Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Physical Sciences and Mathematics

Incorporating Word Order Explicitly In Glove Word Embedding, Brandon Cox Dec 2019

Incorporating Word Order Explicitly In Glove Word Embedding, Brandon Cox

Computer Science and Computer Engineering Undergraduate Honors Theses

Word embedding is the process of representing words from a corpus of text as real number vectors. These vectors are often derived from frequency statistics from the source corpus. In the GloVe model as proposed by Pennington et al., these vectors are generated using a word-word cooccurrence matrix. However, the GloVe model fails to explicitly take into account the order in which words appear within the contexts of other words. In this paper, multiple methods of incorporating word order in GloVe word embeddings are proposed. The most successful method involves directly concatenating several word vector matrices for each position in …


Sentiment Analysis, Quantification, And Shift Detection, Kevin Labille Dec 2019

Sentiment Analysis, Quantification, And Shift Detection, Kevin Labille

Graduate Theses and Dissertations

This dissertation focuses on event detection within streams of Tweets based on sentiment quantification. Sentiment quantification extends sentiment analysis, the analysis of the sentiment of individual documents, to analyze the sentiment of an aggregated collection of documents. Although the former has been widely researched, the latter has drawn less attention but offers greater potential to enhance current business intelligence systems. Indeed, knowing the proportion of positive and negative Tweets is much more valuable than knowing which individual Tweets are positive or negative. We also extend our sentiment quantification research to analyze the evolution of sentiment over time to automatically detect …


Extracting Social Network From Literary Prose, Tarana Tasmin Bipasha Dec 2019

Extracting Social Network From Literary Prose, Tarana Tasmin Bipasha

Graduate Theses and Dissertations

This thesis develops an approach to extract social networks from literary prose, namely, Jane Austen’s published novels from eighteenth- and nineteenth- century. Dialogue interaction plays a key role while we derive the networks, thus our technique relies upon our ability to determine when two characters are in conversation. Our process involves encoding plain literary text into the Text Encoding Initiative’s (TEI) XML format, character name identification, conversation and co-occurrence detection, and social network construction. Previous work in social network construction for literature have focused on drama, specifically manually TEI-encoded Shakespearean plays in which character interactions are much easier to track …


Contrasting Geometric Variations Of Mathematical Models Of Self-Assembling Systems, Michael Sharp Dec 2019

Contrasting Geometric Variations Of Mathematical Models Of Self-Assembling Systems, Michael Sharp

Graduate Theses and Dissertations

Self-assembly is the process by which complex systems are formed and behave due to the interactions of relatively simple units. In this thesis, we explore multiple augmentations of well known models of self-assembly to gain a better understanding of the roles that geometry and space play in their dynamics. We begin in the abstract Tile Assembly Model (aTAM) with some examples and a brief survey of previous results to provide a foundation. We then introduce the Geometric Thermodynamic Binding Network model, a model that focuses on the thermodynamic stability of its systems while utilizing geometrically rigid components (dissimilar to other …


Countering Cybersecurity Vulnerabilities In The Power System, Fengli Zhang Dec 2019

Countering Cybersecurity Vulnerabilities In The Power System, Fengli Zhang

Graduate Theses and Dissertations

Security vulnerabilities in software pose an important threat to power grid security, which can be exploited by attackers if not properly addressed. Every month, many vulnerabilities are discovered and all the vulnerabilities must be remediated in a timely manner to reduce the chance of being exploited by attackers. In current practice, security operators have to manually analyze each vulnerability present in their assets and determine the remediation actions in a short time period, which involves a tremendous amount of human resources for electric utilities. To solve this problem, we propose a machine learning-based automation framework to automate vulnerability analysis and …


Automatic Methods To Enhance The Quality Of Colonoscopy Video, Nidhal Kareem Shukur Azawi Aug 2019

Automatic Methods To Enhance The Quality Of Colonoscopy Video, Nidhal Kareem Shukur Azawi

Graduate Theses and Dissertations

Colonoscopy is a form of endoscopy because it uses colonoscopy device to help the doctor to understand a colon patient. Enhancing the quality of Colonoscopy images is a challenge because of the wet and dynamic environment inside the colon causes many problems even the colonoscope devise has a good quality. Some of these problems are blurriness, specular highlights shiny areas.

In this work, different kinds of techniques have been investigated in order to improve the quality of colonoscopy images. Also, variety of preprocessing approaches (removing bad images, resizing images, median filtration with and without image resizing) have been conducted to …


Fault Adaptive Workload Allocation For Complex Manufacturing Systems, Charlie B. Destefano May 2019

Fault Adaptive Workload Allocation For Complex Manufacturing Systems, Charlie B. Destefano

Graduate Theses and Dissertations

This research proposes novel fault adaptive workload allocation (FAWA) strategies for the health management of complex manufacturing systems. The primary goal of these strategies is to minimize maintenance costs and maximize production by strategically controlling when and where failures occur through condition-based workload allocation.

For complex systems that are capable of performing tasks a variety of different ways, such as an industrial robot arm that can move between locations using different joint angle configurations and path trajectories, each option, i.e. mission plan, will result in different degradation rates and life-expectancies. Consequently, this can make it difficult to predict when a …


Motor Control Systems Analysis, Design, And Optimization Strategies For A Lightweight Excavation Robot, Austin Jerold Crawford May 2019

Motor Control Systems Analysis, Design, And Optimization Strategies For A Lightweight Excavation Robot, Austin Jerold Crawford

Graduate Theses and Dissertations

This thesis entails motor control system analysis, design, and optimization for the University of Arkansas NASA Robotic Mining Competition robot. The open-loop system is to be modeled and simulated in order to achieve a desired rapid, yet smooth response to a change in input. The initial goal of this work is to find a repeatable, generalized step-by-step process that can be used to tune the gains of a PID controller for multiple different operating points. Then, sensors are to be modeled onto the robot within a feedback loop to develop an error signal and to make the control system self-corrective …


Arkansas' Coding For All - Is It Really Reaching All Students?, Kaitlin Mckenzie May 2019

Arkansas' Coding For All - Is It Really Reaching All Students?, Kaitlin Mckenzie

Computer Science and Computer Engineering Undergraduate Honors Theses

The Arkansas Computer Science Initiative required every high school to offer at least one computer science course by the 2015-16 academic year. Schools that did not have a qualified teacher were given access to online courses. It is important to point out that students do not need a computer science course to graduate, but credit in a computer science course could replace a 3rd science credit requirement or a 4th math credit requirement (ADE / ARCareerED Computer Science Fact Sheet). Some initial success has already been demonstrated. In 2014- 15 there were sixty computer science classes offered in all of …


Teaching Introductory Programming Concepts Through A Gesture-Based Interface, Lora Streeter May 2019

Teaching Introductory Programming Concepts Through A Gesture-Based Interface, Lora Streeter

Graduate Theses and Dissertations

Computer programming is an integral part of a technology driven society, so there is a tremendous need to teach programming to a wider audience. One of the challenges in meeting this demand for programmers is that most traditional computer programming classes are targeted to university/college students with strong math backgrounds. To expand the computer programming workforce, we need to encourage a wider range of students to learn about programming.

The goal of this research is to design and implement a gesture-driven interface to teach computer programming to young and non-traditional students. We designed our user interface based on the feedback …


Powers And Behaviors Of Directed Self-Assembly, Trent Allen Rogers May 2019

Powers And Behaviors Of Directed Self-Assembly, Trent Allen Rogers

Graduate Theses and Dissertations

In nature there are a variety of self-assembling systems occurring at varying scales which give rise to incredibly complex behaviors. Theoretical models of self-assembly allow us to gain insight into the fundamental nature of self-assembly independent of the specific physical implementation. In Winfree's abstract tile assembly model (aTAM), the atomic components are unit square "tiles" which have "glues" on their four sides. Beginning from a seed assembly, these tiles attach one at a time during the assembly process in an asynchronous and nondeterministic manner.

We can gain valuable insights into the nature of self-assembly by comparing different models of self-assembly …


Hardware Ip Classification Through Weighted Characteristics, Brendan Mcgeehan May 2019

Hardware Ip Classification Through Weighted Characteristics, Brendan Mcgeehan

Graduate Theses and Dissertations

Today’s business model for hardware designs frequently incorporates third-party Intellectual Property (IP) due to the many benefits it can bring to a company. For instance, outsourcing certain components of an overall design can reduce time-to-market by allowing each party to specialize and perfect a specific part of the overall design. However, allowing third-party involvement also increases the possibility of malicious attacks, such as hardware Trojan insertion. Trojan insertion is a particularly dangerous security threat because testing the functionality of an IP can often leave the Trojan undetected. Therefore, this thesis work provides an improvement on a Trojan detection method known …


Design Of Artificial Swarms Using Network Motifs: A Simulation Study, Khoinguyen Trinh May 2019

Design Of Artificial Swarms Using Network Motifs: A Simulation Study, Khoinguyen Trinh

Mechanical Engineering Undergraduate Honors Theses

The objective of this research is to develop a new approach in engineering complex swarm systems with desired characteristics based on the theory of network motifs – subgraphs that repeat themselves (patterns) among various networks. System engineering has traditionally followed a top-down methodology which creates a framework for the system and adds additional features to meet specific design requirements. Meanwhile, complex swarm systems, such as ant colonies and bird flocks, are formed via a bottom-up manner where the system-level structure directly emerges from the interactions and behaviors among individuals. The behaviors of these individuals cannot be directly controlled, which makes …


Model Development And Assessment Of The Gate Network In A High-Performance Sic Power Module, William Austin Curbow May 2019

Model Development And Assessment Of The Gate Network In A High-Performance Sic Power Module, William Austin Curbow

Graduate Theses and Dissertations

The main objective of this effort is to determine points of weakness in the gate network of a high-performance SiC power module and to offer remedies to these issues to increase the overall performance, robustness, and reliability of the technology. In order to accomplish this goal, a highly accurate model of the gate network is developed through three methods of parameter extraction: calculation, simulation, and measurement. A SPICE model of the gate network is developed to analyze four electrical issues in a high-speed, SiC-based power module including the necessary internal gate resistance for damping under-voltage and over-voltage transients, the disparity …


Applications Of Fog Computing In Video Streaming, Kyle Smith May 2019

Applications Of Fog Computing In Video Streaming, Kyle Smith

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this paper is to show the viability of fog computing in the area of video streaming in vehicles. With the rise of autonomous vehicles, there needs to be a viable entertainment option for users. The cloud fails to address these options due to latency problems experienced during high internet traffic. To improve video streaming speeds, fog computing seems to be the best option. Fog computing brings the cloud closer to the user through the use of intermediary devices known as fog nodes. It does not attempt to replace the cloud but improve the cloud by allowing faster …