Open Access. Powered by Scholars. Published by Universities.®

Numerical Analysis and Scientific Computing Commons

Open Access. Powered by Scholars. Published by Universities.®

1,796 Full-Text Articles 3,046 Authors 731,022 Downloads 135 Institutions

All Articles in Numerical Analysis and Scientific Computing

Faceted Search

1,796 full-text articles. Page 1 of 74.

Contours Of Virtual Enfreakment In Fighting Game Characters, Sercan Sengun, Peter Mawhorter, James Bowie-Wilson, Yusef Audeh, Haewoon KWAK, D. Fox Harrell 2022 Singapore Management University

Contours Of Virtual Enfreakment In Fighting Game Characters, Sercan Sengun, Peter Mawhorter, James Bowie-Wilson, Yusef Audeh, Haewoon Kwak, D. Fox Harrell

Research Collection School Of Computing and Information Systems

Characters in fighting videogames1 such as Street Fighter V and Tekken7 typically reveal a phenomenon that we define as virtual enfreakment: their bodies, costumes, and fighting styles are exaggerated (1) in a manner that emphasizes perceived exoticism and (2) to enable them to be easily visually and conceptually distinguishable from one another. Here, using both quantitative and qualitative methods, including crowd-sourced surveys and analyses of game mechanics, we report on the contours of virtual enfreakment in those games. We specifically examine differences in character design across gender, national-origin, and skin-color lines. Disappointingly but not surprisingly, we find racism and sexism ...


Coded Distributed Function Computation, Pedro J. Soto 2022 The Graduate Center, City University of New York

Coded Distributed Function Computation, Pedro J. Soto

Dissertations, Theses, and Capstone Projects

A ubiquitous problem in computer science research is the optimization of computation on large data sets. Such computations are usually too large to be performed on one machine and therefore the task needs to be distributed amongst a network of machines. However, a common problem within distributed computing is the mitigation of delays caused by faulty machines. This can be performed by the use of coding theory to optimize the amount of redundancy needed to handle such faults. This problem differs from classical coding theory since it is concerned with the dynamic coded computation on data rather than just statically ...


Decomposing Generation Networks With Structure Prediction For Recipe Generation, Hao WANG, Guosheng LIN, Steven C. H. HOI, Chunyan MIAO 2022 Singapore Management University

Decomposing Generation Networks With Structure Prediction For Recipe Generation, Hao Wang, Guosheng Lin, Steven C. H. Hoi, Chunyan Miao

Research Collection School Of Computing and Information Systems

Recipe generation from food images and ingredients is a challenging task, which requires the interpretation of the information from another modality. Different from the image captioning task, where the captions usually have one sentence, cooking instructions contain multiple sentences and have obvious structures. To help the model capture the recipe structure and avoid missing some cooking details, we propose a novel framework: Decomposing Generation Networks (DGN) with structure prediction, to get more structured and complete recipe generation outputs. Specifically, we split each cooking instruction into several phases, and assign different sub-generators to each phase. Our approach includes two novel ideas ...


Implementation Of A Least Squares Method To A Navier-Stokes Solver, Jada P. Lytch, Taylor Boatwright, Ja'Nya Breeden 2022 Francis Marion University

Implementation Of A Least Squares Method To A Navier-Stokes Solver, Jada P. Lytch, Taylor Boatwright, Ja'nya Breeden

Rose-Hulman Undergraduate Mathematics Journal

The Navier-Stokes equations are used to model fluid flow. Examples include fluid structure interactions in the heart, climate and weather modeling, and flow simulations in computer gaming and entertainment. The equations date back to the 1800s, but research and development of numerical approximation algorithms continues to be an active area. To numerically solve the Navier-Stokes equations we implement a least squares finite element algorithm based on work by Roland Glowinski and colleagues. We use the deal.II academic library , the C++ language, and the Linux operating system to implement the solver. We investigate convergence rates and apply the least squares ...


On The Richardson-Lucy Algorithm With A Varying Point Spread Function Along The Iterations, Erica S. Souza, Maria Ines Silvani, Gevaldo L. Almeida, Ricardo T. Lopes 2022 Universidade Federal do Rio de Janeiro

On The Richardson-Lucy Algorithm With A Varying Point Spread Function Along The Iterations, Erica S. Souza, Maria Ines Silvani, Gevaldo L. Almeida, Ricardo T. Lopes

International Journal of Image Processing and Vision Science

Abstract: This work analyses the soundness of two algorithms, Fishsint and Almexp to improve images using the Richardson-Lucy (RL) algorithm under a varying Point Spread Function (PSF) along the iterations. A plethora of methods based on Richardson-Lucy has been published, but no further proposal involving such an alternative has been published. Whereas the unnamed predecessor of Fishsint addressed only small size synthetic images under a blind fashion procedure, Fishsint and Almexp employs an algorithm Wdet to determine the initial PSF and all subsequent values after each iteration, respectively. Fishsint performs a loop, where the last determined PSF improves the previously ...


A Molecular Dynamics Study Of Polymer Chains In Shear Flows And Nanocomposites, Venkat Bala 2022 The University of Western Ontario

A Molecular Dynamics Study Of Polymer Chains In Shear Flows And Nanocomposites, Venkat Bala

Electronic Thesis and Dissertation Repository

In this work we study single chain polymers in shear flows and nanocomposite polymer melts extensively through the use of large scale molecular dynamics simulations through LAMMPS. In the single polymer chain shear flow study, we use the Lattice Boltzmann method to simulate fluid dynamics and also include thermal noise as per the \emph{fluctuation-dissipation} theorem in the system. When simulating the nanocomposite polymer melts, we simply use a Langevin thermostat to mimic a heat bath. In the single polymer in shear flow study we investigated the margination of a single chain towards solid surfaces and how strongly the shear ...


Understanding The Influence Of Perceptual Noise On Visual Flanker Effects Through Bayesian Model Fitting, Jordan Deakin, Dietmar Heinke 2022 University of Birmingham

Understanding The Influence Of Perceptual Noise On Visual Flanker Effects Through Bayesian Model Fitting, Jordan Deakin, Dietmar Heinke

MODVIS Workshop

No abstract provided.


A Novel Method For Sensitivity Analysis Of Time-Averaged Chaotic System Solutions, Christian A. Spencer-Coker 2022 Mississippi State University

A Novel Method For Sensitivity Analysis Of Time-Averaged Chaotic System Solutions, Christian A. Spencer-Coker

Theses and Dissertations

The direct and adjoint methods are to linearize the time-averaged solution of bounded dynamical systems about one or more design parameters. Hence, such methods are one way to obtain the gradient necessary in locally optimizing a dynamical system’s time-averaged behavior over those design parameters. However, when analyzing nonlinear systems whose solutions exhibit chaos, standard direct and adjoint sensitivity methods yield meaningless results due to time-local instability of the system. The present work proposes a new method of solving the direct and adjoint linear systems in time, then tests that method’s ability to solve instances of the Lorenz system ...


Evaluating The Persuasiveness Of Mobile Health: The Intersection Of Persuasive System Design And Data Science, Aleise McGowan 2022 University of South Alabama

Evaluating The Persuasiveness Of Mobile Health: The Intersection Of Persuasive System Design And Data Science, Aleise Mcgowan

Theses and Dissertations

Persuasive technology is an umbrella term that encompasses any software (e.g., mobile app) or hardware (e.g., smartwatch) designed to influence users to perform a preferable behavior once or on a long-term basis. Considering the ubiquitous nature of mobile devices across all socioeconomic groups, user behavior modification thrives under the personalized care that persuasive technology can offer. This research examines the roles psychological characteristics play in interpreted mHealth screen perceived persuasiveness. A review of the literature revealed a gap regarding how developers of digital health technologies are often tasked with developing tools designed to engage patients, yet little emphasis ...


A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall 2022 University of Arkansas, Fayetteville

A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall

Computer Science and Computer Engineering Undergraduate Honors Theses

The ability to synthesize custom DNA molecules has led to the feasibility of DNA nanotechnology. Synthesis is time-consuming and expensive, so simulations of proposed DNA designs are necessary. Open-source simulators, such as oxDNA, are available but often difficult to configure and interface with. Packages such as oxdna-tile-binding pro- vide an interface for oxDNA which allows for the ability to create scripts that automate the configuration process. This project works to improve the scripts in oxdna-tile-binding to improve integration with job scheduling systems commonly used in high-performance computing environments, improve ease-of-use and consistency within the scripts compos- ing oxdna-tile-binding, and move ...


An Investigation Into, And The Construction Of, An Operable Windows Notifier, Grey Hixson 2022 University of Arkansas, Fayetteville

An Investigation Into, And The Construction Of, An Operable Windows Notifier, Grey Hixson

Computer Science and Computer Engineering Undergraduate Honors Theses

The Office of Sustainability at the University of Arkansas identified that building occupants that have control over operable windows may open them at inappropriate times. Windows opened in a building with a temperature and air differential leads to increased HVAC operating costs and building occupant discomfort. This led the Associate Vice Chancellor of Facilities at the University of Arkansas to propose the construction of a mobile application that a building occupant can use to make an informed decision before opening their window. I have formulated a series of research objectives in conjunction with the Director of the Office of Sustainability ...


Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan 2022 University of Arkansas, Fayetteville

Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan

Computer Science and Computer Engineering Undergraduate Honors Theses

The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.


Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague 2022 University of Arkansas, Fayetteville

Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague

Computer Science and Computer Engineering Undergraduate Honors Theses

The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor's Algorithm. NIST proposed a standardization effort in creating a new class of asymmetric cryptography named Post-Quantum Cryptography (PQC). These new algorithms will be resistant against both classical computers and sufficiently powerful quantum computers. Although the new algorithms seem mathematically secure, they can possibly be broken by a class of attacks known as side-channels attacks (SCA). Side-channel attacks involve exploiting the hardware that the algorithm runs on to figure out secret values that could break the security of the ...


Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James 2022 University of Arkansas, Fayetteville

Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James

Computer Science and Computer Engineering Undergraduate Honors Theses

The state-of-the-art for pruning neural networks is ambiguous due to poor experimental practices in the field. Newly developed approaches rarely compare to each other, and when they do, their comparisons are lackluster or contain errors. In the interest of stabilizing the field of pruning, this paper initiates a dive into reproducing prominent pruning algorithms across several architectures and datasets. As a first step towards this goal, this paper shows results for foresight weight pruning across 6 baseline pruning strategies, 5 modern pruning strategies, random pruning, and one legacy method (Optimal Brain Damage). All strategies are evaluated on 3 different architectures ...


Data And Algorithmic Modeling Approaches To Count Data, Andraya Hack 2022 Murray State University

Data And Algorithmic Modeling Approaches To Count Data, Andraya Hack

Honors College Theses

Various techniques are used to create predictions based on count data. This type of data takes the form of a non-negative integers such as the number of claims an insurance policy holder may make. These predictions can allow people to prepare for likely outcomes. Thus, it is important to know how accurate the predictions are. Traditional statistical approaches for predicting count data include Poisson regression as well as negative binomial regression. Both methods also have a zero-inflated version that can be used when the data has an overabundance of zeros. Another procedure is to use computer algorithms, also known as ...


Automated Parallel Optimization Of Simulation Parameters Using Modified Nelder-Mead Simplex Algorithm, Erina Mills 2022 Clemson University

Automated Parallel Optimization Of Simulation Parameters Using Modified Nelder-Mead Simplex Algorithm, Erina Mills

All Dissertations

Computational simulations used in many fields have parameters that define models that are used to evaluate simulated properties. When developing these models, the goal is to choose the parameters that best replicate a set of desired properties. Mathematical optimization methods can be used to optimize the simulation parameters by defining a function that uses simulation parameters as input and outputs a value describing how well a set of experimental properties are reproduced.

Because simulated properties are often calculated using stochastic sampling methods, this optimization involves an objective function that is noisy and expensive to evaluate. Also, optimization of the simulation ...


Tokamak 3d Heat Load Investigations Using An Integrated Simulation Framework, Thomas Looby 2022 University of Tennessee, Knoxville

Tokamak 3d Heat Load Investigations Using An Integrated Simulation Framework, Thomas Looby

Doctoral Dissertations

Reactor class nuclear fusion tokamaks will be inherently complex. Thousands of interconnected systems that span orders of magnitude in physical scale must operate cohesively for the machine to function. Because these reactor class tokamaks are all in an early design stage, it is difficult to quantify exactly how each subsystem will act within the context of the greater systems. Therefore, to predict the engineering parameters necessary to design the machine, simulation frameworks that can model individual systems as well as the interfaced systems are necessary. This dissertation outlines a novel framework developed to couple otherwise disparate computational domains together into ...


Meta-Heuristic Optimization Techniques For The Production Of Medical Isotopes Through Special Target Design, Cameron Ian Salyer 2022 University of Tennessee, Knoxville

Meta-Heuristic Optimization Techniques For The Production Of Medical Isotopes Through Special Target Design, Cameron Ian Salyer

Masters Theses

Medical isotopes are used for a variety of different diagnostic and therapeutic purposes Ruth (2008). Due to recent newly discovered applications, their production has become rapidly more scarce than ever before Charlton (2019). Therefore, more efficient and less time consuming methods are of interest for not only the industry’s demand, but for the individuals who require radio-isotope procedures. Currently, the primary source of most medical isotopes used today are provided by reactor and cyclotron irradiation techniques, followed by supplemental radio-chemical separations Ruth (2008). Up until this point, target designs have been optimized by experience, back of the envelope calculations ...


Competition And Third-Party Platform-Integration In Ride-Sourcing Markets, Yaqian ZHOU, Hai YANG, Jintao KE, Hai WANG, Xinwei LI 2022 Hong Kong University of Science and Technology

Competition And Third-Party Platform-Integration In Ride-Sourcing Markets, Yaqian Zhou, Hai Yang, Jintao Ke, Hai Wang, Xinwei Li

Research Collection School Of Computing and Information Systems

Recently, some third-party integrators attempt to integrate the ride services offered by multiple independent ride-sourcing platforms. Accordingly, passengers can request ride through the integrators and receive ride service from any one of the ride-sourcing platforms. This novel business model, termed as third-party platform-integration in this work, has potentials to alleviate market fragmentation cost resulting from demand splitting among multiple platforms. Although most existing studies focus on operation strategies for one single monopolist platform, much less is known about the competition and platform-integration and their implications on operation strategy and system efficiency. In this work, we propose mathematical models to describe ...


Managing The Phaseout Of Coal Power: A Comparison Of Power Decarbonization Pathways In Jilin Province, Weirong ZHANG, Zhixu MENG, Jiongjun YANG, Yan SONG, Yiou ZHOU, Changhong ZHAO, Jiahai YUAN 2022 Singapore Management University

Managing The Phaseout Of Coal Power: A Comparison Of Power Decarbonization Pathways In Jilin Province, Weirong Zhang, Zhixu Meng, Jiongjun Yang, Yan Song, Yiou Zhou, Changhong Zhao, Jiahai Yuan

Research Collection School Of Computing and Information Systems

With the periodic goals of reaching carbon emission peak before 2030 and achieving carbon neutrality before 2060 (“dual carbon” goals), China shows its unprecedented determination to coal power phaseout. This research takes Jilin Province to showcase possible pathways of coal power units’ phaseout on provincial level. We set up four different coal power phaseout scenarios, under which their transition cost and effectiveness would be calculated, respectively. In terms of natural resource endowment and electricity demand, Jilin Province would achieve a complete coal power phaseout by 2045 or even by 2040. However, after assessing the effectiveness of power transition under the ...


Digital Commons powered by bepress