Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Physical Sciences and Mathematics

Enhancing Monthly Streamflow Prediction Using Meteorological Factors And Machine Learning Models In The Upper Colorado River Basin, Saichand Thota, Ayman Nassar, Soukaina Filali Boubrahimi, Shah Muhammad Hamdi, Pouya Hosseinzadeh May 2024

Enhancing Monthly Streamflow Prediction Using Meteorological Factors And Machine Learning Models In The Upper Colorado River Basin, Saichand Thota, Ayman Nassar, Soukaina Filali Boubrahimi, Shah Muhammad Hamdi, Pouya Hosseinzadeh

Computer Science Student Research

Streamflow prediction is crucial for planning future developments and safety measures along river basins, especially in the face of changing climate patterns. In this study, we utilized monthly streamflow data from the United States Bureau of Reclamation and meteorological data (snow water equivalent, temperature, and precipitation) from the various weather monitoring stations of the Snow Telemetry Network within the Upper Colorado River Basin to forecast monthly streamflow at Lees Ferry, a specific location along the Colorado River in the basin. Four machine learning models—Random Forest Regression, Long short-term memory, Gated Recurrent Unit, and Seasonal AutoRegresive Integrated Moving Average—were trained using …


Plagiarism Deterrence In Cs1 Through Keystroke Data, Kaden Hart, Chad Mano, John M. Edwards Mar 2023

Plagiarism Deterrence In Cs1 Through Keystroke Data, Kaden Hart, Chad Mano, John M. Edwards

Computer Science Student Research

Recent work in computing education has explored the idea of analyzing and grading using the process of writing a computer program rather than just the final submitted code. We build on this idea by investigating the effect on plagiarism when the process of coding, in the form of keystroke logs, is submitted for grading in addition to the final code. We report results from two terms of a university CS1 course in which students submitted keystroke logs. We find that when students are required to submit a log of keystrokes together with their written code they are less likely to …


Accurate Estimation Of Time-On-Task While Programming, Kaden Hart, Christopher M. Warren, John Edwards Mar 2023

Accurate Estimation Of Time-On-Task While Programming, Kaden Hart, Christopher M. Warren, John Edwards

Computer Science Student Research

In a recent study, students were periodically prompted to self-report engagement while working on computer programming assignments in a CS1 course. A regression model predicting time-on-task was proposed. While it was a significant improvement over ad-hoc estimation techniques, the study nevertheless suffered from lack of error analysis, lack of comparison with existing methods, subtle complications in prompting students, and small sample size. In this paper we report results from a study with an increased number of student participants and modified prompting scheme intended to better capture natural student behavior. Furthermore, we perform a cross-validation analysis on our refined regression model …


Portal: Portal Widget For Remote Target Acquisition And Control In Immersive Virtual Environments, Donguyn Han, Donghoon Kim, Isaac Cho Nov 2022

Portal: Portal Widget For Remote Target Acquisition And Control In Immersive Virtual Environments, Donguyn Han, Donghoon Kim, Isaac Cho

Computer Science Student Research

This paper introduces PORTAL (POrtal widget for Remote Target Acquisition and controL) that allows the user to interact with out-of-reach objects in a virtual environment. We describe the PORTAL interaction technique for placing a portal widget and interacting with target objects through the portal. We conduct two formal user studies to evaluate PORTAL for selection and manipulation functionalities. The results show PORTAL supports participants to interact with remote objects successfully and precisely. Following that, we discuss its potential and limitations, and future works.


Pausing While Programming: Insights From Keystroke Analysis, Raj Shrestha, Juho Leinonen, Albina Zavgorodniaia, Arto Hellas, John M. Edwards Oct 2022

Pausing While Programming: Insights From Keystroke Analysis, Raj Shrestha, Juho Leinonen, Albina Zavgorodniaia, Arto Hellas, John M. Edwards

Computer Science Student Research

Pauses in typing are generally considered to indicate cognitive processing and so are of interest in educational contexts. While much prior work has looked at typing behavior of Computer Science students, this paper presents results of a study specifically on the pausing behavior of students in Introductory Computer Programming. We investigate the frequency of pauses of different lengths, what last actions students take before pausing, and whether there is a correlation between pause length and performance in the course. We find evidence that frequency of pauses of all lengths is negatively correlated with performance, and that, while some keystrokes initiate …


Indexer++: Workload-Aware Online Index Tuning With Transformers And Reinforcement Learning, Vishal Sharma, Curtis Dyreson May 2022

Indexer++: Workload-Aware Online Index Tuning With Transformers And Reinforcement Learning, Vishal Sharma, Curtis Dyreson

Computer Science Student Research

With the increasing workload complexity in modern databases, the manual process of index selection is a challenging task. There is a growing need for a database with an ability to learn and adapt to evolving workloads. This paper proposes Indexer++, an autonomous, workload-aware, online index tuner. Unlike existing approaches, Indexer++ imposes low overhead on the DBMS, is responsive to changes in query workloads and swiftly selects indexes. Our approach uses a combination of text analytic techniques and reinforcement learning. Indexer++ consist of two phases: Phase (i) learns workload trends using a novel trend detection technique based on a pre-trained …


A Look Into User's Privacy Perceptions And Data Practices Of Iot Devices, Mahdi Nasrullah Al-Ameen, Apoorva Chauhan, M.A. Manazir Ahsan, Huzeyfe Kocabas Aug 2021

A Look Into User's Privacy Perceptions And Data Practices Of Iot Devices, Mahdi Nasrullah Al-Ameen, Apoorva Chauhan, M.A. Manazir Ahsan, Huzeyfe Kocabas

Computer Science Student Research

Purpose: With the rapid deployment of Internet of Things (IoT) technologies, it has been essential to address the security and privacy issues through maintaining transparency in data practices. The prior research focused on identifying people’s privacy preferences in different contexts of IoT usage, and their mental models of security threats. However, there is a dearth in existing literature to understand the mismatch between user’s perceptions and the actual data practices of IoT devices. Such mismatches could lead users unknowingly sharing their private information, exposing themselves to unanticipated privacy risks. We aim to identify these mismatched privacy perceptions in our work. …


Understanding User Behavior, Information Exposure, And Privacy Risks In Managing Old Devices, Mahdi Nasrullah Al-Ameen, Tanjina Tamanna, Swapnil Nandy, Huzeyfe Kocabas Jul 2021

Understanding User Behavior, Information Exposure, And Privacy Risks In Managing Old Devices, Mahdi Nasrullah Al-Ameen, Tanjina Tamanna, Swapnil Nandy, Huzeyfe Kocabas

Computer Science Student Research

The goal of this study is to understand the behavior of users from developing countries in managing an old device (e.g., computer, mobile phone), which has been replaced by a new device, or suffers from technical issues providing a notion that it may stop working soon. The prior work explored the ecology and challenges of repairing old devices in developing regions. However, it is still understudied how the strategies of people from developing countries in managing their personal information on old devices could impact their digital privacy. To address this gap in existing literature, we conducted semi-structured interview with 52 …


Understanding User's Behavior And Protection Strategy Upon Losing, Or Identifying Unauthorized Access To Online Account, Huzeyfe Kocabas, Swapnil Nandy, Tanjina Tamanna, Mahdi Nasrullah Al-Ameen Jul 2021

Understanding User's Behavior And Protection Strategy Upon Losing, Or Identifying Unauthorized Access To Online Account, Huzeyfe Kocabas, Swapnil Nandy, Tanjina Tamanna, Mahdi Nasrullah Al-Ameen

Computer Science Student Research

A wide-range of personal and sensitive information are stored in users’ online accounts. Losing access, or an unauthorized access to one of those accounts could put them into the risks of privacy breach, cause financial loss, and compromise their accessibility to important information and documents. A large body of prior work focused on developing new schemes and strategies to protect users’ online security. However, there is a dearth in existing literature to understand users’ strategies and contingency plans to protect their online accounts once they lose access, or identify an unauthorized access to one of their accounts. We addressed this …


Infrared And Visible Image Fusion Based On Oversampled Graph Filter Banks, Chunyan Song, Xueying Gao, Yu-Long Qiao, Kaige Zhang Apr 2020

Infrared And Visible Image Fusion Based On Oversampled Graph Filter Banks, Chunyan Song, Xueying Gao, Yu-Long Qiao, Kaige Zhang

Computer Science Student Research

The infrared image (RI) and visible image (VI) fusion method merges complementary information from the infrared and visible imaging sensors to provide an effective way for understanding the scene. The graph filter bank-based graph wavelet transform possesses the advantages of the classic wavelet filter bank and graph representation of a signal. Therefore, we propose an RI and VI fusion method based on oversampled graph filter banks. Specifically, we consider the source images as signals on the regular graph and decompose them into the multiscale representations with M-channel oversampled graph filter banks. Then, the fusion rule for the low-frequency subband is …


A Structural Based Feature Extraction For Detecting The Relation Of Hidden Substructures In Coral Reef Images, Mahmood Sotoodeh, Mohammad Reza Moosavi, Reza Boostani Aug 2019

A Structural Based Feature Extraction For Detecting The Relation Of Hidden Substructures In Coral Reef Images, Mahmood Sotoodeh, Mohammad Reza Moosavi, Reza Boostani

Computer Science Student Research

In this paper, we present an efficient approach to extract local structural color texture features for classifying coral reef images. Two local texture descriptors are derived from this approach. The first one, based on Median Robust Extended Local Binary Pattern (MRELBP), is called Color MRELBP (CMRELBP). CMRELBP is very accurate and can capture the structural information from color texture images. To reduce the dimensionality of the feature vector, the second descriptor, co-occurrence CMRELBP (CCMRELBP) is introduced. It is constructed by applying the Integrative Co-occurrence Matrix (ICM) on the Color MRELBP images. This way we can detect and extract the relative …


A Novel Adaptive Lbp-Based Descriptor For Color Image Retrieval, Mohammad Sotoodeh, Mohammad Reza Moosavi, Reza Boostani Aug 2019

A Novel Adaptive Lbp-Based Descriptor For Color Image Retrieval, Mohammad Sotoodeh, Mohammad Reza Moosavi, Reza Boostani

Computer Science Student Research

In this paper, we present two approaches to extract discriminative features for color image retrieval. The proposed local texture descriptors, based on Radial Mean Local Binary Pattern (RMLBP), are called Color RMCLBP (CRMCLBP) and Prototype Data Model (PDM). RMLBP is a robust to noise descriptor which has been proposed to extract texture features of gray scale images for texture classification.

For the first descriptor, the Radial Mean Completed Local Binary Pattern is applied to channels of the color space, independently. Then, the final descriptor is achieved by concatenating the histogram of the CRMCLBP_S/M/C component of each channel. Moreover, to enhance …


Research On The Law Of Garlic Price Based On Big Data, Feng Guo, Pingzeng Liu, Chao Zhang, Weijie Chen, Wei Han, Wanming Ren, Yong Zheng, Jianrui Ding Jan 2019

Research On The Law Of Garlic Price Based On Big Data, Feng Guo, Pingzeng Liu, Chao Zhang, Weijie Chen, Wei Han, Wanming Ren, Yong Zheng, Jianrui Ding

Computer Science Student Research

In view of the frequent fluctuation of garlic price under the market economy and the current situation of garlic price, the fluctuation of garlic price in the circulation link of garlic industry chain is analyzed, and the application mode of multidisciplinary in the agricultural industry is discussed. On the basis of the big data platform of garlic industry chain, this paper constructs a Garch model to analyze the fluctuation law of garlic price in the circulation link and provides the garlic industry service from the angle of price fluctuation combined with the economic analysis. The research shows that the average …


Development And Application Of Big Data Platform For Garlic Industry Chain, Weijie Chen, Guo Feng, Chao Zhang, Pingzeng Liu, Wanming Ren, Ning Cao, Jianrui Ding Jan 2019

Development And Application Of Big Data Platform For Garlic Industry Chain, Weijie Chen, Guo Feng, Chao Zhang, Pingzeng Liu, Wanming Ren, Ning Cao, Jianrui Ding

Computer Science Student Research

In order to effectively solve the problems which affect the stable and healthy development of garlic industry, such as the uncertainty of the planting scale and production data, the influence factors of price fluctuation is difficult to be accurately analyzed, the difficult to predict the trend of price change, the uncertainty of the market concentration, and the difficulty of the short-term price prediction etc. the big data platform of the garlic industry chain has been developed. Combined with a variety of data acquisition technology, the information collection of influencing factors for garlic industry chain is realized. Based on the construction …


Sheaf Theory Approach To Distributed Applications: Analysing Heterogeneous Data In Air Traffic Monitoring, Seyed M.H. Mansourbeigi Oct 2017

Sheaf Theory Approach To Distributed Applications: Analysing Heterogeneous Data In Air Traffic Monitoring, Seyed M.H. Mansourbeigi

Computer Science Student Research

The goal of the present article is to demonstrate a mathematical modeling for distributed applications. The present paper applies tools from topology and sheaf theory as an appropriate mathematical modeling to reflect interactions among elements of distributed applications resources. Sensors are characterized from their topological representations in distributed network system. This modeling is applied for the study of the air traffic monitoring system and discuss the model in detail.


Algebraic And Topological Structures On Rational Tangles, Vida Milani, Seyed M.H. Mansourbeigi, Hossein Finizadeh Apr 2017

Algebraic And Topological Structures On Rational Tangles, Vida Milani, Seyed M.H. Mansourbeigi, Hossein Finizadeh

Computer Science Student Research

In this paper we present the construction of a group Hopf algebra on the class of rational tangles. A locally finite partial order on this class is introduced and a topology is generated. An interval coalgebra structure associated with the locally finite partial order is specified. Irrational and real tangles are introduced and their relation with rational tangles are studied. The existence of the maximal real tangle is described in detail.


Quantum Computing Vs. Conventional Computing: Near-Term Solution Is Smart Distributed Systems, Seyed M.H. Mansourbeigi, Stephen W. Clyde Apr 2016

Quantum Computing Vs. Conventional Computing: Near-Term Solution Is Smart Distributed Systems, Seyed M.H. Mansourbeigi, Stephen W. Clyde

Computer Science Student Research

Are we getting to the end of Moore's law????? Moore's law which is held for 50 years tells computer power doubling every 18 months may begin to expire in the next 10 or so years. Imagine you buy a computer having the same power as the last year and the year before last year. Would you buy a new computer? Or upgrade? The present computer model is CPU with I/O's and combination of logical gates, and software which controls these I/O's based on finite automata and Turing machine. Basically the above hard-ware software model manipulates the 0 and 1 bits.


Cofibrations In The Category Of Noncommutative Cw Complexes, Vida Milani, Ali Asghar Rezaei, Seyed M.H. Mansourbeigi Jan 2016

Cofibrations In The Category Of Noncommutative Cw Complexes, Vida Milani, Ali Asghar Rezaei, Seyed M.H. Mansourbeigi

Computer Science Student Research

Cofibration in the category of noncommutative CW complexes is defined. The C*-algebraic counterparts of topological mapping Cylinder and mapping cone are presented as examples of noncommutative CW complex cofibres. As a generalization, the concepts of noncommutative mapping cylindrical and conical telescope are introduced to provide more examples of NCCW complex cofibres. Their properties and K-theoretic behavior are also studied in detail. We will see that they carry the properties similar to the topological properties of their CW complex counterparts.


Discrete Dynamics On Noncommunative Cw Complexs, Vida Milani, Seyed M.H. Mansourbeigi Sep 2013

Discrete Dynamics On Noncommunative Cw Complexs, Vida Milani, Seyed M.H. Mansourbeigi

Computer Science Student Research

The concept of discrete multivalued dynamical systems for noncommutative CW complexes is developed. Stable and unstable manifolds are introduced and their role in geometric and topological configurations of noncommutative CW complexes is studied. Our technique is illustrated by an example on the noncommutative CW complex decomposition of the algebra of continuous functions on two dimensional torus.


Morse Theory For C*-Algebras: A Geometric Interpretation Of Some Noncommutative Manifolds, Vida Milani, Ali Asghar Rezaei, Seyed M.H. Mansourbeigi Oct 2011

Morse Theory For C*-Algebras: A Geometric Interpretation Of Some Noncommutative Manifolds, Vida Milani, Ali Asghar Rezaei, Seyed M.H. Mansourbeigi

Computer Science Student Research

The approach we present is a modification of the Morse theory for unital C*-algebras. We provide tools for the geometric interpretation of noncommutative CW complexes. Some examples are given to illustrate these geometric information. The main object of this work is a classification of unital C*-algebras by noncommutative CW complexes and the modified Morse functions on them.