A Comparison Of Data Quality Assessment Checks In Six Data Sharing Networks, 2017 Computational Bioscience Program, University of Colorado Denver Anschutz Medical Campus
A Comparison Of Data Quality Assessment Checks In Six Data Sharing Networks, Tiffany J. Callahan, Alan E. Bauck, David Bertoch, Jeff Brown, Ritu Khare, Patrick B. Ryan, Jenny Staab, Meredith N. Zozus, Michael G. Kahn
eGEMs (Generating Evidence & Methods to improve patient outcomes)
Objective: To compare rule-based data quality (DQ) assessment approaches across multiple national clinical data sharing organizations.
Methods: Six organizations with established data quality assessment (DQA) programs provided documentation or source code describing current DQ checks. DQ checks were mapped to the categories within the data verification context of the harmonized DQA terminology. To ensure all DQ checks were consistently mapped, conventions were developed and four iterations of mapping performed. Difficult-to-map DQ checks were discussed with research team members until consensus was achieved.
Results: Participating organizations provided 11,026 DQ checks, of which 99.97% were successfully mapped to a DQA ...
Travel Mode Identification With Smartphone Sensors, 2017 The Graduate Center, City University of New York
Travel Mode Identification With Smartphone Sensors, Xing Su
All Graduate Works by Year: Dissertations, Theses, and Capstone Projects
Personal trips in a modern urban society typically involve multiple travel modes. Recognizing a traveller's transportation mode is not only critical to personal context-awareness in related applications, but also essential to urban traffic operations, transportation planning, and facility design. While the state of the art in travel mode recognition mainly relies on large-scale infrastructure-based fixed sensors or on individuals' GPS devices, the emergence of the smartphone provides a promising alternative with its ever-growing computing, networking, and sensing powers. In this thesis, we propose new algorithms for travel mode identification using smartphone sensors. The prototype system is built upon the ...
Predicting Pancreatic Cancer Using Support Vector Machine, 2017 San Jose State University
Predicting Pancreatic Cancer Using Support Vector Machine, Akshay Bodkhe
This report presents an approach to predict pancreatic cancer using Support Vector Machine Classification algorithm. The research objective of this project it to predict pancreatic cancer on just genomic, just clinical and combination of genomic and clinical data. We have used real genomic data having 22,763 samples and 154 features per sample. We have also created Synthetic Clinical data having 400 samples and 7 features per sample in order to predict accuracy of just clinical data. To validate the hypothesis, we have combined synthetic clinical data with subset of features from real genomic data. In our results, we observed ...
Path-Finding Methodology For Visually-Impaired Patients Based On Image-Processing, 2017 San Jose State University
Path-Finding Methodology For Visually-Impaired Patients Based On Image-Processing, Abhilash Goyal
The objective of this project is to propose and develop the path-finding methodology for the visually impaired patients. The proposed novel methodology is based on image-processing and it is targeted for the patients who are not completely blind. The major problem faced by visually impaired patients is to walk independently. It is mainly because these patients can not see obstacles in front of them due to the degradation in their eye sight. Degradation in the eye-sight is mainly because either the light doesn't focus on the retina properly or due to the malfunction of the photoreceptor cells on the ...
Web - Based Office Market, 2017 San Jose State University
Web - Based Office Market, Manodivya Kathiravan
People who work in an office often have different pools of resources that they want to exchange. They want to trade their resources/work(seller) with a person who wants that particular resource(buyer) and in return get another resource the buyer offers. These kind of exchanges are often called Barter-exchanges where an item is traded for another item without the involvement of actual money. An exchange is set to be complete when there is a match between an available item and a desired item. This exchange is called direct exchange. When an item desired by one user is made ...
Evolvability: What Is It And How Do We Get It?, 2017 University of Puget Sound
Evolvability: What Is It And How Do We Get It?, Matthew Moreno
Honors Program Theses
Biological organisms exhibit spectacular adaptation to their environments. However, another marvel of biology lurks behind the adaptive traits that organisms exhibit over the course of their lifespans: it is hypothesized that biological organisms also exhibit adaptation to the evolutionary process itself. That is, biological organisms are thought to possess traits that facilitate evolution. The term evolvability was coined to describe this type of adaptation. The question of evolvability has special practical relevance to computer science researchers engaged in longstanding efforts to harness evolution as an algorithm for automated design. It is hoped that a more nuanced understanding of biological evolution ...
Application Of Computational Methods To Study The Selection Of Authentic And Cryptic Splice Sites, 2017 San Jose State University
Application Of Computational Methods To Study The Selection Of Authentic And Cryptic Splice Sites, Tapomay Dey
Proteins are building blocks of the bodies of eukaryotes, and the process of synthesizing proteins from DNA is crucial for the good health of an organism . However, some mutations in the DNA may disrupt the selection of 5’ or 3’ splice sites by a spliceosome. An important research question is whether the disruptions have a stochastic relation to the position of nucleotides in the vicinity of the known authentic and cryptic splice sites. This can be achieved by proving that the authentic and cryptic splice sites are intrinsically different. However, the behavior of the spliceosome is not accurately known ...
Computational Analysis Of Cryptic Splice Sites, 2017 San Jose State University
Computational Analysis Of Cryptic Splice Sites, Remya Mohanan
DNA in the nucleus of all eukaryotes is transcribed into mRNA where it is then translated into proteins. The DNA which is transcribed into mRNA is composed of coding and non-coding regions called exons and introns, respectively. It undergoes a post-trancriptional process called splicing where the introns or the non-coding regions are removed from the pre-mRNA to give the mature mRNA. Splicing of pre-mRNAs at 5 ́ and 3ˊ ends is a crucial step in the gene expression pathway. The mis-splicing by the spliceosome at different sites known as cryptic splice sites is caused by mutations which will affect the primary ...
Comparing Authentic And Cryptic 5’ Splice Sites Using Hidden Markov Models And Decision Trees, 2017 San Jose State University
Comparing Authentic And Cryptic 5’ Splice Sites Using Hidden Markov Models And Decision Trees, Pratikshya Mishra
Splicing is the editing of the precursor mRNA produced during transcription. The mRNA contains a large number of nucleotides in the introns and exons which are spliced to remove the introns and bind the exons to produce the mature mRNA which is translated to generate proteins. Hence accurate splicing at 5’ and 3’ splice sites (authentic splice sites (AuthSS)) is of foremost importance. The 5’ and 3’ splice sites are characterized by consensus sequences. Eukaryotic genome also contains splice sites known as Cryptic Splice Sites (CSS) that match the consensus. But the CSS are activated only when there is a ...
Influence Detection And Spread Estimation In Social Networks, 2017 San Jose State University
Influence Detection And Spread Estimation In Social Networks, Madhura Kaple
A social network is an online platform, where people communicate and share information with each other. Popular social network features, which make them di erent from traditional communication platforms, are: following a user, re-tweeting a post, liking and commenting on a post etc. Many companies use various social networking platforms extensively as a medium for marketing their products. A xed amount of budget is alloted by the companies to maximize the positive in uence of their product. Every social network consists of a set of users (people) with connections between them. Each user has the potential to extend its in ...
Scoring Scene Symmetry, 2017 McGill University
Scoring Scene Symmetry, Morteza Rezanejad, John D. Wilder, Sven Dickinson, Allan Jepson, Dirk B. Walther, Kaleem Siddiqi
No abstract provided.
Red Beetl: Recipe Encoder Decoder Beer Translator Lstm, 2017 Western Washington University
Red Beetl: Recipe Encoder Decoder Beer Translator Lstm, Grace Ermi, Ellyn Ayton
Graduate Student Conference
The number of craft breweries has exploded in last decade: there are around a dozen breweries in Bellingham alone. Each brewery must assemble a lineup of beers, but this process of designing new beers usually relies on some combination of brewer instinct and trial and error. Because brewing beer involves complicated biological and chemical processes, the mapping from recipe to the beer it will produce is non-trivial to predict. In this project, we consider mapping between representations of beer in three distinct domains. In one view, a beer can be described by a recipe, which specifies the particular hop, malt ...
Target Detection With Neural Network Hardware, 2017 University of Tennessee, Knoxville
Target Detection With Neural Network Hardware, Hollis Bui, Garrett Massman, Nikolas Spangler, Jalen Tarvin, Luke Bechtel, Kevin Dunn, Shawn Bradford
University of Tennessee Honors Thesis Projects
No abstract provided.
Simulating Foodborne Pathogens In Poultry Production And Processing To Defend Against Intentional Contamination, 2017 University of Arkansas, Fayetteville
Simulating Foodborne Pathogens In Poultry Production And Processing To Defend Against Intentional Contamination, Silas B. Lankford
Computer Science and Computer Engineering Undergraduate Honors Theses
There is a lack of data in recent history of food terrorism attacks, and as such, it is difficult to predict its impact. The food supply industry is one of the most vulnerable industries for terrorist threats while the poultry industry is one of the largest food industries in the United States. A small food terrorism attack against just a single poultry processing center has the potential to affect a much larger population than its immediate consumers. In this work, the spread of foodborne pathogens is simulated in a poultry production and processing system to defend against intentional contamination. An ...
Image Segmentation Using De-Textured Images, 2017 Utah State University
Image Segmentation Using De-Textured Images, Yaswanth Kodavali
All Graduate Plan B and other Reports
Image segmentation is one of the fundamental problems in computer vision. The outputs of segmentation are used to extract regions of interest and carry out identification or classification tasks. For these tasks to be reliable, segmentation has to be made more reliable. Although there are exceptionally well-built algorithms available today, they perform poorly in many instances by producing over-merged (combining many unrelated objects) or under-merged (one object appeared as many) results. This leads to far fewer or more segments than expected. Such problems primarily arise due to varying textures within a single object and/or common textures near borders of ...
Recommender Response To Diversity And Popularity Bias In User Profiles, 2017 Boise State University
Recommender Response To Diversity And Popularity Bias In User Profiles, Sushma Channamsetty, Michael D. Ekstrand
Michael D. Ekstrand
Osspal: Finding And Evaluating Open Source Software, 2017 Carnegie Mellon University
Osspal: Finding And Evaluating Open Source Software, Anthony Wasserman
Socket Golf - Building A Google Cardboard Game In Unity, 2017 University of Wyoming
Socket Golf - Building A Google Cardboard Game In Unity, Caleb P. Carlson
Honors Theses AY 16/17
Virtual reality is a new and emerging technology in the field of computer science designed to immerse the consumer into the product. To study and learn more about this technology, a four-person team of graduating seniors set out to build a mobile game for Google Cardboard. The game that was created uses the Unity game engine along with Unity multiplayer servers for the development tools. The application was designed to be run using both a Google Cardboard headset and an android controller to allow the user to control the game without removing themselves from the immersive experience.
The idea for ...
Patch-Based Denoising Algorithms For Single And Multi-View Images, 2017 The University of Western Ontario
Patch-Based Denoising Algorithms For Single And Multi-View Images, Monagi H. Alkinani
Electronic Thesis and Dissertation Repository
In general, all single and multi-view digital images are captured using sensors, where they are often contaminated with noise, which is an undesired random signal. Such noise can also be produced during transmission or by lossy image compression. Reducing the noise and enhancing those images is among the fundamental digital image processing tasks. Improving the performance of image denoising methods, would greatly contribute to single or multi-view image processing techniques, e.g. segmentation, computing disparity maps, etc. Patch-based denoising methods have recently emerged as the state-of-the-art denoising approaches for various additive noise levels. This thesis proposes two patch-based denoising methods ...
The Bible Story Producer App, 2017 Cedarville University
The Bible Story Producer App, Michael D. Baxter, Noah W. Bragg, Grant W. Dennison, Robert J. Jacubec, Andrew D. Lockridge, Abigail M. Riffle
The Research and Scholarship Symposium
The Bible Story Producer team at Cedarville University has been spending the past year on the Bible Story Producer app for Android. This app is a tool whose purpose is to facilitate the translation of Bible stories by bilingual laypersons in places where the Bible is unavailable in the vernacular. The aim of the app is to facilitate the oral translation of Bible stories transmitted as templates consisting of voice narration in a Language of Wider Communication (LWC). The narration is accompanied by a series of high-quality illustrations animated by the Ken Burns (pan and zoom) effect. An instance of ...