Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 30

Full-Text Articles in Physical Sciences and Mathematics

Byzantine Consensus In Abstract Mac Layer, Lewis Tseng, Callie Sardina Jan 2024

Byzantine Consensus In Abstract Mac Layer, Lewis Tseng, Callie Sardina

Computer Science

This paper studies the design of Byzantine consensus algorithms in an asynchronous single-hop network equipped with the “abstract MAC layer” [DISC09], which captures core properties of modern wireless MAC protocols. Newport [PODC14], Newport and Robinson [DISC18], and Tseng and Zhang [PODC22] study crash-tolerant consensus in the model. In our setting, a Byzantine faulty node may behave arbitrarily, but it cannot break the guarantees provided by the underlying abstract MAC layer. To our knowledge, we are the first to study Byzantine faults in this model. We harness the power of the abstract MAC layer to develop a Byzantine approximate consensus algorithm …


Tiny Machine Learning For Underwater Image Enhancement: Pruning And Quantizaition Approach, Dr Khaled Nagaty, The British University In Egypt, Andreas Pester Dr Dec 2023

Tiny Machine Learning For Underwater Image Enhancement: Pruning And Quantizaition Approach, Dr Khaled Nagaty, The British University In Egypt, Andreas Pester Dr

Computer Science

Many people have expressed an interest in underwater image processing in a variety of fields, including underwater vehicle control, archaeology, marine biological studies, etc. Underwater exploration is becoming an increasingly important element of our lives, with applications ranging from underwater marine and creature research to pipeline and communication logistics, military use, touristic and entertainment use. Underwater images suffer from poor visibility, distortion, and poor quality for a variety of causes, including light propagation. The major issue arises when these images must be captured at depths greater than 500 feet and artificial lighting needs to be provided. Efficient algorithms and models …


An End-To-End Cnn Approach For Enhancing Underwater Images Using Spatial And Frequency Domain Techniques, Dr Khaled Nagaty, Ayah Hesham Abo El Rejal, The British University In Egypt Sep 2023

An End-To-End Cnn Approach For Enhancing Underwater Images Using Spatial And Frequency Domain Techniques, Dr Khaled Nagaty, Ayah Hesham Abo El Rejal, The British University In Egypt

Computer Science

Underwater image processing area has been a central point of interest to many people in many fields such as control of underwater vehicles, archaeology, marine biology research, etc. Underwater exploration is becoming a big part of our life such as underwater marine and creatures research, pipeline and communication logistics, military use, touristic and entertainment use. Underwater images are subject to poor visibility, distortion, poor quality, etc., due to several reasons such as light propagation. The real problem occurs when these images have to be taken at a depth which is more than 500 feet where artificial light needs to be …


Face Readers: The Frontier Of Computer Vision And Math Learning, Beverly Woolf, Margrit Betke, Hao Yu, Sarah Adel Bargal, Ivan Arroyo, John J. Magee Iv, Danielle Allessio, William Rebelsky Jul 2023

Face Readers: The Frontier Of Computer Vision And Math Learning, Beverly Woolf, Margrit Betke, Hao Yu, Sarah Adel Bargal, Ivan Arroyo, John J. Magee Iv, Danielle Allessio, William Rebelsky

Computer Science

The future of AI-assisted individualized learning includes computer vision to inform intelligent tutors and teachers about student affect, motivation and performance. Facial expression recognition is essential in recognizing subtle differences when students ask for hints or fail to solve problems. Facial features and classification labels enable intelligent tutors to predict students’ performance and recommend activities. Videos can capture students’ faces and model their effort and progress; machine learning classifiers can support intelligent tutors to provide interventions. One goal of this research is to support deep dives by teachers to identify students’ individual needs through facial expression and to provide immediate …


Building Credibility, Trust, And Safety On Video-Sharing Platforms, Shuo Niu, Zhicong Lu, Amy X. Zhang, Jie Cai, Carla F. Griggio, Hendrick Heuer Apr 2023

Building Credibility, Trust, And Safety On Video-Sharing Platforms, Shuo Niu, Zhicong Lu, Amy X. Zhang, Jie Cai, Carla F. Griggio, Hendrick Heuer

Computer Science

Video-sharing platforms (VSPs) such as YouTube, TikTok, and Twitch attract millions of users and have become influential information sources, especially among the young generation. Video creators and live streamers make videos to engage viewers and form online communities. VSP celebrities obtain monetary benefits through monetization programs and affiliated markets. However, there is a growing concern that user-generated videos are becoming a vehicle for spreading misinformation and controversial content. Creators may make inappropriate content for attention and financial benefits. Some other creators also face harassment and attack. This workshop seeks to bring together a group of HCI scholars to brainstorm technical …


A Comprehensive Review On Deep Learning-Based Generative Linguistic Steganography, Dr Khaled Nagaty, Israa Lotfy Lotfy, Abeer Hamdy Dr. Mar 2023

A Comprehensive Review On Deep Learning-Based Generative Linguistic Steganography, Dr Khaled Nagaty, Israa Lotfy Lotfy, Abeer Hamdy Dr.

Computer Science

. The recent development of deep learning has made a significant breakthrough in linguistic generative steganography. The text has become one of the most intensely used communication carriers on the Internet, making steganography an efficient carrier for concealing secret messages. Text steganography has long been used to protect the privacy and confidentiality of data via public transmission. Steganography utilizes a carrier to embed the data to generate a secret unnoticed and less attractive message. Different techniques have been used to improve the security of the generated text and quality of the steganographic text, such as the Markov model, Recurrent Neural …


Secure Authentication Scheme Based On Numerical Series Cryptography For Internet Of Things, Dr Khaled Nagaty, Maha Aladin, Abeer Hamdy Dr. Dec 2022

Secure Authentication Scheme Based On Numerical Series Cryptography For Internet Of Things, Dr Khaled Nagaty, Maha Aladin, Abeer Hamdy Dr.

Computer Science

The rapid advancement of cellular networks and wireless networks has laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities …


Analyzing Academic Self-Regulation Improvement Via Proccoli Task And Time Management Application, Le Jie Bennett Dec 2022

Analyzing Academic Self-Regulation Improvement Via Proccoli Task And Time Management Application, Le Jie Bennett

Computer Science

In the academic context, success is dependent on the individual’s ability to keep track of what needs to be done in a timely manner. But, for most students, procrastination often stands in their way. The time management application, Proccoli, is a tool that the Sahebi/Feyzi lab has developed to study individual and group procrastination behavior and help improve students’ ability to track and manage their tasks and time. Drawing foundations from Human Computer Interaction literature, the application provided features and functionalities to help promote selfregulatory behaviors such as self-observation, self-judgement, and self-reflection. An evaluation survey was sent to previous Proccoli …


A Tale Of Two Regulatory Regimes: Creation And Analysis Of A Bilingual Privacy Policy Corpus, Siddhant Arora, Henry Hosseini, Christine Utz, Vinayshekhar Bannihatti Kumar, Jasmine Mangat, Peter Story, Rex Chen, Martin Degeling, Tom Norton, Thomas Hupperich Jun 2022

A Tale Of Two Regulatory Regimes: Creation And Analysis Of A Bilingual Privacy Policy Corpus, Siddhant Arora, Henry Hosseini, Christine Utz, Vinayshekhar Bannihatti Kumar, Jasmine Mangat, Peter Story, Rex Chen, Martin Degeling, Tom Norton, Thomas Hupperich

Computer Science

Over the past decade, researchers have started to explore the use of NLP to develop tools aimed at helping the public, vendors, and regulators analyze disclosures made in privacy policies. With the introduction of new privacy regulations, the language of privacy policies is also evolving, and disclosures made by the same organization are not always the same in different languages, especially when used to communicate with users who fall under different jurisdictions. This work explores the use of language technologies to capture and analyze these differences at scale. We introduce an annotation scheme designed to capture the nuances of two …


Bug Triage Automation Approaches: A Comparative Study, Dr Khaled Nagaty, Madonna Mayez, Khaled Ahmed Nagay Dr. Mar 2022

Bug Triage Automation Approaches: A Comparative Study, Dr Khaled Nagaty, Madonna Mayez, Khaled Ahmed Nagay Dr.

Computer Science

Bug triage is an essential task in the software maintenance phase. It is the process of assigning a developer (fixer) to bug report. Triaging process is performed by the triager, who has to analyze developers’ profiles and bug reports for the purpose of making a suitable assignment. Manual assignment consumes time, financial resources and human resources; to get a high-quality software with minimum cost, automating this process is necessary. Previous researchers tackled this problem as a classification problem from different perspectives, either information retrieval approach or machine learning algorithms, some researchers handled it as an optimization problem using optimization and …


A Novel Approach For Smart Contracts Using Blockchain, Dr Khaled Nagaty, Manar Abdelhamid Sep 2021

A Novel Approach For Smart Contracts Using Blockchain, Dr Khaled Nagaty, Manar Abdelhamid

Computer Science

No abstract provided.


Concept Building Web Application, Jaime Becker Apr 2019

Concept Building Web Application, Jaime Becker

Computer Science

In this thesis, I have ported a python software application that is used for the collection of information for functional learning classifications into a web application. I have analyzed the problems in the previous software and created the new web application to address these problems using Flask, AppEngine, and Bootstrap. This web application mirrors the original software look and feel but adds several functionalities and improvements like support for multiple input modalities and a separate administrative and user view. I also present a proposed evaluation of the web application.


Take Note: An Investigation Of The Impact Of Human Computer Interaction On The Line Note Taking Process In Theatre, Rene Borr Apr 2019

Take Note: An Investigation Of The Impact Of Human Computer Interaction On The Line Note Taking Process In Theatre, Rene Borr

Computer Science

Most technology used in the theatre was not originally designed for use in a theatrical setting. A majority of technology that we see on the state has been adapted from another field -- be it music, lighting, or construction -- to fit the production's specifics needs. The very nature of the theatre is that every performance is unique, which established one of the main challenges when creating technology to be used in the theatrical setting. This paper discusses the design, creation, and testing of a program to help stage managers take line notes during rehearsal for a theatrical production. We …


Modeling Of Laser-Induced Breakdown Spectroscopic Data Analysis By An Automatic Classifier, David D. Pokrajac, Poopalasingam Sivakumar, Yuriy Markushin, Daniela Milovic, Gary Holness, Jinjie Liu, Noureddine Melikechi, Mukti Rana Jan 2019

Modeling Of Laser-Induced Breakdown Spectroscopic Data Analysis By An Automatic Classifier, David D. Pokrajac, Poopalasingam Sivakumar, Yuriy Markushin, Daniela Milovic, Gary Holness, Jinjie Liu, Noureddine Melikechi, Mukti Rana

Computer Science

Laser-induced breakdown spectroscopy (LIBS) is a multi-elemental and real-time analytical technique with simultaneous detection of all the elements in any type of sample matrix including solid, liquid, gas, and aerosol. LIBS produces vast amount of data which contains information on elemental composition of the material among others. Classification and discrimination of spectra produced during the LIBS process are crucial to analyze the elements for both qualitative and quantitative analysis. This work reports the design and modeling of optimal classifier for LIBS data classification and discrimination using the apparatus of statistical theory of detection. We analyzed the noise sources associated during …


Effects Of Topology Knowledge And Relay Depth On Asynchronous Appoximate Consensus, Dimitris Sakavalas, Lewis Tseng, Nitin H. Vaidya Jan 2019

Effects Of Topology Knowledge And Relay Depth On Asynchronous Appoximate Consensus, Dimitris Sakavalas, Lewis Tseng, Nitin H. Vaidya

Computer Science

Consider a point-to-point message-passing network. We are interested in the asynchronous crash-tolerant consensus problem in incomplete networks. We study the feasibility and efficiency of approximate consensus under different restrictions on topology knowledge and the relay depth, i.e., the maximum number of hops any message can be relayed. These two constraints are common in large-scale networks, and are used to avoid memory overload and network congestion respectively. Specifically, for positive integer values k and k', we consider that each node knows all its neighbors of at most k-hop distance (k-hop topology knowledge), and the relay depth is k'. We consider both …


Reorganize Your Blogs: Supporting Blog Re-Visitation With Natural Language Processing And Visualization, Shuo Niu, D. Scott Mccrickard, Timothy L. Stelter, Alan Dix, G. Don Taylor Jan 2019

Reorganize Your Blogs: Supporting Blog Re-Visitation With Natural Language Processing And Visualization, Shuo Niu, D. Scott Mccrickard, Timothy L. Stelter, Alan Dix, G. Don Taylor

Computer Science

Temporally-connected personal blogs contain voluminous textual content, presenting challenges in re-visiting and reflecting on experiences. Other data repositories have benefited from natural language processing (NLP) and interactive visualizations (VIS) to support exploration, but little is known about how these techniques could be used with blogs to present experiences and support multimodal interaction with blogs, particularly for authors. This paper presents the effect of reorganization—reorganizing the large blog set with NLP and presenting abstract topics with VIS—to support novel re-visitation experiences to blogs. The BlogCloud tool, a blog re-visitation tool that reorganizes blog paragraphs around user-searched keywords, implements reorganization and similarity-based …


An Investigation Of Scenic Visualization Using Virtual Reality During Rehearsal, Cyrus Jian Bonyadi Apr 2018

An Investigation Of Scenic Visualization Using Virtual Reality During Rehearsal, Cyrus Jian Bonyadi

Computer Science

In this paper, we discuss the use of virtual reality as a tool for actors during the rehearsal process and assess methods to implement and continue this research in future works. During the rehearsal process, the scenic design is normally introduced to actors close to the end of rehearsals. In introducing a virtual reality environment to train actors, we hoped to help them develop a better understanding of the design at an earlier point in the process. Our investigative pilot study involves two productions in a university theatre, where we render the scenic design of the production for which our …


Survey Of Techniques For Producing Blended Images: A Case Study Using Rollins College Archives, Hannah Holman Apr 2018

Survey Of Techniques For Producing Blended Images: A Case Study Using Rollins College Archives, Hannah Holman

Computer Science

The Rollins College Archives are a treasure trove of historic resources relating to the college’s history, and they are often underutilized or overlooked by both the student body and the surrounding community. In particular, historic resources are all too often excluded from work in computer science and related fields. This project aims to bridge that gap by bringing the two areas together. To that end, the goal of this project is to merge past and present by blending historic photos with input of a present day scene in order to reveal changes and juxtapositions of the same scene across eras. …


Brief Announcement: Effects Of Topology Knowledge And Relay Depth On Asynchronous Consensus, Dimitris Sakavalas, Lewis Tseng, Nitin H. Vaidya Jan 2018

Brief Announcement: Effects Of Topology Knowledge And Relay Depth On Asynchronous Consensus, Dimitris Sakavalas, Lewis Tseng, Nitin H. Vaidya

Computer Science

Consider an asynchronous incomplete directed network. We study the feasibility and efficiency of approximate crash-tolerant consensus under different restrictions on topology knowledge and relay depth, i.e., the maximum number of hops any message can be relayed.


Popularity Prediction, Andrew Furgiuele Dec 2017

Popularity Prediction, Andrew Furgiuele

Computer Science

With the rise in popularity of the Internet, data describing unique types of items has been collected into easy to access sources. Using this newly acquired data, is it possible to predict if an item will become a bestseller while another fade away with time? Popularity prediction is a problem that has attracted a great deal of research recently, and for good reason. The ability to predict an items future rise to popularity or fall to obscurity is a possibly priceless skill and sought out in many different industries such as sales, investments, and marketing. This report enumerates and analyzes …


Cooperation Between Top-Down And Low-Level Markov Chains For Generating Rock Drumming, Chris Caulfield May 2017

Cooperation Between Top-Down And Low-Level Markov Chains For Generating Rock Drumming, Chris Caulfield

Computer Science

Without heavy modification, the Markov chain is insufficient to handle the task of generating rock drum parts. This paper proposes a system for generating rock drumming that involves the cooperation between a top - down Markov chain that determi nes the structure of created drum parts and a low - level Markov chain that determines their contents. The goal of this system is to generate verse - or chorus - length drum parts that sound reminiscent of the drumming on its input pieces.


Effects Of An Impaired Sonic Hedgehog Signaling Pathway And A Nonfunctional Gli3 Protein On Gnrh-1 Neuronal Migration In Gli3xt/Xt Mutants, Elizabet Aleks Genis May 2017

Effects Of An Impaired Sonic Hedgehog Signaling Pathway And A Nonfunctional Gli3 Protein On Gnrh-1 Neuronal Migration In Gli3xt/Xt Mutants, Elizabet Aleks Genis

Computer Science

Gonadotropin releasing hormone (GnRH) is the master regulatory hormone for sexual development. During embryonic development, gonadotropin releasing hormone-1 neurons (GnRH-1ns) form in the olfactory pit and migrate, along axonal Peripherin positive fibers, from the nasal area to the pre-optic area of the basal forebrain. Upon migration into the brain, GnRH-1ns release GnRH. Defective migration of GnRH-1ns can result in hypogonadotropic hypogonadism (HH), a condition that results in lack of sexual development and infertility. When HH appears associated with reduced or absent sense of smell, it is clinically defined as Kallmann Syndrome (KS) (Paolo E Forni & Wray, 2015). The neurons …


High-Fidelity Spectrum Characterization With Low-Cost Sensors, Stuti Misra May 2017

High-Fidelity Spectrum Characterization With Low-Cost Sensors, Stuti Misra

Computer Science

With the increasing use of wireless technologies, we see a heavy use of the spectrum at certain frequencies whereas it is underutilized at other frequencies. We need to utilize the currently underutilized spectrum. Hence, a paradigm called Dynamic Spectrum Access arises. Dynamic Spectrum Access looks for opportunity to utilize this underutilized spectrum by allowing devices to opportunistically access spectrum that is not actively used. DSA, however, requires spectrum sensing and spectrum characterization across time, space, and frequency for opportunistic devices to know where to operate. Spectrum sensing is the process of collecting power level traces from the radio-frequency spectrum, whereas …


Unboxing Cluster Heatmaps, Sophie J. Engle, S. Whalen, Alark Joshi, K. Pollard Jan 2017

Unboxing Cluster Heatmaps, Sophie J. Engle, S. Whalen, Alark Joshi, K. Pollard

Computer Science

Background: Cluster heatmaps are commonly used in biology and related fields to reveal hierarchical clusters in data matrices. This visualization technique has high data density and reveal clusters better than unordered heatmaps alone. However, cluster heatmaps have known issues making them both time consuming to use and prone to error. We hypothesize that visualization techniques without the rigid grid constraint of cluster heatmaps will perform better at clustering-related tasks.

Results: We developed an approach to “unbox” the heatmap values and embed them directly in the hierarchical clustering results, allowing us to use standard hierarchical visualization techniques as alternatives …


An Evaluation-Guided Approach For Effective Data Visualization On Tablets, Peter S. Games, Alark Joshi Jan 2015

An Evaluation-Guided Approach For Effective Data Visualization On Tablets, Peter S. Games, Alark Joshi

Computer Science

There is a rising trend of data analysis and visualization tasks being performed on a tablet device. Apps with interactive data visualization capabilities are available for a wide variety of domains. We investigate whether users grasp how to effectively interpret and interact with visualizations. We conducted a detailed user evaluation to study the abilities of individuals with respect to analyzing data on a tablet through an interactive visualization app. Based upon the results of the user evaluation, we find that most subjects performed well at understanding and interacting with simple visualizations, specifically tables and line charts. A majority of the …


Visualization Of Off-Screen Data On Tablets Using Context-Providing Bar Graphs And Scatter Plots, Peter S. Games, Alark Joshi Jan 2013

Visualization Of Off-Screen Data On Tablets Using Context-Providing Bar Graphs And Scatter Plots, Peter S. Games, Alark Joshi

Computer Science

Visualizing data on tablets is challenging due to the relatively small screen size and limited user interaction capabilities. Standard data visualization apps provide support for pinch-and-zoom and scrolling operations, but do not provide context for data that is off-screen. When exploring data on tablets, the user must be able to focus on a region of interest and quickly find interesting patterns in the data. We present visualization techniques that facilitate seamless interaction with the region of interest on a tablet using context-providing bar graphs and scatter plots. Through aggregation, fisheye-style, and overview+detail representations, we provide context to the users as …


On-Line Planning And Scheduling: An Application To Controlling Modular Printers, Wheeler Ruml, Minh Binh Do, Rong Zhou, Markus P. J. Fromherz Feb 2011

On-Line Planning And Scheduling: An Application To Controlling Modular Printers, Wheeler Ruml, Minh Binh Do, Rong Zhou, Markus P. J. Fromherz

Computer Science

We present a case study of artificial intelligence techniques applied to the control of production printing equipment. Like many other real-world applications, this complex domain requires high-speed autonomous decision-making and robust continual operation. To our knowledge, this work represents the first successful industrial application of embedded domain-independent temporal planning. Our system handles execution failures and multi-objective preferences. At its heart is an on-line algorithm that combines techniques from state-space planning and partial-order scheduling. We suggest that this general architecture may prove useful in other applications as more intelligent systems operate in continual, on-line settings. Our system has been used to …


Best-First Heuristic Search For Multicore Machines, Ethan Burns, Sofia N. Lemons, Wheeler Ruml, Rong Zhou Dec 2010

Best-First Heuristic Search For Multicore Machines, Ethan Burns, Sofia N. Lemons, Wheeler Ruml, Rong Zhou

Computer Science

To harness modern multicore processors, it is imperative to develop parallel versions of fundamental algorithms. In this paper, we compare different approaches to parallel best-first search in a shared-memory setting. We present a new method, PBNF, that uses abstraction to partition the state space and to detect duplicate states without requiring frequent locking. PBNF allows speculative expansions when necessary to keep threads busy. We identify and fix potential livelock conditions in our approach, proving its correctness using temporal logic. Our approach is general, allowing it to extend easily to suboptimal and anytime heuristic search. In an empirical comparison on STRIPS …


Modeling And Analyzing Faults To Improve Election Process Robustness, B I. Simidchieva, Sophie J. Engle, M Clifford, A C. Jones, S Peisert, M Bishop, L A. Clarke, L J. Osterweil Jan 2010

Modeling And Analyzing Faults To Improve Election Process Robustness, B I. Simidchieva, Sophie J. Engle, M Clifford, A C. Jones, S Peisert, M Bishop, L A. Clarke, L J. Osterweil

Computer Science

This paper presents an approach for continuous process improvement and illustrates its application to improving the robustness of election processes. In this approach, the Little-JIL process definition language is used to create a precise and detailed model of an election process. Given this process model and a potential undesirable event, or hazard, a fault tree is automatically derived. Fault tree analysis is then used to automatically identify combinations of failures that might allow the selected potential hazard to occur. Once these combinations have been identified, we iteratively improve the process model to increase the robustness of the election process against …


The Power Of The Middle Bit, Frederic Green, Johannes Kobler, Jacobo Toran Jan 1992

The Power Of The Middle Bit, Frederic Green, Johannes Kobler, Jacobo Toran

Computer Science

The class of languages that can be recognized in polynomial time with the additional information of one bit from a #P function is studied. In particular, it is shown that every ModkP class and every class contained in PH are low for this class. These results are translated to the area of circuit complexity using MidBit (middle bit) gates. It is shown that every language in ACC can be computed by a family of depth-2 deterministic circuits of size 2 to the (log n)c power with a MidBit gate at the root and AND-gates of fan-in (log n)c at the …