Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

36,266 Full-Text Articles 37,394 Authors 10,216,521 Downloads 317 Institutions

All Articles in Computer Sciences

Faceted Search

36,266 full-text articles. Page 6 of 1112.

A Model For The Spread Of Infectious Diseases In A Region, Elizabeth Hunter, Brian Mac Namee, John D. Kelleher 2020 Technological University Dublin

A Model For The Spread Of Infectious Diseases In A Region, Elizabeth Hunter, Brian Mac Namee, John D. Kelleher

Articles

In understanding the dynamics of the spread of an infectious disease, it is important to understand how a town’s place in a network of towns within a region will impact how the disease spreads to that town and from that town. In this article, we take a model for the spread of an infectious disease in a single town and scale it up to simulate a region containing multiple towns. The model is validated by looking at how adding additional towns and commuters influences the outbreak in a single town. We then look at how the centrality of a ...


Emotional Awareness During Bug Fixes – A Pilot Study, JADA LORO, Abigail L. Schneff, Sarah J. Oran, Bonita Sharif Ph.D. 2020 University of Nebraska - Lincoln

Emotional Awareness During Bug Fixes – A Pilot Study, Jada Loro, Abigail L. Schneff, Sarah J. Oran, Bonita Sharif Ph.D.

UCARE Research Products

This study examines the effects of a programmer's emotional awareness on progress while fixing bugs. The goal of the study is to capitalize on emotional awareness to ultimately increase progress made during software development. This process could result in improved software maintenance.

Research Question: Can we determine emotional state of a developer using biometric sensors during debugging?


Mapping The Modern History Of Philosophy Of Religion With Machine Learning, Jackson C. Foster 2020 University of Alabama

Mapping The Modern History Of Philosophy Of Religion With Machine Learning, Jackson C. Foster

2020 JHU Richard Macksey National Undergraduate Humanities Research Symposium

A current debate in the philosophy of religion ("PoR") is about future routes for scholarship (see Bilimoria and Irvine 2010; Crockett, Putt, and Robbins 2014; Wildman 2010). Yet, while many scholars have assessed where the field should expand, few have addressed the disciplines' modern history. Making use of new methods in the digital humanities, this project proposes a history of the field based on empirical evidence, a meaningful foundation for future growth. "Mapping the History" utilizes various computational techniques to process twenty-thousand research articles from fifteen journals in PoR and religious studies, spanning a period of over ninety years (from ...


Mapping And Simulating Standing Wave Patterns In A Microwave Oven, Sana Ahmed 2020 Susquehanna University

Mapping And Simulating Standing Wave Patterns In A Microwave Oven, Sana Ahmed

Senior Scholars Day

The goal of our project was to map the standing wave patterns in a microwave oven cavity using experimentation. The next task was then to view the standing wave patterns utilizing computer simulations. In a related project done by one of the group members, a microwave oven was used to find the speed of light. He placed chocolate into the microwave cavity, let the chocolate melt at the antinodes of the standing waves. He then measured the distance between the melted spots, multiplied the distance by the frequency of the microwave and found the speed of light. However, while finding ...


Comparison Of A Collective Intelligence Tailored Messaging System On Smoking Cessation Between African American And White People Who Smoke: Quasi-Experimental Design, Jamie Faro, Catherine S. Nagawa, Jeroan J. Allison, Stephenie C. Lemon, Kathleen M. Mazor, Thomas K. Houston, Rajani S. Sadasivam 2020 University of Massachusetts Boston

Comparison Of A Collective Intelligence Tailored Messaging System On Smoking Cessation Between African American And White People Who Smoke: Quasi-Experimental Design, Jamie Faro, Catherine S. Nagawa, Jeroan J. Allison, Stephenie C. Lemon, Kathleen M. Mazor, Thomas K. Houston, Rajani S. Sadasivam

Open Access Articles

BACKGROUND: The Patient Experience Recommender System for Persuasive Communication Tailoring (PERSPeCT) is a machine learning recommender system with a database of messages to motivate smoking cessation. PERSPeCT uses the collective intelligence of users (ie, preferences and feedback) and demographic and smoking profiles to select motivating messages. PERSPeCT may be more beneficial for tailoring content to minority groups influenced by complex, personally relevant factors.

OBJECTIVE: The objective of this study was to describe and evaluate the use of PERSPeCT in African American people who smoke compared with white people who smoke.

METHODS: Using a quasi-experimental design, we compared African American people ...


Completing A Crowdsourcing Task Instead Of An Assignment; What Do University Students Think?, Javed-Vassilis Khan, Konstantinos Papangelis, Panos Markopoulos 2020 Eindhoven University of Technology

Completing A Crowdsourcing Task Instead Of An Assignment; What Do University Students Think?, Javed-Vassilis Khan, Konstantinos Papangelis, Panos Markopoulos

Presentations and other scholarship

University educators actively seek realistic projects to include in their educational activities. However, finding an actually realistic project is not trivial. The rise of crowdsourcing platforms, in which a variety of tasks are offered in the form of an open call, might be an alternative source to help educators scaleup project-based learning. But how do university students feel about executing crowdsourcing tasks instead of their typical assignments? In a study with 24 industrial design students, we investigate students' attitudes on introducing crowdsourcing tasks as assignments. Based on our study we offer four suggestions to universities that consider integrating crowdsourcing tasks ...


An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray 2020 CUNY Hunter College

An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray

Publications and Research

Streaming APIs allow for big data processing of native data structures by providing MapReduce-like operations over these structures. However, unlike traditional big data systems, these data structures typically reside in shared memory accessed by multiple cores. Although popular, this emerging hybrid paradigm opens the door to possibly detrimental behavior, such as thread contention and bugs related to non-execution and non-determinism. This study explores the use and misuse of a popular streaming API, namely, Java 8 Streams. The focus is on how developers decide whether or not to run these operations sequentially or in parallel and bugs both specific and tangential ...


An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray 2020 CUNY Hunter College

An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray

Publications and Research

Streaming APIs allow for big data processing of native data structures by providing MapReduce-like operations over these structures. However, unlike traditional big data systems, these data structures typically reside in shared memory accessed by multiple cores. Although popular, this emerging hybrid paradigm opens the door to possibly detrimental behavior, such as thread contention and bugs related to non-execution and non-determinism. This study explores the use and misuse of a popular streaming API, namely, Java 8 Streams. The focus is on how developers decide whether or not to run these operations sequentially or in parallel and bugs both specific and tangential ...


Smart Cities At Play: Lived Experiences, Emerging Forms Of Playfulness, And Problems Of Participation, Konstantinos Papangelis, Jin-Ha Lee, Michael Saker, Catherine Jones 2020 Rochester Institute of Technology

Smart Cities At Play: Lived Experiences, Emerging Forms Of Playfulness, And Problems Of Participation, Konstantinos Papangelis, Jin-Ha Lee, Michael Saker, Catherine Jones

Presentations and other scholarship

In recent years, the notion of smart cities has become the focus of a growing body of research. To date, much of this attention has revolved around the technical aspect, with related concerns including the creation and implementation of suitable smart city technologies. What is notably missing from these discussions, however, is a consideration of the lived experience of supposedly 'smart spaces' and the extent to which physical and digital environments are currently producing new forms of play and playfulness that can be contextualized within this field. With this in mind, the purpose of our workshop is as follows. First ...


A Semi-Automated Technique For Transcribing Accurate Crowd Motions, Alexander Fuchsberger, Brian Ricks, Zhicheng Chen 2020 University of Nebraska at Omaha

A Semi-Automated Technique For Transcribing Accurate Crowd Motions, Alexander Fuchsberger, Brian Ricks, Zhicheng Chen

Computer Science Faculty Publications

We present a novel technique for transcribing crowds in video scenes that allows extracting the positions of moving objects in video frames. The technique can be used as a more precise alternative to image processing methods, such as background-removal or automated pedestrian detection based on feature extraction and classification. By manually projecting pedestrian actors on a two-dimensional plane and translating screen coordinates to absolute real-world positions using the cross ratio, we provide highly accurate and complete results at the cost of increased processing time. We are able to completely avoid most errors found in other automated annotation techniques, resulting from ...


An Eye Tracking Replication Study Of A Randomized Controlled Trial On The Effects Of Embedded Computer Language Switching, Cole Peterson 2020 University of Nebraska - Lincoln

An Eye Tracking Replication Study Of A Randomized Controlled Trial On The Effects Of Embedded Computer Language Switching, Cole Peterson

Computer Science and Engineering: Theses, Dissertations, and Student Research

The use of multiple programming languages (polyglot programming) during software development is common practice in modern software development. However, not much is known about how the use of these different languages affects developer productivity. The study presented in this thesis replicates a randomized controlled trial that investigates the use of multiple languages in the context of database programming tasks. Participants in our study were given coding tasks written in Java and one of three SQL-like embedded languages: plain SQL in strings, Java methods only, a hybrid embedded language that was more similar to Java. In addition to recording the online ...


Deterministic Machine Learning: Feature Importance Of Persuasive Linguistic Predictors, Leonardo Carrico 2020 Lake Forest College

Deterministic Machine Learning: Feature Importance Of Persuasive Linguistic Predictors, Leonardo Carrico

Senior Theses

Generally, people's opinions are difficult to change. This study searches for the most important features of persuasion. Identifying social media as one of the most difficult modes through which to change people's opinions, we discovered a subreddit dedicated to the sole purpose of changing opinions. Using the data set obtained from r/ChangeMyView, we identified opinion-changing comments and ran machine learning algorithms on those comments. We then further explore those machine learning models to identify how exactly they work. By determining the feature importance and weights of the models, we will specific aspects of persuasive linguistics that influence ...


A Memory Usage Comparison Between Jitana And Soot, Yuanjiu Hu 2020 University of Nebraska - Lincoln

A Memory Usage Comparison Between Jitana And Soot, Yuanjiu Hu

Computer Science and Engineering: Theses, Dissertations, and Student Research

There are several factors that make analyzing Android apps to address dependability and security concerns challenging. These factors include (i) resource efficiency as analysts need to be able to analyze large code-bases to look for issues that can exist in the application code and underlying platform code; (ii) scalability as today’s cybercriminals deploy attacks that may involve many participating apps; and (iii) in many cases, security analysts often rely on dynamic or hybrid analysis techniques to detect and identify the sources of issues.

The underlying principle governing the design of existing program analysis engines is the main cause that ...


An Algorithm For Building Language Superfamilies Using Swadesh Lists, Bill Mutabazi 2020 University of Nebraska - Lincoln

An Algorithm For Building Language Superfamilies Using Swadesh Lists, Bill Mutabazi

Computer Science and Engineering: Theses, Dissertations, and Student Research

The main contributions of this thesis are the following: i. Developing an algorithm to generate language families and superfamilies given for each input language a Swadesh list represented using the international phonetic alphabet (IPA) notation. ii. The algorithm is novel in using the Levenshtein distance metric on the IPA representation and in the way it measures overall distance between pairs of Swadesh lists. iii. Building a Swadesh list for the author's native Kinyarwanda language because a Swadesh list could not be found even after an extensive search for it.

Adviser: Peter Revesz


Volume 12, Haleigh James, Hannah Meyls, Hope Irvin, Megan E. Hlavaty, Samara L. Gall, Austin J. Funk, Karyn Keane, Sarah Ghali, Antonio Harvey, Andrew Jones, Rachel Hazelwood, Madison Schmitz, Marija Venta, Haley Tebo, Jeremiah Gilmer, Bridget Dunn, Benjamin Sullivan, McKenzie Johnson 2020 Longwood University

Volume 12, Haleigh James, Hannah Meyls, Hope Irvin, Megan E. Hlavaty, Samara L. Gall, Austin J. Funk, Karyn Keane, Sarah Ghali, Antonio Harvey, Andrew Jones, Rachel Hazelwood, Madison Schmitz, Marija Venta, Haley Tebo, Jeremiah Gilmer, Bridget Dunn, Benjamin Sullivan, Mckenzie Johnson

Incite: The Journal of Undergraduate Scholarship

Introduction, Dr. Roger A. Byrne, Dean

From the Editor, Dr. Larissa "Kat" Tracy

From the Designers, Rachel English, Rachel Hanson

Immortality in the Mortal World: Otherworldly Intervention in "Lanval" and "The Wife of Bath's Tale" by Haleigh James

Analysis of Phenolic Compounds in Moroccan Olive Oils by HPLC by Hannah Meyls

Art by Hope Irvin

The Effects of Cell Phone Use on Gameplay Enjoyment and Frustration by Megan E. Hlavaty, Samara L. Gall, and Austin J. Funk

Care, No Matter What: Planned Parenthood's Use of Organizational Rhetoric to Expand its Reputation by Karyn Keane

Analysis of Petroleum Products ...


Advancing Performance Of Retail Recommendation Systems, Lisa Leininger, Johnny Gipson, Kito Patterson, Brad Blanchard 2020 Southern Methodist University

Advancing Performance Of Retail Recommendation Systems, Lisa Leininger, Johnny Gipson, Kito Patterson, Brad Blanchard

SMU Data Science Review

This paper presents two recommendation models, one traditional and one novel, for a retail men's clothing company. J. Hilburn is a custom-fit, menswear clothing company headquartered in Dallas, Texas. J. Hilburn employs stylists across the United States, who engage directly with customers to assist in selecting clothes that fit their size and style. J. Hilburn tasked the authors of this paper to leverage data science techniques to the given data set to provide stylists with more insight into clients’ purchase patterns and increase overall sales. This paper presents two recommendation systems which provide stylists with automatic predictions about possible ...


Quantum Computing And Quantum Algorithms, Daniel Serban 2020 Liberty University

Quantum Computing And Quantum Algorithms, Daniel Serban

Senior Honors Theses

The field of quantum computing and quantum algorithms is studied from the ground up. Qubits and their quantum-mechanical properties are discussed, followed by how they are transformed by quantum gates. From there, quantum algorithms are explored as well as the use of high-level quantum programming languages to implement them. One quantum algorithm is selected to be implemented in the Qiskit quantum programming language. The validity and success of the resulting computation is proven with matrix multiplication of the qubits and quantum gates involved.


Improving Syntactic Relationships Between Language And Objects, Benjamin Wilke, Tej Tenmattam, Anand Rajan, Andrew Pollock, Joel Lindsey 2020 Southern Methodist University

Improving Syntactic Relationships Between Language And Objects, Benjamin Wilke, Tej Tenmattam, Anand Rajan, Andrew Pollock, Joel Lindsey

SMU Data Science Review

This paper presents the integration of natural language processing and computer vision to improve the syntax of the language generated when describing objects in images. The goal was to not only understand the objects in an image, but the interactions and activities occurring between the objects. We implemented a multi-modal neural network combining convolutional and recurrent neural network architectures to create a model that can maximize the likelihood of word combinations given a training image. The outcome was an image captioning model that leveraged transfer learning techniques for architecture components. Our novelty was to quantify the effectiveness of transfer learning ...


Physical Dispersions Of Meteor Showers Through High Precision Optical Observations, Denis Vida 2020 The University of Western Ontario

Physical Dispersions Of Meteor Showers Through High Precision Optical Observations, Denis Vida

Electronic Thesis and Dissertation Repository

Meteoroids ejected from comets form meteoroid streams which disperse over time due to gravitational perturbations and non-gravitational forces. When stream meteoroids collide with the Earth's atmosphere, they are visible as meteors emanating from a common point-like area (radiant) in the sky. Measuring the size of meteor shower radiant areas can provide insight into stream formation and age. The tight radiant dispersion of young streams are difficult to determine due to measurement error, but if successfully measured, the dispersion could be used to constrain meteoroid ejection velocities from their parent comets. The estimated ejection velocity is an uncertain, model-dependent value ...


Advanced Techniques To Detect Complex Android Malware, Zhiqiang Li 2020 University of Nebraska - Lincoln

Advanced Techniques To Detect Complex Android Malware, Zhiqiang Li

Computer Science and Engineering: Theses, Dissertations, and Student Research

Android is currently the most popular operating system for mobile devices in the world. However, its openness is the main reason for the majority of malware to be targeting Android devices. Various approaches have been developed to detect malware.

Unfortunately, new breeds of malware utilize sophisticated techniques to defeat malware detectors. For example, to defeat signature-based detectors, malware authors change the malware’s signatures to avoid detection. As such, a more effective approach to detect malware is by leveraging malware’s behavioral characteristics. However, if a behavior-based detector is based on static analysis, its reported results may contain a large ...


Digital Commons powered by bepress