Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 31108

Full-Text Articles in Computer Sciences

Real-Time Stealth Intervention For Motor Learning Using Player Flow-State, Ramin Tadayon, Ashish Amresh, Troy Mcdaniel, Sethuraman Panchanathan Jun 2019

Real-Time Stealth Intervention For Motor Learning Using Player Flow-State, Ramin Tadayon, Ashish Amresh, Troy Mcdaniel, Sethuraman Panchanathan

Ashish Amresh

We present a novel approach to real-time adaptation in serious games for at-home motor learning. Our approach assesses and responds to the “flow-state” of players by tracking and classifying facial emotions in real-time using the Kinect camera. Three different approaches for stealth assessment and adaptation using performance and flow-state data are defined, along with a case-study evaluation of these approaches based on their effectiveness at maintaining positive affective interaction in a subject.


Real-Time Rfi Mitigation In Radio Astronomy, Emily Ramey, Nick Joslyn, Richard Prestage, Michael Lam, Luke Hawkins, Tim Blattner, Mark Whitehead May 2019

Real-Time Rfi Mitigation In Radio Astronomy, Emily Ramey, Nick Joslyn, Richard Prestage, Michael Lam, Luke Hawkins, Tim Blattner, Mark Whitehead

Senior Honors Papers / Undergraduate Theses

As the use of wireless technology has increased around the world, Radio Frequency Interference (RFI) has become more and more of a problem for radio astronomers. Preventative measures exist to limit the presence of RFI, and programs exist to remove it from saved data, but the use of algorithms to detect and remove RFI as an observation is occurring is much less common. Such a method would be incredibly useful for observations in which the data must undergo several rounds of processing before being saved, as in pulsar timing studies. Strategies for real-time mitigation have been discussed and tested with ...


Generative Linguistics And Neural Networks At 60: Foundation, Friction, And Fusion, Joe Pater Feb 2019

Generative Linguistics And Neural Networks At 60: Foundation, Friction, And Fusion, Joe Pater

Joe Pater

The birthdate of both generative linguistics and neural networks can be taken as 1957, the year of the publication of foundational work by both Noam Chomsky and Frank Rosenblatt. This paper traces the development of these two approaches to cognitive science, from their largely autonomous early development in their first thirty years, through their collision in the 1980s around the past tense debate (Rumelhart and McClelland 1986, Pinker and Prince 1988), and their integration in much subsequent work up to the present. Although this integration has produced a considerable body of results, the continued general gulf between these two lines ...


When Human Cognitive Modeling Meets Pins: User-Independent Inter-Keystroke Timing Attacks, Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li Jan 2019

When Human Cognitive Modeling Meets Pins: User-Independent Inter-Keystroke Timing Attacks, Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li

Research Collection School Of Information Systems

This paper proposes the first user-independent inter-keystroke timing attacks on PINs. Our attack method is based on an inter-keystroke timing dictionary built from a human cognitive model whose parameters can be determined by a small amount of training data on any users (not necessarily the target victims). Our attacks can thus be potentially launched on a large scale in real-world settings. We investigate inter-keystroke timing attacks in different online attack settings and evaluate their performance on PINs at different strength levels. Our experimental results show that the proposed attack performs significantly better than random guessing attacks. We further demonstrate that ...


Rehab Tracker: Framework For Monitoring And Enhancing Nmes Patient Compliance, Timothy Stevens Jan 2019

Rehab Tracker: Framework For Monitoring And Enhancing Nmes Patient Compliance, Timothy Stevens

Graduate College Dissertations and Theses

We describe the development of a cyber-physical system (Rehab Tracker) for improving patient compliance with at-home physical rehabilitation using neuromuscular electrical stimulation (NMES) therapy. Rehab Tracker consists of three components: 1) hardware modifications to sense and store use data from an FDA-approved NMES therapy device and provide Bluetooth communication capability, 2) an iOS-based smartphone/tablet application to receive and transmit NMES use data and serve as a conduit for patient-provider interactions and 3) a back-end server platform to receive device use data, display compliance data for provider review and provide automated positive and remedial push notifications to patients to improve ...


Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski Dec 2018

Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


Strong Equivalence And Program's Structure In Arguing Essential Equivalence Between First-Order Logic Programs, Yuliya Lierler Dec 2018

Strong Equivalence And Program's Structure In Arguing Essential Equivalence Between First-Order Logic Programs, Yuliya Lierler

Yuliya Lierler

Answer set programming  is a prominent declarative programming paradigm used in formulating combinatorial search problems and implementing distinct knowledge representation formalisms. It is common that several related and yet substantially different answer set programs exist for a given problem. Sometimes these encodings may display significantly different performance. Uncovering precise formal links between these programs is often important and yet far from trivial. This paper claims the correctness   of a number of interesting program rewritings. Notably, they  assume  programs with variables and  such important language features as choice, disjunction, and aggregates. We showcase the utility of some considered rewritings  by using ...


Automatic Program Rewriting In Non-Ground Answer Set Programs, Nicholas Hippen, Yuliya Lierler Dec 2018

Automatic Program Rewriting In Non-Ground Answer Set Programs, Nicholas Hippen, Yuliya Lierler

Yuliya Lierler

Answer set programming is a popular constraint programming paradigm that has seen wide use across various industry applications. However, logic programs under answer set semantics often require careful design and nontrivial expertise from a programmer to obtain satisfactory solving times. In order to reduce this burden on a software engineer we propose an automated rewriting technique for non-ground logic programs that we implement in a system Projector. We conduct rigorous experimental analysis, which shows that applying system Projector to a logic program can improve its performance, even after significant human-performed optimizations.


Regularity Radius: Properties, Approximation And A Not A Priori Exponential Algorithm, David Hartman, Milan Hladik Dec 2018

Regularity Radius: Properties, Approximation And A Not A Priori Exponential Algorithm, David Hartman, Milan Hladik

Electronic Journal of Linear Algebra

The radius of regularity, sometimes spelled as the radius of nonsingularity, is a measure providing the distance of a given matrix to the nearest singular one. Despite its possible application strength this measure is still far from being handled in an efficient way also due to findings of Poljak and Rohn providing proof that checking this property is NP-hard for a general matrix. There are basically two approaches to handle this situation. Firstly, approximation algorithms are applied and secondly, tighter bounds for radius of regularity are considered. Improvements of both approaches have been recently shown by Hartman and Hlad\'{i ...


User Attitudes About Duo Two-Factor Authentication At Byu, Jonathan Dutson Dec 2018

User Attitudes About Duo Two-Factor Authentication At Byu, Jonathan Dutson

Undergraduate Honors Theses

Simple password-based authentication provides insufficient protection against increasingly common incidents of online identity theft and data loss. Although two-factor authentication (2FA) provides users with increased protection against attackers, users have mixed feelings about the usability of 2FA. We surveyed the students, faculty, and staff of Brigham Young University (BYU) to measure user sentiment about DUO Security, the 2FA system adopted by BYU in 2017. We find that most users consider DUO to be annoying, and about half of those surveyed expressed a preference for authentication without using a second-factor. About half of all participants reported at least one instance of ...


Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa Dec 2018

Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa

Student Scholar Symposium Abstracts and Posters

An application called "Bookstore Enquiry", and it is implemented in Java using TCP client-server program. It contains two programs; one program is called "Server" and another one is called "Client". In this application, the 'server' maintains information about books and for each book it stores information like 'BookId', 'BookName', 'BookEdition', 'AvailableStock', 'UnitPrice', 'Discount'. This application works in such a way that, the server runs indefinitely and waits for client requests. The Client will accept the BookId & BookName from console and send it to server. If the server finds any books that matches with sent details, then it shows "BOOK FOUND ...


Bots, Bias And Big Data: Artificial Intelligence, Algorithmic Bias And Disparate Impact Liability In Hiring Practices, Mckenzie Raub Dec 2018

Bots, Bias And Big Data: Artificial Intelligence, Algorithmic Bias And Disparate Impact Liability In Hiring Practices, Mckenzie Raub

Arkansas Law Review

No abstract provided.


Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu Dec 2018

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu

School of Professional Studies

n The client for this capstone project is RENEW Worcester which is a fledgling solar power project whose main goals are to bring renewable energy in the form of solar power into local, primarily low-income communities and are committed to the mission of making the transition off of fossil fuels to clean, renewable power. Based in Worcester, Massachusetts, they are a local chapter of Co-op Power which is a consumer-owned sustainable energy cooperative (co-op) made up of numerous different local chapters all over the New England area as well as the state of New York. The problem that we will ...


The Role Of Information Communication Technologies (Icts) In Shaping Identity Threats And Responses, Mary Macharia Dec 2018

The Role Of Information Communication Technologies (Icts) In Shaping Identity Threats And Responses, Mary Macharia

Theses and Dissertations

With the rising use of social media, people are increasingly experiencing, and responding to, identity threats online. This sometimes leads to online backlash via “cybermobs” or the creation of online social movements that traverse offline. Prior information systems (IS) research on identity threats and responses largely focuses on information communication technology (ICT) implementations within organizations in an offline context. Therefore, we lack understanding of ICT-mediated identity threats and responses and ways to promote healthier and productive interactions online. This two-essay dissertation seeks to fill this gap. Essay 1 combines a review of ICT-mediated identity threats with a qualitative study (based ...


Phr: Patient Health Record, Quinn Nelson Dec 2018

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research group ...


Sheaf Theory As A Foundation For Heterogeneous Data Fusion, Seyed M-H Mansourbeigi Dec 2018

Sheaf Theory As A Foundation For Heterogeneous Data Fusion, Seyed M-H Mansourbeigi

All Graduate Theses and Dissertations

A major impediment to scientific progress in many fields is the inability to make sense of the huge amounts of data that have been collected via experiment or computer simulation. This dissertation provides tools to visualize, represent, and analyze the collection of sensors and data all at once in a single combinatorial geometric object. Encoding and translating heterogeneous data into common language are modeled by supporting objects. In this methodology, the behavior of the system based on the detection of noise in the system, possible failure in data exchange and recognition of the redundant or complimentary sensors are studied via ...


Calculating The Cohomology Of A Lie Algebra Using Maple And The Serre Hochschild Spectral Sequence, Jacob Kullberg Dec 2018

Calculating The Cohomology Of A Lie Algebra Using Maple And The Serre Hochschild Spectral Sequence, Jacob Kullberg

All Graduate Plan B and other Reports

Lie algebra cohomology is an important tool in many branches of mathematics. It is used in the Topology of homogeneous spaces, Deformation theory, and Extension theory. There exists extensive theory for calculating the cohomology of semi simple Lie algebras, but more tools are needed for calculating the cohomology of general Lie algebras. To calculate the cohomology of general Lie algebras, I used the symbolic software program called Maple. I wrote software to calculate the cohomology in several different ways. I wrote several programs to calculate the cohomology directly. This proved to be computationally expensive as the number of differential forms ...


Improving Accuracy Of The Edgebox Approach, Kamna Yadav Dec 2018

Improving Accuracy Of The Edgebox Approach, Kamna Yadav

All Graduate Theses and Dissertations

Object region detection plays a vital role in many domains ranging from self-driving cars to lane detection, which heavily involves the task of object detection. Improving the performance of object region detection approaches is of great importance and therefore is an active ongoing research in Computer Vision. Traditional sliding window paradigm has been widely used to identify hundreds of thousands of windows (covering different scales, angles, and aspect ratios for objects) before the classification step. However, it is not only computationally expensive but also produces relatively low accuracy in terms of the classifier output by providing many negative samples. Object ...


Review Of: The World Of Scary Video Games: A Study In Videoludic Horror, Approaches To Digital Game Studies, Matthew Murray Dec 2018

Review Of: The World Of Scary Video Games: A Study In Videoludic Horror, Approaches To Digital Game Studies, Matthew Murray

Library Faculty Publications

No abstract provided.


Sensor-Based Human Activity Recognition Using Bidirectional Lstm For Closely Related Activities, Arumugam Thendramil Pavai Dec 2018

Sensor-Based Human Activity Recognition Using Bidirectional Lstm For Closely Related Activities, Arumugam Thendramil Pavai

Electronic Theses, Projects, and Dissertations

Recognizing human activities using deep learning methods has significance in many fields such as sports, motion tracking, surveillance, healthcare and robotics. Inertial sensors comprising of accelerometers and gyroscopes are commonly used for sensor based HAR. In this study, a Bidirectional Long Short-Term Memory (BLSTM) approach is explored for human activity recognition and classification for closely related activities on a body worn inertial sensor data that is provided by the UTD-MHAD dataset. The BLSTM model of this study could achieve an overall accuracy of 98.05% for 15 different activities and 90.87% for 27 different activities performed by 8 persons ...


Scale-Out Algorithm For Apache Storm In Saas Environment, Ravi Kiran Puttaswamy Dec 2018

Scale-Out Algorithm For Apache Storm In Saas Environment, Ravi Kiran Puttaswamy

Computer Science and Engineering: Theses, Dissertations, and Student Research

The main appeal of the Cloud is in its cost effective and flexible access to computing power. Apache Storm is a data processing framework used to process streaming data. In our work we explore the possibility of offering Apache Storm as a software service. Further, we take advantage of the cgroups feature in Storm to divide the computing power of worker machine into smaller units to be offered to users. We predict that the compute bounds placed on the cgroups could be used to approximate the state of the workflow. We discuss the limitations of the current schedulers in facilitating ...


Revolution In Crime: How Cryptocurrencies Have Changed The Criminal Landscape, Igor Groysman Dec 2018

Revolution In Crime: How Cryptocurrencies Have Changed The Criminal Landscape, Igor Groysman

Student Theses

This thesis will examine the ways in which various cryptocurrencies have impacted certain traditional crimes. While crime is always evolving with technology, cryptocurrencies are a game changer in that they provide anonymous and decentralized payment systems which, while they can be tracked in a reactive sense via the blockchain, are seen by criminals as having better uses for them than traditional fiat currencies, such as the ability to send money relatively fast to another party without going through an intermediary, or the ability to obscure the origin of the money for money laundering purposes. Every week there are new cryptocurrencies ...


Learning-Based Analysis On The Exploitability Of Security Vulnerabilities, Adam Bliss Dec 2018

Learning-Based Analysis On The Exploitability Of Security Vulnerabilities, Adam Bliss

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this thesis is to develop a tool that uses machine learning techniques to make predictions about whether or not a given vulnerability will be exploited. Such a tool could help organizations such as electric utilities to prioritize their security patching operations. Three different models, based on a deep neural network, a random forest, and a support vector machine respectively, are designed and implemented. Training data for these models is compiled from a variety of sources, including the National Vulnerability Database published by NIST and the Exploit Database published by Offensive Security. Extensive experiments are conducted, including testing ...


Static Analysis Of Android Secure Application Development Process With Findsecuritybugs, Xianyong Meng Nov 2018

Static Analysis Of Android Secure Application Development Process With Findsecuritybugs, Xianyong Meng

Master of Science in Computer Science Theses

Mobile devices have been growing more and more powerful in recent decades, evolving from a simple device for SMS messages and phone calls to a smart device that can install third party apps. People are becoming more heavily reliant on their mobile devices. Due to this increase in usage, security threats to mobile applications are also growing explosively. Mobile app flaws and security defects can provide opportunities for hackers to break into them and access sensitive information. Defensive coding needs to be an integral part of coding practices to improve the security of our code.

We need to consider data ...


Seasonal Warranty Prediction Based On Recurrent Event Data, Qianqian Shan, Yili Hong, William Q. Meeker Jr. Nov 2018

Seasonal Warranty Prediction Based On Recurrent Event Data, Qianqian Shan, Yili Hong, William Q. Meeker Jr.

Statistics Preprints

Warranty return data from repairable systems, such as vehicles, usually result in recurrent event data. The non-homogeneous Poisson process (NHPP) model is used widely to describe such data. Seasonality in the repair frequencies and other variabilities, however, complicate the modeling of recurrent event data. Not much work has been done to address the seasonality, and this paper provides a general approach for the application of NHPP models with dynamic covariates to predict seasonal warranty returns. A hierarchical clustering method is used to stratify the population into groups that are more homogeneous than the than the overall population. The stratification facilitates ...


A Data Set Of Bloodstain Patterns For Teaching And Research In Bloodstain Pattern Analysis: Gunshot Backspatters, Daniel Attinger, Yu Liu, Ricky Faflak, Yalin Rao, Bryce A. Struttman, Kris De Brabanter, Patrick M. Comiskey, Alex L. Yarin Nov 2018

A Data Set Of Bloodstain Patterns For Teaching And Research In Bloodstain Pattern Analysis: Gunshot Backspatters, Daniel Attinger, Yu Liu, Ricky Faflak, Yalin Rao, Bryce A. Struttman, Kris De Brabanter, Patrick M. Comiskey, Alex L. Yarin

Mechanical Engineering Publications

This is a data set of blood spatter patterns scanned at high resolution, generated in controlled experiments. The spatter patterns were generated with a rifle or a handgun, and different ammunitions. The resulting atomized blood droplets travelled opposite to the bullet direction, generating a gunshot backspatter on a poster board target sheet. Fresh blood with anticoagulants was used; its hematocrit and temperature were measured. Main parameters of the study were the bullet shape, size and speed, and the distance between the blood source and target sheet. Several other parameters were explored in a less systematic way. This new and original ...


Determinants Of Interval Matrices, Jaroslav Horáček, Milan Hladík, Josef Matějka Nov 2018

Determinants Of Interval Matrices, Jaroslav Horáček, Milan Hladík, Josef Matějka

Electronic Journal of Linear Algebra

In this paper we shed more light on determinants of real interval matrices. Computing the exact bounds on a determinant of an interval matrix is an NP-hard problem. Therefore, attention is first paid to approximations. NP-hardness of both relative and absolute approximation is proved. Next, methods computing verified enclosures of interval determinants and their possible combination with preconditioning are discussed. A new method based on Cramer's rule was designed. It returns similar results to the state-of-the-art method, however, it is less consuming regarding computational time. Other methods transferable from real matrices (e.g., the Gerschgorin circles, Hadamard's inequality ...


Worker Activity Recognition In Smart Manufacturing Using Imu And Semg Signals With Convolutional Neural Networks, Wenjin Tao, Ze-Hao Lai, Ming-Chuan Leu, Zhaozheng Yin Nov 2018

Worker Activity Recognition In Smart Manufacturing Using Imu And Semg Signals With Convolutional Neural Networks, Wenjin Tao, Ze-Hao Lai, Ming-Chuan Leu, Zhaozheng Yin

Zhaozheng Yin

In a smart manufacturing system involving workers, recognition of the worker's activity can be used for quantification and evaluation of the worker's performance, as well as to provide onsite instructions with augmented reality. In this paper, we propose a method for activity recognition using Inertial Measurement Unit (IMU) and surface electromyography (sEMG) signals obtained from a Myo armband. The raw 10-channel IMU signals are stacked to form a signal image. This image is transformed into an activity image by applying Discrete Fourier Transformation (DFT) and then fed into a Convolutional Neural Network (CNN) for feature extraction, resulting in ...


Enabling The Social Internet Of Things, Ahmed E. Khaled, Sumi Helal Nov 2018

Enabling The Social Internet Of Things, Ahmed E. Khaled, Sumi Helal

Faculty Research and Creative Activities Symposium

No abstract provided.


A Study Of Text Simplification On Breast Cancer Information Targeting A Low-Health Literacy Population, Francisco D. Iacobelli, Xiwei Wang Nov 2018

A Study Of Text Simplification On Breast Cancer Information Targeting A Low-Health Literacy Population, Francisco D. Iacobelli, Xiwei Wang

Faculty Research and Creative Activities Symposium

No abstract provided.