Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Physical Sciences and Mathematics

Real-Time Indoor Assistive Localization With Mobile Omnidirectional Vision And Cloud Gpu Acceleration, Feng Hu, Zhigang Zhu, Jeury Mejia, Hao Tang Dec 2017

Real-Time Indoor Assistive Localization With Mobile Omnidirectional Vision And Cloud Gpu Acceleration, Feng Hu, Zhigang Zhu, Jeury Mejia, Hao Tang

Publications and Research

In this paper we propose a real-time assistive localization approach to help blind and visually impaired people in navigating an indoor environment. The system consists of a mobile vision front end with a portable panoramic lens mounted on a smart phone, and a remote image feature-based database of the scene on a GPU-enabled server. Compact and elective omnidirectional image features are extracted and represented in the smart phone front end, and then transmitted to the server in the cloud. These features of a short video clip are used to search the database of the indoor environment via image-based indexing to …


On Improvised Music, Computational Creativity And Human-Becoming, Arto Artinian, Adam James Wilson Dec 2017

On Improvised Music, Computational Creativity And Human-Becoming, Arto Artinian, Adam James Wilson

Publications and Research

Music improvisation is an act of human-becoming: of self-expression—an articulation of histories and memories that have molded its participants—and of exploration—a search for unimagined structures that break with the stale norms of majoritarian culture. Given that the former objective may inhibit the latter, we propose an integration of human musical improvisers and deliberately flawed creative software agents that are designed to catalyze the development of human-ratified minoritarian musical structures.


Defaultification Refactoring: A Tool For Automatically Converting Java Methods To Default, Raffi T. Khatchadourian, Hidehiko Masuhara Oct 2017

Defaultification Refactoring: A Tool For Automatically Converting Java Methods To Default, Raffi T. Khatchadourian, Hidehiko Masuhara

Publications and Research

Enabling interfaces to declare (instance) method implementations, Java 8 default methods can be used as a substitute for the ubiquitous skeletal implementation software design pattern. Performing this transformation on legacy software manually, though, may be non-trivial. The refactoring requires analyzing complex type hierarchies, resolving multiple implementation inheritance issues, reconciling differences between class and interface methods, and analyzing tie-breakers (dispatch precedence) with overriding class methods. All of this is necessary to preserve type-correctness and confirm semantics preservation. We demonstrate an automated refactoring tool called Migrate Skeletal Implementation to Interface for transforming legacy Java code to use the new default construct. The …


Zero Textbook Cost Syllabus For Cis 3367 (Spreadsheet Applications In Business), Soniya Dsouza Aug 2017

Zero Textbook Cost Syllabus For Cis 3367 (Spreadsheet Applications In Business), Soniya Dsouza

Open Educational Resources

The primary focus of this course is to learn how to construct and use powerful spreadsheets for effective managerial decision-making. This course is mostly project- oriented with a dual focus on spreadsheet engineering and quantitative modeling of financial applications. Students will learn to develop powerful spreadsheet models and perform data analysis using Pivot Tables, VLookUp, Data Validation techniques and Sub Total functions. Students will also learn how to enhance spreadsheets by creating dashboards on financial data. The Visual Basic (macro) concepts will also be introduced to students. With the knowledge and hands-on experience of these concepts, students will be prepared …


Introduction To Gis Using Open Source Software, 8th Ed, Frank Donnelly Jul 2017

Introduction To Gis Using Open Source Software, 8th Ed, Frank Donnelly

Open Educational Resources

This tutorial was created to accompany the GIS Practicum, a day-long workshop offered by the Newman Library at Baruch College CUNY that introduces participants to geographic information systems (GIS) using the open source software QGIS. The practicum introduces GIS as a concept for envisioning information and as a tool for conducting geographic analyses and creating maps. Participants learn how to navigate a GIS interface, how to prepare layers and conduct a basic geographic analysis, and how to create thematic maps. This tutorial was written using QGIS version 2.18 "Las Palmas", a cross-platform (Windows, Mac, Linux) desktop GIS software package.


Tumor Necrosis Factor Dynamically Regulates The Mrna Stabilome In Rheumatoid Arthritis Fibroblast-Like Synoviocytes, Konstantinos Loupasakis, David Kuo, Upneet K. Sokhi, Christopher Sohn, Bethany Syracuse, Eugenia G. Giannopoulou, Sung Ho Park, Hyelim Kang, Gunnar Rätsch, Lionel B. Ivashkiv, George D. Kalliolias Jul 2017

Tumor Necrosis Factor Dynamically Regulates The Mrna Stabilome In Rheumatoid Arthritis Fibroblast-Like Synoviocytes, Konstantinos Loupasakis, David Kuo, Upneet K. Sokhi, Christopher Sohn, Bethany Syracuse, Eugenia G. Giannopoulou, Sung Ho Park, Hyelim Kang, Gunnar Rätsch, Lionel B. Ivashkiv, George D. Kalliolias

Publications and Research

During rheumatoid arthritis (RA), Tumor Necrosis Factor (TNF) activates fibroblast-like synoviocytes (FLS) inducing in a temporal order a constellation of genes, which perpetuate synovial inflammation. Although the molecular mechanisms regulating TNF-induced transcription are well characterized, little is known about the impact of mRNA stability on gene expression and the impact of TNF on decay rates of mRNA transcripts in FLS. To address these issues we performed RNA sequencing and genome-wide analysis of the mRNA stabilome in RA FLS. We found that TNF induces a biphasic gene expression program: initially, the inducible transcriptome consists primarily of unstable transcripts but progressively switches …


Insights Into The Binding Mode Of Mek Type-Iii Inhibitors. A Step Towards Discovering And Designing Allosteric Kinase Inhibitors Across The Human Kinome, Zheng Zhao, Lei Xie, Philip E. Bourne Jun 2017

Insights Into The Binding Mode Of Mek Type-Iii Inhibitors. A Step Towards Discovering And Designing Allosteric Kinase Inhibitors Across The Human Kinome, Zheng Zhao, Lei Xie, Philip E. Bourne

Publications and Research

Protein kinases are critical drug targets for treating a large variety of human diseases. Type- III kinase inhibitors have attracted increasing attention as highly selective therapeutics. Thus, understanding the binding mechanism of existing type-III kinase inhibitors provides useful insights into designing new type-III kinase inhibitors. In this work, we have systematically studied the binding mode of MEK-targeted type-III inhibitors using structural systems pharmacology and molecular dynamics simulation. Our studies provide detailed sequence, structure, interaction-fingerprint, pharmacophore and binding-site information on the binding characteristics of MEK type-III kinase inhibitors. We hypothesize that the helix-folding activation loop is a hallmark allosteric binding site …


Sliding Window Based Feature Extraction And Traffic Clustering For Green Mobile Cyberphysical Systems, Jiao Zhang, Li Zhou, Angran Xiao, Sai Zeng, Haitao Zhao, Jibo Wei May 2017

Sliding Window Based Feature Extraction And Traffic Clustering For Green Mobile Cyberphysical Systems, Jiao Zhang, Li Zhou, Angran Xiao, Sai Zeng, Haitao Zhao, Jibo Wei

Publications and Research

Both the densification of small base stations and the diversity of user activities bring huge challenges for today’s heterogeneous networks, either heavy burdens on base stations or serious energy waste. In order to ensure coverage of the network while reducing the total energy consumption, we adopt a green mobile cyberphysical system (MCPS) to handle this problem. In this paper, we propose a feature extractionmethod using sliding window to extract the distribution feature of mobile user equipment (UE), and a case study is presented to demonstrate that the method is efficacious in reserving the clustering distribution feature. Furthermore, we present traffic …


Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara May 2017

Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara

Publications and Research

Java 8 default methods, which allow interfaces to contain (instance) method implementations, are useful for the skeletal implementation software design pattern. However, it is not easy to transform existing software to exploit default methods as it requires analyzing complex type hierarchies, resolving multiple implementation inheritance issues, reconciling differences between class and interface methods, and analyzing tie-breakers (dispatch precedence) with overriding class methods to preserve type-correctness and confirm semantics preservation. In this paper, we present an efficient, fully-automated, type constraint-based refactoring approach that assists developers in taking advantage of enhanced interfaces for their legacy Java software. The approach features an extensive …


Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara May 2017

Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara

Publications and Research

Java 8 introduces enhanced interfaces, allowing for default (instance) methods that implementers will inherit if none are provided [3]. Default methods can be used [2] as a replacement of the skeletal implementation pattern [1], which creates abstract skeletal implementation classes that implementers extend. Migrating legacy code using the skeletal implementation pattern to instead use default methods can require significant manual effort due to subtle language and semantic restrictions. It requires preserving typecorrectness by analyzing complex type hierarchies, resolving issues arising from multiple inheritance, reconciling differences between class and interface methods, and ensuring tie-breakers with overriding class methods do not alter …


Toward Measuring Network Aesthetics Based On Symmetry, Zengqiang Chen, Matthias Dehmer, Frank Emmert-Streib, Abbe Mowshowitz, Yongtang Shi May 2017

Toward Measuring Network Aesthetics Based On Symmetry, Zengqiang Chen, Matthias Dehmer, Frank Emmert-Streib, Abbe Mowshowitz, Yongtang Shi

Publications and Research

In this exploratory paper, we discuss quantitative graph-theoretical measures of network aesthetics. Related work in this area has typically focused on geometrical features (e.g., line crossings or edge bendiness) of drawings or visual representations of graphs which purportedly affect an observer’s perception. Here we take a very different approach, abandoning reliance on geometrical properties, and apply information-theoretic measures to abstract graphs and networks directly (rather than to their visual representaions) as a means of capturing classical appreciation of structural symmetry. Examples are used solely to motivate the approach to measurement, and to elucidate our symmetry-based mathematical theory of network aesthetics.


Comparing Tensorflow Deep Learning Performance Using Cpus, Gpus, Local Pcs And Cloud, John Lawrence, Jonas Malmsten, Andrey Rybka, Daniel A. Sabol, Ken Triplin May 2017

Comparing Tensorflow Deep Learning Performance Using Cpus, Gpus, Local Pcs And Cloud, John Lawrence, Jonas Malmsten, Andrey Rybka, Daniel A. Sabol, Ken Triplin

Publications and Research

Deep learning is a very computational intensive task. Traditionally GPUs have been used to speed-up computations by several orders of magnitude. TensorFlow is a deep learning framework designed to improve performance further by running on multiple nodes in a distributed system. While TensorFlow has only been available for a little over a year, it has quickly become the most popular open source machine learning project on GitHub. The open source version of TensorFlow was originally only capable of running on a single node while Google’s proprietary version only was capable of leveraging distributed systems. This has now changed. In this …


Monitoring The Dark Web And Securing Onion Services, John Schriner Apr 2017

Monitoring The Dark Web And Securing Onion Services, John Schriner

Publications and Research

This paper focuses on how researchers monitor the Dark Web. After defining what onion services and Tor are, we discuss tools for monitoring and securing onion services. As Tor Project itself is research-driven, we find that the development and use of these tools help us to project where use of the Dark Web is headed.


Cst1101–Problem Solving With Computer Programming, Syllabus, Elena Filatova Apr 2017

Cst1101–Problem Solving With Computer Programming, Syllabus, Elena Filatova

Open Educational Resources

No abstract provided.


Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara Jan 2017

Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara

Publications and Research

Java 8 default methods, which allow interfaces to contain (instance) method implementations, are useful for the skeletal implementation software design pattern. However, it is not easy to transform existing software to exploit default methods as it requires analyzing complex type hierarchies, resolving multiple implementation inheritance issues, reconciling differences between class and interface methods, and analyzing tie-breakers (dispatch precedence) with overriding class methods to preserve type-correctness and confirm semantics preservation. In this paper, we present an efficient, fully-automated, type constraint-based refactoring approach that assists developers in taking advantage of enhanced interfaces for their legacy Java software. The approach features an extensive …


A Novel Approach For Library Materials Acquisition Using Discrete Particle Swarm Optimization, Daniel A. Sabol Jan 2017

A Novel Approach For Library Materials Acquisition Using Discrete Particle Swarm Optimization, Daniel A. Sabol

Publications and Research

The academic library materials acquisition problem is a challenge for librarian, since library cannot get enough funding from universities and the price of materials inflates greatly. In this paper, we analyze an integer mathematical model by considering the selection of acquired materials to maximize the average preference value as well as the budget execution rate under practical restrictions. The objective is to improve the Discrete Particle Swarm Optimization (DPSO) algorithm by adding a Simulate Annealing algorithm to reduce premature convergence. Furthermore, the algorithm is implemented in multiple threaded environment. The experimental results show the efficiency of this approach.


Detecting Broken Pointcuts Using Structural Commonality And Degree Of Interest, Raffi T. Khatchadourian, Awais Rashid, Hidehiko Masuhara, Takuya Watanabe Jan 2017

Detecting Broken Pointcuts Using Structural Commonality And Degree Of Interest, Raffi T. Khatchadourian, Awais Rashid, Hidehiko Masuhara, Takuya Watanabe

Publications and Research

Pointcut fragility is a well-documented problem in Aspect-Oriented Programming; changes to the base-code can lead to join points incorrectly falling in or out of the scope of pointcuts. Deciding which pointcuts have broken due to base-code changes is a daunting venture, especially in large and complex systems. We present an automated approach that recommends pointcuts that are likely to require modification due to a particular base-code change, as well as ones that do not. Our hypothesis is that join points selected by a pointcut exhibit common structural characteristics. Patterns describing such commonality are used to recommend pointcuts that have potentially …


Geodesic Merging, Konstantinos Georgatos Jan 2017

Geodesic Merging, Konstantinos Georgatos

Publications and Research

We pursue an account of merging through the use of geodesic semantics, the semantics based on the length of the shortest path on a graph. This approach has been fruitful in other areas of belief change such as revision and update. To this end, we introduce three binary merging operators of propositions defined on the graph of their valuations and we characterize them with a finite set of postulates. We also consider a revision operator defined in the extended language of pairs of propositions. This extension allows us to express all merging operators through the set of revision postulates.