Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Answer set programming (27)
- Knowledge representation (14)
- Satisfiability (11)
- Workshop (11)
- Security (10)
-
- Information technology (8)
- Logic programming (8)
- Virtual teams (8)
- Collaboration (7)
- Privacy (7)
- Propositional satisfiability (7)
- Virtual worlds (7)
- ASP (6)
- Answer set solver (6)
- Bioinformatics (6)
- Chordal graphs (6)
- Correlation networks (6)
- Energy Awareness (6)
- Internet of things (6)
- Parallel Processing (6)
- Patterns (6)
- SAT (6)
- Scheduling (6)
- Development (5)
- IT for Development (5)
- Syntax (5)
- CMODELS (4)
- Citizen science (4)
- Cybersecurity (4)
- Deception (4)
- Publication Year
- Publication
-
- Information Systems and Quantitative Analysis Faculty Publications (81)
- Computer Science Faculty Publications (77)
- Student Work (71)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Computer Science Faculty Proceedings & Presentations (63)
-
- Computer Science Graduate Research Workshop (24)
- Interdisciplinary Informatics Faculty Publications (24)
- UNO Student Research and Creative Activity Fair (22)
- Interdisciplinary Informatics Faculty Proceedings & Presentations (20)
- Theses/Capstones/Creative Projects (18)
- Faculty Books and Monographs (3)
- Biology Faculty Publications (1)
- Computer Science Faculty Books and Monographs (1)
- Computer Science Theses, Dissertations, and Student Creative Activity (1)
- Information Systems and Quantitative Analysis Theses, Dissertations, and Student Creative Activity (1)
- Journal of Religion & Film (1)
- Mathematics Faculty Publications (1)
- Psychology Faculty Publications (1)
- Publication Type
Articles 1 - 30 of 474
Full-Text Articles in Physical Sciences and Mathematics
Phoneme Recognition For Pronunciation Improvement, Matthew Heywood
Phoneme Recognition For Pronunciation Improvement, Matthew Heywood
Theses/Capstones/Creative Projects
This project aims to improve English pronunciation by investigating speech errors and developing a tool to provide precise feedback. The study focuses on creating a new pronunciation tool that offers localized feedback, identifies specific errors, and suggests corrective measures. By addressing the shortcomings of current methods, this research seeks to enhance pronunciation refinement.
Utilizing cutting-edge technology, the tool leverages speech-to-phoneme AI models and modified lazy string matching algorithms to compare the user's spoken input with the intended pronunciation. This allows for a detailed analysis of discrepancies, providing users actionable insights into their phonetic errors. The speech-to-phoneme AI models mark a …
Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy
Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy
Theses/Capstones/Creative Projects
Cryptocurrencies rely on a distributed public ledger (record of transactions) in order to perform their intended functions. However, the public’s ability to audit the network is both its greatest strength and greatest weakness: Anyone can see what address sent currency, and to whom the currency was sent. If cryptocurrency is ever going to take some of the responsibility of fiat currency, then there needs to be a certain level of confidentiality. Thus far, Monero has come out on top as the preferred currency for embodying the ideas of privacy and confidentiality. Through numerous cryptographic procedures, Monero is able to obfuscate …
Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple
Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple
Computer Science Faculty Publications
Program completion is a translation from the language of logic programs into the language of first-order theories. Its original definition has been extended to programs that include integer arithmetic, accept input, and distinguish between output predicates and auxiliary predicates. For tight programs, that generalization of completion is known to match the stable model semantics, which is the basis of answer set programming. We show that the tightness condition in this theorem can be replaced by a less restrictive “local tightness” requirement. From this fact we conclude that the proof assistant ANTHEM-P2P can be used to verify equivalence between locally tight …
Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple
Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple
Computer Science Faculty Publications
Program completion is a translation from the language of logic programs into the language of first-order theories. Its original definition has been extended to programs that include integer arithmetic, accept input, and distinguish between output predicates and auxiliary predicates. For tight programs, that generalization of completion is known to match the stable model semantics, which is the basis of answer set programming. We show that the tightness condition in this theorem can be replaced by a less restrictive “local tightness” requirement. From this fact we conclude that the proof assistant ANTHEM-P2P can be used to verify equivalence between locally tight …
Form Auto Generation: An Analysis Of Gui Generation, Jedadiah Mcfarland
Form Auto Generation: An Analysis Of Gui Generation, Jedadiah Mcfarland
Theses/Capstones/Creative Projects
Graphical User Interfaces (GUIs) have transformed how we interact with computers, offering visually appealing and intuitive systems. This paper explores the origins and evolution of GUIs, explicitly focusing on form auto-generation in modern GUI-driven environments. Form auto-generation has emerged as a prominent practice, enabling automatic form creation based on predefined models. To better understand form auto-generation, I investigate SurveyJS, an open-source form auto-generation library known for its active development and support. This investigation aims to understand how SurveyJS recognizes and renders objects from a JSON model. The methodology involves a trial and error examination of the library, exploring its live …
External Behavior Of A Logic Program And Verification Of Refactoring, Jorge Fandinno, Zachary Hansen, Yuliya Lierler, Vladimir Lifschitz, Nathan Temple
External Behavior Of A Logic Program And Verification Of Refactoring, Jorge Fandinno, Zachary Hansen, Yuliya Lierler, Vladimir Lifschitz, Nathan Temple
Computer Science Faculty Publications
Refactoring is modifying a program without changing its external behavior. In this paper, we make the concept of external behavior precise for a simple answer set programming language. Then we describe a proof assistant for the task of verifying that refactoring a program in that language is performed correctly.
System Predictor: Grounding Size Estimator For Logic Programs Under Answer Set Semantics, Daniel Bresnahan, Nicholas Hippen, Yuliya Lierler
System Predictor: Grounding Size Estimator For Logic Programs Under Answer Set Semantics, Daniel Bresnahan, Nicholas Hippen, Yuliya Lierler
Computer Science Faculty Publications
Answer set programming is a declarative logic programming paradigm geared towards solving difficult combinatorial search problems. While different logic programs can encode the same problem, their performance may vary significantly. It is not always easy to identify which version of the program performs the best. We present the system PREDICTOR (and its algorithmic backend) for estimating the grounding size of programs, a metric that can influence a performance of a system processing a program. We evaluate the impact of PREDICTOR when used as a guide for rewritings produced by the answer set programming rewriting tools PROJECTOR and LPOPT. The results …
Efficient Convoy Routing And Bridge Load Optimization User Interface, Brandon Lacy, Will Heller, Yonas Kassa, Brian Ricks, Robin Gandhi
Efficient Convoy Routing And Bridge Load Optimization User Interface, Brandon Lacy, Will Heller, Yonas Kassa, Brian Ricks, Robin Gandhi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Building Explainable Machine Learning Lifecycle: Model Training, Selection, And Deployment With Explainability, Vidit Singh, Yonas Kassa, Brian Ricks, Robin Gandhi
Building Explainable Machine Learning Lifecycle: Model Training, Selection, And Deployment With Explainability, Vidit Singh, Yonas Kassa, Brian Ricks, Robin Gandhi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Developing Architecture For A Routing System Using Bridge Data And Adversary Avoidance, Will Heller, Brian Ricks, Yonas Kassa, Brandon Lacy, Rahul Kamar Nethakani
Developing Architecture For A Routing System Using Bridge Data And Adversary Avoidance, Will Heller, Brian Ricks, Yonas Kassa, Brandon Lacy, Rahul Kamar Nethakani
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Progress In A New Visualization Strategy For Ml Models, Alex Wissing, Brian Ricks, Robin Gandhi, Yonas Kassa, Akshay Kale
Progress In A New Visualization Strategy For Ml Models, Alex Wissing, Brian Ricks, Robin Gandhi, Yonas Kassa, Akshay Kale
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
How To Select Simple-Yet-Accurate Model Of Bridge Maintenance?, Akshay Kale, Yonas Kassa, Brian Ricks, Robin Gandhi
How To Select Simple-Yet-Accurate Model Of Bridge Maintenance?, Akshay Kale, Yonas Kassa, Brian Ricks, Robin Gandhi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Artificial: A Study On The Use Of Artificial Intelligence In Art, Hayden Ernst
Artificial: A Study On The Use Of Artificial Intelligence In Art, Hayden Ernst
Theses/Capstones/Creative Projects
In the past three to five years there have been significant improvements made in AI due to improvements in computing capacity, the collection and use of big data, and an increase in public interest and funding for research. Programs such as ChatGPT, DALL•E, and Midjourney have also gained tremendous popularity in a relatively short amount of time. This led me to this project in which I aimed to gain a deeper understanding of these art generator AI and where they fit into art as a whole. My goal was to give recommendations to museums and exhibits in Omaha on what …
An Application Risk Assessment Of Werner Enterprises, Nathan Andres
An Application Risk Assessment Of Werner Enterprises, Nathan Andres
Theses/Capstones/Creative Projects
Risk assessments provide a systematic approach to identifying potential risks that could negatively impact an organization’s operations, financial performance, and reputation. Using a risk assessment, companies can evaluate potential risks and vulnerabilities, prioritize them based on their potential impact, and develop strategies to manage and address these risks effectively.
Werner Enterprises Inc. is a nationally known trucking company headquartered in Omaha, Nebraska. Our cybersecurity capstone project motivation was to partner with Werner to produce an assessment of known application risks in a functional way that can be repeated for all of Werner’s applications. To achieve this, we created a risk …
Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman
Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman
Theses/Capstones/Creative Projects
This essay explores the relationship between individuals' cybersecurity education, literacy, awareness, and preparedness. While cybersecurity is often associated with complex hacking scenarios, the majority of data breaches and cyber-attacks result from individuals inadvertently falling prey to phishing emails and malware. The lack of standardized education and training in cybersecurity, coupled with the rapid expansion of technology diversity, raises concerns about individuals' cybersecurity preparedness. As individuals are the first line of defense and the weakest link in cybersecurity, understanding the influence of education, literacy, and awareness on their adherence to best practices is crucial. This work aims to survey a diverse …
The State And Use Of Virtual Tutors, Thomas Anthone
The State And Use Of Virtual Tutors, Thomas Anthone
Theses/Capstones/Creative Projects
Virtual tutoring is the process by which students and teachers participate in the learning experience in an online, virtual, or networked environment. This process can not only separate the participants from each other in a physical space, but it can also separate them by time. Virtual tutoring can take the form of the group of students coming together synchronously in an online setting and receiving lessons from a single tutor, or by asynchronous learning in which the teacher pre-plans lessons in advance that the students consume on their own time. The advent of online learning technologies and virtual learning environments …
Attenuated Skeletal Muscle Metabolism Explains Blunted Reactive Hyperemia After Prolonged Sitting, Cody Anderson, Elizabeth Pekas, Michael Allen, Song-Young Park
Attenuated Skeletal Muscle Metabolism Explains Blunted Reactive Hyperemia After Prolonged Sitting, Cody Anderson, Elizabeth Pekas, Michael Allen, Song-Young Park
UNO Student Research and Creative Activity Fair
Introduction: Although reduced post-occlusive reactive hyperemia (PORH) after prolonged sitting (PS) has been reported as impaired microvascular function, no specific mechanism(s) have been elucidated. One potential mechanism, independent of microvascular function, is that an altered muscle metabolic rate (MMR) may change the magnitude of PORH by modifying the oxygen deficit achieved during cuff-induced arterial occlusions. We speculated that if MMR changes during PS, this may invalidate current inferences about microvascular function during PS. Objective: Therefore, the objective of this study was to examine if peripheral leg MMR changes during PS and to ascertain whether the change in the oxygen deficit …
Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter
Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter
UNO Student Research and Creative Activity Fair
In the wake of the Tulsa, Oklahoma hospital shooting in the summer of 2022, it was made clear that more security needed to be implemented in healthcare facilities. As a result, I inquired: What is the happy balance for healthcare facilities to maintain their accessibility to the public while also implementing security measures to prevent terrorist attacks? With that base, I give recommendations in the areas of cybersecurity, physical infrastructure, and physical and mental health, based off the existing literature and data gathered from terrorist attacks against hospitals over several decades.
The Effects Of Demographics And Risk Factors On The Morphological Characteristics Of Human Femoropopliteal Arteries, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy
The Effects Of Demographics And Risk Factors On The Morphological Characteristics Of Human Femoropopliteal Arteries, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy
UNO Student Research and Creative Activity Fair
Background: Disease of the lower extremity arteries (Peripheral Arterial Disease, PAD) is associated with high morbidity and mortality. During disease development, the arteries adapt by changing their diameter, wall thickness, and residual deformations, but the effects of demographics and risk factors on this process are not clear.
Methods: Superficial femoral arteries from 736 subjects (505 male, 231 female, 12 to 99 years old, average age 51±17.8 years) and the associated demographic and risk factor variables were used to construct machine learning (ML) regression models that predicted morphological characteristics (diameter, wall thickness, and longitudinal opening angle resulting from the …
Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens
Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens
UNO Student Research and Creative Activity Fair
Human movement is inherently variable by nature. One of the most common analytical tools for assessing movement variability is the largest Lyapunov exponent (LyE) which quantifies the rate of trajectory divergence or convergence in an n-dimensional state space. One popular method for assessing LyE is the Wolf algorithm. Many studies have investigated how Wolf’s calculation of the LyE changes due to sampling frequency, filtering, data normalization, and stride normalization. However, a surprisingly understudied parameter needed for LyE computation is evolution time. The purpose of this study is to investigate how the LyE changes as a function of evolution time …
Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht
Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht
Theses/Capstones/Creative Projects
Algorithm run-time complexity analysis is an important topic in data structures and algorithms courses, but it is also a topic that many students struggle with. Commonly cited difficulties include the necessary mathematical background knowledge, the abstract nature of the topic, and the presentation style of the material. Analyzing the subject of algorithm analysis using multiple learning theories shows that course materials often leave out key steps in the learning process and neglect certain learning styles. Students can be more successful at learning algorithm run-time complexity analysis if these missing stages and learning styles are addressed.
Positive Dependency Graphs Revisited, Jorge Fandinno, Vladimir Lifschitz
Positive Dependency Graphs Revisited, Jorge Fandinno, Vladimir Lifschitz
Computer Science Faculty Publications
Theory of stable models is the mathematical basis of answer set programming. Several results in that theory refer to the concept of the positive dependency graph of a logic program. We describe a modification of that concept and show that the new understanding of positive dependency makes it possible to strengthen some of these results.
Using Graph Theoretical Methods And Traceroute To Visually Represent Hidden Networks, Jordan M. Sahs
Using Graph Theoretical Methods And Traceroute To Visually Represent Hidden Networks, Jordan M. Sahs
UNO Student Research and Creative Activity Fair
Within the scope of a Wide Area Network (WAN), a large geographical communication network in which a collection of networking devices communicate data to each other, an example being the spanning communication network, known as the Internet, around continents. Within WANs exists a collection of Routers that transfer network packets to other devices. An issue pertinent to WANs is their immeasurable size and density, as we are not sure of the amount, or the scope, of all the devices that exists within the network. By tracing the routes and transits of data that traverses within the WAN, we can identify …
Abstract Argumentation And Answer Set Programming: Two Faces Of Nelson’S Logic, Jorge Fandinno, Luis Fariñas Del Cerro
Abstract Argumentation And Answer Set Programming: Two Faces Of Nelson’S Logic, Jorge Fandinno, Luis Fariñas Del Cerro
Computer Science Faculty Publications
In this work, we show that both logic programming and abstract argumentation frameworks can be interpreted in terms of Nelson’s constructive logic N4. We do so by formalising, in this logic, two principles that we call noncontradictory inference and strengthened closed world assumption: the first states that no belief can be held based on contradictory evidence while the latter forces both unknown and contradictory evidence to be regarded as false. Using these principles, both logic programming and abstract argumentation frameworks are translated into constructive logic in a modular way and using the object language. Logic programming implication and abstract argumentation …
Prediction Of Balance Control And Instability In Walking At Sea, Jungyeon Choi
Prediction Of Balance Control And Instability In Walking At Sea, Jungyeon Choi
Computer Science Graduate Research Workshop
No abstract provided.
Interactive Visualizations For Explanation In Ai, Ashley Ramsey
Interactive Visualizations For Explanation In Ai, Ashley Ramsey
Computer Science Graduate Research Workshop
No abstract provided.
Automated Program Repair For Api Misuse Vulnerabilities, Dip Kiran Pradhan Newar
Automated Program Repair For Api Misuse Vulnerabilities, Dip Kiran Pradhan Newar
Computer Science Graduate Research Workshop
No abstract provided.
New Approaches To Convex Polygon Formations, Rui Yang
New Approaches To Convex Polygon Formations, Rui Yang
Computer Science Graduate Research Workshop
No abstract provided.
Workload Prediction With Cost-Aware Data Analytics System, Anshuman Das Mohapatra
Workload Prediction With Cost-Aware Data Analytics System, Anshuman Das Mohapatra
Computer Science Graduate Research Workshop
No abstract provided.