Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Physical Sciences and Mathematics

Demonstration Of Visible And Near Infrared Raman Spectrometers And Improved Matched Filter Model For Analysis Of Combined Raman Signals, Alexander Matthew Atkinson Oct 2019

Demonstration Of Visible And Near Infrared Raman Spectrometers And Improved Matched Filter Model For Analysis Of Combined Raman Signals, Alexander Matthew Atkinson

Electrical & Computer Engineering Theses & Dissertations

Raman spectroscopy is a powerful analysis technique that has found applications in fields such as analytical chemistry, planetary sciences, and medical diagnostics. Recent studies have shown that analysis of Raman spectral profiles can be greatly assisted by use of computational models with achievements including high accuracy pure sample classification with imbalanced data sets and detection of ideal sample deviations for pharmaceutical quality control. The adoption of automated methods is a necessary step in streamlining the analysis process as Raman hardware becomes more advanced. Due to limits in the architectures of current machine learning based Raman classification models, transfer from pure …


Computational Analysis Of Antipode Algorithms For The Output Feedback Hopf Algebra, Lance Berlin Oct 2019

Computational Analysis Of Antipode Algorithms For The Output Feedback Hopf Algebra, Lance Berlin

Electrical & Computer Engineering Theses & Dissertations

The feedback interconnection of two systems written in terms of Chen-Fliess series can be described explicitly in terms of the antipode of the output feedback Hopf algebra. At present, there are three known computational approaches to calculating this antipode: the left coproduct method, the right coproduct method, and the derivation method. Each of these algorithms is defined recursively, and thus becomes computationally expensive quite quickly. This motivates the need for a more complete understanding of the algorithmic complexity of these methods, as well as the development of new approaches for determining the Hopf algebra antipode. The main goals of this …


Communication Capability For A Simulation-Based Test And Evaluation Framework For Autonomous Systems, Ntiana Sakioti Oct 2019

Communication Capability For A Simulation-Based Test And Evaluation Framework For Autonomous Systems, Ntiana Sakioti

Computational Modeling & Simulation Engineering Theses & Dissertations

The design and testing process for collaborative autonomous systems can be extremely complex and time-consuming, so it is advantageous to begin testing early in the design. A Test & Evaluation (T&E) Framework was previously developed to enable the testing of autonomous software at various levels of mixed reality. The Framework assumes a modular approach to autonomous software development, which introduces the possibility that components are not in the same stage of development. The T&E Framework allows testing to begin early in a simulated environment, with the autonomous software methodically migrating from virtual to augmented to physical environments as component development …


Using Feature Extraction From Deep Convolutional Neural Networks For Pathological Image Analysis And Its Visual Interpretability, Wei-Wen Hsu Jul 2019

Using Feature Extraction From Deep Convolutional Neural Networks For Pathological Image Analysis And Its Visual Interpretability, Wei-Wen Hsu

Electrical & Computer Engineering Theses & Dissertations

This dissertation presents a computer-aided diagnosis (CAD) system using deep learning approaches for lesion detection and classification on whole-slide images (WSIs) with breast cancer. The deep features being distinguishing in classification from the convolutional neural networks (CNN) are demonstrated in this study to provide comprehensive interpretability for the proposed CAD system using the domain knowledge in pathology. In the experiment, a total of 186 slides of WSIs were collected and classified into three categories: Non-Carcinoma, Ductal Carcinoma in Situ (DCIS), and Invasive Ductal Carcinoma (IDC). Instead of conducting pixel-wise classification (segmentation) into three classes directly, a hierarchical framework with the …


Scalable Parallel Delaunay Image-To-Mesh Conversion For Shared And Distributed Memory Architectures, Daming Feng Jul 2019

Scalable Parallel Delaunay Image-To-Mesh Conversion For Shared And Distributed Memory Architectures, Daming Feng

Computer Science Theses & Dissertations

Mesh generation is an essential component for many engineering applications. The ability to generate meshes in parallel is critical for the scalability of the entire Finite Element Method (FEM) pipeline. However, parallel mesh generation applications belong to the broader class of adaptive and irregular problems, and are among the most complex, challenging, and labor intensive to develop and maintain. In this thesis, we summarize several years of the progress that we made in a novel framework for highly scalable and guaranteed quality mesh generation for finite element analysis in three dimensions. We studied and developed parallel mesh generation algorithms on …


Early Information Access To Alleviate Emergency Department Congestion, Anjee Gorkhali Jul 2019

Early Information Access To Alleviate Emergency Department Congestion, Anjee Gorkhali

Theses and Dissertations in Business Administration

Alleviating Emergency Department (ED) congestion results in shorter hospital stay which not only reduces the cost of medical procedure but also increase the hospital performance. Length of patient stay is used to determine the hospital performance. Organization Information Processing (OIPT) Theory is used to explain the impact of information access and availability on the information processing need and ability of a hospital. Technical devices such as RFID that works as “Auto Identification tags” is suggested to increase the information availability as well as the information processing capability of the hospitals. This study suggests that the OIPT needs to be further …


Novel Use Of Neural Networks To Identify And Detect Electrical Infrastructure Performance, Evan Pierre Savaria Jul 2019

Novel Use Of Neural Networks To Identify And Detect Electrical Infrastructure Performance, Evan Pierre Savaria

Computer Science Theses & Dissertations

Electrical grid maintenance and repairs are crucial services that keep America’s lights on. Electrical service providers make it their priority to uphold minimal interruptions to this service. Electricity is essential for modern technology within the home, such as cooking, refrigeration, and hot water. Organizations, such as schools, hospitals, and military bases, cannot properly function or operate without power. When analyzing the current electrical infrastructure, it is evident that considerable components of the power grid are aging and in need of replacement. Additionally, threats and damage continue to occur. These damages occur not only due to simple, single power line failure …


Developing Algorithms To Detect Incidents On Freeways From Loop Detector And Vehicle Re-Identification Data, Biraj Adhikari Jul 2019

Developing Algorithms To Detect Incidents On Freeways From Loop Detector And Vehicle Re-Identification Data, Biraj Adhikari

Civil & Environmental Engineering Theses & Dissertations

A new approach for testing incident detection algorithms has been developed and is presented in this thesis. Two new algorithms were developed and tested taking California #7, which is the most widely used algorithm to date, and SVM (Support Vector Machine), which is considered one of the best performing classifiers, as the baseline for comparisons. Algorithm #B in this study uses data from Vehicle Re-Identification whereas the other three algorithms (California #7, SVM and Algorithm #A) use data from a double loop detector for detection of an incident. A microscopic traffic simulator is used for modeling three types of incident …


Success Factors Impacting Artificial Intelligence Adoption --- Perspective From The Telecom Industry In China, Hong Chen Jul 2019

Success Factors Impacting Artificial Intelligence Adoption --- Perspective From The Telecom Industry In China, Hong Chen

Theses and Dissertations in Business Administration

As the core driving force of the new round of informatization development and the industrial revolution, the disruptive achievements of artificial intelligence (AI) are rapidly and comprehensively infiltrating into various fields of human activities. Although technologies and applications of AI have been widely studied, and factors that affect AI adoption are identified in existing literature, the impact of success factors on AI adoption remains unknown. Accordingly, the main study of this paper proposes a framework to explore the effects of success factors on AI adoption by integrating the technology, organization, and environment (TOE) framework and diffusion of innovation (DOI) theory. …


Aggregating Private And Public Web Archives Using The Mementity Framework, Matthew R. Kelly Jul 2019

Aggregating Private And Public Web Archives Using The Mementity Framework, Matthew R. Kelly

Computer Science Theses & Dissertations

Web archives preserve the live Web for posterity, but the content on the Web one cares about may not be preserved. The ability to access this content in the future requires the assurance that those sites will continue to exist on the Web until the content is requested and that the content will remain accessible. It is ultimately the responsibility of the individual to preserve this content, but attempting to replay personally preserved pages segregates archived pages by individuals and organizations of personal, private, and public Web content. This is misrepresentative of the Web as it was. While the Memento …


Development And Initial Evaluation Of A Reinforced Cue Detection Model To Assess Situation Awareness In Commercial Aircraft Cockpits, Aysen K. Taylor Apr 2019

Development And Initial Evaluation Of A Reinforced Cue Detection Model To Assess Situation Awareness In Commercial Aircraft Cockpits, Aysen K. Taylor

Engineering Management & Systems Engineering Theses & Dissertations

Commercial transport aircraft of today vary greatly from early aircraft with regards to how the aircraft are controlled and the feedback provided from the machine to the human operator. Over time, as avionics systems became more automated, pilots had less direct control over their aircraft. Much research exists in the literature about automation issues, and several major accidents over the last twenty years spurred interest about how to maintain the benefits of automation while improving the overall human-machine interaction as the pilot is considered the last line of defense.

An important reason for maintaining or even improving overall pilot situation …


Expanding The Usage Of Web Archives By Recommending Archived Webpages Using Only The Uri, Lulwah M. Alkwai Apr 2019

Expanding The Usage Of Web Archives By Recommending Archived Webpages Using Only The Uri, Lulwah M. Alkwai

Computer Science Theses & Dissertations

Web archives are a window to view past versions of webpages. When a user requests a webpage on the live Web, such as http://tripadvisor.com/where_to_t ravel/, the webpage may not be found, which results in an HyperText Transfer Protocol (HTTP) 404 response. The user then may search for the webpage in a Web archive, such as the Internet Archive. Unfortunately, if this page had never been archived, the user will not be able to view the page, nor will the user gain any information on other webpages that have similar content in the archive, such as the archived webpage http://classy-travel.net. Similarly, …


Highly Accurate Fragment Library For Protein Fold Recognition, Wessam Elhefnawy Apr 2019

Highly Accurate Fragment Library For Protein Fold Recognition, Wessam Elhefnawy

Computer Science Theses & Dissertations

Proteins play a crucial role in living organisms as they perform many vital tasks in every living cell. Knowledge of protein folding has a deep impact on understanding the heterogeneity and molecular functions of proteins. Such information leads to crucial advances in drug design and disease understanding. Fold recognition is a key step in the protein structure discovery process, especially when traditional computational methods fail to yield convincing structural homologies. In this work, we present a new protein fold recognition approach using machine learning and data mining methodologies.

First, we identify a protein structural fragment library (Frag-K) composed of a …


The Messy Nuclear Landscape: Using Fuzzy Cognitive Mapping To Explore Plausible Nuclear Disarmament Scenarios, Ryan M. Nixon Apr 2019

The Messy Nuclear Landscape: Using Fuzzy Cognitive Mapping To Explore Plausible Nuclear Disarmament Scenarios, Ryan M. Nixon

Graduate Program in International Studies Theses & Dissertations

Nuclear weapons are seemingly permanent fixtures in international relations. Although nuclear abolitionists and actors within the Nonproliferation Treaty (NPT) and the International Atomic Energy Agency (IAEA) have taken significant steps towards designing a world without nuclear weapons, the longstanding realist logic that suggests nuclear disarmament is nonviable has born more fruit. On the other hand, some proponents of realism have suggested global nuclear disarmament is feasible, given that certain international instabilities are stabilized and that special care is taken during diplomatic negotiations. This presents an opportunity to test these predictions using fuzzy cognitive mapping, a computational modeling technique that identifies …


A Framework For Test & Evaluation Of Autonomous Systems Along The Virtuality-Reality Spectrum, Nathan D. Gonda Apr 2019

A Framework For Test & Evaluation Of Autonomous Systems Along The Virtuality-Reality Spectrum, Nathan D. Gonda

Computational Modeling & Simulation Engineering Theses & Dissertations

Test & Evaluation of autonomous vehicles presents a challenge as the vehicles may have emergent behavior and it is frequently difficult to ascertain the reason for software decisions. Current Test & Evaluation approaches for autonomous systems place the vehicles in various operating scenarios to observe their behavior. However, this introduces dependencies between design and development lifecycle of the autonomous software and physical vehicle hardware. Simulation-based testing can alleviate the necessity to have physical hardware; however, it can be costly when transitioning the autonomous software to and from a simulation testing environment. The objective of this thesis is to develop a …


A Data-Driven Approach For Modeling Agents, Hamdi Kavak Apr 2019

A Data-Driven Approach For Modeling Agents, Hamdi Kavak

Computational Modeling & Simulation Engineering Theses & Dissertations

Agents are commonly created on a set of simple rules driven by theories, hypotheses, and assumptions. Such modeling premise has limited use of real-world data and is challenged when modeling real-world systems due to the lack of empirical grounding. Simultaneously, the last decade has witnessed the production and availability of large-scale data from various sensors that carry behavioral signals. These data sources have the potential to change the way we create agent-based models; from simple rules to driven by data. Despite this opportunity, the literature has neglected to offer a modeling approach to generate granular agent behaviors from data, creating …


Variable Speed Limit Control At Sag Curves Through Connected Vehicles: Implications Of Alternative Communications And Sensing Technologies, Reza Vatani Nezafat Apr 2019

Variable Speed Limit Control At Sag Curves Through Connected Vehicles: Implications Of Alternative Communications And Sensing Technologies, Reza Vatani Nezafat

Civil & Environmental Engineering Theses & Dissertations

Connected vehicles (CVs) will enable new applications to improve traffic flow. This study’s focus is to investigate how potential implementation of variable speed limit (VSL) through different types of communication and sensing technologies on CVs may improve traffic flow at a sag curve. At sag curves, the gradient changes from negative to positive values which causes a reduction in the roadway capacity and congestion. A VSL algorithm is developed and implemented in a simulation environment for controlling the inflow of vehicles to a sag curve on a freeway to minimize delays and increase throughput. Both vehicle-to-vehicle (V2V) and infrastructure-to-vehicle (I2V) …


Cyber Security- A New Secured Password Generation Algorithm With Graphical Authentication And Alphanumeric Passwords Along With Encryption, Akash Rao Apr 2019

Cyber Security- A New Secured Password Generation Algorithm With Graphical Authentication And Alphanumeric Passwords Along With Encryption, Akash Rao

Electrical & Computer Engineering Theses & Dissertations

Graphical passwords are always considered as an alternative of alphanumeric passwords for their better memorability and usability [1]. Alphanumeric passwords provide an adequate amount of satisfaction, but they do not offer better memorability compared to graphical passwords [1].

On the other hand, graphical passwords are considered less secured and provide better memorability [1]. Therefore many researchers have researched on graphical passwords to overcome the vulnerability. One of the most significant weaknesses of the graphical passwords is "Shoulder Surfing Attack," which means, sneaking into a victim's computer to learn the whole password or part of password or some confidential information. Such …


Enhancing Portability In High Performance Computing: Designing Fast Scientific Code With Longevity, Jason Orender Apr 2019

Enhancing Portability In High Performance Computing: Designing Fast Scientific Code With Longevity, Jason Orender

Computer Science Theses & Dissertations

Portability, an oftentimes sought-after goal in scientific applications, confers a number of possible advantages onto computer code. Portable code will often have greater longevity, enjoy a broader ecosystem, appeal to a wider variety of application developers, and by definition will run on more systems than its pigeonholed counterpart. These advantages come at a cost, however, and a rational approach to balancing costs and benefits requires a systemic evaluation. While the benefits for each application are likely situation-dependent, the costs in terms of resources, including but not limited to time, money, computational power, and memory requirements, are quantifiable. This document will …


Resilience For Asynchronous Iterative Methods For Sparse Linear Systems, Evan Coleman Apr 2019

Resilience For Asynchronous Iterative Methods For Sparse Linear Systems, Evan Coleman

Computational Modeling & Simulation Engineering Theses & Dissertations

Large scale simulations are used in a variety of application areas in science and engineering to help forward the progress of innovation. Many spend the vast majority of their computational time attempting to solve large systems of linear equations; typically arising from discretizations of partial differential equations that are used to mathematically model various phenomena. The algorithms used to solve these problems are typically iterative in nature, and making efficient use of computational time on High Performance Computing (HPC) clusters involves constantly improving these iterative algorithms. Future HPC platforms are expected to encounter three main problem areas: scalability of code, …


Quantifying Impact Of Cyber Actions On Missions Or Business Processes: A Multilayer Propagative Approach, Unal Tatar Apr 2019

Quantifying Impact Of Cyber Actions On Missions Or Business Processes: A Multilayer Propagative Approach, Unal Tatar

Engineering Management & Systems Engineering Theses & Dissertations

Ensuring the security of cyberspace is one of the most significant challenges of the modern world because of its complexity. As the cyber environment is getting more integrated with the real world, the direct impact of cybersecurity problems on actual business frequently occur. Therefore, operational and strategic decision makers in particular need to understand the cyber environment and its potential impact on business. Cyber risk has become a top agenda item for businesses all over the world and is listed as one of the most serious global risks with significant financial implications for businesses.

Risk analysis is one of the …