Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Applied Mathematics (2)
- Machine Learning (2)
- Acoustic Gravity Waves (1)
- Alderamin (1)
- Alkaid (1)
-
- All-sky Imagers (1)
- Altair (1)
- Arithmetic Cost (1)
- Atmospheric Modeling (1)
- Automobile insurance fraud (1)
- Burglary studies (1)
- Caph (1)
- Coupled transient seepage/stress analysis (1)
- Cybersecurity (1)
- Data mining (1)
- Decision tree (1)
- Discrete Sine Transform (1)
- Fast algorithms (1)
- Fast and Efficient Algorithms (1)
- Finite element method (1)
- Fragmentation (1)
- Framework (1)
- Fundamental parameters (1)
- Gaussian Mixture Models (1)
- High performance computing (1)
- Human decision making (1)
- Interferometry (1)
- Inversion algorithms (1)
- K-Nearest Neighbor Regression (1)
- Line-of-sight Effects (1)
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Computer Sciences
Stellar Atmosphere Models For Select Veritas Stellar Intensity Interferometry Targets, Jackson Ladd Sackrider, Jason P. Aufdenberg, Katelyn Sonnen
Stellar Atmosphere Models For Select Veritas Stellar Intensity Interferometry Targets, Jackson Ladd Sackrider, Jason P. Aufdenberg, Katelyn Sonnen
Beyond: Undergraduate Research Journal
Since 2020 the Very Energetic Radiation Imaging Telescope Array System (VERITAS) has observed 48 stellar targets using the technique of Stellar Intensity Interferometry (SII). Angular diameter measurements by VERITAS SII (VSII) in a waveband near 400 nm complement existing angular diameter measurements in the near-infrared. VSII observations will test fundamental predictions of stellar atmosphere models and should be more sensitive to limb darkening and gravity darkening effects than measurements in the near-IR, however, the magnitude of this difference has not been systematically explored in the literature. In order to investigate the synthetic interferometric (as well as spectroscopic) appearance of stars …
Machine Learning To Predict Warhead Fragmentation In-Flight Behavior From Static Data, Katharine Larsen
Machine Learning To Predict Warhead Fragmentation In-Flight Behavior From Static Data, Katharine Larsen
Doctoral Dissertations and Master's Theses
Accurate characterization of fragment fly-out properties from high-speed warhead detonations is essential for estimation of collateral damage and lethality for a given weapon. Real warhead dynamic detonation tests are rare, costly, and often unrealizable with current technology, leaving fragmentation experiments limited to static arena tests and numerical simulations. Stereoscopic imaging techniques can now provide static arena tests with time-dependent tracks of individual fragments, each with characteristics such as fragment IDs and their respective position vector. Simulation methods can account for the dynamic case but can exclude relevant dynamics experienced in real-life warhead detonations. This research leverages machine learning methodologies to …
Computational Models To Detect Radiation In Urban Environments: An Application Of Signal Processing Techniques And Neural Networks To Radiation Data Analysis, Jose Nicolas Gachancipa
Computational Models To Detect Radiation In Urban Environments: An Application Of Signal Processing Techniques And Neural Networks To Radiation Data Analysis, Jose Nicolas Gachancipa
Beyond: Undergraduate Research Journal
Radioactive sources, such as uranium-235, are nuclides that emit ionizing radiation, and which can be used to build nuclear weapons. In public areas, the presence of a radioactive nuclide can present a risk to the population, and therefore, it is imperative that threats are identified by radiological search and response teams in a timely and effective manner. In urban environments, such as densely populated cities, radioactive sources may be more difficult to detect, since background radiation produced by surrounding objects and structures (e.g., buildings, cars) can hinder the effective detection of unnatural radioactive material. This article presents a computational model …
A Meshless Approach To Computational Pharmacokinetics, Anthony Matthew Khoury
A Meshless Approach To Computational Pharmacokinetics, Anthony Matthew Khoury
Doctoral Dissertations and Master's Theses
The meshless method is an incredibly powerful technique for solving a variety of problems with unparalleled accuracy and efficiency. The pharmacokinetic problem of transdermal drug delivery (TDDD) is one such topic and is of significant complexity. The locally collocated meshless method (LCMM) is developed in solution to this topic. First, the meshless method is formulated to model this transport phenomenon and is then validated against an analytical solution of a pharmacokinetic problem set, to demonstrate this accuracy and efficiency. The analytical solution provides a locus by which convergence behavior are evaluated, demonstrating the super convergence of the locally collocated meshless …
Acoustic/Gravity Wave Phenomena In Wide-Field Imaging: From Data Analysis To A Modeling Framework For Observability In The Mlt Region And Beyond, Jaime Aguilar Guerrero
Acoustic/Gravity Wave Phenomena In Wide-Field Imaging: From Data Analysis To A Modeling Framework For Observability In The Mlt Region And Beyond, Jaime Aguilar Guerrero
Doctoral Dissertations and Master's Theses
Acoustic waves, gravity waves, and larger-scale tidal and planetary waves are significant drivers of the atmosphere’s dynamics and of the local and global circulation that have direct and indirect impacts on our weather and climate. Their measurements and characterization are fundamental challenges in Aeronomy that require a wide range of instrumentation with distinct operational principles. Most measurements share the common features of integrating optical emissions or effects on radio waves through deep layers of the atmosphere. The geometry of these integrations create line-of-sight effects that must be understood, described, and accounted for to properly present the measured data in traditional …
A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami
A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami
Doctoral Dissertations and Master's Theses
Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable …
Monte Carlo Simulations Of Coupled Transient Seepage Flow And Compressive Stress In Levees, Fred Thomas Tracy, Ghada Ellithy, Jodi L. Ryder, Martin T. Schultz, Benjamin R. Breland, T. Chris Massey, Maureen K. Corcoran
Monte Carlo Simulations Of Coupled Transient Seepage Flow And Compressive Stress In Levees, Fred Thomas Tracy, Ghada Ellithy, Jodi L. Ryder, Martin T. Schultz, Benjamin R. Breland, T. Chris Massey, Maureen K. Corcoran
Publications
The purpose of this research is to compare the results from two different computer programs of flow analyses of two levees at Port Arthur, Texas where rising water of a flood from Hurricane Ike occurred on the levees. The first program (Program 1) is a two-dimensional (2-D) transient finite element program that couples the conservation of mass flow equation with accompanying hydraulic boundary conditions with the conservation of force equations with accompanying x and y displacement and force boundary conditions, thus yielding total head, x displacement, and y displacement as unknowns at each finite element node. The second program (Program …
Alpha Insurance: A Predictive Analytics Case To Analyze Automobile Insurance Fraud Using Sas Enterprise Miner (Tm), Richard Mccarthy, Wendy Ceccucci, Mary Mccarthy, Leila Halawi
Alpha Insurance: A Predictive Analytics Case To Analyze Automobile Insurance Fraud Using Sas Enterprise Miner (Tm), Richard Mccarthy, Wendy Ceccucci, Mary Mccarthy, Leila Halawi
Publications
Automobile Insurance fraud costs the insurance industry billions of dollars annually. This case study addresses claim fraud based on data extracted from Alpha Insurance’s automobile claim database. Students are provided the business problem and data sets. Initially, the students are required to develop their hypotheses and analyze the data. This includes identification of any missing or inaccurate data values and outliers as well as evaluation of the 22 variables. Next students will develop and optimize their predictive models using five techniques: regression, decision tree, neural network, gradient boosting, and ensemble. Then students will determine which model is the best fit …
Signal Flow Graph Approach To Efficient Dst I-Iv Algorithms, Sirani M. Perera
Signal Flow Graph Approach To Efficient Dst I-Iv Algorithms, Sirani M. Perera
Publications
In this paper, fast and efficient discrete sine transformation (DST) algorithms are presented based on the factorization of sparse, scaled orthogonal, rotation, rotation-reflection, and butterfly matrices. These algorithms are completely recursive and solely based on DST I-IV. The presented algorithms have low arithmetic cost compared to the known fast DST algorithms. Furthermore, the language of signal flow graph representation of digital structures is used to describe these efficient and recursive DST algorithms having (n�1) points signal flow graph for DST-I and n points signal flow graphs for DST II-IV.
A Fast Algorithm For The Inversion Of Quasiseparable Vandermonde-Like Matrices, Sirani M. Perera, Grigory Bonik, Vadim Olshevsky
A Fast Algorithm For The Inversion Of Quasiseparable Vandermonde-Like Matrices, Sirani M. Perera, Grigory Bonik, Vadim Olshevsky
Publications
The results on Vandermonde-like matrices were introduced as a generalization of polynomial Vandermonde matrices, and the displacement structure of these matrices was used to derive an inversion formula. In this paper we first present a fast Gaussian elimination algorithm for the polynomial Vandermonde-like matrices. Later we use the said algorithm to derive fast inversion algorithms for quasiseparable, semiseparable and well-free Vandermonde-like matrices having O(n2) complexity. To do so we identify structures of displacement operators in terms of generators and the recurrence relations(2-term and 3-term) between the columns of the basis transformation matrices for quasiseparable, semiseparable and well-free polynomials. Finally we …
Burglary Crime Analysis Using Logistic Regression, Daniel Antolos, Dahai Liu, Andrei Ludu, Dennis Vincenzi
Burglary Crime Analysis Using Logistic Regression, Daniel Antolos, Dahai Liu, Andrei Ludu, Dennis Vincenzi
Andrei Ludu
This study used a logistic regression model to investigate the relationship between several predicting factors and burglary occurrence probability with regard to the epicenter. These factors include day of the week, time of the day, repeated victimization, connectors and barriers. Data was collected from a local police report on 2010 burglary incidents. Results showed the model has various degrees of significance in terms of predicting the occurrence within difference ranges from the epicenter. Follow-up refined multiple comparisons of different sizes were observed to further discover the pattern of prediction strength of these factors. Results are discussed and further research directions …