Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Physical Sciences and Mathematics

Remote Sensing Of Forests Using Discrete Return Airborne Lidar, Hamid Hamraz, Marco A. Contreras Dec 2017

Remote Sensing Of Forests Using Discrete Return Airborne Lidar, Hamid Hamraz, Marco A. Contreras

Forestry and Natural Resources Faculty Publications

Airborne discrete return light detection and ranging (LiDAR) point clouds covering forested areas can be processed to segment individual trees and retrieve their morphological attributes. Segmenting individual trees in natural deciduous forests, however, remained a challenge because of the complex and multi-layered canopy. In this chapter, we present (i) a robust segmentation method that avoids a priori assumptions about the canopy structure, (ii) a vertical canopy stratification procedure that improves segmentation of understory trees, (iii) an occlusion model for estimating the point density of each canopy stratum, and (iv) a distributed computing approach for efficient processing at the forest level. …


A Brief Overview Of Intelligent Mobility Management For Future Wireless Mobile Networks, Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song Nov 2017

A Brief Overview Of Intelligent Mobility Management For Future Wireless Mobile Networks, Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song

Information Science Faculty Publications

No abstract provided.


Ordinal Convolutional Neural Networks For Predicting Rdoc Positive Valence Psychiatric Symptom Severity Scores, Anthony Rios, Ramakanth Kavuluru Nov 2017

Ordinal Convolutional Neural Networks For Predicting Rdoc Positive Valence Psychiatric Symptom Severity Scores, Anthony Rios, Ramakanth Kavuluru

Computer Science Faculty Publications

Background—The CEGS N-GRID 2016 Shared Task in Clinical Natural Language Processing (NLP) provided a set of 1000 neuropsychiatric notes to participants as part of a competition to predict psychiatric symptom severity scores. This paper summarizes our methods, results, and experiences based on our participation in the second track of the shared task.

Objective—Classical methods of text classification usually fall into one of three problem types: binary, multi-class, and multi-label classification. In this effort, we study ordinal regression problems with text data where misclassifications are penalized differently based on how far apart the ground truth and model predictions are …


Predicting Mental Conditions Based On "History Of Present Illness" In Psychiatric Notes With Deep Neural Networks, Tung Tran, Ramakanth Kavuluru Nov 2017

Predicting Mental Conditions Based On "History Of Present Illness" In Psychiatric Notes With Deep Neural Networks, Tung Tran, Ramakanth Kavuluru

Computer Science Faculty Publications

Background—Applications of natural language processing to mental health notes are not common given the sensitive nature of the associated narratives. The CEGS N-GRID 2016 Shared Task in Clinical Natural Language Processing (NLP) changed this scenario by providing the first set of neuropsychiatric notes to participants. This study summarizes our efforts and results in proposing a novel data use case for this dataset as part of the third track in this shared task.

Objective—We explore the feasibility and effectiveness of predicting a set of common mental conditions a patient has based on the short textual description of patient’s history …


Single Versus Concurrent Systems: Nominal Classification In Mian, Greville G. Corbett, Sebastian Fedden, Raphael Finkel Oct 2017

Single Versus Concurrent Systems: Nominal Classification In Mian, Greville G. Corbett, Sebastian Fedden, Raphael Finkel

Computer Science Faculty Publications

The Papuan language Mian allows us to refine the typology of nominal classification. Mian has two candidate classification systems, differing completely in their formal realization but overlapping considerably in their semantics. To determine whether to analyse Mian as a single system or concurrent systems we adopt a canonical approach. Our criteria – orthogonality of the systems (we give a precise measure), semantic compositionality, morphosyntactic alignment, distribution across parts of speech, exponence, and interaction with other features – point mainly to an analysis as concurrent systems. We thus improve our analysis of Mian and make progress with the typology of nominal …


Detecting And Accounting For Multiple Sources Of Positional Variance In Peak List Registration Analysis And Spin System Grouping, Andrey Smelter, Eric C. Rouchka, Hunter N. B. Moseley Aug 2017

Detecting And Accounting For Multiple Sources Of Positional Variance In Peak List Registration Analysis And Spin System Grouping, Andrey Smelter, Eric C. Rouchka, Hunter N. B. Moseley

Molecular and Cellular Biochemistry Faculty Publications

Peak lists derived from nuclear magnetic resonance (NMR) spectra are commonly used as input data for a variety of computer assisted and automated analyses. These include automated protein resonance assignment and protein structure calculation software tools. Prior to these analyses, peak lists must be aligned to each other and sets of related peaks must be grouped based on common chemical shift dimensions. Even when programs can perform peak grouping, they require the user to provide uniform match tolerances or use default values. However, peak grouping is further complicated by multiple sources of variance in peak position limiting the effectiveness of …


Forest Understory Trees Can Be Segmented Accurately Within Sufficiently Dense Airborne Laser Scanning Point Clouds, Hamid Hamraz, Marco A. Contreras, Jun Zhang Jul 2017

Forest Understory Trees Can Be Segmented Accurately Within Sufficiently Dense Airborne Laser Scanning Point Clouds, Hamid Hamraz, Marco A. Contreras, Jun Zhang

Computer Science Faculty Publications

Airborne laser scanning (LiDAR) point clouds over large forested areas can be processed to segment individual trees and subsequently extract tree-level information. Existing segmentation procedures typically detect more than 90% of overstory trees, yet they barely detect 60% of understory trees because of the occlusion effect of higher canopy layers. Although understory trees provide limited financial value, they are an essential component of ecosystem functioning by offering habitat for numerous wildlife species and influencing stand development. Here we model the occlusion effect in terms of point density. We estimate the fractions of points representing different canopy layers (one overstory and …


Multiple Attributes Decision Fusion For Wireless Sensor Networks Based On Intuitionistic Fuzzy Set, Zhenjiang Zhang, Ziqi Hao, Sherali Zeadally, Jing Zhang, Bowen Han, Han-Chieh Chao Jul 2017

Multiple Attributes Decision Fusion For Wireless Sensor Networks Based On Intuitionistic Fuzzy Set, Zhenjiang Zhang, Ziqi Hao, Sherali Zeadally, Jing Zhang, Bowen Han, Han-Chieh Chao

Information Science Faculty Publications

Decision fusion is an important issue in wireless sensor networks (WSN), and intuitionistic fuzzy set (IFS) is a novel method for dealing with uncertain data. We propose a multi-attribute decision fusion model based on IFS, which includes two aspects: data distribution-based IFS construction algorithm (DDBIFCA) and the category similarity weight-based TOPSIS intuitionistic fuzzy decision algorithm (CSWBT-IFS). The DDBIFCA is an IFS construction algorithm that transforms the original attribute values into intuitionistic fuzzy measures, and the CSWBT-IFS is an intuitionistic fuzzy aggregation algorithm improved by the traditional TOPSIS algorithm, which combines intuitionistic fuzzy values of different attributes and obtains a final …


Mining Non-Lattice Subgraphs For Detecting Missing Hierarchical Relations And Concepts In Snomed Ct, Licong Cui, Wei Zhu, Shiqiang Tao, James T. Case, Olivier Bodenreider, Guo-Qiang Zhang Jul 2017

Mining Non-Lattice Subgraphs For Detecting Missing Hierarchical Relations And Concepts In Snomed Ct, Licong Cui, Wei Zhu, Shiqiang Tao, James T. Case, Olivier Bodenreider, Guo-Qiang Zhang

Computer Science Faculty Publications

Objective: Quality assurance of large ontological systems such as SNOMED CT is an indispensable part of the terminology management lifecycle. We introduce a hybrid structural-lexical method for scalable and systematic discovery of missing hierarchical relations and concepts in SNOMED CT.

Material and Methods: All non-lattice subgraphs (the structural part) in SNOMED CT are exhaustively extracted using a scalable MapReduce algorithm. Four lexical patterns (the lexical part) are identified among the extracted non-lattice subgraphs. Non-lattice subgraphs exhibiting such lexical patterns are often indicative of missing hierarchical relations or concepts. Each lexical pattern is associated with a potential specific type of error. …


2d And 3d Pointing Device Based On A Passive Lights Detection Operation Method Using One Camera, Fuhua Cheng Jun 2017

2d And 3d Pointing Device Based On A Passive Lights Detection Operation Method Using One Camera, Fuhua Cheng

Computer Science Faculty Patents

Systems for surface-free pointing and/or command input include a computing device operably linked to an imaging device. The imaging device can be any suitable video recording device including a conventional webcam. At least one pointing/input device is provided including first, second, and third sets of actuable light sources, wherein at least the first and second sets emit differently colored light. The imaging device captures one or more sequential image frames each including a view of a scene including the activated light sources. One or more computer program products calculate a two-dimensional or three-dimensional position and/or a motion and/or an orientation …


Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur Jun 2017

Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur

Information Science Faculty Publications

The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network paradigm which is providing various types of solutions to the community and the individual user in various sectors including environmental monitoring, entertainment, transportation, security, and healthcare. We explore and compare the features of wireless sensor networks and ubiquitous sensor networks and based on the differences between these two types of systems, we classify the security-related challenges of ubiquitous sensor networks. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges that need to be addressed …


Towards A Better Understanding Of On And Off Target Effects Of The Lymphocyte-Specific Kinase Lck For The Development Of Novel And Safer Pharmaceuticals, Xiaofei Zhang, Amir Kucharski, Wibe A. De Jong, Sally R. Ellingson Jun 2017

Towards A Better Understanding Of On And Off Target Effects Of The Lymphocyte-Specific Kinase Lck For The Development Of Novel And Safer Pharmaceuticals, Xiaofei Zhang, Amir Kucharski, Wibe A. De Jong, Sally R. Ellingson

Markey Cancer Center Faculty Publications

In this work we have developed a multi-tiered computational platform to study protein-drug interactions. At the beginning of the workflow more efficient and less accurate methods are used to enable large libraries of proteins in many conformations and massive chemical libraries to be screened. At each subsequent step in the workflow a subset of input data is investigated with increased accuracy and more computationally expensive methods. We demonstrate the developed workflow with the investigation of the lymphocyte-specific kinase LCK, which is implicated as a drug target in many cancers and also known to have toxic effects when unintentionally targeted. Several …


Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu May 2017

Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu

Information Science Faculty Publications

Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over the …


Ten Simple Rules For Responsible Big Data Research, Matthew Zook, Solon Barocas, Danah Boyd, Kate Crawford, Emily Keller, Seeta Peña Gangadharan, Alyssa Goodman, Rachelle Hollander, Barbara A. Koenig, Jacob Metcalf, Arvind Narayanan, Alondra Nelson, Frank Pasquale Mar 2017

Ten Simple Rules For Responsible Big Data Research, Matthew Zook, Solon Barocas, Danah Boyd, Kate Crawford, Emily Keller, Seeta Peña Gangadharan, Alyssa Goodman, Rachelle Hollander, Barbara A. Koenig, Jacob Metcalf, Arvind Narayanan, Alondra Nelson, Frank Pasquale

Geography Faculty Publications

No abstract provided.


Lightweight Three-Factor Authentication And Key Agreement Protocol For Internet-Integrated Wireless Sensor Networks, Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He Mar 2017

Lightweight Three-Factor Authentication And Key Agreement Protocol For Internet-Integrated Wireless Sensor Networks, Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He

Information Science Faculty Publications

Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of this integration, it also brings new threats, such as the exposure of sensor nodes to attacks originating from the Internet. In this context, lightweight authentication and key agreement protocols must be in place to enable end-to-end secure communication. Recently, Amin et al. proposed a three-factor mutual authentication protocol for WSNs. However, we identified several flaws in their protocol. We found that their …


Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li Mar 2017

Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li

Information Science Faculty Publications

Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will …


Using The Vehicle Routing Problem To Reduce Field Completion Times With Multiple Machines, Hasan Seyyedhasani, Joseph S. Dvorak Mar 2017

Using The Vehicle Routing Problem To Reduce Field Completion Times With Multiple Machines, Hasan Seyyedhasani, Joseph S. Dvorak

Biosystems and Agricultural Engineering Faculty Publications

The Vehicle Routing Problem (VRP) is a powerful tool used to express many logistics problems, yet unlike other vehicle routing challenges, agricultural field work consists of machine paths that completely cover a field. In this work, the allocation and ordering of field paths among a number of available machines has been transformed into a VRP that enables optimization of completion time for the entire field. A basic heuristic algorithm (a modified form of the common Clarke-Wright algorithm) and a meta-heuristic algorithm, Tabu Search, were employed for optimization. Both techniques were evaluated through computer simulations in two fields: a hypothetical basic …


Organelle_Pba, A Pipeline For Assembling Chloroplast And Mitochondrial Genomes From Pacbio Dna Sequencing Data, Aboozar Soorni, David Haak, David Zaitlin, Aureliano Bombarely Jan 2017

Organelle_Pba, A Pipeline For Assembling Chloroplast And Mitochondrial Genomes From Pacbio Dna Sequencing Data, Aboozar Soorni, David Haak, David Zaitlin, Aureliano Bombarely

Kentucky Tobacco Research and Development Center Faculty Publications

Background: The development of long-read sequencing technologies, such as single-molecule real-time (SMRT) sequencing by PacBio, has produced a revolution in the sequencing of small genomes. Sequencing organelle genomes using PacBio long-read data is a cost effective, straightforward approach. Nevertheless, the availability of simple-to-use software to perform the assembly from raw reads is limited at present.

Results: We present Organelle-PBA, a Perl program designed specifically for the assembly of chloroplast and mitochondrial genomes. For chloroplast genomes, the program selects the chloroplast reads from a whole genome sequencing pool, maps the reads to a reference sequence from a closely related species, and …


Fourth-Generation Fan Assessment Numeration System (Fans) Design And Performance Specifications, Michael P. Sama, George B. Day, Laura M. Pepple, Richard S. Gates Jan 2017

Fourth-Generation Fan Assessment Numeration System (Fans) Design And Performance Specifications, Michael P. Sama, George B. Day, Laura M. Pepple, Richard S. Gates

Biosystems and Agricultural Engineering Faculty Publications

The Fan Assessment Numeration System (FANS) is a measurement device for generating ventilation fan performance curves. Three different-sized FANS currently exist for assessing ventilation fans commonly used in poultry and livestock housing systems. All FANS consist of an array of anemometers inside an aluminum shroud that traverse the inlet or outlet of a ventilation fan. The FANS design has been updated several times since its inception and is currently in its fourth-generation (G4). The current design iteration (FANS-G4) is reported in this article with an emphasis on the hardware and software control, data acquisition systems, and operational reliability. Six FANS-G4 …