Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

215,609 Full-Text Articles 271,397 Authors 47,230,550 Downloads 417 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

215,609 full-text articles. Page 7 of 6064.

Linear Analysis Method To Calculate The Specific Forage Ingestion By Livestock, Andrea Pardini, V. Pratesi, N. Staglianò 2020 University of Florence, Italy

Linear Analysis Method To Calculate The Specific Forage Ingestion By Livestock, Andrea Pardini, V. Pratesi, N. Staglianò

International Grassland Congress Proceedings

No abstract provided.


Effects Of Oxidative Modifications On The Structure And Non-Canonical Functions Of Cytochrome C Studied By Mass Spectrometry, Victor Yin 2020 The University of Western Ontario

Effects Of Oxidative Modifications On The Structure And Non-Canonical Functions Of Cytochrome C Studied By Mass Spectrometry, Victor Yin

Electronic Thesis and Dissertation Repository

The peroxidase activity of the mitochondrial protein cytochrome c (cyt c) plays a critical role in triggering programmed cell death, or apoptosis. However, the native structure of cyt c should render this activity impossible due to the lack of open iron coordination sites at its heme cofactor. Despite its key biological importance, the molecular mechanisms underlying this structure-function mismatch remain enigmatic. The work detailed in this dissertation fills this knowledge gap by using mass spectrometry (MS) to decipher the central role that protein oxidative modifications and their associated structural changes play in activating the peroxidase function of cyt c.

Chapter ...


Topic Modeling To Understand Technology Talent, Chad Madding, Allen Ansari, Chris Ballenger, Aswini Thota 2020 Southern Methodist University

Topic Modeling To Understand Technology Talent, Chad Madding, Allen Ansari, Chris Ballenger, Aswini Thota

SMU Data Science Review

Attracting technology talent in today’s hiring climate is more complicated than ever. Recruiting for technology talent in non-technology industries is even more challenging. This intense hiring landscape is motivating companies not only to attract the right talent but also to create a culture that can retain and grow that talent. In this paper, we developed algorithms and present insights that use data provided in reviews to glean information employers can use to address or even change their priorities to meet the demands of an ever-changing job market. The core of our research is to investigate and attribute the role ...


Cover Song Identification - A Novel Stem-Based Approach To Improve Song-To-Song Similarity Measurements, Lavonnia Newman, Dhyan Shah, Chandler Vaughn, Faizan Javed 2020 Southern Methodist University

Cover Song Identification - A Novel Stem-Based Approach To Improve Song-To-Song Similarity Measurements, Lavonnia Newman, Dhyan Shah, Chandler Vaughn, Faizan Javed

SMU Data Science Review

Music is incorporated into our daily lives whether intentional or unintentional. It evokes responses and behavior so much so there is an entire study dedicated to the psychology of music. Music creates the mood for dancing, exercising, creative thought or even relaxation. It is a powerful tool that can be used in various venues and through advertisements to influence and guide human reactions. Music is also often "borrowed" in the industry today. The practices of sampling and remixing music in the digital age have made cover song identification an active area of research. While most of this research is focused ...


Time Series Analysis Of Offshore Buoy Light Detection And Ranging (Lidar) Windspeed Data, Aditya Garapati, Charles J. Henderson, Carl Walenciak, Brian T. Waite 2020 Southern Methodist University

Time Series Analysis Of Offshore Buoy Light Detection And Ranging (Lidar) Windspeed Data, Aditya Garapati, Charles J. Henderson, Carl Walenciak, Brian T. Waite

SMU Data Science Review

In this paper, modeling techniques for the forecasting of wind speed using historical values observed by Light Detection and Ranging (LIDAR) sensors in an offshore context are described. Both univariate time series and multivariate time series modeling techniques leveraging meteorological data collected simultaneously with the LIDAR data are evaluated for potential contributions to predictive ability. Accurate and timely ability to predict wind values is essential to the effective integration of wind power into existing power grid systems. It allows for both the management of rapid ramp-up / down of base production capacity due to highly variable wind power inputs and integration ...


Toxic Language Detection Using Robust Filters, Deepti Kunupudi, Shantanu Godbole, Pankaj Kumar, Suhas Pai 2020 Southern Methodist University(SMU)

Toxic Language Detection Using Robust Filters, Deepti Kunupudi, Shantanu Godbole, Pankaj Kumar, Suhas Pai

SMU Data Science Review

Social networks sometimes become a medium for threats, insults, and other types of cyberbullying. A large number of people are involved in online social networks. Hence, the protection of network users from anti-social behavior is a critical activity [19]. One of the significant tasks of such activity is the detection of toxic language. Abusive/Toxic language in user-generated online content has become an issue of increasing importance in recent years. Most current commercial methods use blacklists and regular expressions; however, these measures fall short when contending with more subtle, lesser-known examples of hate speech, profanity, or swearing[6]. Abusive language ...


Reducing Age Bias In Machine Learning: An Algorithmic Approach, Adriana Solange Garcia de Alford, Steven K. Hayden, Nicole Wittlin, Amy Atwood 2020 Southern Methodist University

Reducing Age Bias In Machine Learning: An Algorithmic Approach, Adriana Solange Garcia De Alford, Steven K. Hayden, Nicole Wittlin, Amy Atwood

SMU Data Science Review

In this paper, we study the prevalence of bias in machine learning; we explore the life cycle phases where bias is potentially introduced into a machine learning model; and lastly, we present how adversarial learning can be leveraged to measure unwanted bias and unfair behavior from a machine learning algorithm. This study focuses particularly on the topics of age bias in predicting employee attrition and presents a practical approach for how adversarial learning can be successful in mitigating age bias. To measure bias, we calculate group fairness metrics across five-year age groups and evaluate fairness between a baseline predictive model ...


Forecasting Spare Parts Sporadic Demand Using Traditional Methods And Machine Learning - A Comparative Study, Bhuvana Adur Kannan, Ganesh Kodi, Oscar Padilla, Dough Gray, Barry C. Smith 2020 Southern Methodist University

Forecasting Spare Parts Sporadic Demand Using Traditional Methods And Machine Learning - A Comparative Study, Bhuvana Adur Kannan, Ganesh Kodi, Oscar Padilla, Dough Gray, Barry C. Smith

SMU Data Science Review

Sporadic demand presents a particular challenge to traditional time forecasting methods. In the past 50 years, there has been developments, such as, the Croston Model [3], which has improved forecast performance. With the rise of Machine Learning (ML) there is abundant research in the field of applying ML algorithms to predict sporadic demand [8][12][9]. However, most existing research has analyzed this problem from the demand side [17]. In this paper, we tackle this predictive analytics challenge from the supply side. We perform a comparative analysis utilizing a spare parts demand dataset from an Original Equipment Manufacturer (OEM). Since ...


Floor Regularization And Investigation Of Transfer Learning Through Sharing Of Probability Distribution Parameters, Daniel Byrne, Stacey Smith, Joanna Duran, John Santerre 2020 Southern Methodist University

Floor Regularization And Investigation Of Transfer Learning Through Sharing Of Probability Distribution Parameters, Daniel Byrne, Stacey Smith, Joanna Duran, John Santerre

SMU Data Science Review

In this work we introduce a simple new regularization technique, aptly named Floor, which drops low weight connections on every forward pass whenever they fall below a specified event horizon threshold. We compare the results of this technique side by side on identical network architectures between regular Dropout and Floor algorithms. We report similar or improved regularization, with the Floor algorithm versus regular Dropout and/or in concert with regular Dropout.

In this paper we also describe our research into transfer learning by sharing of probability distribution parameters in which we investigated methods of transferring Gaussian prior parameters derived from ...


Monitoring Of Inner Mongolian Grassland Using Sustainable Roundtable Indictors, Mengli Zhao, Guodong Han, Mingjun Wang, Xiaoyu Wang, Chunli Li, Zhongwu Wang, Dennis Chlld, Lakhdar Benkobi, Walter D. Willms 2020 Inner Mongolia Agricultural University, China

Monitoring Of Inner Mongolian Grassland Using Sustainable Roundtable Indictors, Mengli Zhao, Guodong Han, Mingjun Wang, Xiaoyu Wang, Chunli Li, Zhongwu Wang, Dennis Chlld, Lakhdar Benkobi, Walter D. Willms

International Grassland Congress Proceedings

No abstract provided.


Indicators Of Sustainability For Production And Biodiversity Conservation In Australian Rangelands, Margaret H. Friedel, G. N. Bastin, A. K. Smyth 2020 CSIRO, Australia

Indicators Of Sustainability For Production And Biodiversity Conservation In Australian Rangelands, Margaret H. Friedel, G. N. Bastin, A. K. Smyth

International Grassland Congress Proceedings

No abstract provided.


Usage Of Adversarial Examples As A Defensive Mechanism In Cybersecurity, Carl Jake Thurnau 2020 State University of New York College at Brockport

Usage Of Adversarial Examples As A Defensive Mechanism In Cybersecurity, Carl Jake Thurnau

Senior Honors Theses

The focus of this research article is on defenses to a theoretical threat model of malware. The malware, or GUI-Attack, aims to search the victim computer’s desktop and use image recognition to find the icons for highly used web browsers such as Google Chrome, Internet Explorer, Mozilla Firefox, and Opera, and gain access to secure data and information. We propose that adversarial examples can be used as a defensive mechanism to protect secure information from these GUI-Attacks. We hope to prove that these adversarial examples can be used to prevent malicious AI from being able to recognize the icons ...


Second-Best Prioritization Of Environmental Cleanups, Jacob LaRiviere, Matthew J. McMahon, Justin Roush 2020 Microsoft, University of Washington, University of Tennessee

Second-Best Prioritization Of Environmental Cleanups, Jacob Lariviere, Matthew J. Mcmahon, Justin Roush

Sustainability Research & Practice Seminar Presentations

No abstract provided.


On Weak Flexibility In Planar Graphs, Bernard Lidicky, Tomáš Masarík, Kyle Murphy, Shira Zerbib 2020 Iowa State University

On Weak Flexibility In Planar Graphs, Bernard Lidicky, Tomáš Masarík, Kyle Murphy, Shira Zerbib

Mathematics Publications

Recently, Dvořák, Norin, and Postle introduced flexibility as an extension of list coloring on graphs [JGT 19']. In this new setting, each vertex v in some subset of V(G) has a request for a certain color r(v) in its list of colors L(v). The goal is to find an L coloring satisfying many, but not necessarily all, of the requests.

The main studied question is whether there exists a universal constant ϵ>0 such that any graph G in some graph class C satisfies at least ϵ proportion of the requests. More formally, for k>0 the ...


Modeling Marsh‐Forest Boundary Transgression In Response To Storms And Sea‐Level Rise, J. Carr, G. Guntenspergen, Matthew L. Kirwan 2020 Virginia Institute of Marine Science

Modeling Marsh‐Forest Boundary Transgression In Response To Storms And Sea‐Level Rise, J. Carr, G. Guntenspergen, Matthew L. Kirwan

VIMS Articles

The lateral extent and vertical stability of salt marshes experiencing rising sea levels depend on interacting drivers and feedbacks with potential for nonlinear behaviors. A two‐dimensional transect model was developed to examine changes in marsh and upland forest lateral extent and to explore controls on marsh inland transgression. Model behavior demonstrates limited and abrupt forest retreat with long‐term upland boundary migration rates controlled by slope, sea‐level rise (SLR), high water events, and biotic‐abiotic interactions. For low to moderate upland slopes the landward marsh edge is controlled by the interaction of these inundation events and forest recovery ...


Web Based Service For Diabetes Patient Monitoring Sensors, M. USHA RANI 2020 Dept. of Information Technology, Velammal College of Engineering and Technology, Madurai, India.

Web Based Service For Diabetes Patient Monitoring Sensors, M. Usha Rani

International Journal of Computer Science and Informatics

Diabetes mellitus is a major cause of blindness, renal failure, amputation, heart attacks and stroke. For a diabetes patient, many factors are to be considered. Change in the meal may cause unpredictable changes in blood sugar levels. The diabetes patient monitoring considers these factors and proposes a solution using the sensors like glucometer sensor, blood Pressure sensor and the RFID tag with arduino given to the individual patients. The internet of things integrates many technologies, such as Internet, Zigbee, Bluetooth, infrared, Wi-Fi, GPRS, 3G, etc., This paper provides low cost global connectivity between the patients personal device and the patient ...


Comparative Study Of Multi User Broadcast Authentication In Wireless Sensor Network, P. PRASUNA 2020 Keshav Memorial Institute of Technology

Comparative Study Of Multi User Broadcast Authentication In Wireless Sensor Network, P. Prasuna

International Journal of Computer Science and Informatics

Wireless sensor network (WSN) is an emerging technology consisting of spatially distributed sensor nodes, which can cooperatively monitor physical or environmental conditions. The major resource constrain of WSN are, low processing, energy and storage capabilities. Broadcast is widely used communication method in WSN environment. In most of the sensor networks, the sink node sends broadcast information to all other sensor nodes. Broadcast authentication is an important security mechanism in WSN, as it allows mobile users to broadcast messages to multiple sensor nodes in a secured way. While variety of multiuser broadcast authentication approaches are being developed, a lot of research ...


Empirical Study On Selection Of Team Members For Software Projects – Data Mining Approach, SANGITA GUPTA 2020 Jain University, Bangalore

Empirical Study On Selection Of Team Members For Software Projects – Data Mining Approach, Sangita Gupta

International Journal of Computer Science and Informatics

One of the essential requisites of any software industry is the development of customer satisfied products. However, accomplishing the aforesaid business objective depends upon the depth of quality of product that is engineered in the organization. Thus, generation of high quality depends upon process, which is in turn depends upon the people. Existing scenario in IT industries demands a requirement for deploying the right personnel for achieving desirable quality in the product through the existing process. The goal of this paper is to identify the criteria which will be used in industrial practice to select members of a software project ...


Vfg – Index: A Novel Graph Indexing Method, A. PANKAJ MOSES MONICKARAJ 2020 Dept. of Computer Science, Bharathiar University, Coimbatore, India

Vfg – Index: A Novel Graph Indexing Method, A. Pankaj Moses Monickaraj

International Journal of Computer Science and Informatics

The latest advancements in science and technology have observed large quantity of complicated structures and schema less data such as proteins, circuits, images, Web, and XML documents which can be modeled into various types of which one of the most dominant now a days are graphs. This has caused Graph Mining, one of the budding areas of research happening throughout. In this paper, we investigate the various algorithms for Graph Indexing which makes use of Frequent Sub graph as a key term for indexing, of which one the most dominant is FG-index algorithm. This algorithm is tested with AIDS dataset ...


Managing Redundancy And Conflicts In Distributed Firewalls, MS. KRUTHI K. KUMAR 2020 Dept of CSE, CMRIT, Bangalore, India

Managing Redundancy And Conflicts In Distributed Firewalls, Ms. Kruthi K. Kumar

International Journal of Computer Science and Informatics

The use of firewall has been widespread in all the emerging technologies such as Service Oriented Architecture, web services, cloud computing and so on. The term security itself is the most important task that has to be maintained in the real-time applications. Policies are enrolled in the security of the firewall where the quality of policies is to be maintained. The network administrator defines the policy as a rule. Managing the firewall policies, maintaining the risk analysis and also the conflicting nature that arise in the network, lack of systematic analysis mechanisms and tools used are often error prone. The ...


Digital Commons powered by bepress