Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,359 Full-Text Articles 72,277 Authors 23,183,657 Downloads 376 Institutions

All Articles in Computer Sciences

Faceted Search

55,359 full-text articles. Page 808 of 2016.

Every Data Point Counts: Political Elections In The Age Of Digital Analytics, Julian Kehle, Samir Naimi 2019 Loyola Marymount University

Every Data Point Counts: Political Elections In The Age Of Digital Analytics, Julian Kehle, Samir Naimi

Honors Thesis

Synthesizing the investigative research and cautionary messages from experts in the fields of technology, political science, and behavioral science, this project explores the ways in which digital analytics has begun to influence the American political arena. Historically, political parties have constructed systems to target voters and win elections. However, rapid changes in the field of technology (such as big data, artificial intelligence, and the prevalence of social media) threaten to undermine the integrity of elections themselves. Future political campaigns will utilize profiling to micro-target individuals in order to manipulate and persuade them with hyper-personalized political content. Most dangerously, the average …


#Whyididntreport: Using Social Media As A Tool To Understand Why Sexual Assault Victims Do Not Report, Abby Garrett 2019 University of Mississippi

#Whyididntreport: Using Social Media As A Tool To Understand Why Sexual Assault Victims Do Not Report, Abby Garrett

Honors Theses

Sexual assault has gone largely under-reported, and social media movements, like #WhyIDidntReport, have brought great awareness to this issue. In order to take advantage of the large amounts of data the #WhyIDidntReport movement has generated, the study uses tweets to explore reasons why victims do not report their assault. The thesis cites current research on the topic of assault to generate a list of explanations victims use to describe their lack of reporting and compares the distributions with existing studies. We use a supervised learning technique to automatically categorize tweets into one of eight categories. This approach uses social sensing …


Optimal Staged Self-Assembly Of Linear Assemblies, Cameron Chalk, Eric Martinez, Robert Schweller, Luis Vega, Andrew Winslow, Tim Wylie 2019 University of Texas at Austin

Optimal Staged Self-Assembly Of Linear Assemblies, Cameron Chalk, Eric Martinez, Robert Schweller, Luis Vega, Andrew Winslow, Tim Wylie

Computer Science Faculty Publications and Presentations

We analyze the complexity of building linear assemblies, sets of linear assemblies, and O(1)-scale general shapes in the staged tile assembly model. For systems with at most b bins and t tile types, we prove that the minimum number of stages to uniquely assemble a 1 n line is (logt n + logb n t + 1). Generalizing to O(1) n lines, we prove the minimum number of stages is O( log n tb t log t b2 + log log b log t ) and

( log n tb t log t b2 ). Next, we consider assembling sets …


A Robust And Automated Deconvolution Algorithm Of Peaks In Spectroscopic Data, William Johan Burke IV 2019 Rowan University

A Robust And Automated Deconvolution Algorithm Of Peaks In Spectroscopic Data, William Johan Burke Iv

Theses and Dissertations

The huge amount of spectroscopic data in use in metabolomic experiments requires an algorithm that can process the data in an autonomous fashion while providing quality of analysis comparable to manual methods. Scientists need an algorithm that effectively deconvolutes spectroscopic peaks automatically and is resilient to the presence of noise in the data. The algorithm must also provide a simple measure of quality of the deconvolution. The deconvolution algorithm presented in this thesis consists of preprocessing steps, noise removal, peak detection, and function fitting. Both a Fourier Transform and Continuous Wavelet Transform (CWT) method of noise removal were investigated. The …


Identification And Classification Of Poultry Eggs: A Case Study Utilizing Computer Vision And Machine Learning, Jeremy Lubich, Kyle Thomas, Daniel W. Engels 2019 Southern Methodist University

Identification And Classification Of Poultry Eggs: A Case Study Utilizing Computer Vision And Machine Learning, Jeremy Lubich, Kyle Thomas, Daniel W. Engels

SMU Data Science Review

We developed a method to identify, count, and classify chickens and eggs inside nesting boxes of a chicken coop. Utilizing an IoT AWS Deep Lens Camera for data capture and inferences, we trained and deployed a custom single-shot multibox (SSD) object detection and classification model. This allows us to monitor a complex environment with multiple chickens and eggs moving and appearing simultaneously within the video frames. The models can label video frames with classifications for 8 breeds of chickens and/or 4 colors of eggs, with 98% accuracy on chickens or eggs alone and 82.5% accuracy while detecting both types of …


Modeling A Chaotic Billiard: The Bunimovich Stadium, Randal Shoemaker 2019 James Madison University

Modeling A Chaotic Billiard: The Bunimovich Stadium, Randal Shoemaker

Senior Honors Projects, 2010-2019

The Bunimovich stadium is a chaotic dynamical system in which a single particle, known as a billiard, moves indefinitely within a barrier without loss of momentum. Mathematicians and physicists have been interested in its properties since it was discovered to be chaotic in the 1970’s [5] [3] [4]. The Bunimovich stadium is actively researched [9]. This thesis and its accompanying software, the Bunimovich Stadia Evolution Viewer (BSEV), present a novel visual representation of the the chaotic dynamical system. The goal for the software is to provide insights into the stadium’s properties to aid researchers. This tool allows one to visualize …


The Effects Of Finite Precision On The Simulation Of The Double Pendulum, Rebecca Wild 2019 James Madison University

The Effects Of Finite Precision On The Simulation Of The Double Pendulum, Rebecca Wild

Senior Honors Projects, 2010-2019

We use mathematics to study physical problems because abstracting the information allows us to better analyze what could happen given any range and combination of parameters. The problem is that for complicated systems mathematical analysis becomes extremely cumbersome. The only effective and reasonable way to study the behavior of such systems is to simulate the event on a computer. However, the fact that the set of floating-point numbers is finite and the fact that they are unevenly distributed over the real number line raises a number of concerns when trying to simulate systems with chaotic behavior. In this research we …


Nurse-Led Design And Development Of An Expert System For Pressure Ulcer Management, Débora Abranches, Dympna O'Sullivan, Jon Bird 2019 City, University of London

Nurse-Led Design And Development Of An Expert System For Pressure Ulcer Management, Débora Abranches, Dympna O'Sullivan, Jon Bird

Conference papers

The use of Clinical Practice Guidelines (CPGs) is known to enable better care outcomes by promoting a consistent way of treating patients. This paper describes a user-centered design approach involving nurses, to develop a prototype expert system for modelling CPGs for Pressure Ulcer management. The system was developed using Visirule, a software tool that uses a graphical approach to modeling knowledge. The system was evaluated by 5 staff nurses and compared nurses’ time and accuracy to assess a wound using CPGs accessed via the Intranet of an NHS Trust and the expert system. A post task qualitative evaluation revealed that …


A Study Of The Effect Of Memory System Configuration On The Power Consumption Of An Fpga Processor, Adam Blalock 2019 James Madison University

A Study Of The Effect Of Memory System Configuration On The Power Consumption Of An Fpga Processor, Adam Blalock

Senior Honors Projects, 2010-2019

With electrical energy being a finite resource, feasible methods of reducing system power consumption continue to be of great importance within the field of computing, especially as computers proliferate. A victim cache is a small fully associative cache that “captures” lines evicted from L1 cache memory, thereby reducing lower memory accesses and compensating for conflict misses. Little experimentation has been done to evaluate its effect on system power behavior and consumption. This project investigates the performance and power consumption of three different processor memory designs for a sample program using a field programmable gate array (FPGA) and the Vivado Integrated …


Using Data Science To Detect Fake News, Eliza Shoemaker 2019 James Madison University

Using Data Science To Detect Fake News, Eliza Shoemaker

Senior Honors Projects, 2010-2019

The purpose of this thesis is to assist in automating the detection of Fake News by identifying which features are more useful for different classifiers. The effectiveness of different extracted features for Fake News detection are going to be examined. When classifying text with machine learning algorithms features have to be extracted from the articles for the classifiers to be trained on. In this thesis, several different features are extracted: word counts, ngram counts, term frequency-inverse document frequency, sentiment analysis, lemmatization, and named entity recognition to train the classifiers. Two classifiers are used, a Random Forest classifier and a Naïve …


Analysis Of Computer Audit Data To Create Indicators Of Compromise For Intrusion Detection, Steven Millett, Michael Toolin, Justin Bates 2019 Southern Methodist University

Analysis Of Computer Audit Data To Create Indicators Of Compromise For Intrusion Detection, Steven Millett, Michael Toolin, Justin Bates

SMU Data Science Review

Network security systems are designed to identify and, if possible, prevent unauthorized access to computer and network resources. Today most network security systems consist of hardware and software components that work in conjunction with one another to present a layered line of defense against unauthorized intrusions. Software provides user interactive layers such as password authentication, and system level layers for monitoring network activity. This paper examines an application monitoring network traffic that attempts to identify Indicators of Compromise (IOC) by extracting patterns in the network traffic which likely corresponds to unauthorized access. Typical network log data and construct indicators are …


Visualization And Machine Learning Techniques For Nasa’S Em-1 Big Data Problem, Antonio P. Garza III, Jose Quinonez, Misael Santana, Nibhrat Lohia 2019 Southern Methodist University

Visualization And Machine Learning Techniques For Nasa’S Em-1 Big Data Problem, Antonio P. Garza Iii, Jose Quinonez, Misael Santana, Nibhrat Lohia

SMU Data Science Review

In this paper, we help NASA solve three Exploration Mission-1 (EM-1) challenges: data storage, computation time, and visualization of complex data. NASA is studying one year of trajectory data to determine available launch opportunities (about 90TBs of data). We improve data storage by introducing a cloud-based solution that provides elasticity and server upgrades. This migration will save $120k in infrastructure costs every four years, and potentially avoid schedule slips. Additionally, it increases computational efficiency by 125%. We further enhance computation via machine learning techniques that use the classic orbital elements to predict valid trajectories. Our machine learning model decreases trajectory …


Machine Learning Pipeline For Exoplanet Classification, George Clayton Sturrock, Brychan Manry, Sohail Rafiqi 2019 Southern Methodist University

Machine Learning Pipeline For Exoplanet Classification, George Clayton Sturrock, Brychan Manry, Sohail Rafiqi

SMU Data Science Review

Planet identification has typically been a tasked performed exclusively by teams of astronomers and astrophysicists using methods and tools accessible only to those with years of academic education and training. NASA’s Exoplanet Exploration program has introduced modern satellites capable of capturing a vast array of data regarding celestial objects of interest to assist with researching these objects. The availability of satellite data has opened up the task of planet identification to individuals capable of writing and interpreting machine learning models. In this study, several classification models and datasets are utilized to assign a probability of an observation being an exoplanet. …


Automate Nuclei Detection Using Neural Networks, Jonathan Flores, Thejas Prasad, Jordan Kassof, Robert Slater 2019 Southern Methodist University

Automate Nuclei Detection Using Neural Networks, Jonathan Flores, Thejas Prasad, Jordan Kassof, Robert Slater

SMU Data Science Review

Nuclei identification is a pivotal first step in many areas of biomedical research. Pathologists often observe images containing microscopic nuclei as part of their day to day jobs. During research, pathologists must identify nuclei characteristics from microscopic images such as: volume of nuclei, size, density and individual position within image. The pathology field can benefit from image detection enhancements done through the use of computer image segmentation techniques. This research presents methods that can be used to identify all the cell nuclei contained in images. Multiple techniques were experimented with such as edge detection and Convolutional Neural Networks with U-Net …


Leveraging Natural Language Processing Applications And Microblogging Platform For Increased Transparency In Crisis Areas, Ernesto Carrera-Ruvalcaba, Johnson Ekedum, Austin Hancock, Ben Brock 2019 Southern Methodist University

Leveraging Natural Language Processing Applications And Microblogging Platform For Increased Transparency In Crisis Areas, Ernesto Carrera-Ruvalcaba, Johnson Ekedum, Austin Hancock, Ben Brock

SMU Data Science Review

Through microblogging applications, such as Twitter, people actively document their lives even in times of natural disasters such as hurricanes and earthquakes. While first responders and crisis-teams are able to help people who call 911, or arrive at a designated shelter, there are vast amounts of information being exchanged online via Twitter that provide real-time, location-based alerts that are going unnoticed. To effectively use this information, the Tweets must be verified for authenticity and categorized to ensure that the proper authorities can be alerted. In this paper, we create a Crisis Message Corpus from geotagged Tweets occurring during 7 hurricanes …


Autonomous Watercraft Simulation And Programming, Nicholas J. Savino 2019 Lynchburg College

Autonomous Watercraft Simulation And Programming, Nicholas J. Savino

Undergraduate Theses and Capstone Projects

Automation of various modes of transportation is thought to make travel more safe and efficient. Over the past several decades advances to semi-autonomous and autonomous vehicles have led to advanced autopilot systems on planes and boats and an increasing popularity of self-driving cars. We simulated the motion of an autonomous vehicle using computational models. The simulation models the motion of a small-scale watercraft, which can then be built and programmed using an Arduino Microcontroller. We examined different control methods for a simulated rescue craft to reach a target. We also examined the effects of different factors, such as various biases …


Sensitive Research, Practice And Design In Hci, Stevie Chancellor, Nazanin Andalibi, Lindsay Blackwell, David Nemer, Wendy Moncur 2019 Georgia Tech

Sensitive Research, Practice And Design In Hci, Stevie Chancellor, Nazanin Andalibi, Lindsay Blackwell, David Nemer, Wendy Moncur

Information Science Faculty Publications

New research areas in HCI examine complex and sensitive research areas, such as crisis, life transitions, and mental health. Further, research in complex topics such as harassment and graphic content can leave researchers vulnerable to emotional and physical harm. There is a need to bring researchers together to discuss challenges across sensitive research spaces and environments. We propose a workshop to explore the methodological, ethical, and emotional challenges of sensitive research in HCI. We will actively recruit from diverse research environments (industry, academia, government, etc.) and methods areas (qualitative, quantitative, design practices, etc.) and identify commonalities in and encourage relationship-building …


Intrusion-Tolerant Order-Preserving Encryption, John Huson 2019 James Madison University

Intrusion-Tolerant Order-Preserving Encryption, John Huson

Masters Theses, 2010-2019

Traditional encryption schemes such as AES and RSA aim to achieve the highest level of security, often indistinguishable security under the adaptive chosen-ciphertext attack. Ciphertexts generated by such encryption schemes do not leak useful information. As a result, such ciphertexts do not support efficient searchability nor range queries.

Order-preserving encryption is a relatively new encryption paradigm that allows for efficient queries on ciphertexts. In order-preserving encryption, the data-encrypting key is a long-term symmetric key that needs to stay online for insertion, query and deletion operations, making it an attractive target for attacks.

In this thesis, an intrusion-tolerant order-preserving encryption system …


Celltrademap: Delineating Trade Areas For Urban Commercial Districts With Cellular Networks, Yi ZHAO, Zimu ZHOU, Xu WANG, Tongtong LIU, Yunhao LIU, Zheng YANG 2019 Singapore Management University

Celltrademap: Delineating Trade Areas For Urban Commercial Districts With Cellular Networks, Yi Zhao, Zimu Zhou, Xu Wang, Tongtong Liu, Yunhao Liu, Zheng Yang

Research Collection School Of Computing and Information Systems

Understanding customer mobility patterns to commercial districts is crucial for urban planning, facility management, and business strategies. Trade areas are a widely applied measure to quantity where the visitors are from. Traditional trade area analysis is limited to small-scale or store-level studies because information such as visits to competitor commercial entities and place of residence is collected by labour-intensive questionnaires or heavily biased location-based social media data. In this paper, we propose CellTradeMap, a novel district-level trade area analysis framework using mobile flow records (MFRs), a type of fine-grained cellular network data. CellTradeMap extracts robust location information from the irregularly …


Sensor System And Method For Cognitive Health Assessment, Debraj De, Sajal K. Das, Mignon Makos 2019 Missouri University of Science and Technology

Sensor System And Method For Cognitive Health Assessment, Debraj De, Sajal K. Das, Mignon Makos

Computer Science Faculty Research & Creative Works

Sensors arranged on a chair on which a subject is seated detect a physical characteristic of the subject during administration of a cognitive health assessment. An assessment processor coupled to the sensors executes computer-executable instructions causing the processor to determine a contemporaneous reaction corresponding to each of the questions as a function of the detected physical characteristic. And the subject is assigned a cognitive health assessment score based on the subject's answers and determined reactions.


Digital Commons powered by bepress