Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

University of Nebraska - Lincoln

2020

Keyword
Publication

Articles 1 - 30 of 40

Full-Text Articles in Physical Sciences and Mathematics

Suffix Tree, Minwise Hashing And Streaming Algorithms For Big Data Analysis In Bioinformatics, Sairam Behera Dec 2020

Suffix Tree, Minwise Hashing And Streaming Algorithms For Big Data Analysis In Bioinformatics, Sairam Behera

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

In this dissertation, we worked on several algorithmic problems in bioinformatics using mainly three approaches: (a) a streaming model, (b) sux-tree based indexing, and (c) minwise-hashing (minhash) and locality-sensitive hashing (LSH). The streaming models are useful for large data problems where a good approximation needs to be achieved with limited space usage. We developed an approximation algorithm (Kmer-Estimate) using the streaming approach to obtain a better estimation of the frequency of k-mer counts. A k-mer, a subsequence of length k, plays an important role in many bioinformatics analyses such as genome distance estimation. We also developed new methods that use …


A Novel Spatiotemporal Prediction Method Of Cumulative Covid-19 Cases, Junzhe Cai Dec 2020

A Novel Spatiotemporal Prediction Method Of Cumulative Covid-19 Cases, Junzhe Cai

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Prediction methods are important for many applications. In particular, an accurate prediction for the total number of cases for pandemics such as the Covid-19 pandemic could help medical preparedness by providing in time a sufficient supply of testing kits, hospital beds and medical personnel. This thesis experimentally compares the accuracy of ten prediction methods for the cumulative number of Covid-19 pandemic cases. These ten methods include two types of neural networks and extrapolation methods based on best fit linear, best fit quadratic, best fit cubic and Lagrange interpolation, as well as an extrapolation method from Revesz. We also consider the …


Factors Affecting Computer Science Research Productivity And Impact In Nigeria: A Bibliometric Evidence, Azubuike Ezenwoke Dec 2020

Factors Affecting Computer Science Research Productivity And Impact In Nigeria: A Bibliometric Evidence, Azubuike Ezenwoke

Library Philosophy and Practice (e-journal)

Computer science is a burgeoning research field and has the potential to accelerate the rate of industrialisation and subsequently, economic development. Using bibliometric data obtained from Scopus, this study employed a 15-year bibliometric analysis to highlight Nigeria’s productivity and impact trends in the computer science research landscape. Our findings are summarised as follows: First, Nigeria’s computer science research contribution and citations are meager in comparison to the global output. Secondly, international collaboration is generally weak as most collaborations are national in scope. Third, Nigeria’s computer science-related research is published in low-quality outlets, as Scopus has discontinued the indexing of most …


Representational Learning Approach For Predicting Developer Expertise Using Eye Movements, Sumeet Maan Dec 2020

Representational Learning Approach For Predicting Developer Expertise Using Eye Movements, Sumeet Maan

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The thesis analyzes an existing eye-tracking dataset collected while software developers were solving bug fixing tasks in an open-source system. The analysis is performed using a representational learning approach namely, Multi-layer Perceptron (MLP). The novel aspect of the analysis is the introduction of a new feature engineering method based on the eye-tracking data. This is then used to predict developer expertise on the data. The dataset used in this thesis is inherently more complex because it is collected in a very dynamic environment i.e., the Eclipse IDE using an eye-tracking plugin, iTrace. Previous work in this area only worked on …


Packet Delivery: An Investigation Of Educational Video Games For Computer Science Education, Robert Lafferty Dec 2020

Packet Delivery: An Investigation Of Educational Video Games For Computer Science Education, Robert Lafferty

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The field of educational video games has rapidly grown since the 1970s, mostly producing video games to teach core education concepts such as mathematics, natural science, and English. Recently, various research groups have developed educational games to address elective topics such as finance and health. Educational video games often target grade school audiences and rarely target high school students, college students, or adults. Computer science topics are not a common theme among educational video games; the games that address Computer Science topics teach computer fundamentals, such as typing or basic programming, to young audiences.

Packet Delivery, an educational video …


Machine Learning Augmentation Micro-Sensors For Smart Device Applications, Mohammad H. Hasan Nov 2020

Machine Learning Augmentation Micro-Sensors For Smart Device Applications, Mohammad H. Hasan

Department of Mechanical and Materials Engineering: Dissertations, Theses, and Student Research

Novel smart technologies such as wearable devices and unconventional robotics have been enabled by advancements in semiconductor technologies, which have miniaturized the sizes of transistors and sensors. These technologies promise great improvements to public health. However, current computational paradigms are ill-suited for use in novel smart technologies as they fail to meet their strict power and size requirements. In this dissertation, we present two bio-inspired colocalized sensing-and-computing schemes performed at the sensor level: continuous-time recurrent neural networks (CTRNNs) and reservoir computers (RCs). These schemes arise from the nonlinear dynamics of micro-electro-mechanical systems (MEMS), which facilitates computing, and the inherent ability …


Formal Concept Analysis Applications In Bioinformatics, Sarah Roscoe Nov 2020

Formal Concept Analysis Applications In Bioinformatics, Sarah Roscoe

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Bioinformatics is an important field that seeks to solve biological problems with the help of computation. One specific field in bioinformatics is that of genomics, the study of genes and their functions. Genomics can provide valuable analysis as to the interaction between how genes interact with their environment. One such way to measure the interaction is through gene expression data, which determines whether (and how much) a certain gene activates in a situation. Analyzing this data can be critical for predicting diseases or other biological reactions. One method used for analysis is Formal Concept Analysis (FCA), a computing technique based …


Investigating Factors Predicting Effective Learning In A Cs Professional Development Program For K-12 Teachers, Patrick Morrow Oct 2020

Investigating Factors Predicting Effective Learning In A Cs Professional Development Program For K-12 Teachers, Patrick Morrow

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The demand for K-12 Computer Science (CS) education is growing and there is not an adequate number of educators to match the demand. Comprehensive research was carried out to investigate and understand the influence of a summer two-week professional development (PD) program on teachers’ CS content and pedagogical knowledge, their confidence in such knowledge, their interest in and perceived value of CS, and the factors influencing such impacts. Two courses designed to train K-12 teachers to teach CS, focusing on both concepts and pedagogy skills were taught over two separate summers to two separate cohorts of teachers. Statistical and SWOT …


Reliability And Validity Of Scales Assessing Anxiety Associated With Information Related Tasks: A Systematic Review, Muhammad Asif Naveed, Sajjad Ullah Jan, Mumtaz Ali Anwar Oct 2020

Reliability And Validity Of Scales Assessing Anxiety Associated With Information Related Tasks: A Systematic Review, Muhammad Asif Naveed, Sajjad Ullah Jan, Mumtaz Ali Anwar

Library Philosophy and Practice (e-journal)

This research carried out a systematic review of the evidence of reliability and validity of scales available in studies reporting surveys of individuals to assess anxiety associated with information related tasks such as library anxiety, information seeking anxiety, and information anxiety. A systematic search using keywords ‘library anxiety’, ‘information anxiety’, 'information seeking anxiety', and 'information seeking' AND 'anxiety' was carried in Web of Science, Scopus, LISA, and LISTA to identify the relevant literature. This review included those studies reporting the use of any scale assessing information related anxiety, and published in the English language, and included all type of documents …


Information Literacy Skills And The Use Of E-Library Resources Among Undergraduates In South-West Nigeria, Paul Adeoye Omosebi, Fehintoluwa E. Omosebi . Oct 2020

Information Literacy Skills And The Use Of E-Library Resources Among Undergraduates In South-West Nigeria, Paul Adeoye Omosebi, Fehintoluwa E. Omosebi .

Library Philosophy and Practice (e-journal)

This study is a correlational survey study which investigates information literacy skills and the use of E-library resources among business administration undergraduates in south-west Nigeria. A sample size of 900 respondents was used but 800 questionnaires were retrieved. The target population for the study comprised of undergraduate business administration students in private universities in Southwest Nigeria. A simple random sampling technique was adopted for the purpose of this study. The questionnaire was the main instrument used for data collection and was divided into three sections namely demographic characteristics, information literacy and use of e-library among students in the private universities …


Research 4.0: Research In The Age Of Automation, Rob Procter, Ben Glover, Elliot Jones Sep 2020

Research 4.0: Research In The Age Of Automation, Rob Procter, Ben Glover, Elliot Jones

Copyright, Fair Use, Scholarly Communication, etc.

Executive Summary

There is a growing consensus that we are at the start of a fourth industrial revolution, driven by developments in Artificial Intelligence, machine learning, robotics, the Internet of Things, 3-D printing, nanotechnology, biotechnology, 5G, new forms of energy storage and quantum computing. This wave of technical innovations is already having a significant impact on how research is conducted, with dramatic change across research methods in recent years within some disciplines, as this project’s interim report set out.

Whilst there are a wide range of technologies associated with the fourth industrial revolution, this report primarily seeks to understand what …


Routing Optimization In Heterogeneous Wireless Networks For Space And Mission-Driven Internet Of Things (Iot) Environments, Sara El Alaoui Aug 2020

Routing Optimization In Heterogeneous Wireless Networks For Space And Mission-Driven Internet Of Things (Iot) Environments, Sara El Alaoui

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

As technological advances have made it possible to build cheap devices with more processing power and storage, and that are capable of continuously generating large amounts of data, the network has to undergo significant changes as well. The rising number of vendors and variety in platforms and wireless communication technologies have introduced heterogeneity to networks compromising the efficiency of existing routing algorithms. Furthermore, most of the existing solutions assume and require connection to the backbone network and involve changes to the infrastructures, which are not always possible -- a 2018 report by the Federal Communications Commission shows that over 31% …


Application Of Software Engineering Principles To Synthetic Biology And Emerging Regulatory Concerns, Justin Firestone Aug 2020

Application Of Software Engineering Principles To Synthetic Biology And Emerging Regulatory Concerns, Justin Firestone

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

As the science of synthetic biology matures, engineers have begun to deliver real-world applications which are the beginning of what could radically transform our lives. Recent progress indicates synthetic biology will produce transformative breakthroughs. Examples include: 1) synthesizing chemicals for medicines which are expensive and difficult to produce; 2) producing protein alternatives; 3) altering genomes to combat deadly diseases; 4) killing antibiotic-resistant pathogens; and 5) speeding up vaccine production.

Although synthetic biology promises great benefits, many stakeholders have expressed concerns over safety and security risks from creating biological behavior never seen before in nature. As with any emerging technology, there …


Formal Language Constraints In Deep Reinforcement Learning For Self-Driving Vehicles, Tyler Bienhoff Jul 2020

Formal Language Constraints In Deep Reinforcement Learning For Self-Driving Vehicles, Tyler Bienhoff

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

In recent years, self-driving vehicles have become a holy grail technology that, once fully developed, could radically change the daily behaviors of people and enhance safety. The complexities of controlling a car in a constantly changing environment are too immense to directly program how the vehicle should behave in each specific scenario. Thus, a common technique when developing autonomous vehicles is to use reinforcement learning, where vehicles can be trained in simulated and real-world environments to make proper decisions in a wide variety of scenarios. Reinforcement learning models, however, have uncertainties in how the vehicle acts, especially in a previously …


Power-Over-Tether Uas Leveraged For Nearly-Indefinite Meteorological Data Acquisition, Daniel Rico, Carrick Detweiler, Francisco Muñoz-Arriola Jul 2020

Power-Over-Tether Uas Leveraged For Nearly-Indefinite Meteorological Data Acquisition, Daniel Rico, Carrick Detweiler, Francisco Muñoz-Arriola

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Use of unmanned aerial systems (UASs) in agriculture has risen in the past decade. These systems are key to modernizing agriculture. UASs collect and elucidate data previously difficult to obtain and used to help increase agricultural efficiency and production. Typical commercial off-the-shelf (COTS) UASs are limited by small payloads and short flight times. Such limits inhibit their ability to provide abundant data at multiple spatiotemporal scales. In this paper, we describe the design and construction of the tethered aircraft unmanned system (TAUS), which is a novel power-over-tether UAS leveraging the physical presence of the tether to launch multiple sensors along …


Introduction To The R-Package: Usdampr, Elliott James Dennis, Bowen Chen Jun 2020

Introduction To The R-Package: Usdampr, Elliott James Dennis, Bowen Chen

Extension Farm and Ranch Management News

Why the Need for the Package? In the 1990’s, concern over growing packer concentration and a hog industry market shock resulted in discontent among producers and packers. As a result, the United States Congress passed the Livestock Mandatory Reporting Act of 1999 (1999 Act) [Pub. L. 106-78, Title IX] which is required to be reauthorized every five years. See here for a full history of the Livestock Mandatory Reporting Background.

Market reports were publicly issued in the form of .txt files with varying frequency from April 2000 to April 2020. Current and historical data were also housed in a USDA-AMS …


Reducing Run-Time Adaptation Space Via Analysis Of Possible Utility Bounds, Clay Stevens, Hamid Bagheri May 2020

Reducing Run-Time Adaptation Space Via Analysis Of Possible Utility Bounds, Clay Stevens, Hamid Bagheri

CSE Conference and Workshop Papers

Self-adaptive systems often employ dynamic programming or similar techniques to select optimal adaptations at run-time. These techniques suffer from the “curse of dimensionality", increasing the cost of run-time adaptation decisions. We propose a novel approach that improves upon the state-of-the-art proactive self-adaptation techniques to reduce the number of possible adaptations that need be considered for each run-time adaptation decision. The approach, realized in a tool called Thallium, employs a combination of automated formal modeling techniques to (i) analyze a structural model of the system showing which configurations are reachable from other configurations and (ii) compute the utility that can be …


Understanding Eye Gaze Patterns In Code Comprehension, Jonathan Saddler May 2020

Understanding Eye Gaze Patterns In Code Comprehension, Jonathan Saddler

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Program comprehension is a sub-field of software engineering that seeks to understand how developers understand programs. Comprehension acts as a starting point for many software engineering tasks such as bug fixing, refactoring, and feature creation. The dissertation presents a series of empirical studies to understand how developers comprehend software in realistic settings. The unique aspect of this work is the use of eye tracking equipment to gather fine-grained detailed information of what developers look at in software artifacts while they perform realistic tasks in an environment familiar to them, namely a context including both the Integrated Development Environment (Eclipse or …


Emotional Awareness During Bug Fixes – A Pilot Study, Jada O. Loro, Abigail L. Schneff, Sarah J. Oran, Bonita Sharif Apr 2020

Emotional Awareness During Bug Fixes – A Pilot Study, Jada O. Loro, Abigail L. Schneff, Sarah J. Oran, Bonita Sharif

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

This study examines the effects of a programmer's emotional awareness on progress while fixing bugs. The goal of the study is to capitalize on emotional awareness to ultimately increase progress made during software development. This process could result in improved software maintenance.


An Eye Tracking Replication Study Of A Randomized Controlled Trial On The Effects Of Embedded Computer Language Switching, Cole Peterson Apr 2020

An Eye Tracking Replication Study Of A Randomized Controlled Trial On The Effects Of Embedded Computer Language Switching, Cole Peterson

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The use of multiple programming languages (polyglot programming) during software development is common practice in modern software development. However, not much is known about how the use of these different languages affects developer productivity. The study presented in this thesis replicates a randomized controlled trial that investigates the use of multiple languages in the context of database programming tasks. Participants in our study were given coding tasks written in Java and one of three SQL-like embedded languages: plain SQL in strings, Java methods only, a hybrid embedded language that was more similar to Java. In addition to recording the online …


A Memory Usage Comparison Between Jitana And Soot, Yuanjiu Hu Apr 2020

A Memory Usage Comparison Between Jitana And Soot, Yuanjiu Hu

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

There are several factors that make analyzing Android apps to address dependability and security concerns challenging. These factors include (i) resource efficiency as analysts need to be able to analyze large code-bases to look for issues that can exist in the application code and underlying platform code; (ii) scalability as today’s cybercriminals deploy attacks that may involve many participating apps; and (iii) in many cases, security analysts often rely on dynamic or hybrid analysis techniques to detect and identify the sources of issues.

The underlying principle governing the design of existing program analysis engines is the main cause that prevents …


An Algorithm For Building Language Superfamilies Using Swadesh Lists, Bill Mutabazi Apr 2020

An Algorithm For Building Language Superfamilies Using Swadesh Lists, Bill Mutabazi

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The main contributions of this thesis are the following: i. Developing an algorithm to generate language families and superfamilies given for each input language a Swadesh list represented using the international phonetic alphabet (IPA) notation. ii. The algorithm is novel in using the Levenshtein distance metric on the IPA representation and in the way it measures overall distance between pairs of Swadesh lists. iii. Building a Swadesh list for the author's native Kinyarwanda language because a Swadesh list could not be found even after an extensive search for it.

Adviser: Peter Revesz


Advanced Techniques To Detect Complex Android Malware, Zhiqiang Li Apr 2020

Advanced Techniques To Detect Complex Android Malware, Zhiqiang Li

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Android is currently the most popular operating system for mobile devices in the world. However, its openness is the main reason for the majority of malware to be targeting Android devices. Various approaches have been developed to detect malware.

Unfortunately, new breeds of malware utilize sophisticated techniques to defeat malware detectors. For example, to defeat signature-based detectors, malware authors change the malware’s signatures to avoid detection. As such, a more effective approach to detect malware is by leveraging malware’s behavioral characteristics. However, if a behavior-based detector is based on static analysis, its reported results may contain a large number of …


Open Dynamic Interaction Network: A Cell-Phone Based Platform For Responsive Ema, Gisela Font Sayeras Apr 2020

Open Dynamic Interaction Network: A Cell-Phone Based Platform For Responsive Ema, Gisela Font Sayeras

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The study of social networks is central to advancing our understanding of a wide range of phenomena in human societies. Social networks co-evolve concurrently alongside the individuals within them. Selection processes cause network structure to change in response to emerging similarities/differences between individuals. At the same time, diffusion processes occur as individuals influence one another when they interact across network links. Indeed, each network link is a logical abstraction that aggregates many short-lived pairwise interactions of interest that are being studied. Traditionally, network co-evolution is studied by periodically taking static snapshots of social networks using surveys. Unfortunately, participation incentives …


Engagement And Computational Thinking Through Creative Coding, Dana Hoppe Apr 2020

Engagement And Computational Thinking Through Creative Coding, Dana Hoppe

Honors Theses

Rising enrollments in Computer Science pose an opportunity to engage students from diverse backgrounds and interests; and a challenge to deliver on positive learning outcomes. While student engagement is the driving factor for increased learning performance and retention, it has been declining to new lows for Computer Science students in recent years. In order to further explore the potential of contextualized computing as a tool for increasing engagement in computing and developing Computational Thinking aptitude in students, we have developed an introductory computing course contextualized with Art and Design with modules centered around guiding pedagogical principles and aimed at middle …


Need For Adoption Of Koha Integrated Library Management Software In Nigerian Academic Libraries, Isaac Echezonam Anyira Apr 2020

Need For Adoption Of Koha Integrated Library Management Software In Nigerian Academic Libraries, Isaac Echezonam Anyira

Library Philosophy and Practice (e-journal)

The main objective of this paper is to justify the need for Nigerian libraries which have not automated their functions to adopt of Koha ILMS as their automation software. The paper therefore examined the need for automation, the reasons for the choice of Koha ILMS and potential benefits accruable to the libraries, and functions that Koha can facilitate their perform in their libraries. The paper identified the need for automation to include need to handle information explosion, for effective management of library operations, to improve operation speed, resource sharing etc; the choice of Koha was informed by its features and …


Explainable Deep Learning For Medical Image Analysis, Brennan Rhoadarmer Apr 2020

Explainable Deep Learning For Medical Image Analysis, Brennan Rhoadarmer

UCARE Research Products

Explainable Deep Learning for Medical Image Analysis is a project focused on improving the ability for deep learning models to explain the reasoning behind their classification in order to improve their viability in the medical field, where explanations of decisions is critical for the care of patients. In order to explore this topic, we work to implement GradCAM, which is a new method of determining the cause classification in models by tracing back through the model layers to the input.


An Anns Based Failure Detection Method For Onos Sdon Controller, Shideh Yavary Mehr Apr 2020

An Anns Based Failure Detection Method For Onos Sdon Controller, Shideh Yavary Mehr

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Network reachability is an important factor of an optical telecommunication network. In a wavelength-division-muliplexing (WDM) optical network, any failure can cause a large amount of loss and disruptions in network. Failures can occur in network elements, link, and component inside a node or etc. Since major network disruptions can caused network performance degradations, it is necessary that operators have solutions to prevent such those failures. This work examines a prediction model in optical networks and propose a protection plan using a Machine Learning (ML) algorithm called Artificial Neural Networks (ANN) using Mininet emulator. ANN is one of the best method …


Communicating Computing Limitations Through Kinesthetic Pedagogy, Michael Mason Mar 2020

Communicating Computing Limitations Through Kinesthetic Pedagogy, Michael Mason

Honors Theses

Abstract concepts, such as those in advanced Computer Science and Mathematics, can be extremely difficult to understand fundamentally without an existing background in a similar subject. Recent research has shown that raw visualizations without learner interaction are not particularly effective at communicating complex information because they allow the learner to ignore the example (Lauer 2006, Naps 2002). Forcing somebody to interact with an example ensures that they can grasp the visualization. This paper describes a six step technique to demonstrate the limitations of computing through kinesthetic pedagogy, then offers an example exercise utilizing the method. The six proposed steps are: …


Scraping Bepress: Downloading Dissertations For Preservation, Stephen Zweibel Feb 2020

Scraping Bepress: Downloading Dissertations For Preservation, Stephen Zweibel

Copyright, Fair Use, Scholarly Communication, etc.

This article will describe our process developing a script to automate downloading of documents and secondary materials from our library’s BePress repository. Our objective was to collect the full archive of dissertations and associated files from our repository into a local disk for potential future applications and to build out a preservation system.

Unlike at some institutions, our students submit directly into BePress, so we did not have a separate repository of the files; and the backup of BePress content that we had access to was not in an ideal format (for example, it included “withdrawn” items and did not …