Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- College seniors (17)
- Science projects (17)
- Undergraduate students (17)
- Engineering design, contest (15)
- Engineering, studying and teaching (15)
-
- Alpha-bearing wastes; Argonne Model for Universal Solvent Extraction (AMUSE); Computer programming; Separation (Technology); Software engineering; System analysis; Systems engineering; Transuranium elements – Separation; Uranium Recovery by Extraction (UREX) (9)
- Argonne Model for Universal Solvent Extraction (AMUSE); Computer programming; Radioactive wastes – Purification; Reactor fuel reprocessing; Separation (Technology); Software engineering; System analysis; Systems engineering; Transmutation (Chemistry) (8)
- Argonne Model for Universal Solvent Extraction (AMUSE); Computer programming; Separation (Technology); Software engineering; System analysis; Systems engineering; Transuranium elements – Separation; Uranium Recovery by Extraction (UREX) (6)
- Machine learning (5)
- Databases (4)
- Minimotifs (4)
- Protein (4)
- Amino Acid Motifs (3)
- Artificial intelligence (3)
- Automated guided vehicle systems (3)
- Intelligent control systems (3)
- Proteins (3)
- Sequence Analysis (3)
- Traffic engineering (3)
- Web applications (3)
- Amino acid sequence (2)
- Automatic control (2)
- Biology (2)
- Blockchain (2)
- Brain tumor (2)
- Computer algorithms (2)
- Computer graphics (2)
- Computer science – Study and teaching (2)
- Deep learning (2)
- Engineering design – Contests (2)
- Publication Year
- Publication
-
- Separations Campaign (TRP) (25)
- Fred and Harriet Cox Senior Design Competition Projects (18)
- Electrical & Computer Engineering Faculty Research (16)
- Computer Science Faculty Research (15)
- Life Sciences Faculty Research (9)
-
- Library Faculty Presentations (4)
- Management, Entrepreneurship and Technology Faculty Publications (4)
- Mechanical Engineering Faculty Research (4)
- Math 365 Class Projects (3)
- Civil and Environmental Engineering and Construction Faculty Research (2)
- Library Faculty Publications (2)
- Physics & Astronomy Faculty Research (2)
- Publications (YM) (2)
- Brain Health Faculty Publications (1)
- Calvert Undergraduate Research Awards (1)
- Chemistry and Biochemistry Faculty Research (1)
- College of Engineering Faculty Research (1)
- Economics Faculty Publications (1)
- Inside UNLV (1)
- Mathematical Sciences Faculty Research (1)
- Mechanical Engineering Faculty Presentations (1)
- Policy Briefs and Reports (1)
- Psychology Faculty Research (1)
- Public Policy and Leadership Faculty Presentations (1)
- School of Medicine Faculty Publications (1)
- Teaching and Learning Faculty Research (1)
Articles 1 - 30 of 119
Full-Text Articles in Physical Sciences and Mathematics
Broadband Equity, Access, And Deployment In Nevada, Brad Wimmer
Broadband Equity, Access, And Deployment In Nevada, Brad Wimmer
Policy Briefs and Reports
The $45.45 billion Broadband, Equity, Access, and Deployment (BEAD) program’s primary objective is to extend broadband service to all unserved and underserved locations in the U.S. and its territories. Several industry studies predict that the BEAD program can meet its goal of providing universal access to broadband service if eligible entities execute their grant programs well. My review of the BEAD program indicates that policy makers can enhance the likelihood of program success by designing competitive grant programs that give applicants the incentive to undercut the subsidies proposed by their rivals and provide applicants the flexibility to design networks that …
Artificial Intelligence In The Radiomic Analysis Of Glioblastomas: A Review, Taxonomy, And Perspective, Ming Zhu, Sijia Li, Yu Kuang, Virginia B. Hill, Amy B. Heimberger, Lijie Zhai, Shenjie Zhai
Artificial Intelligence In The Radiomic Analysis Of Glioblastomas: A Review, Taxonomy, And Perspective, Ming Zhu, Sijia Li, Yu Kuang, Virginia B. Hill, Amy B. Heimberger, Lijie Zhai, Shenjie Zhai
Electrical & Computer Engineering Faculty Research
Radiological imaging techniques, including magnetic resonance imaging (MRI) and positron emission tomography (PET), are the standard-of-care non-invasive diagnostic approaches widely applied in neuro-oncology. Unfortunately, accurate interpretation of radiological imaging data is constantly challenged by the indistinguishable radiological image features shared by different pathological changes associated with tumor progression and/or various therapeutic interventions. In recent years, machine learning (ML)-based artificial intelligence (AI) technology has been widely applied in medical image processing and bioinformatics due to its advantages in implicit image feature extraction and integrative data analysis. Despite its recent rapid development, ML technology still faces many hurdles for its broader applications …
Artificial Intelligence Framework Identifies Candidate Targets For Drug Repurposing In Alzheimer’S Disease, Jiansong Fang, Pengyue Zhang, Quan Wang, Chien Wei Chiang, Yadi Zhou, Yuan Hou, Jielin Xu, Rui Chen, Bin Zhang, Stephen J. Lewis, James B. Leverenz, Andrew A. Pieper, Bingshan Li, Lang Li, Jeffrey Cummings, Feixiong Cheng
Artificial Intelligence Framework Identifies Candidate Targets For Drug Repurposing In Alzheimer’S Disease, Jiansong Fang, Pengyue Zhang, Quan Wang, Chien Wei Chiang, Yadi Zhou, Yuan Hou, Jielin Xu, Rui Chen, Bin Zhang, Stephen J. Lewis, James B. Leverenz, Andrew A. Pieper, Bingshan Li, Lang Li, Jeffrey Cummings, Feixiong Cheng
Brain Health Faculty Publications
Background: Genome-wide association studies (GWAS) have identified numerous susceptibility loci for Alzheimer’s disease (AD). However, utilizing GWAS and multi-omics data to identify high-confidence AD risk genes (ARGs) and druggable targets that can guide development of new therapeutics for patients suffering from AD has heretofore not been successful. Methods: To address this critical problem in the field, we have developed a network-based artificial intelligence framework that is capable of integrating multi-omics data along with human protein–protein interactome networks to accurately infer accurate drug targets impacted by GWAS-identified variants to identify new therapeutics. When applied to AD, this approach integrates GWAS findings, …
Evaluation Of Continuous Power-Down Schemes, James Andro-Vasko, Wolfgang Bein
Evaluation Of Continuous Power-Down Schemes, James Andro-Vasko, Wolfgang Bein
Computer Science Faculty Research
We consider a power-down system with two states—“on” and “off”—and a continuous set of power states. The system has to respond to requests for service in the “on” state and, after service, the system can power off or switch to any of the intermediate power-saving states. The choice of states determines the cost to power on for subsequent requests. The protocol for requests is “online”, which means that the decision as to which intermediate state (or the off-state) the system will switch has to be made without knowledge of future requests. We model a linear and a non-linear system, and …
Novel Architecture Of Onem2m-Based Convergence Platform For Mixed Reality And Iot, Seungwoon Lee, Woogeun Kil, Byeong Hee Roh, Si-Jung Kim, Jin Suk Kang
Novel Architecture Of Onem2m-Based Convergence Platform For Mixed Reality And Iot, Seungwoon Lee, Woogeun Kil, Byeong Hee Roh, Si-Jung Kim, Jin Suk Kang
College of Engineering Faculty Research
There have been numerous works proposed to merge augmented reality/mixed reality (AR/MR) and Internet of Things (IoT) in various ways. However, they have focused on their specific target applications and have limitations on interoperability or reusability when utilizing them to different domains or adding other devices to the system. This paper proposes a novel architecture of a convergence platform for AR/MR and IoT systems and services. The proposed architecture adopts the oneM2M IoT standard as the basic framework that converges AR/MR and IoT systems and enables the development of application services used in general-purpose environments without being subordinate to specific …
Machine Learning And Radiomic Features To Predict Overall Survival Time For Glioblastoma Patients, Lina Chato, Shahram Latifi
Machine Learning And Radiomic Features To Predict Overall Survival Time For Glioblastoma Patients, Lina Chato, Shahram Latifi
Electrical & Computer Engineering Faculty Research
Glioblastoma is an aggressive brain tumor with a low survival rate. Understanding tumor behavior by predicting prognosis outcomes is a crucial factor in deciding a proper treatment plan. In this paper, an automatic overall survival time prediction system (OST) for glioblastoma patients is developed on the basis of radiomic features and machine learning (ML). This system is designed to predict prognosis outcomes by classifying a glioblastoma patient into one of three survival groups: short-term, mid-term, and long-term. To develop the prediction system, a medical dataset based on imaging information from magnetic resonance imaging (MRI) and non-imaging information is used. A …
Data Of The Constructivist Practices In The Learning Environment Survey From Engineering Undergraduates: An Exploratory Factor Analysis, Chengcheng Li, Shaoan Zhang, Tiberio Garza, Yingtao Jiang
Data Of The Constructivist Practices In The Learning Environment Survey From Engineering Undergraduates: An Exploratory Factor Analysis, Chengcheng Li, Shaoan Zhang, Tiberio Garza, Yingtao Jiang
Teaching and Learning Faculty Research
This paper presents the dataset of a questionnaire on first-year engineering undergraduates’ perceptions of constructivist practices in the learning environment. The questionnaire with a 5-Likert scale was adapted from previous research. The sample consisted of 293 first-year engineering undergraduates in the southwest region of the United States. The online questionnaire was sent to participants who completed it voluntarily at the end of Fall 2019. A total of 274 of 293 participants completed the questionnaire with a response rate of 93.515%. Exploratory factor analysis was conducted to test the underlying factor structure of the questionnaire, which serves as a good reference …
Novel Theorems And Algorithms Relating To The Collatz Conjecture, Michael R. Schwob, Peter Shiue, Rama Venkat
Novel Theorems And Algorithms Relating To The Collatz Conjecture, Michael R. Schwob, Peter Shiue, Rama Venkat
Mathematical Sciences Faculty Research
Proposed in 1937, the Collatz conjecture has remained in the spotlight for mathematicians and computer scientists alike due to its simple proposal, yet intractable proof. In this paper, we propose several novel theorems, corollaries, and algorithms that explore relationships and properties between the natural numbers, their peak values, and the conjecture. These contributions primarily analyze the number of Collatz iterations it takes for a given integer to reach 1 or a number less than itself, or the relationship between a starting number and its peak value.
A Survey On Securing Iot Ecosystems And Adaptive Network Vision, Tejaswini Goli, Yoohwan Kim
A Survey On Securing Iot Ecosystems And Adaptive Network Vision, Tejaswini Goli, Yoohwan Kim
Computer Science Faculty Research
The rapid growth of Internet-of-Things (IoT) devices and the large network of interconnected devices pose new security challenges and privacy threats that would put those devices at high risk and cause harm to the affiliated users. This paper emphasizes such potential security challenges and proposes possible solutions in the field of IoT Security, mostly focusing on automated or adaptive networks. Considering the fact that IoT became widely adopted, the intricacies in the security field tend to grow expeditiously. Therefore, it is necessary for businesses to adopt new security protocols and to the notion of automated network security practices driven by …
Bountychain: Toward Decentralizing A Bug Bounty Program With Blockchain And Ipfs, Alex Hoffman, Phillipe Austria, Chol Hyun Park, Yoohwan Kim
Bountychain: Toward Decentralizing A Bug Bounty Program With Blockchain And Ipfs, Alex Hoffman, Phillipe Austria, Chol Hyun Park, Yoohwan Kim
Computer Science Faculty Research
Bug Bounty Programs (BBPs) play an important role in providing and maintaining security in software applications. These programs allow testers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse. However, they have shown problems such as organizations providing accountability of reporting bugs and nonrecognition of testers. In this paper, we discuss Bountychain, a decentralized application using Ethereum-based Smart Contracts (SCs) and the Interplanetary File System (IPFS), a distributed file storage system. Blockchain and SCs provide a safe, secure and transparent platform for a BBP. Testers can submit bug reports and organizations …
Topology Identification In Distribution System Via Machine Learning Algorithms, Peyman Razmi, Mahdi Ghaemi Asl, Giorgio Canarella, Afsaneh Sadat Emami
Topology Identification In Distribution System Via Machine Learning Algorithms, Peyman Razmi, Mahdi Ghaemi Asl, Giorgio Canarella, Afsaneh Sadat Emami
Economics Faculty Publications
This paper contributes to the literature on topology identification (TI) in distribution networks and, in particular, on change detection in switching devices' status. The lack of measurements in distribution networks compared to transmission networks is a notable challenge. In this paper, we propose an approach to topology identification (TI) of distribution systems based on supervised machine learning (SML) algorithms. This methodology is capable of analyzing the feeder's voltage profile without requiring the utilization of sensors or any other extraneous measurement device. We show that machine learning algorithms can track the voltage profile's behavior in each feeder, detect the status of …
Machine Learning Approaches For The Prediction Of Bone Mineral Density By Using Genomic And Phenotypic Data Of 5130 Older Men, Qing Wu, Fatma Nasoz, Jongyun Jung, Bibek Bhattarai, Mira V. Han, Robert A. Greenes, Kenneth G. Saag
Machine Learning Approaches For The Prediction Of Bone Mineral Density By Using Genomic And Phenotypic Data Of 5130 Older Men, Qing Wu, Fatma Nasoz, Jongyun Jung, Bibek Bhattarai, Mira V. Han, Robert A. Greenes, Kenneth G. Saag
School of Medicine Faculty Publications
The study aimed to utilize machine learning (ML) approaches and genomic data to develop a prediction model for bone mineral density (BMD) and identify the best modeling approach for BMD prediction. The genomic and phenotypic data of Osteoporotic Fractures in Men Study (n = 5130) was analyzed. Genetic risk score (GRS) was calculated from 1103 associated SNPs for each participant after a comprehensive genotype imputation. Data were normalized and divided into a training set (80%) and a validation set (20%) for analysis. Random forest, gradient boosting, neural network, and linear regression were used to develop BMD prediction models separately. Ten-fold …
Computation And Data Driven Discovery Of Topological Phononic Materials, Jiangxu Li, Jiaxi Liu, Stanley A. Baronett, Mingfeng Liu, Lei Wang, Ronghan Li, Yun Chen, Dianzhong Li, Qiang Zhu, Xing Qiu Chen
Computation And Data Driven Discovery Of Topological Phononic Materials, Jiangxu Li, Jiaxi Liu, Stanley A. Baronett, Mingfeng Liu, Lei Wang, Ronghan Li, Yun Chen, Dianzhong Li, Qiang Zhu, Xing Qiu Chen
Physics & Astronomy Faculty Research
© 2021, The Author(s). The discovery of topological quantum states marks a new chapter in both condensed matter physics and materials sciences. By analogy to spin electronic system, topological concepts have been extended into phonons, boosting the birth of topological phononics (TPs). Here, we present a high-throughput screening and data-driven approach to compute and evaluate TPs among over 10,000 real materials. We have discovered 5014 TP materials and grouped them into two main classes of Weyl and nodal-line (ring) TPs. We have clarified the physical mechanism for the occurrence of single Weyl, high degenerate Weyl, individual nodal-line (ring), nodal-link, nodal-chain, …
Pyxtal_Ff: A Python Library For Automated Force Field Generation, Howard Yanxon, David Zagaceta, Binh Tang, David S. Matteson, Qiang Zhu
Pyxtal_Ff: A Python Library For Automated Force Field Generation, Howard Yanxon, David Zagaceta, Binh Tang, David S. Matteson, Qiang Zhu
Physics & Astronomy Faculty Research
We present PyXtal_FF—a package based on Python programming language—for developing machine learning potentials (MLPs). The aim of PyXtal_FF is to promote the application of atomistic simulations through providing several choices of atom-centered descriptors and machine learning regressions in one platform. Based on the given choice of descriptors (including the atom-centered symmetry functions, embedded atom density, SO4 bispectrum, and smooth SO3 power spectrum), PyXtal_FF can train MLPs with either generalized linear regression or neural network models, by simultaneously minimizing the errors of energy/forces/stress tensors in comparison with the data from ab-initio simulations. The trained MLP model from PyXtal_FF is interfaced with …
Rethinking The Weakness Of Stream Ciphers And Its Application To Encrypted Malware Detection, William Stone, Daeyoung Kim, Victor Youdom Kemmoe, Mingon Kang, Junggab Son
Rethinking The Weakness Of Stream Ciphers And Its Application To Encrypted Malware Detection, William Stone, Daeyoung Kim, Victor Youdom Kemmoe, Mingon Kang, Junggab Son
Computer Science Faculty Research
One critical vulnerability of stream ciphers is the reuse of an encryption key. Since most stream ciphers consist of only a key scheduling algorithm and an Exclusive OR (XOR) operation, an adversary may break the cipher by XORing two captured ciphertexts generated under the same key. Various cryptanalysis techniques based on this property have been introduced in order to recover plaintexts or encryption keys; in contrast, this research reinterprets the vulnerability as a method of detecting stream ciphers from the ciphertexts it generates. Patterns found in the values (characters) expressed across the bytes of a ciphertext make the ciphertext distinguishable …
Measuring The Perceived Social Intelligence Of Robots, Kimberly A. Barchard, Leiszle Lapping-Carr, R. Shane Westfall, Andrea Fink-Armold, Santosh Balajee Banisetty, David Feil-Seifer
Measuring The Perceived Social Intelligence Of Robots, Kimberly A. Barchard, Leiszle Lapping-Carr, R. Shane Westfall, Andrea Fink-Armold, Santosh Balajee Banisetty, David Feil-Seifer
Psychology Faculty Research
Robotic social intelligence is increasingly important. However, measures of human social intelligence omit basic skills, and robot-specific scales do not focus on social intelligence. We combined human robot interaction concepts of beliefs, desires, and intentions with psychology concepts of behaviors, cognitions, and emotions to create 20 Perceived Social Intelligence (PSI) Scales to comprehensively measure perceptions of robots with a wide range of embodiments and behaviors. Participants rated humanoid and non-humanoid robots interacting with people in five videos. Each scale had one factor and high internal consistency, indicating each measures a coherent construct. Scales capturing perceived social information processing skills (appearing …
Machine Learning Corrected Quantum Dynamics Calculations, A. Jasinski, J. Montaner, R. C. Forrey, B. H. Yang, P. C. Stancil, Naduvalath Balakrishnan, J. Dai, A. Vargas-Hernandez, R. V. Krems
Machine Learning Corrected Quantum Dynamics Calculations, A. Jasinski, J. Montaner, R. C. Forrey, B. H. Yang, P. C. Stancil, Naduvalath Balakrishnan, J. Dai, A. Vargas-Hernandez, R. V. Krems
Chemistry and Biochemistry Faculty Research
Quantum scattering calculations for all but low-dimensional systems at low energies must rely on approximations. All approximations introduce errors. The impact of these errors is often difficult to assess because they depend on the Hamiltonian parameters and the particular observable under study. Here, we illustrate a general, system- and approximation-independent, approach to improve the accuracy of quantum dynamics approximations. The method is based on a Bayesian machine learning (BML) algorithm that is trained by a small number of exact results and a large number of approximate calculations, resulting in ML models that can generalize exact quantum results to different dynamical …
College Of Engineering Senior Design Competition Spring 2020, University Of Nevada, Las Vegas
College Of Engineering Senior Design Competition Spring 2020, University Of Nevada, Las Vegas
Fred and Harriet Cox Senior Design Competition Projects
Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …
The Equifax Hack Revisited And Repurposed, Hal Berghel
The Equifax Hack Revisited And Repurposed, Hal Berghel
Civil and Environmental Engineering and Construction Faculty Research
Reports on the recent indictments against Chinese hackers regarding Equifax.
Wind Power Forecasting Methods Based On Deep Learning: A Survey, Xing Deng, Haijian Shao, Chunlong Hu, Dengbiao Jiang, Yingtao Jiang
Wind Power Forecasting Methods Based On Deep Learning: A Survey, Xing Deng, Haijian Shao, Chunlong Hu, Dengbiao Jiang, Yingtao Jiang
Electrical & Computer Engineering Faculty Research
Accurate wind power forecasting in wind farm can effectively reduce the enormous impact on grid operation safety when high permeability intermittent power supply is connected to the power grid. Aiming to provide reference strategies for relevant researchers as well as practical applications, this paper attempts to provide the literature investigation and methods analysis of deep learning, enforcement learning and transfer learning in wind speed and wind power forecasting modeling. Usually, wind speed and wind power forecasting around a wind farm requires the calculation of the next moment of the definite state, which is usually achieved based on the state of …
Dynamic Allocation/Reallocation Of Dark Cores In Many-Core Systems For Improved System Performance, Xingxing Huang, Xiaohang Wang, Yingtao Jiang, Amit Kumar Singh, Mei Yang
Dynamic Allocation/Reallocation Of Dark Cores In Many-Core Systems For Improved System Performance, Xingxing Huang, Xiaohang Wang, Yingtao Jiang, Amit Kumar Singh, Mei Yang
Electrical & Computer Engineering Faculty Research
A significant number of processing cores in any many-core systems nowadays and likely in the future have to be switched off or forced to be idle to become dark cores, in light of ever increasing power density and chip temperature. Although these dark cores cannot make direct contributions to the chip's throughput, they can still be allocated to applications currently running in the system for the sole purpose of heat dissipation enabled by the temperature gradient between the active and dark cores. However, allocating dark cores to applications tends to add extra waiting time to applications yet to be launched, …
A Design Of Mac Model Based On The Separation Of Duties And Data Coloring: Dsdc-Mac, Soon-Book Lee, Yoo-Hwan Kim, Jin-Woo Kim, Chee-Yang Song
A Design Of Mac Model Based On The Separation Of Duties And Data Coloring: Dsdc-Mac, Soon-Book Lee, Yoo-Hwan Kim, Jin-Woo Kim, Chee-Yang Song
Computer Science Faculty Research
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing, either confidentiality or integrity. Thus, it can cause collisions between security policies in supporting confidentiality and integrity simultaneously. In addition, they do not provide a granular security class policy of subjects and objects in terms of subjects' roles or tasks. In this paper, we present the security policy of Bell_LaPadula Model (BLP) model and Biba model as …
College Of Engineering Senior Design Competition Fall 2019, University Of Nevada, Las Vegas
College Of Engineering Senior Design Competition Fall 2019, University Of Nevada, Las Vegas
Fred and Harriet Cox Senior Design Competition Projects
Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …
3d-Printing And Machine Learning Control Of Soft Ionic Polymer-Metal Composite Actuators, James D. Carrico, Tucker Hermans, Kwang J. Kim, Kam K. Leang
3d-Printing And Machine Learning Control Of Soft Ionic Polymer-Metal Composite Actuators, James D. Carrico, Tucker Hermans, Kwang J. Kim, Kam K. Leang
Mechanical Engineering Faculty Research
This paper presents a new manufacturing and control paradigm for developing soft ionic polymer-metal composite (IPMC) actuators for soft robotics applications. First, an additive manufacturing method that exploits the fused-filament (3D printing) process is described to overcome challenges with existing methods of creating custom-shaped IPMC actuators. By working with ionomeric precursor material, the 3D-printing process enables the creation of 3D monolithic IPMC devices where ultimately integrated sensors and actuators can be achieved. Second, Bayesian optimization is used as a learning-based control approach to help mitigate complex time-varying dynamic effects in 3D-printed actuators. This approach overcomes the challenges with existing methods …
Design And Modeling Of A New Biomimetic Soft Robotic Jellyfish Using Ipmc-Based Electroactive Polymers, Zakai J. Olsen, Kwang J. Kim
Design And Modeling Of A New Biomimetic Soft Robotic Jellyfish Using Ipmc-Based Electroactive Polymers, Zakai J. Olsen, Kwang J. Kim
Mechanical Engineering Faculty Research
Smart materials and soft robotics have been seen to be particularly well-suited for developing biomimetic devices and are active fields of research. In this study, the design and modeling of a new biomimetic soft robot is described. Initial work was made in the modeling of a biomimetic robot based on the locomotion and kinematics of jellyfish. Modifications were made to the governing equations for jellyfish locomotion that accounted for geometric differences between biology and the robotic design. In particular, the capability of the model to account for the mass and geometry of the robot design has been added for better …
Hadoop Performance Analysis Model With Deep Data Locality, Sungchul Lee, Ju-Yeon Jo, Yoohwan Kim
Hadoop Performance Analysis Model With Deep Data Locality, Sungchul Lee, Ju-Yeon Jo, Yoohwan Kim
Computer Science Faculty Research
Background: Hadoop has become the base framework on the big data system via the simple concept that moving computation is cheaper than moving data. Hadoop increases a data locality in the Hadoop Distributed File System (HDFS) to improve the performance of the system. The network traffic among nodes in the big data system is reduced by increasing a data-local on the machine. Traditional research increased the data-local on one of the MapReduce stages to increase the Hadoop performance. However, there is currently no mathematical performance model for the data locality on the Hadoop. Methods: This study made the Hadoop performance …
College Of Engineering Senior Design Competition Spring 2019, University Of Nevada, Las Vegas
College Of Engineering Senior Design Competition Spring 2019, University Of Nevada, Las Vegas
Fred and Harriet Cox Senior Design Competition Projects
Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …
Energy Efficiency And Renewable Energy Management With Multi-State Power-Down Systems, James Andro-Vasko, Wolfgang W. Bein, Hiro Ito
Energy Efficiency And Renewable Energy Management With Multi-State Power-Down Systems, James Andro-Vasko, Wolfgang W. Bein, Hiro Ito
Computer Science Faculty Research
A power-down system has an on-state, an off-state, and a finite or infinite number of intermediate states. In the off-state, the system uses no energy and in the on-state energy it is used fully. Intermediate states consume only some fraction of energy but switching back to the on-state comes at a cost. Previous work has mainly focused on asymptotic results for systems with a large number of states. In contrast, the authors study problems with a few states as well as systems with one continuous state. Such systems play a role in energy-efficiency for information technology but are especially important …
Self-Stabilizing Token Distribution With Constant-Space For Trees, Yuichi Sudo, Ajoy K. Datta, Lawrence L. Larmore, Toshimitsu Masuzawa
Self-Stabilizing Token Distribution With Constant-Space For Trees, Yuichi Sudo, Ajoy K. Datta, Lawrence L. Larmore, Toshimitsu Masuzawa
Computer Science Faculty Research
Self-stabilizing and silent distributed algorithms for token distribution in rooted tree networks are given. Initially, each process of a graph holds at most l tokens. Our goal is to distribute the tokens in the whole network so that every process holds exactly k tokens. In the initial configuration, the total number of tokens in the network may not be equal to nk where n is the number of processes in the network. The root process is given the ability to create a new token or remove a token from the network. We aim to minimize the convergence time, the number …
Loosely-Stabilizing Leader Election With Polylogarithmic Convergence Time, Yuichi Sudo, Fukuhito Ooshita, Hirotsugu Kukugawa, Toshimitsu Masuzawa, Ajoy K. Datta, Lawrence L. Larmore
Loosely-Stabilizing Leader Election With Polylogarithmic Convergence Time, Yuichi Sudo, Fukuhito Ooshita, Hirotsugu Kukugawa, Toshimitsu Masuzawa, Ajoy K. Datta, Lawrence L. Larmore
Computer Science Faculty Research
A loosely-stabilizing leader election protocol with polylogarithmic convergence time in the population protocol model is presented in this paper. In the population protocol model, which is a common abstract model of mobile sensor networks, it is known to be impossible to design a self-stabilizing leader election protocol. Thus, in our prior work, we introduced the concept of loose-stabilization, which is weaker than self-stabilization but has similar advantage as self-stabilization in practice. Following this work, several loosely-stabilizing leader election protocols are presented. The loosely-stabilizing leader election guarantees that, starting from an arbitrary configuration, the system reaches a safe configuration with a …