Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 68

Full-Text Articles in Physical Sciences and Mathematics

Index Bucketing: A Novel Approach To Manipulating Data Structures, Jeffrey Myers Dec 2023

Index Bucketing: A Novel Approach To Manipulating Data Structures, Jeffrey Myers

Masters Theses & Specialist Projects

Handling nested data collections in large-scale distributed systems poses considerable challenges in query processing, often resulting in substantial costs and error susceptibility. While substantial efforts have been directed toward overcoming computation hurdles in querying vast data collections within relational databases, scant attention has been devoted to the manipulation and flattening procedures necessary for unnesting these data collections. Flattening operations, integral to unnesting, frequently yield copious duplicate data and entail a loss of information, devoid of mechanisms for reconstructing the original structure. These challenges exacerbate in scenarios involving skewed, nested data with irregular inner data collections. Processing such data demands an …


The Socialization Of Social Media: Examining The Impact Of Social Media Use On Interpersonal Skills During Face-To-Face Interaction, Tenille Thomas Dec 2023

The Socialization Of Social Media: Examining The Impact Of Social Media Use On Interpersonal Skills During Face-To-Face Interaction, Tenille Thomas

Masters Theses & Specialist Projects

Research has well established that the use of social networking sites (SNS) has increased accessibility and connectivity to people with limitless boundaries. SNS have progressively become the preferred source of communication. However, often overlooked is the impact SNS use has on face-to-face interactions, specifically on interpersonal skills. The purpose of this study was to examine the relationship between SNS use and face-to-face interaction. Specifically, this study examines the participant’s ability to recognize and interpret nonverbal cues with increased SNS use. This was a correlational study utilizing a quantitative design of self-reported questionnaires. A total of 178 participants, ranging in age …


Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike Dec 2023

Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike

Masters Theses & Specialist Projects

The Jing-Jin-Ji region of China is a highly industrialized and populated area of the country. Its periodic high pollution and smog includes particles smaller than 2.5 μm, known as PM2.5, linked to many respiratory and cardiovascular illnesses. PM2.5 concentration around Jing-Jin-Ji has exceeded China’s urban air quality safety threshold for over 20% of all days in 2017 through 2020.

The quantity of ground weather stations that measure the concentrations of these pollutants, and their valuable data, is unfortunately small. By employing many machine learning strategies, many researchers have focused on interpolating finer spatial grids of PM2.5, or hindcasting PM2.5. However, …


Adaptable Object And Animation System For Game Development, Isaiah Turner Dec 2023

Adaptable Object And Animation System For Game Development, Isaiah Turner

Masters Theses & Specialist Projects

In contemporary times, video games have swiftly evolved into a prominent medium, excelling in both entertainment and narrative delivery, positioning themselves as significant rivals to traditional forms such as film and theater. The burgeoning popularity of gaming has led to a surge in aspiring game developers seeking to craft their own creations, driven by both commercial aspirations and personal passion. However, a common challenge faced by these individuals involves the considerable time investment required to acquire essential skills and establish a foundational framework for their projects. Accessible game development engines that offer a diverse range of fundamental features play a …


Topology Optimization For Artificial Neural Networks, Justin Mills Aug 2023

Topology Optimization For Artificial Neural Networks, Justin Mills

Masters Theses & Specialist Projects

This thesis examines the feasibility of implementing two simple optimization methods, namely the Weights Power method (Hagiwara, 1994) and the Tabu Search method (Gupta & Raza, 2020), within an existing framework. The study centers around the generation of artificial neural networks using these methods, assessing their performance in terms of both accuracy and the capacity to reduce components within the Artificial Neural Network’s (ANN) topology.

The evaluation is conducted on three classification datasets: Air Quality (Shahane, 2021), Diabetes (Soni, 2021), and MNIST (Deng, 2012). The main performance metric used is accuracy, which measures the network's predictive capability for the classification …


Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu May 2023

Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu

Masters Theses & Specialist Projects

Advancements in computer technology and internet services have led to the availability of vast amounts of information like videos, articles, research papers, and code samples. Free online information will increase the possibility of plagiarism and collusion among students. People can commit plagiarism in both text and code [1], as tools used to detect plagiarism between texts and between codes are distinct. Traditionally plagiarism in code is detected using manual inspection, which is a tedious process and misses to compare code from previous submissions and external sources. To overcome this issue, systems that can automatically detect plagiarism in code were developed …


Robust Sensor Design For The Novel Reduced Models Of The Mead-Marcus Sandwich Beam Equation, Ahmet Aydin Jul 2022

Robust Sensor Design For The Novel Reduced Models Of The Mead-Marcus Sandwich Beam Equation, Ahmet Aydin

Masters Theses & Specialist Projects

Novel space-discretized Finite Differences-based model reductions are proposed for the partial differential equations (PDE) model of a multi-layer Mead-Marcus-type beam with (i) hinged-hinged and (ii) clamped-free boundary conditions. The PDE model describes transverse vibrations for a sandwich beam whose alternating outer elastic layers constrain viscoelastic core layers, which allow transverse shear. The major goal of this project is to design a single boundary sensor, placed at the tip of the beam, to control the overall dynamics on the beam.

For (i), it is first shown that the PDE model is exactly observable by the so-called nonharmonic Fourier series approach. However, …


Canary: An Automated Approach To Security Scanning And Remediation, David Wiles May 2022

Canary: An Automated Approach To Security Scanning And Remediation, David Wiles

Masters Theses & Specialist Projects

Modern software has a smaller attack surface today than in the past. Memory-safe languages, container runtimes, virtual machines, and a mature web stack all contribute to the relative safety of the web and software in general compared to years ago. Despite this, we still see high-profile bugs, hacks, and outages which affect major companies and widely-used technologies. The extensive work that has gone into hardening virtualization, containerization, and commonly used applications such as Nginx still depends on the end-user to configure correctly to prevent a compromised machine.

In this paper, I introduce a tool, which I call Canary, which can …


Reinforcement Learning With Deep Q-Networks, Caleb Cassady Apr 2022

Reinforcement Learning With Deep Q-Networks, Caleb Cassady

Masters Theses & Specialist Projects

In the past decade, machine learning strategies centered on the use of Deep Neural Networks (DNNs) have caught the interest of researchers due to their success in complicated classification and prediction problems. More recently, these DNNs have been applied to reinforcement learning tasks with state of- the-art results using Deep Q-Networks (DQNs) based on the Q-Learning algorithm. However, the DQN training process is different from standard DNNs and poses significant challenges for certain reinforcement learning environments. This paper examines some of these challenges, compares proposed solutions, and offers novel solutions based on previous research. Experiment implementation available at https://github.com/caleb98/dqlearning.


K-Means Clustering Using Gravity Distance, Ajinkya Vishwas Indulkar Apr 2022

K-Means Clustering Using Gravity Distance, Ajinkya Vishwas Indulkar

Masters Theses & Specialist Projects

Clustering is an important topic in data modeling. K-means Clustering is a well-known partitional clustering algorithm, where a dataset is separated into groups sharing similar properties. Clustering an unbalanced dataset is a challenging problem in data modeling, where some group has a much larger number of data points than others. When a K-means clustering algorithm with Euclidean distance is applied to such data, the algorithm fails to form good clusters. The standard K-means tends to split data into smaller clusters during a clustering process evenly.

We propose a new K-means clustering algorithm to overcome the disadvantage by introducing a different …


Knot Theory In Virtual Reality, Donald Lee Price Jul 2021

Knot Theory In Virtual Reality, Donald Lee Price

Masters Theses & Specialist Projects

Throughout the study of Knot Theory, there have been several programmatic solutions to common problems or questions. These solutions have included software to draw knots, software to identify knots, or online databases to look up pre-computed data about knots. We introduce a novel prototype of software used to study knots and links by using Virtual Reality. This software can allow researchers to draw links in 3D, run physics simulations on them, and identify them. This technique has not yet been rigorously explored and we believe it will be of great interest to Knot Theory researchers. The computer code is written …


Buffer Overflow And Sql Injection In C++, Noah Warren Kapley Apr 2021

Buffer Overflow And Sql Injection In C++, Noah Warren Kapley

Masters Theses & Specialist Projects

Buffer overflows and SQL Injection have plagued programmers for many years. A successful buffer overflow, innocuous or not, damages a computer’s permanent memory. Safer buffer overflow programs are presented in this thesis for the C programs characterizing string concatenation, string copy, and format get string, a C program which takes input and output from a keyboard, in most cases. Safer string concatenation and string copy programs presented in this thesis require the programmer to specify the amount of storage space necessary for the program’s execution. This safety mechanism is designed to help programmers avoid over specifying the amount of storage …


Video Game Genre Classification Based On Deep Learning, Yuhang Jiang Oct 2020

Video Game Genre Classification Based On Deep Learning, Yuhang Jiang

Masters Theses & Specialist Projects

Video games have played a more and more important role in our life. While the genre classification is a deeply explored research subject by leveraging the strength of deep learning, the automatic video game genre classification has drawn little attention in academia. In this study, we compiled a large dataset of 50,000 video games, consisting of the video game covers, game descriptions and the genre information. We explored three approaches for genre classification using deep learning techniques. First, we developed five image-based models utilizing pre-trained computer vision models such as MobileNet, ResNet50 and Inception, based on the game covers. Second, …


Some Generalizations Of Classical Integer Sequences Arising In Combinatorial Representation Theory, Sasha Verona Malone Oct 2020

Some Generalizations Of Classical Integer Sequences Arising In Combinatorial Representation Theory, Sasha Verona Malone

Masters Theses & Specialist Projects

There exists a natural correspondence between the bases for a given finite-dimensional representation of a complex semisimple Lie algebra and a certain collection of finite edge-colored ranked posets, laid out by Donnelly, et al. in, for instance, [Don03]. In this correspondence, the Serre relations on the Chevalley generators of the given Lie algebra are realized as conditions on coefficients assigned to poset edges. These conditions are the so-called diamond, crossing, and structure relations (hereinafter DCS relations.) New representation constructions of Lie algebras may thus be obtained by utilizing edge-colored ranked posets. Of particular combinatorial interest are those representations whose corresponding …


Book Genre Classification By Its Cover Using A Multi-View Learning Approach, Chandra Shakhar Kundu Apr 2020

Book Genre Classification By Its Cover Using A Multi-View Learning Approach, Chandra Shakhar Kundu

Masters Theses & Specialist Projects

An interesting topic in the visual analysis is to determine the genre of a book by its cover. The book cover is the very first communication to the reader which shapes the reader’s expectation about the type of the book. Each book cover is carefully designed by the cover designers and typographers to convey the visual representation of its content. In this study, we explore several different deep learning approaches for predicting the genre from the cover image alone, such as MobileNet V1, MobileNet V2, ResNet50, Inception V2. Moreover, we add an extra modality by extracting text from the cover …


Inflammatory Bowel Disease Diagnosis Using Metagenomic Classification, Michael Riggle Apr 2020

Inflammatory Bowel Disease Diagnosis Using Metagenomic Classification, Michael Riggle

Masters Theses & Specialist Projects

Inflammatory bowel disease (IBD) is a set of disorders that involve chronic inflammation of digestive tracts, e.g., Crohn's disease (CD) and ulcerative colitis (UC). Millions of people around the world have inflammatory bowel disease. However, it is still difficult to treat IBD due to its unknown cause. In fact, accurately diagnosing inflammatory bowel disease (IBD) can be very challenging too since some of IBD symptoms can mimic those of other conditions. In this work, we apply classification methods to help improve the success rate of diagnosis. We study four formulations of IBD classification: i) IBD and non-IBD (binary classification), ii) …


A Comparative Study Of Recommendation Systems, Ashwini Lokesh Oct 2019

A Comparative Study Of Recommendation Systems, Ashwini Lokesh

Masters Theses & Specialist Projects

Recommendation Systems or Recommender Systems have become widely popular due to surge of information at present time and consumer centric environment. Researchers have looked into a wide range of recommendation systems leveraging a wide range of algorithms. This study investigates three popular recommendation systems in existence, Collaborative Filtering, Content-Based Filtering, and Hybrid recommendation system. The famous MovieLens dataset was utilized for the purpose of this study. The evaluation looked into both quantitative and qualitative aspects of the recommendation systems. We found that from both the perspectives, the hybrid recommendation system performs comparatively better than standalone Collaborative Filtering or Content-Based Filtering …


Exploring The Effect Of Different Numbers Of Convolutional Filters And Training Loops On The Performance Of Alphazero, Jared Prince Oct 2018

Exploring The Effect Of Different Numbers Of Convolutional Filters And Training Loops On The Performance Of Alphazero, Jared Prince

Masters Theses & Specialist Projects

In this work, the algorithm used by AlphaZero is adapted for dots and boxes, a two-player game. This algorithm is explored using different numbers of convolutional filters and training loops, in order to better understand the effect these parameters have on the learning of the player. Different board sizes are also tested to compare these parameters in relation to game complexity. AlphaZero originated as a Go player using an algorithm which combines Monte Carlo tree search and convolutional neural networks. This novel approach, integrating a reinforcement learning method previously applied to Go (MCTS) with a supervised learning method (neural networks) …


Application Of Huffman Data Compression Algorithm In Hashing Computation, Lakshmi Narasimha Devulapalli Venkata, Apr 2018

Application Of Huffman Data Compression Algorithm In Hashing Computation, Lakshmi Narasimha Devulapalli Venkata,

Masters Theses & Specialist Projects

Cryptography is the art of protecting information by encrypting the original message into an unreadable format. A cryptographic hash function is a hash function which takes an arbitrary length of the text message as input and converts that text into a fixed length of encrypted characters which is infeasible to invert. The values returned by the hash function are called as the message digest or simply hash values. Because of its versatility, hash functions are used in many applications such as message authentication, digital signatures, and password hashing [Thomsen and Knudsen, 2005].

The purpose of this study is to apply …


Green Cloud - Load Balancing, Load Consolidation Using Vm Migration, Manh Duc Do Oct 2017

Green Cloud - Load Balancing, Load Consolidation Using Vm Migration, Manh Duc Do

Masters Theses & Specialist Projects

Recently, cloud computing is a new trend emerging in computer technology with a massive demand from the clients. To meet all requirements, a lot of cloud data centers have been constructed since 2008 when Amazon published their cloud service. The rapidly growing data center leads to the consumption of a tremendous amount of energy even cloud computing has better improved in the performance and energy consumption, but cloud data centers still absorb an immense amount of energy. To raise company’s income annually, the cloud providers start considering green cloud concepts which gives an idea about how to optimize CPU’s usage …


A Proposed Frequency-Based Feature Selection Method For Cancer Classification, Yi Pan Apr 2017

A Proposed Frequency-Based Feature Selection Method For Cancer Classification, Yi Pan

Masters Theses & Specialist Projects

Feature selection method is becoming an essential procedure in data preprocessing step. The feature selection problem can affect the efficiency and accuracy of classification models. Therefore, it also relates to whether a classification model can have a reliable performance. In this study, we compared an original feature selection method and a proposed frequency-based feature selection method with four classification models and three filter-based ranking techniques using a cancer dataset. The proposed method was implemented in WEKA which is an open source software. The performance is evaluated by two evaluation methods: Recall and Receiver Operating Characteristic (ROC). Finally, we found the …


Mabic: Mobile Application Builder For Interactive Communication, Huy Manh Nguyen Oct 2016

Mabic: Mobile Application Builder For Interactive Communication, Huy Manh Nguyen

Masters Theses & Specialist Projects

Nowadays, the web services and mobile technology advance to a whole new level. These technologies make the modern communication faster and more convenient than the traditional way. People can also easily share data, picture, image and video instantly. It also saves time and money. For example: sending an email or text message is cheaper and faster than a letter. Interactive communication allows the instant exchange of feedback and enables two-way communication between people and people, or people and computer. It increases the engagement of sender and receiver in communication.

Although many systems such as REDCap and Taverna are built for …


Vertical Implementation Of Cloud For Education (V.I.C.E.), Travis S. Brummett Jul 2016

Vertical Implementation Of Cloud For Education (V.I.C.E.), Travis S. Brummett

Masters Theses & Specialist Projects

There are several different implementations of open source cloud software that organizations can utilize when deploying their own private cloud. Some possible solutions are OpenNebula, Nimbus, and Eucalyptus. These are Infrastructure-as-a-Service (IaaS) cloud implementations that ultimately gives users virtual machines to undefined job types. A typical IaaS cloud is composed of a front-end cloud controller node, a cluster controller node for controlling compute nodes, a virtual machine image repository node, and many persistent storage nodes and compute nodes. These architectures are built for ease of scalability and availability.

Interestingly, the potential of such architectures could have in the educational field …


In The Face Of Anticipation: Decision Making Under Visible Uncertainty As Present In The Safest-With-Sight Problem, Bryan A. Knowles Apr 2016

In The Face Of Anticipation: Decision Making Under Visible Uncertainty As Present In The Safest-With-Sight Problem, Bryan A. Knowles

Masters Theses & Specialist Projects

Pathfinding, as a process of selecting a fixed route, has long been studied in

Computer Science and Mathematics. Decision making, as a similar, but intrinsically different, process of determining a control policy, is much less studied. Here, I propose a problem that appears to be of the first class, which would suggest that it is easily solvable with a modern machine, but that would be too easy, it turns out. By allowing a pathfinding to anticipate and respond to information, without setting restrictions

on the \structure" of this anticipation, selecting the \best step" appears to be an intractable problem.

After …


Pedestrian Detection Using Basic Polyline: A Geometric Framework For Pedestrian Detection, Liang Gongbo Apr 2016

Pedestrian Detection Using Basic Polyline: A Geometric Framework For Pedestrian Detection, Liang Gongbo

Masters Theses & Specialist Projects

Pedestrian detection has been an active research area for computer vision in recently years. It has many applications that could improve our lives, such as video surveillance security, auto-driving assistance systems, etc. The approaches of pedestrian detection could be roughly categorized into two categories, shape-based approaches and appearance-based approaches. In the literature, most of approaches are appearance-based. Shape-based approaches are usually integrated with an appearance-based approach to speed up a detection process.

In this thesis, I propose a shape-based pedestrian detection framework using the geometric features of human to detect pedestrians. This framework includes three main steps. Give a static …


Distributed Approach For Peptide Identification, Naga V K Abhinav Vedanbhatla Oct 2015

Distributed Approach For Peptide Identification, Naga V K Abhinav Vedanbhatla

Masters Theses & Specialist Projects

A crucial step in protein identification is peptide identification. The Peptide Spectrum Match (PSM) information set is enormous. Hence, it is a time-consuming procedure to work on a single machine. PSMs are situated by a cross connection, a factual score, or a probability that the match between the trial and speculative is right and original. This procedure takes quite a while to execute. So, there is demand for enhancement of the performance to handle extensive peptide information sets. Development of appropriate distributed frameworks are expected to lessen the processing time.

The designed framework uses a peptide handling algorithm named C-Ranker, …


An Apache Hadoop Framework For Large-Scale Peptide Identification, Harinivesh Donepudi Jul 2015

An Apache Hadoop Framework For Large-Scale Peptide Identification, Harinivesh Donepudi

Masters Theses & Specialist Projects

Peptide identification is an essential step in protein identification, and Peptide Spectrum Match (PSM) data set is huge, which is a time consuming process to work on a single machine. In a typical run of the peptide identification method, PSMs are positioned by a cross correlation, a statistical score, or a likelihood that the match between the trial and hypothetical is correct and unique. This process takes a long time to execute, and there is a demand for an increase in performance to handle large peptide data sets. Development of distributed frameworks are needed to reduce the processing time, but …


Moneyware: Simulating Software Portfolio Quality Management, Robert David Beverly May 2015

Moneyware: Simulating Software Portfolio Quality Management, Robert David Beverly

Masters Theses & Specialist Projects

In this research we introduce MoneyWare, a simulator designed to explore and ultimately to provide guidance on simulating software portfolio quality management. The name “MoneyWare” is inspired by the movie Moneyball. It chronicled a baseball team which used more descriptive statistics to achieve a higher quality ball club with limited resources. MoneyWare is inspired by the observation that the problem of software development is somewhat analogous. Management is faced with an incoming stream of tasks for development. The tasks vary in terms of size, priority, risk, and date needed. But, in any case, the demands come to more than the …


Generating Random Walks And Polygons With Thickness In Confinement, Sai Sindhuja Veeramachaneni May 2015

Generating Random Walks And Polygons With Thickness In Confinement, Sai Sindhuja Veeramachaneni

Masters Theses & Specialist Projects

Algorithms to generate walks (chains of unit-length, freely-jointed segments) and polygons (closed walks) in spherical confinements have been developed in the last few years. These algorithms generate polygons inside spherical confinement based on their mathematically derived probability distributions. The generated polygons do not occupy any volume { although that would be useful for some applications. This thesis investigates how to generate walks and polygons which occupy some volume in spherical confinement. More specifically, in this thesis, existing methods described in the literature have been studied and implemented to generate walks and polygons in confinement. Additionally, these methods were adapted to …


The Cadet Training Program Versus The Student Certification Program: A Study Of It- Support Training Programs At Western Kentucky University, Michael Courtney Moore Dec 2014

The Cadet Training Program Versus The Student Certification Program: A Study Of It- Support Training Programs At Western Kentucky University, Michael Courtney Moore

Masters Theses & Specialist Projects

Technology is a critical component of modern-day success. Advancements in technology have improved communication between individuals and companies. Technological advancements have allowed students to earn college degrees online. People who habitually use technology expect a high level of performance and support. As new technologies are implemented, such as complex web services or new operating systems, the dependence for information technology (IT) support grows in demand. Even learning curves can be cumbersome without proper assistance from IT professionals. Companies and institutions must accommodate user needs by implementing fast, efficient, and friendly support. In order to offer optimal customer support, representatives must …