Case Study, Jason Breland

Dissertations

Thanks to advances in Additive Manufacturing (AM) technology and continued research by academics and entrepreneurs alike, the ability to “3d print” permanent concrete structures such as homes or offices is now a reality. Generally, AM is the process that allows for a 3d model of an object to be converted into hardware instructions to generate that object layer by layer using a malleable medium such as a plastic. Specifically, large scale concrete AM can now generate a structure, such as a building, layer by layer more quickly and efficiently than traditional construction methods [6, 39]. This innovative, semi-autonomous process promises …


Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell Dec 2017

Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell

Journal of Digital Forensics, Security and Law

Digital forensics is a multidisciplinary field encompassing both computer science and criminal justice. This action research compared demonstrated skill levels of university students enrolled in a semester course in small device forensics with 54 hours of instruction in mobile forensics with an emphasis on physical techniques such as JTAG and Chip-Off extraction against the skill levels of industry professionals who have completed an accelerated 40 hour advanced mobile forensics training covering much of the same material to include JTAG and Chip-Off extraction. Participant backgrounds were also examined to determine if those participants with a background in computer science had an …


Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad Dec 2017

Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

In this thesis, we present the design and implementation of a stand-alone tool for metabolic simulations. This system is able to integrate custom-built SBML models along with external user’s input information and produces the estimation of any reactants participating in the chain of the reactions in the provided model, e.g., ATP, Glucose, Insulin, for the given duration using numerical analysis and simulations. This tool offers the food intake arguments in the calculations to consider the personalized metabolic characteristics in the simulations. The tool has also been generalized to take into consideration of temporal genomic information and be flexible for simulation …


Web Application For Graduate Course Advising System, Sanjay Karrolla Dec 2017

Web Application For Graduate Course Advising System, Sanjay Karrolla

Electronic Theses, Projects, and Dissertations

The main aim of the course recommendation system is to build a course recommendation path for students to help them plan courses to successfully graduate on time. The Model-View-Controller (MVC) architecture is used to isolate the user interface (UI) design from the business logic. The front-end of the application develops the UI using AngularJS. The front-end design is done by gathering the functionality system requirements -- input controls, navigational components, informational components and containers and usability testing. The back-end of the application involves setting up the database and server-side routing. Server-side routing is done using Express JS.


A Cluster Analysis Of Challenging Behaviors In Autism Spectrum Disorder, Elizabeth Stevens, Abigail Atchison, Laura Stevens, Esther Hong, Doreen Granpeesheh, Dennis Dixon, Erik J. Linstead Dec 2017

A Cluster Analysis Of Challenging Behaviors In Autism Spectrum Disorder, Elizabeth Stevens, Abigail Atchison, Laura Stevens, Esther Hong, Doreen Granpeesheh, Dennis Dixon, Erik J. Linstead

Mathematics, Physics, and Computer Science Faculty Articles and Research

We apply cluster analysis to a sample of 2,116 children with Autism Spectrum Disorder in order to identify patterns of challenging behaviors observed in home and centerbased clinical settings. The largest study of this type to date, and the first to employ machine learning, our results indicate that while the presence of multiple challenging behaviors is common, in most cases a dominant behavior emerges. Furthermore, the trend is also observed when we train our cluster models on the male and female samples separately. This work provides a basis for future studies to understand the relationship of challenging behavior profiles to …


Separating Markup From Text, Ronald I. Greenberg, George K. Thiruvathukal Nov 2017

Separating Markup From Text, Ronald I. Greenberg, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

As more and more online versions of Humanities texts are created, it is becoming commonplace to embed elaborate formatting, for example, through the use of HTML. But this can interfere with computerized analyses of the original text. While it may seem, at first, straightforward to simply strip markup from text, this is not the reality. Many digital texts add things that appear to be legitimate content according to the markup syntax, for example, line numbers, and even apart from this issue, existing tools for stripping markup produce inconsistent results. Apart from adopting and enforcing strict conventions for adding markup to …


Adaptation Of Legacy Computer Science Complexity Metrics To Sysml Diagrams, Victor Lopez Oct 2017

Adaptation Of Legacy Computer Science Complexity Metrics To Sysml Diagrams, Victor Lopez

Von Braun Symposium Student Posters

No abstract provided.


Analyzing Http Requests For Web Intrusion Detection, Sara Althubiti, Xiaohong Yuan, Albert Esterline Oct 2017

Analyzing Http Requests For Web Intrusion Detection, Sara Althubiti, Xiaohong Yuan, Albert Esterline

KSU Proceedings on Cybersecurity Education, Research and Practice

Many web application security problems related to intrusion have resulted from the rapid development of web applications. To reduce the risk of web application problems, web application developers need to take measures to write secure applications to prevent known attacks. When such measures fail, it is important to detect such attacks and find the source of the attacks to reduce the estimated risks. Intrusion detection is one of the powerful techniques designed to identify and prevent harm to the system. Most defensive techniques in Web Intrusion Systems are not able to deal with the complexity of cyber-attacks in web applications. …


Critical Digital Literacies Across Scales And Beneath The Screen, Noah Asher Golden Oct 2017

Critical Digital Literacies Across Scales And Beneath The Screen, Noah Asher Golden

Education Faculty Articles and Research

Digital technologies and education scholarship tend to focus on either individual creative design or analysis of the political economy. To better understand how ideologies travel across networks, critical digital literacies must focus on enactments beneath the screen, as the linguistic constructs known as software can enact interests across scales of activity to “disembed” local actions and meaning. Investigations of these mobilities and disembedding effects challenge popular notions of digital technologies as neutral, rendering overt the ways that algorithms can naturalize manifestations of power and social arrangements. Such a framework allows for descriptive analyses of the ways hegemonic discourses are enacted …


Using Tablet Technologies To Engage And Motivate Urban High School Students, Nicol R. Howard, Keith Howard Oct 2017

Using Tablet Technologies To Engage And Motivate Urban High School Students, Nicol R. Howard, Keith Howard

Education Faculty Articles and Research

In this two-year study, researchers examined the impact of using tablet technologies across content areas in an urban high school setting. Class observations provided notable examples of how student motivation and learning appeared to be enhanced by use of the iPads in conjunction with opportunities to collaborate and be creative in the context of their learning. Interviews from a set of teachers with a range of classroom teaching experience provided multiple perspectives of the program’s impact. The opportunity for teachers and students to have the flexibility to select the apps they believe achieve curricular and/or learning goals supports the shift …


A Cellular Automaton Modeling Approach To Chestnut Blight Canker Development, Samuel Iselin Oct 2017

A Cellular Automaton Modeling Approach To Chestnut Blight Canker Development, Samuel Iselin

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Cnemidophorus Sexlineatus And The Impacts The Environment Has On Its Population At The Braidwood Dunes, Jeremiah Soto Oct 2017

Cnemidophorus Sexlineatus And The Impacts The Environment Has On Its Population At The Braidwood Dunes, Jeremiah Soto

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Land Cover Change Shows Little Effect On Migration Patterns Of Wood Storks And Great Egrets, Johanna Smith Oct 2017

Land Cover Change Shows Little Effect On Migration Patterns Of Wood Storks And Great Egrets, Johanna Smith

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Spatiotemporal Subspace Feature Tracking By Mining Discriminatory Characteristics, Richard D. Appiah Oct 2017

Spatiotemporal Subspace Feature Tracking By Mining Discriminatory Characteristics, Richard D. Appiah

Doctoral Dissertations

Recent advancements in data collection technologies have made it possible to collect heterogeneous data at complex levels of abstraction, and at an alarming pace and volume. Data mining, and most recently data science seek to discover hidden patterns and insights from these data by employing a variety of knowledge discovery techniques. At the core of these techniques is the selection and use of features, variables or properties upon which the data were acquired to facilitate effective data modeling. Selecting relevant features in data modeling is critical to ensure an overall model accuracy and optimal predictive performance of future effects. The …


An Evaluation Of The Effects Of Intensity And Duration On Outcomes Across Treatment Domains For Children With Autism Spectrum Disorder, Erik J. Linstead, D. R. Dixon, E. Hong, C. O. Burns, Ryan French, M. N. Novack, D. Granpeesheh Sep 2017

An Evaluation Of The Effects Of Intensity And Duration On Outcomes Across Treatment Domains For Children With Autism Spectrum Disorder, Erik J. Linstead, D. R. Dixon, E. Hong, C. O. Burns, Ryan French, M. N. Novack, D. Granpeesheh

Mathematics, Physics, and Computer Science Faculty Articles and Research

Applied behavior analysis (ABA) is considered an effective treatment for individuals with autism spectrum disorder (ASD), and many researchers have further investigated factors associated with treatment outcomes. However, few studies have focused on whether treatment intensity and duration have differential influences on separate skills. The aim of the current study was to investigate how treatment intensity and duration impact learning across different treatment domains, including academic, adaptive, cognitive, executive function, language, motor, play, and social. Separate multiple linear regression analyses were used to evaluate these relationships. Participants included 1468 children with ASD, ages 18 months to 12 years old, M= …


An Efficient Image Segmentation Algorithm Using Neutrosophic Graph Cut, Florentin Smarandache, Yanhui Guo, Yaman Akbulut, Abdulkadir Sengur, Rong Xia Sep 2017

An Efficient Image Segmentation Algorithm Using Neutrosophic Graph Cut, Florentin Smarandache, Yanhui Guo, Yaman Akbulut, Abdulkadir Sengur, Rong Xia

Branch Mathematics and Statistics Faculty and Staff Publications

Segmentation is considered as an important step in image processing and computer vision applications, which divides an input image into various non-overlapping homogenous regions and helps to interpret the image more conveniently. This paper presents an efficient image segmentation algorithm using neutrosophic graph cut (NGC). An image is presented in neutrosophic set, and an indeterminacy filter is constructed using the indeterminacy value of the input image, which is defined by combining the spatial information and intensity information. The indeterminacy filter reduces the indeterminacy of the spatial and intensity information. A graph is defined on the image and the weight for …


Morphogenesis And Growth Driven By Selection Of Dynamical Properties, Yuri Cantor Sep 2017

Morphogenesis And Growth Driven By Selection Of Dynamical Properties, Yuri Cantor

Dissertations, Theses, and Capstone Projects

Organisms are understood to be complex adaptive systems that evolved to thrive in hostile environments. Though widely studied, the phenomena of organism development and growth, and their relationship to organism dynamics is not well understood. Indeed, the large number of components, their interconnectivity, and complex system interactions all obscure our ability to see, describe, and understand the functioning of biological organisms.

Here we take a synthetic and computational approach to the problem, abstracting the organism as a cellular automaton. Such systems are discrete digital models of real-world environments, making them more accessible and easier to study then their physical world …


Secure And Efficient Delegation Of A Single And Multiple Exponentiations To A Single Malicious Server, Matluba Khodjaeva Sep 2017

Secure And Efficient Delegation Of A Single And Multiple Exponentiations To A Single Malicious Server, Matluba Khodjaeva

Dissertations, Theses, and Capstone Projects

Group exponentiation is an important operation used in many cryptographic protocols, specifically public-key cryptosystems such as RSA, Diffie Hellman, ElGamal, etc. To expand the applicability of group exponentiation to computationally weaker devices, procedures were established by which to delegate this operation from a computationally weaker client to a computationally stronger server. However, solving this problem with a single, possibly malicious, server, has remained open since a formal cryptographic model was introduced by Hohenberger and Lysyanskaya in 2005. Several later attempts either failed to achieve privacy or only achieved constant security probability.

In this dissertation, we study and solve this problem …


Comparing And Improving Facial Recognition Method, Brandon Luis Sierra Sep 2017

Comparing And Improving Facial Recognition Method, Brandon Luis Sierra

Electronic Theses, Projects, and Dissertations

Facial recognition is the process in which a sample face can be correctly identified by a machine amongst a group of different faces. With the never-ending need for improvement in the fields of security, surveillance, and identification, facial recognition is becoming increasingly important. Considering this importance, it is imperative that the correct faces are recognized and the error rate is as minimal as possible. Despite the wide variety of current methods for facial recognition, there is no clear cut best method. This project reviews and examines three different methods for facial recognition: Eigenfaces, Fisherfaces, and Local Binary Patterns to determine …


Rating By Ranking: An Improved Scale For Judgement-Based Labels, Jack O'Neill, Sarah Jane Delany, Brian Mac Namee Aug 2017

Rating By Ranking: An Improved Scale For Judgement-Based Labels, Jack O'Neill, Sarah Jane Delany, Brian Mac Namee

Conference papers

Labels representing value judgements are commonly elicited using an interval scale of absolute values. Data collected in such a manner is not always reliable. Psychologists have long recognized a number of biases to which many human raters are prone, and which result in disagreement among raters as to the true gold standard rating of any particular object. We hypothesize that the issues arising from rater bias may be mitigated by treating the data received as an ordered set of preferences rather than a collection of absolute values. We experiment on real-world and artificially generated data, finding that treating label ratings …


Research On Improving Navigation Safety Based On Big Data And Cloud Computing Technology For Qiongzhou Strait, Rui Wang Aug 2017

Research On Improving Navigation Safety Based On Big Data And Cloud Computing Technology For Qiongzhou Strait, Rui Wang

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Computer Vision Problems In 3d Plant Phenotyping, Ayan Chaudhury Aug 2017

Computer Vision Problems In 3d Plant Phenotyping, Ayan Chaudhury

Electronic Thesis and Dissertation Repository

In recent years, there has been significant progress in Computer Vision based plant phenotyping (quantitative analysis of biological properties of plants) technologies. Traditional methods of plant phenotyping are destructive, manual and error prone. Due to non-invasiveness and non-contact properties as well as increased accuracy, imaging techniques are becoming state-of-the-art in plant phenotyping. Among several parameters of plant phenotyping, growth analysis is very important for biological inference. Automating the growth analysis can result in accelerating the throughput in crop production. This thesis contributes to the automation of plant growth analysis.

First, we present a novel system for automated and non-invasive/non-contact plant …