Second-Order Know-How Strategies, 2018 Lafayette College

#### Second-Order Know-How Strategies, Pavel Naumov, Jia Tao

*Faculty Research and Reports*

The fact that a coalition has a strategy does not mean that the coalition knows what the strategy is. If the coalition knows the strategy, then such a strategy is called a know-how strategy of the coalition. The paper proposes the notion of a second-order know-how strategy for the case when one coalition knows what the strategy of another coalition is. The main technical result is a sound and complete logical system describing the interplay between the distributed knowledge modality and the second-order coalition know-how modality.

Smt-Based Answer Set Solver Cmodels-Diff (System Description), 2018 University of Nebraska at Omaha

#### Smt-Based Answer Set Solver Cmodels-Diff (System Description), Da Shen, Yuliya Lierler

*Yuliya Lierler*

Word Blending And Other Formal Models Of Bio-Operations, 2018 The University of Western Ontario

#### Word Blending And Other Formal Models Of Bio-Operations, Zihao Wang

*Electronic Thesis and Dissertation Repository*

As part of ongoing efforts to view biological processes as computations, several formal models of DNA-based processes have been proposed and studied in the formal language literature. In this thesis, we survey some classical formal language word and language operations, as well as several bio-operations, and we propose a new operation inspired by a DNA recombination lab protocol known as Cross-pairing Polymerase Chain Reaction, or XPCR. More precisely, we define and study a word operation called word blending which models a special case of XPCR, where two words x w p and q w y sharing a non-empty overlap part ...

Applications Of Artificial Intelligence In Power Systems, 2018 srastgou

#### Applications Of Artificial Intelligence In Power Systems, Samin Rastgoufard

*University of New Orleans Theses and Dissertations*

Artificial intelligence tools, which are fast, robust and adaptive can overcome the drawbacks of traditional solutions for several power systems problems. In this work, applications of AI techniques have been studied for solving two important problems in power systems.

The first problem is static security evaluation (SSE). The objective of SSE is to identify the contingencies in planning and operations of power systems. Numerical conventional solutions are time-consuming, computationally expensive, and are not suitable for online applications. SSE may be considered as a binary-classification, multi-classification or regression problem. In this work, multi-support vector machine is combined with several evolutionary computation ...

Computational Complexity Of Determining The Rigidity Of Ftam Assemblies, 2018 University of Arkansas, Fayetteville

#### Computational Complexity Of Determining The Rigidity Of Ftam Assemblies, Ian Perkins

*Computer Science and Computer Engineering Undergraduate Honors Theses*

In this paper, we discuss a tile-based self-assembly model called the Folding Tile Assembly Model (FTAM). We briefly define what makes the FTAM unique in its ability to have folding 2D tiles. We also discuss the difficulty of determining the computational complexity of certain FTAM properties despite it being simpler for less dynamic models. Specifically, we discuss the property of rigidity in FTAM assemblies by devising a simple definition of rigidity, so that it is easier to determine its complexity. We use a reduction between an assembly and a 3SAT instance along with a series of proofs to give a ...

Tamscript - High Level Programming Interface For The Abstract Tile Assembly Model, 2018 University of Arkansas, Fayetteville

#### Tamscript - High Level Programming Interface For The Abstract Tile Assembly Model, Perry Mills

*Computer Science and Computer Engineering Undergraduate Honors Theses*

This paper describes a programming interface, TAMScript, for use with the PyTAS simulator. The interface allows for the dynamic generation of tile types as the simulation progresses, with the goal of reducing complexity for researchers. This paper begins with an introduction to the PyTAS software and a description of the 3D model which it simulates. Next, the changes made to support a dynamic generation scheme are detailed, and some of the potential beneﬁts of this scheme are outlined. Then several of the example scripts which have been written using the TAMScript interface are reviewed. Finally, the potential for future research ...

Computer Vision Evidence Supporting Craniometric Alignment Of Rat Brain Atlases To Streamline Expert-Guided, First-Order Migration Of Hypothalamic Spatial Datasets Related To Behavioral Control, 2018 University of Texas at El Paso

#### Computer Vision Evidence Supporting Craniometric Alignment Of Rat Brain Atlases To Streamline Expert-Guided, First-Order Migration Of Hypothalamic Spatial Datasets Related To Behavioral Control, Arshad M. Khan, Jose G. Perez, Claire E. Wells, Olac Fuentes

*Arshad M. Khan, Ph.D.*

*PW*, first published in 1982) or Swanson (

*S*, first published in 1992) as guides to probe or map specific rat brain structures and their connections. Despite nearly three decades of contemporaneous publication, no independent attempt has been made to establish a basic framework that allows data mapped in

*PW*to be placed in register with

*S*, or vice versa. Such data migration would allow ...

Analysis Challenges For High Dimensional Data, 2018 The University of Western Ontario

#### Analysis Challenges For High Dimensional Data, Bangxin Zhao

*Electronic Thesis and Dissertation Repository*

In this thesis, we propose new methodologies targeting the areas of high-dimensional variable screening, influence measure and post-selection inference. We propose a new estimator for the correlation between the response and high-dimensional predictor variables, and based on the estimator we develop a new screening technique termed Dynamic Tilted Current Correlation Screening (DTCCS) for high dimensional variables screening. DTCCS is capable of picking up the relevant predictor variables within a finite number of steps. The DTCCS method takes the popular used sure independent screening (SIS) method and the high-dimensional ordinary least squares projection (HOLP) approach as its special cases.

Two methods ...

Blockchain In Payment Card Systems, 2018 Southern Methodist University

#### Blockchain In Payment Card Systems, Darlene Godfrey-Welch, Remy Lagrois, Jared Law, Russell Scott Anderwald

*SMU Data Science Review*

Payment cards (e.g., credit and debit cards) are the most frequent form of payment in use today. A payment card transaction entails many verification information exchanges between the cardholder, merchant, issuing bank, a merchant bank, and third-party payment card processors. Today, a record of the payment transaction often records to multiple ledgers. Merchant’s incur fees for both accepting and processing payment cards. The payment card industry is in dire need of technology which removes the need for third-party verification and records transaction details to a single tamper-resistant digital ledger. The private blockchain is that technology. Private blockchain provides ...

A Reasonable Bias Approach To Gerrymandering: Using Automated Plan Generation To Evaluate Redistricting Proposals, 2018 College of William & Mary Law School

#### A Reasonable Bias Approach To Gerrymandering: Using Automated Plan Generation To Evaluate Redistricting Proposals, Bruce E. Cain, Wendy K. Tam Cho, Yan Y. Liu, Emily R. Zhang

*William & Mary Law Review*

No abstract provided.

Modular Scheduling System For Westside School District, 2018 University of Nebraska-Lincoln

#### Modular Scheduling System For Westside School District, Tyler Bienhoff

*Honors Theses, University of Nebraska-Lincoln*

Westside School district offers a modular scheduling system for their high school that is more similar to a college schedule than the typical high school system. Due to the complexity of their master schedule each semester, there are no commercially available products that can assist in creating a schedule. Hence, this thesis discusses a scheduling algorithm and management system that was built specifically for Westside High School with the potential to be expanded for use by other interested schools. The first part of the paper is focused on gathering input from students and faculty for which courses and how many ...

Quantum Attacks On Modern Cryptography And Post-Quantum Cryptosystems, 2018 Liberty University

#### Quantum Attacks On Modern Cryptography And Post-Quantum Cryptosystems, Zachary Marron

*Senior Honors Theses*

Cryptography is a critical technology in the modern computing industry, but the security of many cryptosystems relies on the difficulty of mathematical problems such as integer factorization and discrete logarithms. Large quantum computers can solve these problems efficiently, enabling the effective cryptanalysis of many common cryptosystems using such algorithms as Shor’s and Grover’s. If data integrity and security are to be preserved in the future, the algorithms that are vulnerable to quantum cryptanalytic techniques must be phased out in favor of quantum-proof cryptosystems. While quantum computer technology is still developing and is not yet capable of breaking commercial ...

Application Of Huffman Data Compression Algorithm In Hashing Computation, 2018 Western Kentucky University

#### Application Of Huffman Data Compression Algorithm In Hashing Computation, Lakshmi Narasimha Devulapalli Venkata,

*Masters Theses & Specialist Projects*

Cryptography is the art of protecting information by encrypting the original message into an unreadable format. A cryptographic hash function is a hash function which takes an arbitrary length of the text message as input and converts that text into a fixed length of encrypted characters which is infeasible to invert. The values returned by the hash function are called as the message digest or simply hash values. Because of its versatility, hash functions are used in many applications such as message authentication, digital signatures, and password hashing [Thomsen and Knudsen, 2005].

The purpose of this study is to apply ...

Understanding Natural Keyboard Typing Using Convolutional Neural Networks On Mobile Sensor Data, 2018 Southern Methodist University

#### Understanding Natural Keyboard Typing Using Convolutional Neural Networks On Mobile Sensor Data, Travis Siems

*Computer Science and Engineering Theses and Dissertations*

Mobile phones and other devices with embedded sensors are becoming increasingly ubiquitous. Audio and motion sensor data may be able to detect information that we did not think possible. Some researchers have created models that can predict computer keyboard typing from a nearby mobile device; however, certain limitations to their experiment setup and methods compelled us to be skeptical of the models’ realistic prediction capability. We investigate the possibility of understanding natural keyboard typing from mobile phones by performing a well-designed data collection experiment that encourages natural typing and interactions. This data collection helps capture realistic vulnerabilities of the security ...

Similarity Based Classification Of Adhd Using Singular Value Decomposition, 2018 Western Michigan University

#### Similarity Based Classification Of Adhd Using Singular Value Decomposition, Taban Eslami, Fahad Saeed

*Parallel Computing and Data Science Lab Technical Reports*

Attention deficit hyperactivity disorder (ADHD) is one of the most common brain disorders among children. This disorder is considered as a big threat for public health and causes attention, focus and organizing difficulties for children and even adults. Since the cause of ADHD is not known yet, data mining algorithms are being used to help discover patterns which discriminate healthy from ADHD subjects. Numerous efforts are underway with the goal of developing classification tools for ADHD diagnosis based on functional and structural magnetic resonance imaging data of the brain. In this paper, we used Eros, which is a technique for ...

Implementation And Analysis Of The Nonlinear Decomposition Attack On Polycyclic Groups, 2018 College of William and Mary

#### Implementation And Analysis Of The Nonlinear Decomposition Attack On Polycyclic Groups, Yoongbok Lee

*Undergraduate Honors Theses*

Around two years ago, Roman'kov introduced a new type of attack called the nonlinear decomposition attack on groups with solvable membership search problem. To analyze the precise efficiency of the algorithm, we implemented the algorithm on two protocols: semidirect product protocol and Ko-Lee protocol. Because polycyclic groups were suggested as possible platform groups in the semidirect product protocol and polycyclic groups have a solvable membership search problem, we used poly- cyclic groups as the platform group to test the attack. While the complexity could vary regarding many different factors within the group, there was always at least one exponential ...

Cora: Commingled Remains And Analytics – An Open Community Ecosystem, 2018 University of Nebraska at Omaha

#### Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole Mcelroy, Ryan Ernst

*Student Research and Creative Activity Fair*

Anthropologists at organizations such as the DPAA (Defense POW/MIA Accounting Agency) have the tough job of sorting through commingled remains of fallen soldiers. Under the direction of Professor Pawaskar at the College of IS&T, Ryan Ernst and I are currently developing a web application for the DPAA that will help them inventory the bones and record all the appropriate associations. After the inventory web application is built we will begin the analysis process using graph theory and other mathematical algorithms. This will ultimately help organizations like the DPAA get closer to the end goal of identifying fallen soldiers ...

Virtualized Cloud Platform Management Using A Combined Neural Network And Wavelet Transform Strategy, 2018 California State University – San Bernardino

#### Virtualized Cloud Platform Management Using A Combined Neural Network And Wavelet Transform Strategy, Chunyu Liu

*Electronic Theses, Projects, and Dissertations*

This study focuses on implementing a log analysis strategy that combines a neural network algorithm and wavelet transform. Wavelet transform allows us to extract the important hidden information and features of the original time series log data and offers a precise framework for the analysis of input information. While neural network algorithm constitutes a powerfulnonlinear function approximation which can provide detection and prediction functions. The combination of the two techniques is based on the idea of using wavelet transform to denoise the log data by decomposing it into a set of coefficients, then feed the denoised data into a neural ...

Information Flow Under Budget Constraints, 2018 Lafayette College

#### Information Flow Under Budget Constraints, Pavel Naumov, Jia Tao

*Faculty Research and Reports*

Although first proposed in the database theory as properties of functional dependencies between attributes, Armstrong's axioms capture general principles of information flow by describing properties of dependencies between sets of pieces of information. This article generalizes Armstrong's axioms to a setting in which there is a cost associated with information. The proposed logical system captures general principles of dependencies between pieces of information constrained by a given budget.

Armstrong's Axioms And Navigation Strategies, 2018 Vassar College

#### Armstrong's Axioms And Navigation Strategies, Kaya Deuser, Pavel Naumov

*Faculty Research and Reports*

The paper investigates navigability with imperfect information. It shows that the properties of navigability with perfect recall are exactly those captured by Armstrong's axioms from database theory. If the assumption of perfect recall is omitted, then Armstrong's transitivity axiom is not valid, but it can be replaced by a weaker principle. The main technical results are soundness and completeness theorems for the logical systems describing properties of navigability with and without perfect recall.