Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Chapman University (13)
- San Jose State University (7)
- University of Dayton (7)
- University of Nebraska - Lincoln (7)
- City University of New York (CUNY) (6)
-
- Embry-Riddle Aeronautical University (6)
- California Polytechnic State University, San Luis Obispo (5)
- Western University (5)
- University of New Mexico (4)
- Utah State University (4)
- California State University, San Bernardino (3)
- Illinois State University (3)
- Technological University Dublin (3)
- University of Tennessee, Knoxville (3)
- Virginia Commonwealth University (3)
- Augustana College (2)
- Cedarville University (2)
- Claremont Colleges (2)
- Colby College (2)
- Loyola University Chicago (2)
- Michigan Technological University (2)
- Montclair State University (2)
- Purdue University (2)
- Rochester Institute of Technology (2)
- The University of Akron (2)
- Air Force Institute of Technology (1)
- Bellarmine University (1)
- Bowling Green State University (1)
- Central Washington University (1)
- De La Salle University (1)
- Keyword
-
- Programming (3)
- Android (2)
- App (2)
- Artificial intelligence (2)
- Big data (2)
-
- Bioinformatics (2)
- CUDA (2)
- Canada (2)
- Clustering (2)
- Computer Science (2)
- Data Visualization (2)
- Data mining (2)
- Hidden Markov Model (2)
- Human computer interaction (2)
- IOS (2)
- Machine Learning (2)
- Natural language processing (2)
- OpenStreetMap (2)
- Quality (2)
- Volunteered geographic information (2)
- "hot hand" (1)
- 3D Printing (1)
- 3D model (1)
- 62-07 (1)
- 62-09 (1)
- 68-04 (1)
- Abm (1)
- Additive Manufacturing (1)
- Agent-based model (1)
- Alternative reading frames (1)
- Publication
-
- Computer Science Faculty Publications (7)
- Master's Projects (7)
- CSE Conference and Workshop Papers (6)
- Annual ADFSL Conference on Digital Forensics, Security and Law (5)
- Dissertations, Theses, and Capstone Projects (5)
-
- Mathematics, Physics, and Computer Science Faculty Articles and Research (5)
- Electronic Thesis and Dissertation Repository (4)
- Engineering Faculty Articles and Research (4)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (3)
- Annual Symposium on Biomathematics and Ecology Education and Research (3)
- Branch Mathematics and Statistics Faculty and Staff Publications (3)
- Computer Engineering (3)
- Electronic Theses and Dissertations (3)
- Electronic Theses, Projects, and Dissertations (3)
- Theses and Dissertations (3)
- Celebration of Learning (2)
- Computer Science: Faculty Publications and Other Works (2)
- Conference papers (2)
- Dissertations, Master's Theses and Master's Reports (2)
- Education Faculty Articles and Research (2)
- Honors Theses (2)
- Masters Theses (2)
- Presentations and other scholarship (2)
- The Research and Scholarship Symposium (2013-2019) (2)
- Williams Honors College, Honors Research Projects (2)
- All Graduate Projects (1)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
- Angelo King Institute for Economic and Business Studies (AKI) (1)
- CIRT News (1)
- CMC Senior Theses (1)
- Publication Type
- File Type
Articles 1 - 30 of 123
Full-Text Articles in Physical Sciences and Mathematics
Kodysynth, Ryan Kody
Kodysynth, Ryan Kody
Williams Honors College, Honors Research Projects
KodySynth is a VST digital synthesizer that can be loaded into any digital audio workstation such as FL Studio, Ableton, or Garageband. The program was made using the JUCE library which helped with streamlining the process and making it easier to create clean and intuitive looking graphics. The project also needs the Maximilian Library of sounds to create the sound waves that listeners will hear when playing the synthesizer. Users will also be able to plug in a MIDI keyboard to play KodySynth. The functionalities include a choice of 5 oscillator wave types, as well as an attack, decay, sustain, …
Analisis Desain Website Bni, Bukopin, J.Co Donuts Dan Mcdonals Menurut Buku "The Principles Of Beautiful Web Design", Fitria Ekarini
Analisis Desain Website Bni, Bukopin, J.Co Donuts Dan Mcdonals Menurut Buku "The Principles Of Beautiful Web Design", Fitria Ekarini
Elinvo (Electronics, Informatics, and Vocational Education)
Paper ini bertujuan untuk mengetahui hasil analisis desain beberapa tampilan website berdasarkan teori "The Principle Beautiful Web Design" menggunakan tujuh variabel antara lain Defining good Design, Web Page Anatomy, Grid Theory, Balance, Unity, Bread and Butter Layout dan Fresh Trends. Penelitian ini membandingkan empat website yang terdiri 2 jenis website perbankan dan 2 jenis food company. yaitu website BNI, website Bank BUKOPIN, website Jco Donuts, dan website McDonals. Hasilnya didapatkan bahwa website food company lebih baik dalam desain tampilan websitenya dibandingan dengan website perbankan. Dalam website food company hampir seluruh variabel digunakan dalam mendesain tampilan websitenya.
Atomistic Simulations And Network-Based Modeling Of The Hsp90-Cdc37 Chaperone Binding With Cdk4 Client Protein: A Mechanism Of Chaperoning Kinase Clients By Exploiting Weak Spots Of Intrinsically Dynamic Kinase Domains, John Czemeres, Kurt Buse, Gennady M. Verkhivker
Atomistic Simulations And Network-Based Modeling Of The Hsp90-Cdc37 Chaperone Binding With Cdk4 Client Protein: A Mechanism Of Chaperoning Kinase Clients By Exploiting Weak Spots Of Intrinsically Dynamic Kinase Domains, John Czemeres, Kurt Buse, Gennady M. Verkhivker
Mathematics, Physics, and Computer Science Faculty Articles and Research
A fundamental role of the Hsp90 and Cdc37 chaperones in mediating conformational development and activation of diverse protein kinase clients is essential in signal transduction. There has been increasing evidence that the Hsp90-Cdc37 system executes its chaperoning duties by recognizing conformational instability of kinase clients and modulating their folding landscapes. The recent cryo-electron microscopy structure of the Hsp90-Cdc37- Cdk4 kinase complex has provided a framework for dissecting regulatory principles underlying differentiation and recruitment of protein kinase clients to the chaperone machinery. In this work, we have combined atomistic simulations with protein stability and network-based rigidity decomposition analyses to characterize dynamic …
Virtual Reality As A Training Tool To Treat Physical Inactivity In Children, Adam W. Kiefer, David Pincus, Michael J. Richardson, Gregory D. Myer
Virtual Reality As A Training Tool To Treat Physical Inactivity In Children, Adam W. Kiefer, David Pincus, Michael J. Richardson, Gregory D. Myer
Psychology Faculty Articles and Research
Lack of adequate physical activity in children is an epidemic that can result in obesity and other poor health outcomes across the lifespan. Physical activity interventions focused on motor skill competence continue to be developed, but some interventions, such as neuromuscular training (NMT), may be limited in how early they can be implemented due to dependence on the child’s level of cognitive and perceptual-motor development. Early implementation of motor-rich activities that support motor skill development in children is critical for the development of healthy levels of physical activity that carry through into adulthood. Virtual reality (VR) training may be beneficial …
The Official Rulebook For Choice In Video Games: An Examination Of Choice In Modern Narrative Games, Tyler Paulley
The Official Rulebook For Choice In Video Games: An Examination Of Choice In Modern Narrative Games, Tyler Paulley
Undergraduate Theses
Film, drama, and novels are each capable of telling stories in a specialized way. This thesis makes the claim that video games are the newest means of storytelling and that they can tell stories in unique and engaging ways by using choice. The first goal of this thesis is to determine how and why choice is being used by game developers by examining several modern narrative games. After this examination, it is determined that the increase of choice-driven and narrative games have had an impact on the expectations of players, the goals of video games, and on game culture itself. …
Statistical Analysis Of Momentum In Basketball, Mackenzi Stump
Statistical Analysis Of Momentum In Basketball, Mackenzi Stump
Honors Projects
The “hot hand” in sports has been debated for as long as sports have been around. The debate involves whether streaks and slumps in sports are true phenomena or just simply perceptions in the mind of the human viewer. This statistical analysis of momentum in basketball analyzes the distribution of time between scoring events for the BGSU Women’s Basketball team from 2011-2017. We discuss how the distribution of time between scoring events changes with normal game factors such as location of the game, game outcome, and several other factors. If scoring events during a game were always randomly distributed, or …
Self-Assembly Of Tiles: Theoretical Models, The Power Of Signals, And Local Computing, Amirhossein Simjour
Self-Assembly Of Tiles: Theoretical Models, The Power Of Signals, And Local Computing, Amirhossein Simjour
Electronic Thesis and Dissertation Repository
DNA-based self-assembly is an autonomous process whereby a disordered system of DNA sequences forms an organized structure or pattern as a consequence of Watson-Crick complementarity of DNA sequences, without external direction.
Here, we propose self-assembly (SA) hypergraph automata as an automata-theoretic model for patterned self-assembly. We investigate the computational power of SA-hypergraph automata and show that for every recognizable picture language, there exists an SA-hypergraph automaton that accepts this language. Conversely, we prove that for any restricted SA-hypergraph automaton, there exists a Wang Tile System, a model for recognizable picture languages, that accepts the same language.
Moreover, we investigate the …
A Restful Framework For Writing, Running, And Evaluating Code In Multiple Academic Settings, Christopher Ban
A Restful Framework For Writing, Running, And Evaluating Code In Multiple Academic Settings, Christopher Ban
MS in Computer Science Project Reports
In academia, students and professors want a well-structured and implemented framework for writing and running code in both testing and learning environments. The current limitations of the paper and pencil medium have led to the creation of many different online grading systems. However, no known system provides all of the essential features our client is interested in. Our system, developed in conjunction with Doctor Halterman, offers the ability to build modules from flat files, allow code to be compiled and run in the browser, provide users with immediate feedback, support multiple languages, and offer a module designed specifically for an …
3d Printing Concrete Structures And Verifying Integrity Of Their G-Code Instructions: Border Wall A Case Study, Jason Breland
3d Printing Concrete Structures And Verifying Integrity Of Their G-Code Instructions: Border Wall A Case Study, Jason Breland
Dissertations
Thanks to advances in Additive Manufacturing (AM) technology and continued research by academics and entrepreneurs alike, the ability to “3d print” permanent concrete structures such as homes or offices is now a reality. Generally, AM is the process that allows for a 3d model of an object to be converted into hardware instructions to generate that object layer by layer using a malleable medium such as a plastic. Specifically, large scale concrete AM can now generate a structure, such as a building, layer by layer more quickly and efficiently than traditional construction methods [6, 39]. This innovative, semi-autonomous process promises …
Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell
Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell
Journal of Digital Forensics, Security and Law
Digital forensics is a multidisciplinary field encompassing both computer science and criminal justice. This action research compared demonstrated skill levels of university students enrolled in a semester course in small device forensics with 54 hours of instruction in mobile forensics with an emphasis on physical techniques such as JTAG and Chip-Off extraction against the skill levels of industry professionals who have completed an accelerated 40 hour advanced mobile forensics training covering much of the same material to include JTAG and Chip-Off extraction. Participant backgrounds were also examined to determine if those participants with a background in computer science had an …
Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad
Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
In this thesis, we present the design and implementation of a stand-alone tool for metabolic simulations. This system is able to integrate custom-built SBML models along with external user’s input information and produces the estimation of any reactants participating in the chain of the reactions in the provided model, e.g., ATP, Glucose, Insulin, for the given duration using numerical analysis and simulations. This tool offers the food intake arguments in the calculations to consider the personalized metabolic characteristics in the simulations. The tool has also been generalized to take into consideration of temporal genomic information and be flexible for simulation …
Web Application For Graduate Course Advising System, Sanjay Karrolla
Web Application For Graduate Course Advising System, Sanjay Karrolla
Electronic Theses, Projects, and Dissertations
The main aim of the course recommendation system is to build a course recommendation path for students to help them plan courses to successfully graduate on time. The Model-View-Controller (MVC) architecture is used to isolate the user interface (UI) design from the business logic. The front-end of the application develops the UI using AngularJS. The front-end design is done by gathering the functionality system requirements -- input controls, navigational components, informational components and containers and usability testing. The back-end of the application involves setting up the database and server-side routing. Server-side routing is done using Express JS.
A Cluster Analysis Of Challenging Behaviors In Autism Spectrum Disorder, Elizabeth Stevens, Abigail Atchison, Laura Stevens, Esther Hong, Doreen Granpeesheh, Dennis Dixon, Erik J. Linstead
A Cluster Analysis Of Challenging Behaviors In Autism Spectrum Disorder, Elizabeth Stevens, Abigail Atchison, Laura Stevens, Esther Hong, Doreen Granpeesheh, Dennis Dixon, Erik J. Linstead
Mathematics, Physics, and Computer Science Faculty Articles and Research
We apply cluster analysis to a sample of 2,116 children with Autism Spectrum Disorder in order to identify patterns of challenging behaviors observed in home and centerbased clinical settings. The largest study of this type to date, and the first to employ machine learning, our results indicate that while the presence of multiple challenging behaviors is common, in most cases a dominant behavior emerges. Furthermore, the trend is also observed when we train our cluster models on the male and female samples separately. This work provides a basis for future studies to understand the relationship of challenging behavior profiles to …
Separating Markup From Text, Ronald I. Greenberg, George K. Thiruvathukal
Separating Markup From Text, Ronald I. Greenberg, George K. Thiruvathukal
Computer Science: Faculty Publications and Other Works
As more and more online versions of Humanities texts are created, it is becoming commonplace to embed elaborate formatting, for example, through the use of HTML. But this can interfere with computerized analyses of the original text. While it may seem, at first, straightforward to simply strip markup from text, this is not the reality. Many digital texts add things that appear to be legitimate content according to the markup syntax, for example, line numbers, and even apart from this issue, existing tools for stripping markup produce inconsistent results. Apart from adopting and enforcing strict conventions for adding markup to …
Adaptation Of Legacy Computer Science Complexity Metrics To Sysml Diagrams, Victor Lopez
Adaptation Of Legacy Computer Science Complexity Metrics To Sysml Diagrams, Victor Lopez
Von Braun Symposium Student Posters
No abstract provided.
Analyzing Http Requests For Web Intrusion Detection, Sara Althubiti, Xiaohong Yuan, Albert Esterline
Analyzing Http Requests For Web Intrusion Detection, Sara Althubiti, Xiaohong Yuan, Albert Esterline
KSU Proceedings on Cybersecurity Education, Research and Practice
Many web application security problems related to intrusion have resulted from the rapid development of web applications. To reduce the risk of web application problems, web application developers need to take measures to write secure applications to prevent known attacks. When such measures fail, it is important to detect such attacks and find the source of the attacks to reduce the estimated risks. Intrusion detection is one of the powerful techniques designed to identify and prevent harm to the system. Most defensive techniques in Web Intrusion Systems are not able to deal with the complexity of cyber-attacks in web applications. …
Critical Digital Literacies Across Scales And Beneath The Screen, Noah Asher Golden
Critical Digital Literacies Across Scales And Beneath The Screen, Noah Asher Golden
Education Faculty Articles and Research
Digital technologies and education scholarship tend to focus on either individual creative design or analysis of the political economy. To better understand how ideologies travel across networks, critical digital literacies must focus on enactments beneath the screen, as the linguistic constructs known as software can enact interests across scales of activity to “disembed” local actions and meaning. Investigations of these mobilities and disembedding effects challenge popular notions of digital technologies as neutral, rendering overt the ways that algorithms can naturalize manifestations of power and social arrangements. Such a framework allows for descriptive analyses of the ways hegemonic discourses are enacted …
Using Tablet Technologies To Engage And Motivate Urban High School Students, Nicol R. Howard, Keith Howard
Using Tablet Technologies To Engage And Motivate Urban High School Students, Nicol R. Howard, Keith Howard
Education Faculty Articles and Research
In this two-year study, researchers examined the impact of using tablet technologies across content areas in an urban high school setting. Class observations provided notable examples of how student motivation and learning appeared to be enhanced by use of the iPads in conjunction with opportunities to collaborate and be creative in the context of their learning. Interviews from a set of teachers with a range of classroom teaching experience provided multiple perspectives of the program’s impact. The opportunity for teachers and students to have the flexibility to select the apps they believe achieve curricular and/or learning goals supports the shift …
A Cellular Automaton Modeling Approach To Chestnut Blight Canker Development, Samuel Iselin
A Cellular Automaton Modeling Approach To Chestnut Blight Canker Development, Samuel Iselin
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
Cnemidophorus Sexlineatus And The Impacts The Environment Has On Its Population At The Braidwood Dunes, Jeremiah Soto
Cnemidophorus Sexlineatus And The Impacts The Environment Has On Its Population At The Braidwood Dunes, Jeremiah Soto
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
Land Cover Change Shows Little Effect On Migration Patterns Of Wood Storks And Great Egrets, Johanna Smith
Land Cover Change Shows Little Effect On Migration Patterns Of Wood Storks And Great Egrets, Johanna Smith
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
Spatiotemporal Subspace Feature Tracking By Mining Discriminatory Characteristics, Richard D. Appiah
Spatiotemporal Subspace Feature Tracking By Mining Discriminatory Characteristics, Richard D. Appiah
Doctoral Dissertations
Recent advancements in data collection technologies have made it possible to collect heterogeneous data at complex levels of abstraction, and at an alarming pace and volume. Data mining, and most recently data science seek to discover hidden patterns and insights from these data by employing a variety of knowledge discovery techniques. At the core of these techniques is the selection and use of features, variables or properties upon which the data were acquired to facilitate effective data modeling. Selecting relevant features in data modeling is critical to ensure an overall model accuracy and optimal predictive performance of future effects. The …
An Evaluation Of The Effects Of Intensity And Duration On Outcomes Across Treatment Domains For Children With Autism Spectrum Disorder, Erik J. Linstead, D. R. Dixon, E. Hong, C. O. Burns, Ryan French, M. N. Novack, D. Granpeesheh
An Evaluation Of The Effects Of Intensity And Duration On Outcomes Across Treatment Domains For Children With Autism Spectrum Disorder, Erik J. Linstead, D. R. Dixon, E. Hong, C. O. Burns, Ryan French, M. N. Novack, D. Granpeesheh
Mathematics, Physics, and Computer Science Faculty Articles and Research
Applied behavior analysis (ABA) is considered an effective treatment for individuals with autism spectrum disorder (ASD), and many researchers have further investigated factors associated with treatment outcomes. However, few studies have focused on whether treatment intensity and duration have differential influences on separate skills. The aim of the current study was to investigate how treatment intensity and duration impact learning across different treatment domains, including academic, adaptive, cognitive, executive function, language, motor, play, and social. Separate multiple linear regression analyses were used to evaluate these relationships. Participants included 1468 children with ASD, ages 18 months to 12 years old, M= …
An Efficient Image Segmentation Algorithm Using Neutrosophic Graph Cut, Florentin Smarandache, Yanhui Guo, Yaman Akbulut, Abdulkadir Sengur, Rong Xia
An Efficient Image Segmentation Algorithm Using Neutrosophic Graph Cut, Florentin Smarandache, Yanhui Guo, Yaman Akbulut, Abdulkadir Sengur, Rong Xia
Branch Mathematics and Statistics Faculty and Staff Publications
Segmentation is considered as an important step in image processing and computer vision applications, which divides an input image into various non-overlapping homogenous regions and helps to interpret the image more conveniently. This paper presents an efficient image segmentation algorithm using neutrosophic graph cut (NGC). An image is presented in neutrosophic set, and an indeterminacy filter is constructed using the indeterminacy value of the input image, which is defined by combining the spatial information and intensity information. The indeterminacy filter reduces the indeterminacy of the spatial and intensity information. A graph is defined on the image and the weight for …
Morphogenesis And Growth Driven By Selection Of Dynamical Properties, Yuri Cantor
Morphogenesis And Growth Driven By Selection Of Dynamical Properties, Yuri Cantor
Dissertations, Theses, and Capstone Projects
Organisms are understood to be complex adaptive systems that evolved to thrive in hostile environments. Though widely studied, the phenomena of organism development and growth, and their relationship to organism dynamics is not well understood. Indeed, the large number of components, their interconnectivity, and complex system interactions all obscure our ability to see, describe, and understand the functioning of biological organisms.
Here we take a synthetic and computational approach to the problem, abstracting the organism as a cellular automaton. Such systems are discrete digital models of real-world environments, making them more accessible and easier to study then their physical world …
Secure And Efficient Delegation Of A Single And Multiple Exponentiations To A Single Malicious Server, Matluba Khodjaeva
Secure And Efficient Delegation Of A Single And Multiple Exponentiations To A Single Malicious Server, Matluba Khodjaeva
Dissertations, Theses, and Capstone Projects
Group exponentiation is an important operation used in many cryptographic protocols, specifically public-key cryptosystems such as RSA, Diffie Hellman, ElGamal, etc. To expand the applicability of group exponentiation to computationally weaker devices, procedures were established by which to delegate this operation from a computationally weaker client to a computationally stronger server. However, solving this problem with a single, possibly malicious, server, has remained open since a formal cryptographic model was introduced by Hohenberger and Lysyanskaya in 2005. Several later attempts either failed to achieve privacy or only achieved constant security probability.
In this dissertation, we study and solve this problem …
Comparing And Improving Facial Recognition Method, Brandon Luis Sierra
Comparing And Improving Facial Recognition Method, Brandon Luis Sierra
Electronic Theses, Projects, and Dissertations
Facial recognition is the process in which a sample face can be correctly identified by a machine amongst a group of different faces. With the never-ending need for improvement in the fields of security, surveillance, and identification, facial recognition is becoming increasingly important. Considering this importance, it is imperative that the correct faces are recognized and the error rate is as minimal as possible. Despite the wide variety of current methods for facial recognition, there is no clear cut best method. This project reviews and examines three different methods for facial recognition: Eigenfaces, Fisherfaces, and Local Binary Patterns to determine …
Rating By Ranking: An Improved Scale For Judgement-Based Labels, Jack O'Neill, Sarah Jane Delany, Brian Mac Namee
Rating By Ranking: An Improved Scale For Judgement-Based Labels, Jack O'Neill, Sarah Jane Delany, Brian Mac Namee
Conference papers
Labels representing value judgements are commonly elicited using an interval scale of absolute values. Data collected in such a manner is not always reliable. Psychologists have long recognized a number of biases to which many human raters are prone, and which result in disagreement among raters as to the true gold standard rating of any particular object. We hypothesize that the issues arising from rater bias may be mitigated by treating the data received as an ordered set of preferences rather than a collection of absolute values. We experiment on real-world and artificially generated data, finding that treating label ratings …
Research On Improving Navigation Safety Based On Big Data And Cloud Computing Technology For Qiongzhou Strait, Rui Wang
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Computer Vision Problems In 3d Plant Phenotyping, Ayan Chaudhury
Computer Vision Problems In 3d Plant Phenotyping, Ayan Chaudhury
Electronic Thesis and Dissertation Repository
In recent years, there has been significant progress in Computer Vision based plant phenotyping (quantitative analysis of biological properties of plants) technologies. Traditional methods of plant phenotyping are destructive, manual and error prone. Due to non-invasiveness and non-contact properties as well as increased accuracy, imaging techniques are becoming state-of-the-art in plant phenotyping. Among several parameters of plant phenotyping, growth analysis is very important for biological inference. Automating the growth analysis can result in accelerating the throughput in crop production. This thesis contributes to the automation of plant growth analysis.
First, we present a novel system for automated and non-invasive/non-contact plant …