Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 31

Full-Text Articles in Physical Sciences and Mathematics

Identifying Key Activity Indicators In Rats' Neuronal Data Using Lasso Regularized Logistic Regression, Avery Woods May 2023

Identifying Key Activity Indicators In Rats' Neuronal Data Using Lasso Regularized Logistic Regression, Avery Woods

Honors Theses

This thesis aims to identify timestamps of rats’ neuronal activity that best determine behavior using a machine learning model. Neuronal data is a complex and high-dimensional dataset, and identifying the most informative features is crucial for understanding the underlying neuronal processes. The Lasso regularization technique is employed to select the most relevant features of the data to the model’s prediction. The results of this study provide insights into the key activity indicators that are associated with specific behaviors or cognitive processes in rats, as well as the effect that stress can have on neuronal activity and behavior. Ultimately, it was …


Exploration Of Feature Selection Techniques In Machine Learning Models On Hptlc Images For Rule Extraction, Bozidar-Brannan Kovachev May 2023

Exploration Of Feature Selection Techniques In Machine Learning Models On Hptlc Images For Rule Extraction, Bozidar-Brannan Kovachev

Honors Theses

Research related to Biology often utilizes machine learning models that are ultimately uninterpretable by the researcher. It would be helpful if researchers could leverage the same computing power but instead gain specific insight into decision-making to gain a deeper understanding of their domain knowledge. This paper seeks to select features and derive rules from a machine learning classification problem in biochemistry. The specific point of interest is five species of Glycyrrhiza, or Licorice, and the ability to classify them using High-Performance Thin Layer Chromatography (HPTLC) images. These images were taken using HPTLC methods under varying conditions to provide eight …


Critically Observing The Challenges And Changes: An Analysis On Covid-19’S Impact With An Emphasis On Students In Higher Education, Landon Perkins Dec 2022

Critically Observing The Challenges And Changes: An Analysis On Covid-19’S Impact With An Emphasis On Students In Higher Education, Landon Perkins

Honors Theses

This project involves comparing different visualizations related to COVID-19 and higher education in order to determine key impacts of the COVID-19 pandemic on students in higher education, as well as higher education as a whole. The main metrics used to determine the impact were mental health indicators for anxiety or depressive disorders, enrollment numbers by control type (public, private non-profit, or private for-profit) and state for 2020 and 2021, and state mandate lift dates for a variety of mandates implemented across the United States. These metrics were analyzed both individually and against each other to determine if they had any …


Improving Adjacency List Storage Methods For Polypeptide Similarity Analysis, Arianna Swensen Dec 2022

Improving Adjacency List Storage Methods For Polypeptide Similarity Analysis, Arianna Swensen

Honors Theses

Protein design is a complex biomolecular and computational problem. Working on increasingly large protein folding problems requires an improvement in current analysis methods available. This work first discusses various methods of protein design, including de novo protein design, which is the primary focus of this thesis. Then, a new approach utilizing a B+ tree to effectively store and query a graph of keys and vertices is proposed in order to store the number of times two polypeptides are considered to be similar. This approach is found to have a reduction in time complexity from current mapping methods and thus provides …


Computational Investigations Into Astrochemical Inorganic Oxides, Ammonia Borane, And Genetic Algorithms, E. Michael Valencia May 2022

Computational Investigations Into Astrochemical Inorganic Oxides, Ammonia Borane, And Genetic Algorithms, E. Michael Valencia

Honors Theses

The formulations of quantum mechanics in the early 1900s were exciting theoretical discoveries, but were not practical to apply until the advent of computers and the subsequent computational methods in 1951. With the introduction of tractable simplifications, procedures such as Hartree-Fock allowed for determination of properties of non-trivial systems. Presently, huge leads of computational power have allowed for extremely precise, quantitative work that can be applied to the human body, synthesis, or even astrochemical processes. This thesis presents works concerning 1) the history of quantum mechanics; 2) a brief primer on computational chemistry and its methods; 3) inorganic oxides in …


Increasing Perceived Realism Of Objects In A Mixed Reality Environment Using 'Diminished Virtual Reality', Logan Scott Parker May 2022

Increasing Perceived Realism Of Objects In A Mixed Reality Environment Using 'Diminished Virtual Reality', Logan Scott Parker

Honors Theses

With the recent explosion of popularity of virtual and mixed reality, an important question has arisen: “Is there a way to create a better blend of real and virtual worlds in a mixed reality experience?” This research attempts to determine whether a visual filter can be created and applied to virtual objects to better convince the brain into interpreting a composite of virtual and real views as one seamless view. The method devised in this thesis is being called 'Diminished Virtual Reality'. The results found in this study show that when presented with a scene composed of a combination of …


Sandworms And Computer Worms: An Assessment Of American Critical Infrastructure Cyber Vulnerabilities And The Russian Federation's Growing Offensive Capabilities, Spencer Johns Apr 2022

Sandworms And Computer Worms: An Assessment Of American Critical Infrastructure Cyber Vulnerabilities And The Russian Federation's Growing Offensive Capabilities, Spencer Johns

Honors Theses

Bottom Line Up Front: It is highly likely that the Russian GRU has the capability, resources, and intent to execute cyberweapon attacks against American critical infrastructure in times of heightened tensions, either as a warning or a first strike. I also assess that much of current American critical infrastructure is not secure enough to withstand a coordinated assault by the GRU, and very likely has numerous severe vulnerabilities known by the GRU.


Incorporating Demographic Structure And Variable Interaction Types Into Community Assembly Models, Akhil Reddy Alasandagutti, Nayan Chawla May 2021

Incorporating Demographic Structure And Variable Interaction Types Into Community Assembly Models, Akhil Reddy Alasandagutti, Nayan Chawla

Honors Theses

Theoretical studies of ecological food webs have allowed ecologists to remove the constraints of specific location and timescales from their study of ecological communities; food webs are generally complex and thus empirical study is difficult. Further, this theoretical approach allows ecologists to compare ecological processes and outcomes across any possible food web structures. However, these simulated communities are only as useful as the model from which they were constructed. Modifying existing considerations in these models, and generating new ones, are the jobs of theoretical ecologists that seek to achieve the shared goal of a majority of simulations: representation of real …


Using Deep Learning To Automate The Diagnosis Of Skin Melanoma, Akhil Reddy Alasandagutti May 2021

Using Deep Learning To Automate The Diagnosis Of Skin Melanoma, Akhil Reddy Alasandagutti

Honors Theses

Machine learning and image processing techniques have been widely implemented in the field of medicine to help accurately diagnose a multitude of medical conditions. The automated diagnosis of skin melanoma is one such instance. However, a majority of the successful machine learning models that have been implemented in the past have used deep learning approaches where only raw image data has been utilized to train machine learning models, such as neural networks. While they have been quite effective at predicting the condition of these lesions, they lack key information about the images, such as clinical data, and features that medical …


Increasing The Effectiveness Of Impossible Spaces In Virtual Environments Using Moving Textures, Dylan Devenny May 2019

Increasing The Effectiveness Of Impossible Spaces In Virtual Environments Using Moving Textures, Dylan Devenny

Honors Theses

This study looks to examine a method of overcoming the limitations caused by the size of a physical tracking area in virtual reality environments known as impossible spaces and attempt to improve its efficiency by altering the texture flow of the virtual environment. The experiment involves running participants through a series of small buildings consisting of two rooms in which the percentage of overlap between the two rooms and the ratio of texture movement to user movement (corresponding to textural ow conditions) differs from trial to trial and asking participants to make a judgement of whether or not the environment …


Indoor Localization Using A Smartphone: Approaches, Issues, And Challenges, Lee J. Easson May 2019

Indoor Localization Using A Smartphone: Approaches, Issues, And Challenges, Lee J. Easson

Honors Theses

Localization has gained priority in an increasingly inter-connected world. The majority of industries and sectors require some means of tracking the location of objects and/or people anywhere on the Earth, whether indoors or outdoors. GPS is an already-implemented and viable solution for outdoor localization. However, indoor localization is more challenging to implement and thus has become a broad area of research. Despite the challenges of tracking location in places where satellite GPS signals are unreliable or unreachable (i.e. within a building or structure), there has been considerable progress made in indoor localization research. Although current indoor localization technology can achieve …


Effects Of Halogen Bonding On 13c Nmr Shifts Of Iodotolan, James Long May 2019

Effects Of Halogen Bonding On 13c Nmr Shifts Of Iodotolan, James Long

Honors Theses

Halogen bonding is the ability of heavier halogens to have noncovalent interactions similar to hydrogen bonding. By mixing two compounds that should halogen bond together and analyzing this mixture with carbon NMR spectroscopy, we attempted to test the strength and extent of halogen bonding in 4-iodotolan. After observing the changes in the 4-iodotolans chemical shifts, the halogen bond appears to be too weak to affect the chemical shifts in a substantial manner; however, the C-I bonded carbon shows a slight but consistent increase in its shift which could be an avenue for future research.


Understanding Juuling Trends Among Differing Age And Gender Demographics Through Social Sensing, Thomas Mcfann May 2019

Understanding Juuling Trends Among Differing Age And Gender Demographics Through Social Sensing, Thomas Mcfann

Honors Theses

Middle schoolers, high schoolers, and college students have increasingly begun using the Juul, which is a type of e-cigarette. In fact, in 2017 a study showed that “2.1 million high schoolers and middle schoolers used e-cigarettes” (Richtel and Kaplan, 2018). The reason why my research specifically addresses the Juul is that it “is now the largest e-cigarette brand measured by retail sales companies” (Huang et al., 2018b). Studies have been done to show the short time it takes for a child to lose autonomy over tobacco use, ranging from 2 to 30 days of first inhaling a cigarette (DiFranza et …


#Whyididntreport: Using Social Media As A Tool To Understand Why Sexual Assault Victims Do Not Report, Abby Garrett May 2019

#Whyididntreport: Using Social Media As A Tool To Understand Why Sexual Assault Victims Do Not Report, Abby Garrett

Honors Theses

Sexual assault has gone largely under-reported, and social media movements, like #WhyIDidntReport, have brought great awareness to this issue. In order to take advantage of the large amounts of data the #WhyIDidntReport movement has generated, the study uses tweets to explore reasons why victims do not report their assault. The thesis cites current research on the topic of assault to generate a list of explanations victims use to describe their lack of reporting and compares the distributions with existing studies. We use a supervised learning technique to automatically categorize tweets into one of eight categories. This approach uses social sensing …


Dworkinian Liberalism, The Right To Pornography, And The Internet, Will Nowell Jan 2019

Dworkinian Liberalism, The Right To Pornography, And The Internet, Will Nowell

Honors Theses

In a 1981 journal article, “Is There A Right to Pornography?,” Ronald Dworkin argues that we have a right to ethical independence that includes the right to consume pornography. The purpose of this thesis is to inquire as to whether Dworkinian liberalism does entail a right to specifically internet pornography. This research is primarily focused on Ronald Dworkin’s writings in Justice for Hedgehogs, Sovereign Virtue: The Theory and Practice of Equality, and Taking Rights Seriously to describe the principles and character of Dworkinian liberalism and its philosophical relationship to the question of the right to pornography. This thesis considers contemporary …


Survey Of Biosynthetic Gene Clusters From Sequenced Myxobacteria And Analysis Of Potential Metabolic Diversity, Katherine C. Gregory Jan 2019

Survey Of Biosynthetic Gene Clusters From Sequenced Myxobacteria And Analysis Of Potential Metabolic Diversity, Katherine C. Gregory

Honors Theses

The importance of natural product discovery to society is undeniable as natural products have seemingly infinite applications, particularly in regard to pharmacological use as antibacterial, antifungal, antiparasitic, anticancer and immunosuppressive agents. The search for new therapeutics and other new chemical commodities thus grows simultaneously with antibiotic resistance and commercial pressure on pharmaceutical research. However, the increasingly common phenomenon of natural product rediscovery continues to inhibit advancement in this field. We contend that the likelihood of rediscovery can be predicted by taxonomic distance between the bacteria in question and previously studied bacteria. That is, our data supports a correlation between chemical …


Classically Biased: A Quantitative Analysis Of Gender & Writing Styles In Classical Literature, Madeleine Rose Delcambre Jan 2019

Classically Biased: A Quantitative Analysis Of Gender & Writing Styles In Classical Literature, Madeleine Rose Delcambre

Honors Theses

This thesis is a first attempt in assessing patterns related to gender in classical literature prior to the 21st century, specifically looking at the way writing styles and language di↵er among female and male authors; e.g., sentence structuring, lexical diversity, and dictionary similarities. Further topics of analysis included gender distribution and sentiment within the novels themselves. Seventy-eight open-source novels were used in the analysis, with thirty-one books by female authors and forty-seven by male authors. Data from the novels was acquired using Python, natural language processing, and the Natural Language Toolkit (NLTK). Graphs and visuals were then created to summarize …


A Quantitative Evaluation Of The Htc Vive For Virtual Reality Research, Ethan Luckett Jan 2018

A Quantitative Evaluation Of The Htc Vive For Virtual Reality Research, Ethan Luckett

Honors Theses

The equipment typically used in virtual reality (VR) research, including head-mounted displays (HMDs) and motion capture systems, has traditionally been prohibitively expensive. The recent increase in the availability of consumer-grade VR equipment has greatly lowered the barrier to entry for VR research. The equipment typically used for research can cost upwards of tens of thousands of dollars, but the consumer-grade HTC Vive system offers an HMD with room-scale tracking for less than $500. In order for scientific studies to be properly conducted using the Vive, its tracking must be well understood. This study measures the accuracy and drift in the …


Autonomous Vehicle Communication Using Blockchain, Reid Barber Jan 2018

Autonomous Vehicle Communication Using Blockchain, Reid Barber

Honors Theses

With recent advancements in machine learning and interest in expanding the smart city, various technology companies and car manufacturers have begun pour- ing billions of dollars into research and development of autonomous vehicles. While many companies are hard at work developing their own driverless cars, it is important to begin planning how these cars will communicate with one another and other in- frastructure. Because the safety of passengers and pedestrians are heavily dependent on these communications, the careful design and implementation of these networks is crucial. Blockchain is another technology that has amassed a great deal of attention in recent …


Sentiment Of The Union: Analyzing Tone In Presidential State Of The Union Addresses, Chase Rydeen Jan 2018

Sentiment Of The Union: Analyzing Tone In Presidential State Of The Union Addresses, Chase Rydeen

Honors Theses

As the machine learning and data science craze sweeps the nation, the implications and implementations are vast. This paper takes a look at both of them through the lens of a topic of national importance, at the very least for the United States. This topic is the words used by past Presidents of the United States, which are being pulled from their State of the Union Addresses. The focus of this research is on Natural Language Processing (NLP) and it's applied processes. Natural Language Processing allows for effective analysis of text-based data. Using NLP, a sentiment analysis was conducted on …


Classifying #Metoo Hash-Tagged Tweets By Semantics To Understand The Extent Of Sexual Harassment, Claire Hubacek Jan 2018

Classifying #Metoo Hash-Tagged Tweets By Semantics To Understand The Extent Of Sexual Harassment, Claire Hubacek

Honors Theses

This thesis contains a program that will process tweets from Twitter that use the hashtag "#MeToo" and categorize them by their relevance to the movement, their stance on the movement, and the type of sexual harassment expressed (if applicable). Being able to work with a narrowed set of tweets belonging to a specific category creates the capacity to do more in-depth research and analysis, exploring Twitter as a special platform for discussing these sensitive topics and showing that this online space for expressing personal experiences has delivered unprecedented potential avenues of study. This thesis also contains research into additional solutions …


Utilizing Natural Language Processing And Other Technical Tools To Automate The Financial Modeling Process While Maintaining Robustness In The Model, Robert Forrest Short Jan 2017

Utilizing Natural Language Processing And Other Technical Tools To Automate The Financial Modeling Process While Maintaining Robustness In The Model, Robert Forrest Short

Honors Theses

The objective of this thesis is to improve upon the most commonly utilized, entirely manual financial modeling process. This thesis gives guidance for implementing a set of technical tools that can be utilized in an individual's financial modeling process to automate repetitive and predictable tasks. The goal is not to provide a robust set of tools that can be implemented across all financial models; in fact, this may not be possible. The goal is to provide a basis for anyone who utilizes financial modeling to study their own modeling processes and adapt the given tools to fit into and improve …


The Ping-Pong Project, Adhithya Ravishankar Jan 2017

The Ping-Pong Project, Adhithya Ravishankar

Honors Theses

Table Tennis, more commonly referred to as ping pong, has been a sport of the elite for over two centuries since its inception in the late 1800s. However, coaching for this sport is not usually taught in most places, and many do not know how to play this sport. To democratize the sport, and make it more accessible to everyone, this program was designed to analyze a player's game and to give suggestions and recommendations to improve it. Using hard coded rules and tests, this program is designed to coach someone by detecting and measuring the speed and the spin …


Implementation Of An Enhanced System Of Motion Tracking For Virtual Reality Using 'Common Off-The-Shelf' Items, Sean M. O'Hara Jan 2016

Implementation Of An Enhanced System Of Motion Tracking For Virtual Reality Using 'Common Off-The-Shelf' Items, Sean M. O'Hara

Honors Theses

My project was tasked and guided by Dr. Adam Jones of the University of Mississippi's Computer Science Department to design and implement an improved system of infrared motion tracking for virtual reality. The enhancements allow Dr. Jones to use motion tracking for VR in ways that he previously could not, and these improvements include the ability to track multiple objects along with a foundation for expanding my project's use to work with a multiple camera setup for motion tracking. The hardware used in my project made use of Dr. Jones' supply of technology for development and research within the area …


A Visualization Tool For Survey Responses And A Unifying Interface Redesign, Iva Cramer Jan 2015

A Visualization Tool For Survey Responses And A Unifying Interface Redesign, Iva Cramer

Honors Theses

As an intern for financial software company FNC, Inc. during the summer of 2014, my fellow interns and I began an innovation project for creating and analyzing surveys for better client feedback methods. I have continued this project even after the internship, and this thesis covers that continuation: the visualization of survey responses and the redesign of the page on which they are contained. The project detailed here was to revamp the survey statistics page with a coherent layout that matches the rest of the site in addition to overhauling the actual graphs and charts for aesthetic and accuracy.


Estimating The Number Of Components Of A Spatial—Em Algorithm: An R Package, Aishat O. Aloba Jan 2015

Estimating The Number Of Components Of A Spatial—Em Algorithm: An R Package, Aishat O. Aloba

Honors Theses

The Expectation Maximization algorithm also known as the EM algorithm is an algorithm used to solve the maximum likelihood parameter estimation problem. This problem arises when some of the data involved are missing or incomplete, hence it becomes difficult to know the parameters of the underlying distribution. The EM algorithm mainly comprises of two steps; the E—Step, and the M—Step. In the E—Step, estimated parameter values are used as true values to calculate the maximum likelihood estimate, and in the M—Step, the maximum likelihood calculated is used to estimate the parameters. The E—Step and M—Step iterate through until a specified …


Modelling Global Climate Variables With Cellular Automata Networks, David Robinson Jan 2015

Modelling Global Climate Variables With Cellular Automata Networks, David Robinson

Honors Theses

Cellular automata are discrete models that can be used to simulate many physical systems. Cellular automata have been used to model gas diffusion, different types of chemical reactions, population growth, and land use change over time. Recent research into cellular automata networks has shown that if sparse long range connections are added to a cellular automata, then it will exhibit properties of complex networks. Furthermore, research into modeling climate systems has shown that modeling the global climate as a complex network can be used to predict individual climate variables. In this work we attempt to connect these ideas by simulating …


Para-Interface: A Novel Interface For Para-Aeh Software Suite, Michael Ginn Jan 2015

Para-Interface: A Novel Interface For Para-Aeh Software Suite, Michael Ginn

Honors Theses

Para-AEH is a software suite designed to the Asymptotic Expansion Homogenization method. This method is commonly used to model structures by using differential equations to represent larger structure from a smaller structure input. In order to facilitate the University of Mississippi's Department of Mechanical Engineering's research purposes the software needed to be installed. A novel interface was designed to remove the overhead of interacting with the software on a command line based level. The software allows the management of users that can access the software and jobs that package several commands together for asynchronous execution without manual intervention.


Implementation Of A Visualizer For Web Request Data Generated By An Internet Information Services Server, Daniel J. Garrett Jan 2014

Implementation Of A Visualizer For Web Request Data Generated By An Internet Information Services Server, Daniel J. Garrett

Honors Theses

I was tasked by Graham Green at FNC, Inc. to design a web tool that is capable of visualizing log data that is produced by FNC's many servers. These logs contain data that will warn Graham about web pages that are failing, servers that are experiencing heavy loads, and sundry other pieces of information, but the data is pure text, and each server has thousands of logs. A visual tool is needed to display necessary information about the data. Rather than make a graph for each individual purpose that might be needed, I built visualization tools that are customizable for …


Dynamic Feature Extraction And User Classification Using Touchanalytics™, Clay Mcleod Jan 2014

Dynamic Feature Extraction And User Classification Using Touchanalytics™, Clay Mcleod

Honors Theses

Security systems for modern computing devices suffer from a multitude of weaknesses that can render users helpless against an attack on their system. Various attempts at incorporating human characteristics into security systems have achieved varying levels of success in improving security. In this paper, we study the usefulness of TouchAnalytics™ - a second-level security system that attempts to authenticate a user based on touch-data gathered from an interaction with the device. Through the use of machine learning algorithms, we developed a system that is successful at au- thenticating users, achieving under 0.05% False Authentication Rate (FAR). We conclude that the …