Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

204,872 Full-Text Articles 253,123 Authors 47,230,550 Downloads 401 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

204,872 full-text articles. Page 1 of 5622.

Practical Server-Side Indoor Localization: Tackling Cardinality & Outlier Challenges, Anuradha RAVI, Archan MISRA 2020 Singapore Management University

Practical Server-Side Indoor Localization: Tackling Cardinality & Outlier Challenges, Anuradha Ravi, Archan Misra

Research Collection School Of Information Systems

In spite of many advances in indoor localization techniques, practical implementation of robust deviceindependent, server-side Wi-Fi localization (i.e., without any active participation of client devices) remains a challenge. This work utilizes an operationally-deployed Wi-Fi based indoor location infrastructure, based on the classical RADAR algorithm, to tackle two such practical challenges: (a) low cardinality, whereby only the associated AP generates sufficient RSSI reports and (b) outlier identification, which requires explicit identification of mobile clients that are attached to the Wi-Fi network but outside the fingerprinted region. To tackle the low-cardinality problem, we present a technique that uses cardinality changes to ...


Learning-Guided Network Fuzzing For Testing Cyber-Physical System Defences, Yuqi CHEN, Christopher M. POSKITT, Jun SUN, Sridhar ADEPU, Fan ZHANG 2020 Singapore Management University

Learning-Guided Network Fuzzing For Testing Cyber-Physical System Defences, Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang

Research Collection School Of Information Systems

The threat of attack faced by cyber-physical systems (CPSs), especially when they play a critical role in automating public infrastructure, has motivated research into a wide variety of attack defence mechanisms. Assessing their effectiveness is challenging, however, as realistic sets of attacks to test them against are not always available. In this paper, we propose smart fuzzing, an automated, machine learning guided technique for systematically finding 'test suites' of CPS network attacks, without requiring any knowledge of the system's control programs or physical processes. Our approach uses predictive machine learning models and metaheuristic search algorithms to guide the fuzzing ...


Children In 2077: Designing Children’S Technologies In The Age Of Transhumanism, Oğuz Oz Buruk, Oğuzhan Özcan, Gökçe Elif Baykal, Tilbe Göksun, Selçuk Acar, Güler Akduman, Mehmet Aydın Baytaş, Ceylan Beşevli, Joe Best, Aykut Coşkun, Hüseyin Uğur Genç, Baki Kocaballi, Samuli Laato, Cássia Mota, Konstantinos Papangelis, Marigo Raftopoulos, Richard Ramchurn, Juan Sádaba, Mattia Thibault, Annika Wolff, Mert Yıldız 2020 Tampere University of Technology

Children In 2077: Designing Children’S Technologies In The Age Of Transhumanism, Oğuz Oz Buruk, Oğuzhan Özcan, Gökçe Elif Baykal, Tilbe Göksun, Selçuk Acar, Güler Akduman, Mehmet Aydın Baytaş, Ceylan Beşevli, Joe Best, Aykut Coşkun, Hüseyin Uğur Genç, Baki Kocaballi, Samuli Laato, Cássia Mota, Konstantinos Papangelis, Marigo Raftopoulos, Richard Ramchurn, Juan Sádaba, Mattia Thibault, Annika Wolff, Mert Yıldız

Presentations and other scholarship

What for and how will we design children’s technologies in the transhumanism age, and what stance will we take as designers? This paper aims to answer this question with 13 fictional abstracts from sixteen authors of different countries, institutions and disciplines. Transhumanist thinking envisions enhancing human body and mind by blending human biology with technological augmentations. Fundamentally, it seeks to improve the human species, yet the impacts of such movement are unknown and the implications on children’s lives and technologies were not explored deeply. In an age, where technologies can clearly be defined as transhumanist, such as under-skin ...


"A Comparison Of Variable Selection Methods Using Bootstrap Samples From Environmental Metal Mixture Data", Paul-Yvann Djamen 4785403, Paul-Yvann Djamen 2020 University Of New Mexico

"A Comparison Of Variable Selection Methods Using Bootstrap Samples From Environmental Metal Mixture Data", Paul-Yvann Djamen 4785403, Paul-Yvann Djamen

Mathematics & Statistics ETDs

In this thesis, I studied a newly developed variable selection method SODA, and three customarily used variable selection methods: LASSO, Elastic net, and Random forest for environmental mixture data. The motivating datasets have neuro-developmental status as responses and metal measurements and demographic variables as covariates. The challenges for variable selections include (1) many measured metal concentrations are highly correlated, (2) there are many possible ways of modeling interactions among the metals, (3) the relationships between the outcomes and explanatory variables are possibly nonlinear, (4) the signal to noise ratio in the real data may be low. To compare these methods ...


Passive Quadrupedal Gait Synchronization For Extra Robotic Legs Using A Dynamically Coupled Double Rimless Wheel Model, Daniel J. Gonzalez, Harry Asada 2020 USMA West Point & MIT

Passive Quadrupedal Gait Synchronization For Extra Robotic Legs Using A Dynamically Coupled Double Rimless Wheel Model, Daniel J. Gonzalez, Harry Asada

West Point Research Papers

The Extra Robotic Legs (XRL) system is a robotic augmentation worn by a human operator consisting of two articulated robot legs that walk with the operator and help bear a heavy backpack payload. It is desirable for the Human-XRL quadruped system to walk with the rear legs lead the front by 25% of the gait period, minimizing the energy lost from foot impacts while maximizing balance stability. Unlike quadrupedal robots, the XRL cannot command the human's limbs to coordinate quadrupedal locomotion. Connecting the XRL to the human using a passive coupler, we have found that the two bipeds converge ...


Singular Value Decomposition, Krystal Bonaccorso, Andrew Incognito 2020 Coastal Carolina University

Singular Value Decomposition, Krystal Bonaccorso, Andrew Incognito

Honors Theses

A well-known theorem is Diagonalization, where one of the factors is a diagonal matrix. In this paper we will be describing a similar way to factor/decompose a non-square matrix. The key to both of these ways to factor is eigenvalues and eigenvectors.


Hplc Detection Of Organic Gunshot Residues With Silicone Wristbands, Yelyzaveta Zuy 2020 University of Tennessee at Chattanooga

Hplc Detection Of Organic Gunshot Residues With Silicone Wristbands, Yelyzaveta Zuy

Honors Theses

The analysis of gunshot residue (GSR) is frequently used to aid in investigating firearm-related crimes. Typically, Scanning Electron Microscopy (SEM) is applied for inorganic analysis of elements such as lead, barium, and antimony to study GSR. However, heavy metal-free ammunition creates the need for a different type of approach. This research focuses on studying the potential of detecting organic gunshot residue (OGSR) collected with silicone wristbands through passive sampling. This study has been directed towards the development of an optimal High Performance Liquid Chromatography (HPLC) procedure for the detection and separation of five selected compounds typically found in OGSR. The ...


Molecular Dynamics Simulations Of Apolipoprotein A1 In Ionic Liquids, Benjamin Smith 2020 University of Tennessee at Chattanooga

Molecular Dynamics Simulations Of Apolipoprotein A1 In Ionic Liquids, Benjamin Smith

Honors Theses

High-density lipoprotein function is essential for the healthy processing of fats in the blood. The function of these proteins is determined by their conformational structure of chains of amino acids. Certain ionic liquids have been shown to interact with individual amino acids to affect the tertiary shape of the protein. These interactions can disrupt the native hydrogen bonds between amino acids which can either promote folding or denaturing of the protein. Our work focused on apoA-1, a high-density lipoprotein that binds to cholesterol for efflux from the body. We studied this protein in different ion-based liquids with sodium, chloride, and ...


Semisimple Subalgebras Of Semisimple Lie Algebras, Mychelle Parker 2020 Utah State University

Semisimple Subalgebras Of Semisimple Lie Algebras, Mychelle Parker

All Graduate Theses and Dissertations

Let g be a Lie algebra. The subalgebra classification problem is to create a list of all subalgebras of g up to equivalence. The purpose of this thesis is to provide a software toolkit within the Differential Geometry package of Maple for classifying subalgebras of In particular the thesis will focus on classifying those subalgebras which are isomorphic to the Lie algebra sl(2) and those subalgebras of which have a basis aligned with the root space decomposition (regular subalgebras).


White-Box Fairness Testing Through Adversarial Sampling, Peixin ZHANG, Jingyi WANG, Jun SUN, Guoliang DONG, Xinyu WANG, Xingen WANG, Jin Song DONG, Dai TING 2020 Singapore Management University

White-Box Fairness Testing Through Adversarial Sampling, Peixin Zhang, Jingyi Wang, Jun Sun, Guoliang Dong, Xinyu Wang, Xingen Wang, Jin Song Dong, Dai Ting

Research Collection School Of Information Systems

No abstract provided.


Mapping Renewal: How An Unexpected Interdisciplinary Collaboration Transformed A Digital Humanities Project, Elise Tanner, Geoffrey Joseph 2020 UA Little Rock Center for Arkansas History and Culture

Mapping Renewal: How An Unexpected Interdisciplinary Collaboration Transformed A Digital Humanities Project, Elise Tanner, Geoffrey Joseph

Digital Initiatives Symposium

Funded by a National Endowment for Humanities (NEH) Humanities Collections and Reference Resources Foundations Grant, the UA Little Rock Center for Arkansas History and Culture’s “Mapping Renewal” pilot project focused on creating access to and providing spatial context to archival materials related to racial segregation and urban renewal in the city of Little Rock, Arkansas, from 1954-1989. An unplanned interdisciplinary collaboration with the UA Little Rock Arkansas Economic Development Institute (AEDI) has proven to be an invaluable partnership. One team member from each department will demonstrate the Mapping Renewal website and discuss how the collaborative process has changed and ...


Lightning Talk: Public Or Perish: Promoting Open Access In Tenure & Promotion, Lana Wood 2020 California State University, East Bay

Lightning Talk: Public Or Perish: Promoting Open Access In Tenure & Promotion, Lana Wood

Digital Initiatives Symposium

In a recent article in the Chronicle of Higher Education, Lindsay Ellis (2019) writes that “we are now at a turning point for scholarly publishing where the scales have been tipped towards open access;’ however, Ellis notes that one of the major challenges is that "departments largely do not consider open-access publication in their promotion-and-tenure decisions." This lightning talk will consider barriers towards better integrating open access in the tenure and promotion process, and discuss examples of universities that are beginning this work.


The 10th Annual Computer Science Workshop, Submissions, Abstract Template, Computer Science Department 2020 University of Nebraska at Omaha

The 10th Annual Computer Science Workshop, Submissions, Abstract Template, Computer Science Department

Computer Science Faculty Proceedings & Presentations

This is the abstract template for the 10th Annual Computer Science Graduate Research Workshop (2020). To learn more about this workshop, please visit: https://digitalcommons.unomaha.edu/csworkshop/2020/.


Encryption Decrypted, Alex Ramsey 2020 University of Nebraska at Omaha

Encryption Decrypted, Alex Ramsey

Student Research and Creative Activity Fair

Encryption is a complex and bewildering process, yet it is absolutely foundational for secure and safe activities on the internet. Encryption, in its many forms, ultimately enables identity verification, password protection, secure conversation, cryptocurrency trade, and other online activities. Despite this widespread use, encryption is not a process easily explained to the layperson due to its complexity. Thus, the object of this research is to demystify the process of encryption and provide an understanding of one of the most common forms of modern encryption - RSA Encryption. This will be accomplished through the information provided on my poster as well as ...


Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton 2020 University of Nebraska at Omaha

Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton

Student Research and Creative Activity Fair

Cryptography is often a critical component in secure software systems. Cryptographic primitive misuses often cause several vulnerability issues. To secure data and communications in applications, developers often rely on cryptographic algorithms and APIs which provide confidentiality, integrity, and authentication based on solid mathematical foundations. While many advanced crypto algorithms are available to developers, the correct usage of these APIs is challenging. Turning mathematical equations in crypto algorithms into an application is a difficult task. A mistake in cryptographic implementations can subvert the security of the entire system. In this research, we present an automated approach for Finding and Repairing Bugs ...


Characterization Of Dimerization Domains On The Mannose-6-Phosphate/Insulin-Like Growth Factor 2 Receptor, Tyler Degener 2020 University of Nebraska at Omaha

Characterization Of Dimerization Domains On The Mannose-6-Phosphate/Insulin-Like Growth Factor 2 Receptor, Tyler Degener

Student Research and Creative Activity Fair

The mannose-6-phosphate/insulin-like growth factor 2 (M6P/IGF2) receptor is a transmembrane protein with the ability to sequester growth factors from the extracellular matrix. This behavior links the receptor to tumor suppression. On a structural level, the extracellular portion of the protein is segmented into 15 homologous repeats, which can be divided further into 5 triplet domains, labelled 1-3, 4-6, 7-9, 10-12, and 13-15. Each triplet receptor displays its own unique ligand binding affinity, including the ability to form dimers with triplets on a second M6P/IGF2 receptor. In fact, previous studies indicate that this protein functions optimally when dimerized ...


Design, Construction, And Characterization Of A Low-Cost Spectrometer With Interchangeable Parts, Jack Godek 2020 University of Nebraska at Omaha

Design, Construction, And Characterization Of A Low-Cost Spectrometer With Interchangeable Parts, Jack Godek

Student Research and Creative Activity Fair

A low-cost spectrometer was designed for the purpose of teaching spectroscopy. The spectrometer can be built by the student and contains interchangeable pieces such as slit width, grating, and lenses. This will allow the student to understand how changing these variables effects resolution. The spectrometer was constructed from PVC pipe, a plastic electrical box, and a USB webcam. The actual resolution of the spectrometer is close to the theoretical value, depending on which lens and grating is used. In addition, an extra piece can be added that allows absorption spectra to be collected. Having the student piece together the spectrometer ...


What Is The Most Threatening Disaster To The Continental United States?, Aaron Spomer, Elijah Kaufman, Julisa Prieto-Garcia, Brooke Aschwanden 2020 University of Nebraska at Omaha

What Is The Most Threatening Disaster To The Continental United States?, Aaron Spomer, Elijah Kaufman, Julisa Prieto-Garcia, Brooke Aschwanden

Student Research and Creative Activity Fair

Our goal for our project is to fully understand which natural disaster is the most destructive to the United States. We have chosen to compare hurricanes, floods, tornadoes, wildfires, earthquakes, and nor’easters. We have researched the cost of the total damage and repair, how the warning systems have improved over time, the death tolls from each, and also the frequency at which each one occurs. Each group member will research a different disaster impact, and the data will create a comprehensive view of the level of devastation each disaster has. We collected data all the way from the early ...


On The Relationship Between Dust Devil Radii And Heights, Brian Jackson 2020 Boise State University

On The Relationship Between Dust Devil Radii And Heights, Brian Jackson

Physics Faculty Publications and Presentations

The influence of dust devils on the martian atmosphere depends on their capacity to loft dust, which depends on their wind profiles and footprint on the martian surface, i.e., on their radii, 𝑅. Previous work suggests the wind profile depends on a devil’s thermodynamic efficiency, which scales with its height, ℎ. However, the precise mechanisms that set a dust devil’s radius have remained unclear. Combining previous work with simple assumptions about angular momentum conservation in dust devils predicts that 𝑅 ∝ ℎ1∕2, and a model fit to observed radii and heights from a survey of martian ...


Simulation-Based Power And Sample Size Calculation For Designing Interrupted Time Series Analyses Of Count Outcomes In Evaluation Of Health Policy Interventions, Wei Liu, Shangyuan Ye, Bruce A. Barton, Melissa A. Fischer, Colleen Lawrence, Elizabeth J. Rahn, Maria I. Danila, Kenneth G. Saag, Paul A. Harris, Stephenie C. Lemon, Jeroan J. Allison, Bo Zhang 2020 Harbin Institute of Technology

Simulation-Based Power And Sample Size Calculation For Designing Interrupted Time Series Analyses Of Count Outcomes In Evaluation Of Health Policy Interventions, Wei Liu, Shangyuan Ye, Bruce A. Barton, Melissa A. Fischer, Colleen Lawrence, Elizabeth J. Rahn, Maria I. Danila, Kenneth G. Saag, Paul A. Harris, Stephenie C. Lemon, Jeroan J. Allison, Bo Zhang

Population and Quantitative Health Sciences Publications

Objective: The purpose of this study was to present the design, model, and data analysis of an interrupted time series (ITS) model applied to evaluate the impact of health policy, systems, or environmental interventions using count outcomes. Simulation methods were used to conduct power and sample size calculations for these studies.

Methods: We proposed the models and analyses of ITS designs for count outcomes using the Strengthening Translational Research in Diverse Enrollment (STRIDE) study as an example. The models we used were observation-driven models, which bundle a lagged term on the conditional mean of the outcome for a time series ...


Digital Commons powered by bepress