Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Computer Sciences

The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto Dec 2019

The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto

Publications and Research

One of the main challenges in the smart grid is how to efficiently manage the high-volume data from smart meters and sensors and preserve the privacy from the consumption data to avoid potential attacks (e.g., identity theft) for the involved prosumers, retail electricity providers and other clusters of distributed energy resources. This poster proposes a two-layer framework with the cloud computing infrastructure. The virtual ring and identity-based cryptography are utilized in each layer to preserve privacy efficiently. The methods of the virtual ring and identity-based cryptography are introduced. The purposes and needs are discussed at the end of this poster.


Finding Needles In A Haystack: A Case Study Of Text Mining The Corpus Of 15 Academic Journals, Eric A. Kowalik, Tara Baillargeon, Jennifer M. Cook Oct 2019

Finding Needles In A Haystack: A Case Study Of Text Mining The Corpus Of 15 Academic Journals, Eric A. Kowalik, Tara Baillargeon, Jennifer M. Cook

Eric A. Kowalik

Learn how a team collaborated to develop a text mining process for 7,500 journal articles and 500+ keywords to determine how often, when, and in what context specific terms were used. We share our processes obtaining journal permissions, data conversion, and code writing, which you can replicate to assist researchers.


System Projector: An Automatic Program Rewriting Tool For Non-Ground Answer Set Programs, Yuliya Lierler Aug 2019

System Projector: An Automatic Program Rewriting Tool For Non-Ground Answer Set Programs, Yuliya Lierler

Yuliya Lierler

Answer set programming is a popular constraint programming paradigm that has seen wide use across various industry applications. However, logic programs under answer set semantics often require careful design and nontrivial expertise from a programmer to obtain satisfactory solving times. In order to reduce this burden on a software engineer we propose an automated rewriting technique for non-ground logic programs that we implement in a system PROJECTOR. We conduct rigorous experimental analysis, which shows that applying system PROJECTOR to a logic program can improve its performance, even after significant human-performed optimizations. This talk will present PROJECTOR and considered experimental analysis …


Plw Tutorial: Processing Narratives By Means Of Action Languages​, Yuliya Lierler Jun 2019

Plw Tutorial: Processing Narratives By Means Of Action Languages​, Yuliya Lierler

Yuliya Lierler

The tutorial explains the design of a narrative understanding tool Text2Alm. System Text2Alm uses an action language ALM to perform inferences on complex interactions of events described in narratives. The methodology used to implement the Text2Alm was originally outlined by Lierler, Inclezan, and Gelfond in 2017. Text2Alm relies on a conglomeration of resources and techniques from two distinct fields of artificial intelligence, namely, natural language processing and knowledge representation and reasoning. The tutorial will also present the results on the effectiveness of system Text2Alm measured by its ability to correctly answer questions from the bAbI tasks published by Facebook Research …


Enhancing The Study Of Art History Utilizing Computational Thinking: Focus, Abstraction In Art (Modern), Douglas L. Moody, Sandra Cheng Jun 2019

Enhancing The Study Of Art History Utilizing Computational Thinking: Focus, Abstraction In Art (Modern), Douglas L. Moody, Sandra Cheng

Open Educational Resources

No abstract provided.


3d Procedural Maze & Cave Generation, Jacob Sharp Apr 2019

3d Procedural Maze & Cave Generation, Jacob Sharp

Student Scholar Showcase

The goal of this project is to generate a maze or cave procedurally so that a player may be able to explore infinitely without a reoccurring pattern. The project also utilizes Virtual Reality (VR); the user will be able to put on a VR Headset and become more immersed in a procedural environment. One of the challenges that needed to be overcome was simple random number generators did not generate natural looking worlds. Introducing VR to the project created the additional challenge of preventing the user from becoming motion sick. These challenges were both addressed through many hours of research …


Autonomous Watercraft Simulation And Programming, Nicholas J. Savino Apr 2019

Autonomous Watercraft Simulation And Programming, Nicholas J. Savino

Student Scholar Showcase

Automation of various modes of transportation is thought to make travel more safe and efficient. Over the past several decades, advances to semi-autonomous and autonomous vehicles have led to advanced autopilot systems on planes and boats, and an increasing popularity of self-driving cars. We predicted the motion of an autonomous vehicle using simulations in Python. The simulation models the motion of a small scale watercraft, which can then be built and programmed using an Arduino Microcontroller. We examined different control methods for a simulated rescue craft to reach a target. We also examined the effects of different factors, such as …


Death Arena Game, Ryan Deasy, Nick Snan, Albert Anderson, David Cole, Shahzada Aqib Gill Apr 2019

Death Arena Game, Ryan Deasy, Nick Snan, Albert Anderson, David Cole, Shahzada Aqib Gill

Student Scholar Showcase

Death Arena is a 3D first-person action shooter with a horror twist. The player has 30 seconds to collect guns and health before a monster spawns. The map will be large with indoor and outdoor play. In each round a more powerful boss spawns with minions. Our goal is to appeal to horror and action fans alike.


Design For Safety: Decreasing First Responder Health Risks Through Real-Time Bio-Sensor Alerts, Suzy Fendrick Mar 2019

Design For Safety: Decreasing First Responder Health Risks Through Real-Time Bio-Sensor Alerts, Suzy Fendrick

UNO Student Research and Creative Activity Fair

The focus of this research project is using the Design Thinking process to create an informative dashboard for first responders. Design Thinking involves empathizing with the user, defining the problems to be solved, ideation, creating prototypes, and testing. This iterate process focuses on the user, resulting in the most effective product possible. The dashboard will display real-time biosensor data from sensors in the first responders’ uniforms. This project is part of a larger project with the goal of vastly improving the safety of first responders during emergency hazardous material incidents.


Data Analytics Pipeline For Rna Structure Analysis Via Shape, Quinn Nelson Mar 2019

Data Analytics Pipeline For Rna Structure Analysis Via Shape, Quinn Nelson

UNO Student Research and Creative Activity Fair

Coxsackievirus B3 (CVB3) is a cardiovirulent enterovirus from the family Picornaviridae. The RNA genome houses an internal ribosome entry site (IRES) in the 5’ untranslated region (5’UTR) that enables cap-independent translation. Ample evidence suggests that the structure of the 5’UTR is a critical element for virulence. We probe RNA structure in solution using base-specific modifying agents such as dimethyl sulfate as well as backbone targeting agents such as N-methylisatoic anhydride used in Selective 2’-Hydroxyl Acylation Analyzed by Primer Extension (SHAPE). We have developed a pipeline that merges and evaluates base-specific and SHAPE data together with statistical analyses that provides confidence …


Automatic Program Rewriting In Non-Ground Answer Set Programs, Yuliya Lierler Jan 2019

Automatic Program Rewriting In Non-Ground Answer Set Programs, Yuliya Lierler

Yuliya Lierler

No abstract provided.