Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

30,826 Full-Text Articles 30,221 Authors 7,711,165 Downloads 278 Institutions

All Articles in Computer Sciences

Faceted Search

30,826 full-text articles. Page 1 of 867.

Real-Time Rfi Mitigation In Radio Astronomy, Emily Ramey, Nick Joslyn, Richard Prestage, Michael Lam, Luke Hawkins, Tim Blattner, Mark Whitehead 2019 Washington University in St. Louis

Real-Time Rfi Mitigation In Radio Astronomy, Emily Ramey, Nick Joslyn, Richard Prestage, Michael Lam, Luke Hawkins, Tim Blattner, Mark Whitehead

Senior Honors Papers / Undergraduate Theses

As the use of wireless technology has increased around the world, Radio Frequency Interference (RFI) has become more and more of a problem for radio astronomers. Preventative measures exist to limit the presence of RFI, and programs exist to remove it from saved data, but the use of algorithms to detect and remove RFI as an observation is occurring is much less common. Such a method would be incredibly useful for observations in which the data must undergo several rounds of processing before being saved, as in pulsar timing studies. Strategies for real-time mitigation have been discussed and tested with ...


Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu 2018 Clark University

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu

School of Professional Studies

n The client for this capstone project is RENEW Worcester which is a fledgling solar power project whose main goals are to bring renewable energy in the form of solar power into local, primarily low-income communities and are committed to the mission of making the transition off of fossil fuels to clean, renewable power. Based in Worcester, Massachusetts, they are a local chapter of Co-op Power which is a consumer-owned sustainable energy cooperative (co-op) made up of numerous different local chapters all over the New England area as well as the state of New York. The problem that we will ...


Phr: Patient Health Record, Quinn Nelson 2018 University of Nebraska at Omaha

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research group ...


A Deep Learning Approach To Recognizing Bees In Video Analysis Of Bee Traffic, Astha Tiwari 2018 Utah State University

A Deep Learning Approach To Recognizing Bees In Video Analysis Of Bee Traffic, Astha Tiwari

All Graduate Theses and Dissertations

Colony Collapse Disorder (CCD) has been a major threat to bee colonies around the world which affects vital human food crop pollination. The decline in bee population can have tragic consequences, for humans as well as the bees and the ecosystem. Bee health has been a cause of urgent concern for farmers and scientists around the world for at least a decade but a specific cause for the phenomenon has yet to be conclusively identified.

This work uses Artificial Intelligence and Computer Vision approaches to develop and analyze techniques to help in continuous monitoring of bee traffic which will further ...


Use Of Verified Twitter Accounts During Crisis Events, Kai Anderson 2018 Utah State University

Use Of Verified Twitter Accounts During Crisis Events, Kai Anderson

All Graduate Theses and Dissertations

This thesis reports on the use of verified Twitter accounts during crisis events. Twitter is a social media platform that allows users to broadcast and exchange public text messages and it can be used as a communication tool during crisis events. Verified Twitter accounts are those accounts that Twitter has investigated and found to be genuinely maintained by the claimed owner. Celebrities, public officials, and other well-known persons or companies often seek this account status. The owners of these accounts are likely to provide more accurate or relevant information during a crisis event because they represent a brand, whether themselves ...


Second-Order Know-How Strategies, Pavel Naumov, Jia Tao 2018 Lafayette College

Second-Order Know-How Strategies, Pavel Naumov, Jia Tao

Faculty Research and Reports

The fact that a coalition has a strategy does not mean that the coalition knows what the strategy is. If the coalition knows the strategy, then such a strategy is called a know-how strategy of the coalition. The paper proposes the notion of a second-order know-how strategy for the case when one coalition knows what the strategy of another coalition is. The main technical result is a sound and complete logical system describing the interplay between the distributed knowledge modality and the second-order coalition know-how modality.


Smt-Based Answer Set Solver Cmodels-Diff (System Description), Da Shen, Yuliya Lierler 2018 University of Nebraska at Omaha

Smt-Based Answer Set Solver Cmodels-Diff (System Description), Da Shen, Yuliya Lierler

Yuliya Lierler

Many answer set solvers utilize Satisfiability solvers for search. SMT solvers extend Satisfiability solvers. This paper presents the CMODELS-DIFF system that uses SMT solvers to find answer sets of a logic program. Its theoretical foundation is based on Niemala's characterization of answer sets of a logic program via so called level rankings. The comparative experimental analysis demonstrates that CMODELS-DIFF is a viable answer set solver.


Quantitative Electroencephalography For Detecting Concussions, Sara Krehbiel, Kathy Hoke, Joanna Wares 2018 University of Richmond

Quantitative Electroencephalography For Detecting Concussions, Sara Krehbiel, Kathy Hoke, Joanna Wares

Biology and Medicine Through Mathematics Conference

No abstract provided.


Critical Parameters In A Computational Model Of Tgf-Beta-Induced Epithelial Mesenchymal Transition., Mario J. Mendez, Seth H. Weinberg 2018 Virginia Commonwealth University

Critical Parameters In A Computational Model Of Tgf-Beta-Induced Epithelial Mesenchymal Transition., Mario J. Mendez, Seth H. Weinberg

Biology and Medicine Through Mathematics Conference

No abstract provided.


Measuring Symmetry In Real-World Scenes Using Derivatives Of The Medial Axis Radius Function, Morteza Rezanejad, John D. Wilder, Kaleem Siddiqi, Sven Dickinson, Allan Jepson, Dirk B. Walther 2018 McGill University

Measuring Symmetry In Real-World Scenes Using Derivatives Of The Medial Axis Radius Function, Morteza Rezanejad, John D. Wilder, Kaleem Siddiqi, Sven Dickinson, Allan Jepson, Dirk B. Walther

MODVIS Workshop

Symmetry has been shown to be an important principle that guides the grouping of scene information. Previously, we have described a method for measuring the local, ribbon symmetry content of line-drawings of real-world scenes (Rezanejad, et al., MODVIS 2017), and we demonstrated that this information has important behavioral consequences (Wilder, et al., MODIVS 2017). Here, we describe a continuous, local version of the symmetry measure, that allows for both ribbon and taper symmetry to be captured. Our original method looked at the difference in the radius between successive maximal discs along a symmetric axis. The number of radii differences in ...


Lokkal - A Group Location-Sharing Mobile Application, Kolby Fenster 2018 University of Wyoming

Lokkal - A Group Location-Sharing Mobile Application, Kolby Fenster

Honors Theses AY 17/18

As smart devices become more and more popular among the general population, their use as a tool of communication is no longer their primary functionality. These devices are being used and treated as miniature computers that provide access to entertainment, email, and many other services. We as a group decided to focus on the location-tracking aspect that many smart devices currently provide in hopes of addressing the problem of visiting a location with a group, splitting up, and being unable to know where other group members are. Our solution was to create a free and easy to use mobile application ...


Player-Response: On The Nature Of Interactive Narratives As Literature, Lee Feldman 2018 Chapman University

Player-Response: On The Nature Of Interactive Narratives As Literature, Lee Feldman

English Theses

In recent years, having evolved beyond solely play-based interactions, it is now possible to analyze video games alongside other narrative forms, such as novels and films. Video games now involve rich stories that require input and interaction on behalf of the player. This level of agency likens video games to a kind of modern hypertext, networking and weaving various narrative threads together, something which traditional modes of media lack. When examined from the lens of reader-response criticism, this interaction deepens even further, acknowledging the player’s experience as a valid interpretation of a video game’s plot. The wide freedom ...


Understanding The Gender Gap In Computer Science Undergraduate Academics, Mikaela Goldrich 2018 University of Mary Washington

Understanding The Gender Gap In Computer Science Undergraduate Academics, Mikaela Goldrich

Student Research Submissions

There is a gender gap in technical fields that has persisted through generations. In my research, I focus on the gender gap within computer science (CS) undergraduate academics. Diversity in technical fields starts with diversity in academics. Studies have shown that girls who are exposed to CS in or before high school are more likely to study CS in college. [1] Other factors such as role models, life goals, and perception of CS also influence a girl’s decision. I surveyed UMW students in different stages of their CS degrees, in addition to students who only participated in an introductory ...


The Future Possibility Of Consumer-Grade Quantum Computers, Peter Dolan 2018 Missouri University of Science and Technology

The Future Possibility Of Consumer-Grade Quantum Computers, Peter Dolan

Missouri S&T’s Peer to Peer

Quantum computers are rapidly evolving and are on the edge of becoming useful for the first time. The theoretical limit of computational speed for quantum computers would put even small-scale quantum computers well ahead of any classical computer. With more researchers attempting to build their own, it has become a race to see who can create the first truly useful quantum computer. Once such computers become both useful and prevalent, massive advancements in many fields of science can be achieved, leading to a scientific revolution. Advances in quantum computing lead some researchers and consumers to question whether the technology can ...


The Viability Of Quantum Computing, Brennan Michael King 2018 Missouri University of Science and Technology

The Viability Of Quantum Computing, Brennan Michael King

Missouri S&T’s Peer to Peer

Quantum computing is an upcoming computational technology that could be the key to advancing the field and ushering in a new era of innovation. In this paper examines the viability of quantum computing extensively using only highly credible peer-reviewed articles from the last few years. These peer-reviewed articles will provide relevant facts and data from prominent researchers in the field of computer engineering. A growing problem in the field of electronics and computers is the concept of Moore’s law. Moore’s law refers to the doubling of transistors every two years in integrated circuits. Recent research has suggested that ...


The Dangers Of Human-Like Bias In Machine-Learning Algorithms, Daniel James Fuchs 2018 Missouri University of Science and Technology

The Dangers Of Human-Like Bias In Machine-Learning Algorithms, Daniel James Fuchs

Missouri S&T’s Peer to Peer

Machine learning algorithms (MLAGs), frequently used in artificial intelligence (AI), rely on using patterns across sets of data to derive decision-making intelligence. In recent years, as society continues to give increasing authority to ML-driven AIs, these algorithms have demonstrated the ability to take on human-like discriminatory biases. Microsoft's "Tay," for example, a social media-based chatbot, went from resembling a normal teenage girl to displaying racist and sexist attitudes in a mere sixteen hours). Tay and many other ML-driven implementations across a wide variety of fields have replicated numerous human biases. In most cases, these human-like biases originated due to ...


Assessment Of Observed Increases In Extreme Warm Exceedances In Locations With Short Warm Side Tails, Jacob S. Hunter, Paul C. Loikith, J. David Neelin 2018 Portland State University

Assessment Of Observed Increases In Extreme Warm Exceedances In Locations With Short Warm Side Tails, Jacob S. Hunter, Paul C. Loikith, J. David Neelin

Student Research Symposium

Regions of shorter-than-Gaussian temperature distribution tails have been shown to occur in spatially coherent patterns in the current climate using reanalysis. Under such conditions, future changes in extremes due to global warming may manifest in more complex ways than if the underlying distribution were closer to Gaussian. For instance, under a uniform warm shift, the simplest prototype for future warming, a location with a short warm side tail would experience a greater increase in exceedances than if the distribution were Gaussian. This carries meaningful societal and environmental implications including but not limited to negative impacts on human and ecosystem health ...


Using Reservoir Computing To Build A Robust Interface With Dna Circuits In Determining Genetic Similarities Between Pathogens, Christopher Neighbor, Christof Teuscher 2018 Portland State University

Using Reservoir Computing To Build A Robust Interface With Dna Circuits In Determining Genetic Similarities Between Pathogens, Christopher Neighbor, Christof Teuscher

Student Research Symposium

As computational power increases, the field of neural networks has advanced exponentially. In particular recurrent neural networks (RNNs) are being utilized to simulate dynamic systems and to learn to predict time series data. Reservoir computing is an architecture which has the potential to increase training speed while reducing computational costs. Reservoir computing consists of a RNN with a fixed connections “reservoir” while only the output layer is trained. The purpose of this research is to explore the effective use of reservoir computing networks with the eventual application towards use in a DNA based molecular computing reservoir for use in pathogen ...


Designing Smart Applications Using Ar (Augmented Reality), Kimberly A. De La Santa 2018 CUNY New York City College of Technology

Designing Smart Applications Using Ar (Augmented Reality), Kimberly A. De La Santa

Publications and Research

Augmented Reality is rapidly developing in popularity because it brings elements of the virtual world, into our real world. Augmented Reality (AR) is a variation of Virtual Reality (VR). VR technologies immerses a user inside an imaginary environment. While immersed, the user cannot see the real world around them. In contrast, AR allows the user to see the real world, with virtual objects and information intertwined. Therefore, AR supplements reality and enhances the things we see, hear, and feel. This research project will implement a Web page that gives the user the opportunity to experiment with AR.


Consensus Ensemble Approaches Improve De Novo Transcriptome Assemblies, Adam Voshall 2018 University of Nebraska-Lincoln

Consensus Ensemble Approaches Improve De Novo Transcriptome Assemblies, Adam Voshall

Computer Science and Engineering: Theses, Dissertations, and Student Research

Accurate and comprehensive transcriptome assemblies lay the foundation for a range of analyses, such as differential gene expression analysis, metabolic pathway reconstruction, novel gene discovery, or metabolic flux analysis. With the arrival of next-generation sequencing technologies it has become possible to acquire the whole transcriptome data rapidly even from non-model organisms. However, the problem of accurately assembling the transcriptome for any given sample remains extremely challenging, especially in species with a high prevalence of recent gene or genome duplications, those with alternative splicing of transcripts, or those whose genomes are not well studied. This thesis provides a detailed overview of ...


Digital Commons powered by bepress