Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 30

Full-Text Articles in Physical Sciences and Mathematics

Computational Thinking For Teachers, Susan Imberman Dec 2021

Computational Thinking For Teachers, Susan Imberman

Open Educational Resources

This is a syllabus for a course in computational thinking. The course described introduces preservice and inservice teachers to the fundamental concepts of computer science, including web design, coding, ethics, computational thinking, course resources, etc.


Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii Dec 2021

Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii

Publications and Research

The spaces we live in go through many transformations over the course of a year, a month, or a day; My room has seen tremendous clutter and pristine order within the span of a few hours. My goal is to discover patterns within my space and formulate an understanding of the changes that occur. This insight will provide actionable direction for maintaining a cleaner environment, as well as provide some information about the optimal times for productivity and energy preservation.

Using a Raspberry Pi, I will set up automated image capture in a room in my home. These images will …


Treatment Selection Using Prototyping In Latent-Space With Application To Depression Treatment, Akiva Kleinerman, Ariel Rosenfeld, David Benrimoh, Robert Fratila, Caitrin Armstrong, Joseph Mehltretter, Eliyahu Shneider, Amit Yaniv-Rosenfeld, Jordan Karp, Charles F. Reynolds, Gustavo Turecki, Adam Kapelner Nov 2021

Treatment Selection Using Prototyping In Latent-Space With Application To Depression Treatment, Akiva Kleinerman, Ariel Rosenfeld, David Benrimoh, Robert Fratila, Caitrin Armstrong, Joseph Mehltretter, Eliyahu Shneider, Amit Yaniv-Rosenfeld, Jordan Karp, Charles F. Reynolds, Gustavo Turecki, Adam Kapelner

Publications and Research

Machine-assisted treatment selection commonly follows one of two paradigms: a fully personalized paradigm which ignores any possible clustering of patients; or a sub-grouping paradigm which ignores personal differences within the identified groups. While both paradigms have shown promising results, each of them suffers from important limitations. In this article, we propose a novel deep learning-based treatment selection approach that is shown to strike a balance between the two paradigms using latent-space prototyping. Our approach is specifically tailored for domains in which effective prototypes and sub-groups of patients are assumed to exist, but groupings relevant to the training objective are not …


(2021 Revision) Chapter 6: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana Oct 2021

(2021 Revision) Chapter 6: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana

Open Educational Resources

No abstract provided.


(2021 Revision) Chapter 7: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana Oct 2021

(2021 Revision) Chapter 7: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana

Open Educational Resources

No abstract provided.


Introduction To Discrete Mathematics: An Oer For Ma-471, Mathieu Sassolas Oct 2021

Introduction To Discrete Mathematics: An Oer For Ma-471, Mathieu Sassolas

Open Educational Resources

The first objective of this book is to define and discuss the meaning of truth in mathematics. We explore logics, both propositional and first-order , and the construction of proofs, both formally and human-targeted. Using the proof tools, this book then explores some very fundamental definitions of mathematics through set theory. This theory is then put in practice in several applications. The particular (but quite widespread) case of equivalence and order relations is studied with detail. Then we introduces sequences and proofs by induction, followed by number theory. Finally, a small introduction to combinatorics is …


(2021 Revision) Chapter 2: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana Oct 2021

(2021 Revision) Chapter 2: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana

Open Educational Resources

No abstract provided.


(2021 Revision) Chapter 1: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana Oct 2021

(2021 Revision) Chapter 1: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana

Open Educational Resources

No abstract provided.


(2021 Revision) Chapter 3: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana Oct 2021

(2021 Revision) Chapter 3: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana

Open Educational Resources

No abstract provided.


(2021 Revision) Chapter 4: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana Oct 2021

(2021 Revision) Chapter 4: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana

Open Educational Resources

No abstract provided.


(2021 Revision) Chapter 5: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana Oct 2021

(2021 Revision) Chapter 5: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana

Open Educational Resources

No abstract provided.


Appendix: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana Oct 2021

Appendix: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana

Open Educational Resources

No abstract provided.


Cis 440 Unix, George A. Nossa Oct 2021

Cis 440 Unix, George A. Nossa

Open Educational Resources

This document is a topical outline of the CIS 440 UNIX Course. This course is mostly based on lab assignments that are performed by students using their home computers (desktops or laptops). The home computers are configured as virtual machines by installing the Oracle Virtual Box Version 6.12 The Ubuntu Desktop Operating System (version 20.04) is then installed on these virtual machines, which are then used to run the course labs. The first Unit of the syllabus covers the virtual machine configuration for the lab environment and subsequent Units are a topical outline of the course. The detailed content is …


Teaching Machine Learning For The Physical Sciences: A Summary Of Lessons Learned And Challenges, Viviana Acquaviva Aug 2021

Teaching Machine Learning For The Physical Sciences: A Summary Of Lessons Learned And Challenges, Viviana Acquaviva

Publications and Research

This paper summarizes some challenges encountered and best practices established in several years of teaching Machine Learning for the Physical Sciences at the undergraduate and graduate level. I discuss motivations for teaching ML to physicists, desirable properties of pedagogical materials, such as accessibility, relevance, and likeness to real-world research problems, and give examples of components of teaching units.


An Adaptive Cryptosystem On A Finite Field, Awnon Bhowmik, Unnikrishnan Menon Aug 2021

An Adaptive Cryptosystem On A Finite Field, Awnon Bhowmik, Unnikrishnan Menon

Publications and Research

Owing to mathematical theory and computational power evolution, modern cryptosystems demand ingenious trapdoor functions as their foundation to extend the gap between an enthusiastic interceptor and sensitive information. This paper introduces an adaptive block encryption scheme. This system is based on product, exponent, and modulo operation on a finite field. At the heart of this algorithm lies an innovative and robust trapdoor function that operates in the Galois Field and is responsible for the superior speed and security offered by it. Prime number theorem plays a fundamental role in this system, to keep unwelcome adversaries at bay. This is a …


On Communication For Distributed Babai Point Computation, Maiara F. Bollauf, Vinay A. Vaishampayan, Sueli I.R. Costa Jul 2021

On Communication For Distributed Babai Point Computation, Maiara F. Bollauf, Vinay A. Vaishampayan, Sueli I.R. Costa

Publications and Research

We present a communication-efficient distributed protocol for computing the Babai point, an approximate nearest point for a random vector X∈Rn in a given lattice. We show that the protocol is optimal in the sense that it minimizes the sum rate when the components of X are mutually independent. We then investigate the error probability, i.e. the probability that the Babai point does not coincide with the nearest lattice point, motivated by the fact that for some cases, a distributed algorithm for finding the Babai point is sufficient for finding the nearest lattice point itself. Two different probability models for X …


Graph-Theoretic Partitioning Of Rnas And Classification Of Pseudoknots-Ii, Louis Petingi Jul 2021

Graph-Theoretic Partitioning Of Rnas And Classification Of Pseudoknots-Ii, Louis Petingi

Publications and Research

Dual graphs have been applied to model RNA secondary structures with pseudoknots, or intertwined base pairs. In previous works, a linear-time algorithm was introduced to partition dual graphs into maximally connected components called blocks and determine whether each block contains a pseudoknot or not. As pseudoknots can not be contained into two different blocks, this characterization allow us to efficiently isolate smaller RNA fragments and classify them as pseudoknotted or pseudoknot-free regions, while keeping these sub-structures intact. Moreover we have extended the partitioning algorithm by classifying a pseudoknot as either recursive or non-recursive in order to continue with our research …


Decoding Clinical Biomarker Space Of Covid-19: Exploring Matrix Factorization-Based Feature Selection Methods, Farshad Saberi-Movahed, Mahyar Mohammadifard, Adel Mehrpooya, Mohammad Rezaei-Ravari, Kamal Berahmand, Mehrdad Rostami, Saeed Karami, Mohammad Najafzadeh, Davood Hajinezhad, Mina Jamshidi, Farshid Abedi, Mahtab Mohammadifard, Elnaz Farbod, Farinaz Safavi, Mohammadreza Dorvash, Shahrzad Vahedi, Mahdi Eftekhari, Farid Saberi-Movahed, Iman Tavassoly Jul 2021

Decoding Clinical Biomarker Space Of Covid-19: Exploring Matrix Factorization-Based Feature Selection Methods, Farshad Saberi-Movahed, Mahyar Mohammadifard, Adel Mehrpooya, Mohammad Rezaei-Ravari, Kamal Berahmand, Mehrdad Rostami, Saeed Karami, Mohammad Najafzadeh, Davood Hajinezhad, Mina Jamshidi, Farshid Abedi, Mahtab Mohammadifard, Elnaz Farbod, Farinaz Safavi, Mohammadreza Dorvash, Shahrzad Vahedi, Mahdi Eftekhari, Farid Saberi-Movahed, Iman Tavassoly

Publications and Research

One of the most critical challenges in managing complex diseases like COVID-19 is to establish an intelligent triage system that can optimize the clinical decision-making at the time of a global pandemic. The clinical presentation and patients’ characteristics are usually utilized to identify those patients who need more critical care. However, the clinical evidence shows an unmet need to determine more accurate and optimal clinical biomarkers to triage patients under a condition like the COVID-19 crisis. Here we have presented a machine learning approach to find a group of clinical indicators from the blood tests of a set of COVID-19 …


Covid-19 Multi-Targeted Drug Repurposing Using Few-Shot Learning, Yang Liu, You Wu, Xiaoke Shen, Lei Xie Jun 2021

Covid-19 Multi-Targeted Drug Repurposing Using Few-Shot Learning, Yang Liu, You Wu, Xiaoke Shen, Lei Xie

Publications and Research

The life-threatening disease COVID-19 has inspired significant efforts to discover novel therapeutic agents through repurposing of existing drugs. Although multi-targeted (polypharmacological) therapies are recognized as the most efficient approach to system diseases such as COVID-19, computational multi-targeted compound screening has been limited by the scarcity of high-quality experimental data and difficulties in extracting information from molecules. This study introduces MolGNN , a new deep learning model for molecular property prediction. MolGNN applies a graph neural network to computational learning of chemical molecule embedding. Comparing to state-of-the-art approaches heavily relying on labeled experimental data, our method achieves equivalent or superior prediction …


The “Knapsack Problem” Workbook: An Exploration Of Topics In Computer Science, Steven Cosares Jun 2021

The “Knapsack Problem” Workbook: An Exploration Of Topics In Computer Science, Steven Cosares

Open Educational Resources

This workbook provides discussions, programming assignments, projects, and class exercises revolving around the “Knapsack Problem” (KP), which is widely a recognized model that is taught within a typical Computer Science curriculum. Throughout these discussions, we use KP to introduce or review topics found in courses covering topics in Discrete Mathematics, Mathematical Programming, Data Structures, Algorithms, Computational Complexity, etc. Because of the broad range of subjects discussed, this workbook and the accompanying spreadsheet files might be used as part of some CS capstone experience. Otherwise, we recommend that individual sections be used, as needed, for exercises relevant to a course in …


An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja May 2021

An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja

Publications and Research

Machine Learning (ML), including Deep Learning (DL), systems, i.e., those with ML capabilities, are pervasive in today’s data-driven society. Such systems are complex; they are comprised of ML models and many subsystems that support learning processes. As with other complex systems, ML systems are prone to classic technical debt issues, especially when such systems are long-lived, but they also exhibit debt specific to these systems. Unfortunately, there is a gap in knowledge of how ML systems evolve and are maintained. In this paper, we fill this gap by studying refactorings, i.e., source-to-source semantics-preserving program transformations, performed in real-world, open-source software, …


An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja May 2021

An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja

Publications and Research

Machine Learning (ML), including Deep Learning (DL), systems, i.e., those with ML capabilities, are pervasive in today’s data-driven society. Such systems are complex; they are comprised of ML models and many subsystems that support learning processes. As with other complex systems, ML systems are prone to classic technical debt issues, especially when such systems are long-lived, but they also exhibit debt specific to these systems. Unfortunately, there is a gap of knowledge in how ML systems actually evolve and are maintained. In this paper, we fill this gap by studying refactorings, i.e., source-to-source semantics-preserving program transformations, performed in real-world, open-source …


Shedding Light On Dark Patterns: A Case Study On Digital Harms, Noreen Y. Whysel Apr 2021

Shedding Light On Dark Patterns: A Case Study On Digital Harms, Noreen Y. Whysel

Publications and Research

You’ve been there before. You thought you could trust someone with a secret. You thought it would be safe, but found out later that they blabbed to everyone. Or maybe they didn’t share it, but the way they used it felt manipulative. You gave more than you got and it didn’t feel fair. But now that it’s out there, do you even have control anymore?

Ok. Now imagine that person was your supermarket. Or your bank. Or your boss.

As designers of digital spaces for consumer products and services, how often do we consider the relationship we have with our …


Automated Evolution Of Feature Logging Statement Levels Using Git Histories And Degree Of Interest, Yiming Tang, Allan Spektor, Raffi Khatchadourian, Mehdi Bagherzadeh Apr 2021

Automated Evolution Of Feature Logging Statement Levels Using Git Histories And Degree Of Interest, Yiming Tang, Allan Spektor, Raffi Khatchadourian, Mehdi Bagherzadeh

Publications and Research

Logging—used for system events and security breaches to more informational yet essential aspects of software features—is pervasive. Given the high transactionality of today’s software, logging effectiveness can be reduced by information overload. Log levels help alleviate this problem by correlating a priority to logs that can be later filtered. As software evolves, however, levels of logs documenting surrounding feature implementations may also require modification as features once deemed important may have decreased in urgency and vice-versa. We present an automated approach that assists developers in evolving levels of such (feature) logs. The approach, based on mining Git histories and manipulating …


Survey On Quantum Circuit Compilation For Noisy Intermediate-Scale Quantum Computers: Artificial Intelligence To Heuristics, Janusz Kusyk, Samah Mohamed Saeed, Muharrem Umit Uyar Mar 2021

Survey On Quantum Circuit Compilation For Noisy Intermediate-Scale Quantum Computers: Artificial Intelligence To Heuristics, Janusz Kusyk, Samah Mohamed Saeed, Muharrem Umit Uyar

Publications and Research

Computationally expensive applications, including machine learning, chemical simulations, and financial modeling, are promising candidates for noisy intermediate scale quantum (NISQ) computers. In these problems, one important challenge is mapping a quantum circuit onto NISQ hardware while satisfying physical constraints of an underlying quantum architecture. Quantum circuit compilation (QCC) aims to generate feasible mappings such that a quantum circuit can be executed in a given hardware platform with acceptable confidence in outcomes. Physical constraints of a NISQ computer change frequently, requiring QCC process to be repeated often. When a circuit cannot directly be executed on a quantum hardware due to its …


Introduction To Computers And Programming Using Python: A Project-Based Approach, Esma Yildirim, Daniel Garbin, Mathieu Sassolas, Kwang Hyun Kim Jan 2021

Introduction To Computers And Programming Using Python: A Project-Based Approach, Esma Yildirim, Daniel Garbin, Mathieu Sassolas, Kwang Hyun Kim

Open Educational Resources

Welcome to the “Introduction to Computers and Programming using Python: A Project-based Approach”. This book is designed to teach basic programming skills to students who are new to the field of computing using a project-based learning approach. It has been designed to give freedom to the instructor, both in format and topics ultimately used throughout the course. While we provide 13 turnkey projects, it is only expected that 3 or 4 are used over the course of a semester, and all projects are provided both as textual instructions (the student version of this OER) and Jupyter Notebooks (one with and …


Create A New Login Authentication And User Authorization Using Ms Sql Server, Safet Jahaj Jan 2021

Create A New Login Authentication And User Authorization Using Ms Sql Server, Safet Jahaj

Open Educational Resources

The document describes the steps on creating a new login authentication using the mixed mode, and adding user authorizations.


Public Interest Technology – Exploring Covid-19 Health Data, Sarah Zelikovitz Jan 2021

Public Interest Technology – Exploring Covid-19 Health Data, Sarah Zelikovitz

Open Educational Resources

This module is part of a Introduction to Data Science course that covers the different parts of the data science process: data acquisition, cleaning, exploratory data analysis, and modeling. The COVID-19 pandemic has created much interest in public health data, as well as interest in visualization of all types of data. Public health data has a set of challenges that is unique to health data, with HIPAA laws, and real time collection of data. With COVID-19, the challenges are particularly amplified, as data collection and statistics collected are constantly changing in response to feedback from labs, hospitals, drug companies, and …


Discrete Mathematical Structures, Tugce Ozdemir Jan 2021

Discrete Mathematical Structures, Tugce Ozdemir

Open Educational Resources

No abstract provided.


Distributed Cross-Community Collaboration For The Cloud-Based Energy Management Service, Yu-Wen Chen, J. Morris Chang Jan 2021

Distributed Cross-Community Collaboration For The Cloud-Based Energy Management Service, Yu-Wen Chen, J. Morris Chang

Publications and Research

Customers’ participation is a critical factor for inte-grating the distributed energy resources via demand response and demand-side management programs, especially when customers become prosumers. Incentives need to be delivered by the energy management service to attract prosumers to operate their distributed energy resources and electricity loads grid-friendly actively. The cloud-based energy management service enables virtual trading for customers within the same community to minimize cost and smooth the fluctuation. With the potential fast-growing number of service providers and customers, the needs exist for efficiently collaborating across multiple service providers and customers. This paper proposes the distributed cross-community collaboration (XCC) for …