Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Wright State University

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 3410

Full-Text Articles in Physical Sciences and Mathematics

Measuring Nomophobia And Exploration Of Consequences And Comorbidities, Sarah Marie Fryman, William L. Romine Apr 2020

Measuring Nomophobia And Exploration Of Consequences And Comorbidities, Sarah Marie Fryman, William L. Romine

Symposium of Student Research, Scholarship, and Creative Activities Materials

Excessive use of smartphones has coined the term “Nomophobia”, or fear of not being able to use your smartphone. For many, these devices have become an extension of ourselves, which raises hesitation on whether or not society has become addicted to smartphones. Specific diagnostic criteria for smartphone addiction have yet to be settled, and even appropriate to use the word “addiction” when describing excessive usage of smartphones is controversial.

We therefore explore utilize current measures to explore the symptoms of nomophobia and their hierarchy, as well as comorbidities including social anxiety, self-esteem, distracted driving and sleep quality. A total of ...


Multi-Label Model For Toxicity Prediction, Xiu Huan Yap, Michael L. Raymer Apr 2020

Multi-Label Model For Toxicity Prediction, Xiu Huan Yap, Michael L. Raymer

Symposium of Student Research, Scholarship, and Creative Activities Materials

Most computational predictive models are specifically trained for a single toxicity endpoint. Since more than 1300 toxicity assays have been reported in the TOXCAST dashboard, achieving high coverage over this growing number of toxicity endpoints remains challenging. Furthermore, single-endpoint models lack the ability to learn dependencies between endpoints, such as those targeting similar biological pathways, which may be used to boost model performance. In this study, we characterize the performance of 3 multi-label classification (MLC) models, namely Classifier Chains (CC), Label Powersets (LP) and Stacking (SBR), on Tox21 challenge data. These MLC models employ the Problem Transformation approach, which is ...


The Wright State – Lake Campus 2019 – 2020 Scholarly Review, Wright State University - Lake Campus Apr 2020

The Wright State – Lake Campus 2019 – 2020 Scholarly Review, Wright State University - Lake Campus

Lake Campus Research Symposium Reports

This report provides a listing of the scholarly endeavors from Lake Campus during the 2018 calendar year spanning across disciplines.

This document contains the Annual Research Report from 2019 and the Research Symposium Program from 2020.


Snakes On A Plain: Paleontology, Archeology, And History Of The Rattlesnake And Garter Snake In Western Ohio, Ryan Shell, David Peterman, Charles Ciampaglio, Stephen J. Jacquemin Apr 2020

Snakes On A Plain: Paleontology, Archeology, And History Of The Rattlesnake And Garter Snake In Western Ohio, Ryan Shell, David Peterman, Charles Ciampaglio, Stephen J. Jacquemin

Lake Campus Research Symposium Abstracts and Posters

During an investigation of caves in Taylorsville Metropark, near Dayton, Ohio, vertebral remains of rattlesnake (Crotalus sp.) and garter snake (Thamnophis sp.) were recovered from sites radiocarbon dated to a the historical period (~146 years before present) and to the Hopewell Archeological period (~1,433 years before present). The latter specimens recovered represent the some of the oldest sub-fossil evidence of the migration of these genera into the plains and forests of Ohio. A review of scientific and historical records for each genus indicates thatThamnophis appeared in the region prior to the end of the Pleistocene Epoch and persisted in ...


Describing Quasi-Graphic Matroids, Nathan Bowler, Daryl Funk, Dan Slilaty Mar 2020

Describing Quasi-Graphic Matroids, Nathan Bowler, Daryl Funk, Dan Slilaty

Mathematics and Statistics Faculty Publications

The class of quasi-graphic matroids recently introduced by Geelen, Gerards, and Whittle generalises each of the classes of frame matroids and liftedgraphic matroids introduced earlier by Zaslavsky. For each biased graph (G, B) Zaslavsky defined a unique lift matroid L(G, B) and a unique frame matroid F(G, B), each on ground set E(G). We show that in general there may be many quasi-graphic matroids on E(G) and describe them all: for each graph G and partition (B, L, F) of its cycles such that B satisfies the theta property and each cycle in L meets each ...


The Graphs That Have Antivoltages Using Groups Of Small Order, Vaidy Sivaraman, Dan Slilaty Nov 2019

The Graphs That Have Antivoltages Using Groups Of Small Order, Vaidy Sivaraman, Dan Slilaty

Mathematics and Statistics Faculty Publications

Given a group Γ of order at most six, we characterize the graphs that have Γ-antivoltages and also determine the list of minor-minimal graphs that have no Γ-antivoltage. Our characterizations yield polynomial-time recognition algorithms for such graphs.


Iamhappy: Towards An Iot Knowledge-Based Cross-Domain Well-Being Recommendation System For Everyday Happiness, Amelia Gyrard, Amit Sheth Jul 2019

Iamhappy: Towards An Iot Knowledge-Based Cross-Domain Well-Being Recommendation System For Everyday Happiness, Amelia Gyrard, Amit Sheth

Kno.e.sis Publications

Nowadays, healthy lifestyle, fitness, and diet habits have become central applications in our daily life. Positive psychology such as well-being and happiness is the ultimate dream of everyday people’s feelings (even without being aware of it). Wearable devices are being increasingly employed to support well-being and fitness. Those devices produce physiological signals that are analyzed by machines to understand emotions and physical state. The Internetof Things (IoT) technology connects (wearable) devices to the Internet to easily access and process data, even using Web technologies (aka Web of Things).

We design IAMHAPPY, an innovative IoT-based well-being recommendation system to encourage ...


Deep Neural Ranking For Crowdsourced Geopolitical Event Forecasting, Giuseppe Nebbione, Derek Doran, Srikanth Nadella, Brandon Minnery May 2019

Deep Neural Ranking For Crowdsourced Geopolitical Event Forecasting, Giuseppe Nebbione, Derek Doran, Srikanth Nadella, Brandon Minnery

Computer Science and Engineering Faculty Publications

There are many examples of “wisdom of the crowd” effects in which the large number of participants imparts confidence in the collective judgment of the crowd. But how do we form an aggregated judgment when the size of the crowd is limited? Whose judgments do we include, and whose do we accord the most weight? This paper considers this problem in the context of geopolitical event forecasting, where volunteer analysts are queried to give their expertise, confidence, and predictions about the outcome of an event. We develop a forecast aggregation model that integrates topical information about a question, meta-data about ...


Question Answering For Suicide Risk Assessment Using Reddit, Amanuel Alambo, Usha Lokala, Ugur Kursuncu, Krishnaprasad Thirunarayan, Amelia Gyrard, Randon S. Welton, Jyotishman Pathak, Amit P. Sheth Feb 2019

Question Answering For Suicide Risk Assessment Using Reddit, Amanuel Alambo, Usha Lokala, Ugur Kursuncu, Krishnaprasad Thirunarayan, Amelia Gyrard, Randon S. Welton, Jyotishman Pathak, Amit P. Sheth

Kno.e.sis Publications

Mental Health America designed ten questionnaires that are used to determine the risk of mental disorders. They are also commonly used by Mental Health Professionals (MHPs) to assess suicidality. Specifically, the Columbia Suicide Severity Rating Scale (C-SSRS), a widely used suicide assessment questionnaire, helps MHPs determine the severity of suicide risk and offer an appropriate treatment. A major challenge in suicide treatment is the social stigma wherein the patient feels reluctance in discussing his/her conditions with an MHP, which leads to inaccurate assessment and treatment of patients. On the other hand, the same patient is comfortable freely discussing his ...


10. Corrections To Design And Analysis Of Experiments, Angela Dean, Dan Voss, Danel Draguljic Jan 2019

10. Corrections To Design And Analysis Of Experiments, Angela Dean, Dan Voss, Danel Draguljic

Design and Analysis of Experiments

Corrections for the provided by the authors for Design and Analysis of Experiments.


Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li Jan 2019

Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li

Browse all Theses and Dissertations

Security has become one of the most significant concerns for our cyberspace. Securing the cyberspace, however, becomes increasingly challenging. This can be attributed to the rapidly growing diversities and complexity of the modern cyberspace. Specifically, it is not any more dominated by connected personal computers (PCs); instead, it is greatly characterized by cyber-physical systems (CPS), embedded systems, dynamic services, and human-computer interactions. Securing modern cyberspace therefore calls for a multi-faceted approach capable of systematically integrating these emerging characteristics. This dissertation presents our novel and significant solutions towards this direction. Specifically, we have devised automated, systematic security solutions to three critical ...


Kbot: Knowledge-Enabled Personalized Chatbot For Self-Management Of Asthma In Pediatric Population, Dipesh Kadariya Jan 2019

Kbot: Knowledge-Enabled Personalized Chatbot For Self-Management Of Asthma In Pediatric Population, Dipesh Kadariya

Browse all Theses and Dissertations

Asthma, chronic pulmonary disease, is one of the major health issues in the United States. Given its chronic nature, the demand for continuous monitoring of patient’s adherence to the medication care plan, assessment of their environment triggers, and management of asthma control level can be challenging in traditional clinical settings and taxing on clinical professionals. A shift from a reactive to a proactive asthma care can improve health outcomes and reduce expenses. On the technology spectrum, smart conversational systems and Internet-of-Things (IoTs) are rapidly gaining popularity in the healthcare industry. By leveraging such technological prevalence, it is feasible to ...


Rules With Right Hand Existential Or Disjunction With Rowltab, Sri Jitendra Satpathy Jan 2019

Rules With Right Hand Existential Or Disjunction With Rowltab, Sri Jitendra Satpathy

Browse all Theses and Dissertations

One hotly debated research topic is, “What is the best approach for modeling ontologies?”. In the earlier stages of modeling ontologies, researchers have favored the usage of description logic to capture knowledge. One such choice is the Web Ontology Language (OWL) that is based on description logic. Many tools were designed around this principle and are still widely being used to model and explore ontologies. However, not all users find description logic to be intuitive, at least not without an extensive background in formal logics. Due to this, researchers have tried to explore other ways that will enable such users ...


Abusive And Hate Speech Tweets Detection With Text Generation, Abhishek Nalamothu Jan 2019

Abusive And Hate Speech Tweets Detection With Text Generation, Abhishek Nalamothu

Browse all Theses and Dissertations

According to a Pew Research study, 41% of Americans have personally experienced online harassment and two-thirds of Americans have witnessed harassment in 2017. Hence, online harassment detection is vital for securing and sustaining the popularity and viability of online social networks. Machine learning techniques play a crucial role in automatic harassment detection. One of the challenges of using supervised approaches is training data imbalance. Existing text generation techniques can help augment the training data, but they are still inadequate and ineffective. This research explores the role of domain-specific knowledge to complement the limited training data available for training a text ...


Detecting Malicious Behavior In Openwrt With Qemu Tracing, Jeremy Porter Jan 2019

Detecting Malicious Behavior In Openwrt With Qemu Tracing, Jeremy Porter

Browse all Theses and Dissertations

In recent years embedded devices have become more ubiquitous than ever before and are expected to continue this trend. Embedded devices typically have a singular or more focused purpose, a smaller footprint, and often interact with the physical world. Some examples include routers, wearable heart rate monitors, and thermometers. These devices are excellent at providing real time data or completing a specific task quickly, but they lack many features that make security issues more obvious. Generally, Embedded devices are not easily secured. Malware or rootkits in the firmware of an embedded system are difficult to detect because embedded devices do ...


Software Implementations And Applications Of Elliptic Curve Cryptography, Kirill Kultinov Jan 2019

Software Implementations And Applications Of Elliptic Curve Cryptography, Kirill Kultinov

Browse all Theses and Dissertations

Elliptic Curve Cryptography (ECC) is a public-key cryptography system. Elliptic Curve Cryptography (ECC) can achieve the same level of security as the public-key cryptography system, RSA, with a much smaller key size. It is a promising public key cryptography system with regard to time efficiency and resource utilization. This thesis focuses on the software implementations of ECC over finite field GF(p) with two distinct implementations of the Big Integer classes using character arrays, and bit sets in C++ programming language. Our implementation works on the ECC curves of the form y^2 = x^3 + ax + b (mod p). The ...


Vegetation Sensitivity During The Mid-Holocene Warming In Western Ohio, Kristin Kopera Jan 2019

Vegetation Sensitivity During The Mid-Holocene Warming In Western Ohio, Kristin Kopera

Browse all Theses and Dissertations

There has been a growing interest in prairie reconstruction in western Ohio, yet there are few recent academic sources supporting the claim that prairies appeared in western Ohio during the mid-Holocene. The hypsithermal was the warmest and driest part of the Holocene and occurred from 8,000-4,000 years ago in the Midwest. During the hypsithermal, the Prairie Peninsula appeared from Minnesota to eastern Ohio. If prairie did appear in Ohio, it occurred during the mid-Holocene hypsithermal. The goal of this study was to determine if western Ohio experienced a prairie period during the hypsithermal using pollen as a proxy ...


Use Of Virtual Reality Technology In Medical Training And Patient Rehabilitation, Sankalp Mishra Jan 2019

Use Of Virtual Reality Technology In Medical Training And Patient Rehabilitation, Sankalp Mishra

Browse all Theses and Dissertations

Coaching patients to follow the rehabilitation routines correctly and timely after surgery is often a challenge due to the limited medical knowledge of patients and limited availability of clinicians. Similarly, it is also a challenge to train medical professionals with both the technical and communication skills required in their practices. The recent emergence of VR technologies shines the light on improving the current training practices. In this thesis research, I will look at the development and application of VR-based immersive training games for two particular cases: 1. Post hand surgery rehab; and, 2. Training for Social determinants of health (SDOH ...


Investigating An Apparent Structural High In Seismic Data In North Terre Haute, Indiana, Through First-Arrival Traveltime Tomography And Gravity Analysis, Daniel Grant Koehl Jan 2019

Investigating An Apparent Structural High In Seismic Data In North Terre Haute, Indiana, Through First-Arrival Traveltime Tomography And Gravity Analysis, Daniel Grant Koehl

Browse all Theses and Dissertations

This study focuses on northern Terre Haute, Indiana, where seven 2D seismic reflection time sections were collected by CountryMark and donated to Wright State University. Geologically, the area is on the eastern margin of the Illinois Basin. Two of these seismic lines display significant relief along a continuous, high-amplitude horizon approximately 180 milliseconds in two-way traveltime depth. This horizon was previously interpreted by CountryMark to be a Silurian reef core of the type common in this region of the Illinois Basin; however, other seismic lines within the data set display no relief. Furthermore, borehole logs within the area show no ...


Automated Vehicle Electronic Control Unit (Ecu) Sensor Location Using Feature-Vector Based Comparisons, Gregory S. Buthker Jan 2019

Automated Vehicle Electronic Control Unit (Ecu) Sensor Location Using Feature-Vector Based Comparisons, Gregory S. Buthker

Browse all Theses and Dissertations

In the growing world of cybersecurity, being able to map and analyze how software and hardware interact is key to understanding and protecting critical embedded systems like the Engine Control Unit (ECU). The aim of our research is to use our understanding of the ECU's control flow attained through manual analysis to automatically map and identify sensor functions found within the ECU. We seek to do this by generating unique sets of feature vectors for every function within the binary file of a car ECU, and then using those feature sets to locate functions within each binary similar to ...


Scalable Clustering For Immune Repertoire Sequence Analysis, Prem Bhusal Jan 2019

Scalable Clustering For Immune Repertoire Sequence Analysis, Prem Bhusal

Browse all Theses and Dissertations

The development of the next-generation sequencing technology has enabled systems immunology researchers to conduct detailed immune repertoire analysis at the molecule level. Large sequence datasets (e.g., millions of sequences) are being collected to comprehensively understand how the immune system of a patient evolves over different stages of disease development. A recent study has shown that the hierarchical clustering (HC) algorithm gives the best results for B-cell clones analysis - an important type of immune repertoire sequencing (IR-Seq) analysis. However, due to the inherent complexity, the classical hierarchical clustering algorithm does not scale well to large sequence datasets. Surprisingly, no algorithms ...


Ammonium Cycling And Nitrifier Community Composition In Eutrophic Waters Affected By Cyanobacterial Harmful Algal Blooms, Justyna J. Hampel Jan 2019

Ammonium Cycling And Nitrifier Community Composition In Eutrophic Waters Affected By Cyanobacterial Harmful Algal Blooms, Justyna J. Hampel

Browse all Theses and Dissertations

Non-point source nitrogen (N) from agriculture is a main driver of eutrophication in aquatic systems, which often manifests as toxin producing cyanobacterial harmful algal blooms (cyanoHABs). Non-N2 fixing cyanobacteria, such as Microcystis, thrive on chemically reduced N forms (e.g., ammonium (NH4+) and urea) used as the main N form in fertilizer. NH4+ turnover rates are important components of the aquatic N cycle in eutrophic lakes affected by cyanoHABs. Regeneration of NH4+ can contribute to the internal cycling of NH4+, which can sustain cyanoHABs when external loads are low. Additionally, NH4+ uptake by cyanobacteria competes directly with nitrification, another important ...


Recognition Of Incomplete Objects Based On Synthesis Of Views Using A Geometric Based Local-Global Graphs, Michael Christopher Robbeloth Jan 2019

Recognition Of Incomplete Objects Based On Synthesis Of Views Using A Geometric Based Local-Global Graphs, Michael Christopher Robbeloth

Browse all Theses and Dissertations

The recognition of single objects is an old research field with many techniques and robust results. The probabilistic recognition of incomplete objects, however, remains an active field with challenging issues associated to shadows, illumination and other visual characteristics. With object incompleteness, we mean missing parts of a known object and not low-resolution images of that object. The employment of various single machine-learning methodologies for accurate classification of the incomplete objects did not provide a robust answer to the challenging problem. In this dissertation, we present a suite of high-level, model-based computer vision techniques encompassing both geometric and machine learning approaches ...


Accelerating Reverse Engineering Image Processing Using Fpga, Matthew Joshua Harris Jan 2019

Accelerating Reverse Engineering Image Processing Using Fpga, Matthew Joshua Harris

Browse all Theses and Dissertations

In recent decades, field programmable gate arrays (FPGAs) have evolved beyond simple, expensive computational components with minimal computing power to complex, inexpensive computational engines. Today, FPGAs can perform algorithmically complex problems with improved performance compared to sequential CPUs by taking advantage of parallelization. This concept can be readily applied to the computationally dense field of image manipulation and analysis. Processed on a standard CPU, image manipulation suffers with large image sets processed by highly sequential algorithms, but by carefully adhering to data dependencies, parallelized FPGA functions or kernels offer the possibility of significant improvement through threaded CPU functions. This thesis ...


Mapping Of Suspected Unmarked Burials As High Resistivity Anomalies At The Stevenson Cemetery Near Xenia, Ohio, Philip Alexander Marsh Jan 2019

Mapping Of Suspected Unmarked Burials As High Resistivity Anomalies At The Stevenson Cemetery Near Xenia, Ohio, Philip Alexander Marsh

Browse all Theses and Dissertations

The purpose of this thesis was to further study geophysical anomalies discovered and mapped by Shank (2013) at the Stevenson Cemetery, Greene County, Ohio, with the goal of delineating any resistivity anomaly possibly associated with suspected, but unmarked, burial sites. The previous study delineated geophysical anomalies using electromagnetic (EM), magnetic, and ground penetrating radar surveys, which were interpreted to represent unmarked burial sites. A hand-drawn map from the 1950’s shows a pattern of gravesites across this area, and three aligned subtle depressions are present at the surface in the study area. The focus of this study was to expand ...


Speech Enabled Navigation In Virtual Environments, Raksha Rajashekar Jan 2019

Speech Enabled Navigation In Virtual Environments, Raksha Rajashekar

Browse all Theses and Dissertations

Navigating in a Virtual Environment with traditional input devices such as mouse, joysticks and keyboards provide limited maneuverability and is also time consuming. While working in a virtual environment, changing parameters to obtain the desired visualization requires time to achieve by manually entering parameter values in an algorithm to test outcomes. The following thesis presents an alternate user interface to reduce user efforts, while navigating within the Virtual Environment. The user interface is an Android application which is designed to accommodate spoken commands. This Speech Enabled User Interface termed as the Speech Navigation Application (SNA), provides the user with an ...


Towards Data And Model Confidentiality In Outsourced Machine Learning, Sagar Sharma Jan 2019

Towards Data And Model Confidentiality In Outsourced Machine Learning, Sagar Sharma

Browse all Theses and Dissertations

With massive data collections and needs for building powerful predictive models, data owners may choose to outsource storage and expensive machine learning computations to public cloud providers (Cloud). Data owners may choose cloud outsourcing due to the lack of in-house storage and computation resources or the expertise of building models. Similarly, users, who subscribe to specialized services such as movie streaming and social networking, voluntarily upload their data to the service providers' site for storage, analytics, and better services. The service provider, in turn, may also choose to benefit from ubiquitous cloud computing. However, outsourcing to a public cloud provider ...


Paradoxical Behavior In Groundwater Levels In Response To Precipitation Events, Alexandra Shelters Jan 2019

Paradoxical Behavior In Groundwater Levels In Response To Precipitation Events, Alexandra Shelters

Browse all Theses and Dissertations

Groundwater levels are expected to fluctuate with precipitation, rising when precipitation increases and falling when it decreases. However, observations often show that groundwater levels rise in months when precipitation has decreased from the previous month, or alternately, falls in months when precipitation has increased from the previous month. Such paradoxical behavior is documented in a 30-year record for a monitoring well in southwestern Ohio. This record was analyzed to evaluate the hypothesis that mass balance controls the change in groundwater level such that changes cannot be predicted solely from monthly changes in precipitation. Though precipitation may vary from one month ...


Leveraging Schema Information For Improved Knowledge Graph Navigation, Rama Someswar Chittella Jan 2019

Leveraging Schema Information For Improved Knowledge Graph Navigation, Rama Someswar Chittella

Browse all Theses and Dissertations

Over the years, the semantic web has emerged as a new generation of the world wide web featuring advanced technologies and research contributions. It has revolutionized the usage of information by allowing users to capture and publish machine-understandable data and expedite methods such as ontologies to perform the same. These ontologies help in the formal representation of a specified domain and foster comprehensive machine understanding. Although, the engineering of ontologies and usage of logic have been an integral part of the web semantics, new areas of research such as the semantic web search, linking and usage of open data on ...


Conditional Dilated Attention Tracking Model - C-Datm, Tyler Clayton Highlander Jan 2019

Conditional Dilated Attention Tracking Model - C-Datm, Tyler Clayton Highlander

Browse all Theses and Dissertations

Current commercial tracking systems do not process images fast enough to perform target-tracking in real- time. State-of-the-art methods use entire scenes to locate objects frame-by-frame and are commonly computationally expensive because they use image convolutions. Alternatively, attention mechanisms track more efficiently by mimicking human optical cognitive interaction to only process small portions of an image. Thus, in this work we use an attention-based approach to create a model called C-DATM (Conditional Dilated Attention tracking Model) that learns to compare target features in a sequence of image-frames using dilated convolutions. The C-DATM is tested using the Modified National Institute of Standards ...