Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 71

Full-Text Articles in Physical Sciences and Mathematics

Grounding Size Predictions For Answer Set Programs, Nicholas Hippen Dec 2019

Grounding Size Predictions For Answer Set Programs, Nicholas Hippen

Student Work

Answer set programming is a declarative programming paradigm geared towards solving difficult combinatorial search problems. Logic programs under answer set semantics can typically be written in many different ways while still encoding the same problem. These different versions of the program may result in diverse performances. Unfortunately, it is not always easy to identify which version of the program performs the best, requiring expert knowledge on both answer set processing and the problem domain. More so, the best version to use may even vary depending on the problem instance. One measure that has been shown to correlate with performance is …


Multi-Label Classification Using Higher-Order Label Clusters, Dilanga Lakshitha Bandara Abeyrathna Galapita Mudiyanselage Dec 2018

Multi-Label Classification Using Higher-Order Label Clusters, Dilanga Lakshitha Bandara Abeyrathna Galapita Mudiyanselage

Student Work

Multi-label classification (MLC) is one of the major classification approaches in the context of data mining where each instance in the dataset is annotated with a set of labels. The nature of multiple labels associated with one instance often demands higher computational power compared to conventional single-label classification tasks. A multi-label classification is often simplified by decomposing the task into single-label classification which ignores correlations among labels. Incorporating label correlations into classification task can be hard since correlations may be missing, or may exist among a pair or a large subset of labels. In this study, a novel MLC approach …


An Investigation Into The Imposed Cognitive Load Of Static & Dynamic Type Systems On Programmers, Ian Vaughn Koeppe Nov 2018

An Investigation Into The Imposed Cognitive Load Of Static & Dynamic Type Systems On Programmers, Ian Vaughn Koeppe

Student Work

Static and dynamic type systems have long been a point of contention in the programming language wars. Yet, for many years, arguments on either side were drawn from personal experience and not empirical evidence. A challenge for researchers is that the usability of language constructs is difficult to quantify, especially since usability can be interpreted in many ways. By one definition, language usability can be measured in terms of the level of cognitive load imposed on a developer. This can be done through questionnaires, but ultimately user responses are subject to bias. In recent years, eye-tracking has been shown to …


Predicting User Interaction On Social Media Using Machine Learning, Chad Crowe Nov 2018

Predicting User Interaction On Social Media Using Machine Learning, Chad Crowe

Student Work

Analysis of Facebook posts provides helpful information for users on social media. Current papers about user engagement on social media explore methods for predicting user engagement. These analyses of Facebook posts have included text and image analysis. Yet, the studies have not incorporate both text and image data. This research explores the usefulness of incorporating image and text data to predict user engagement. The study incorporates five types of machine learning models: text-based Neural Networks (NN), image-based Convolutional Neural Networks (CNN), Word2Vec, decision trees, and a combination of text-based NN and image-based CNN. The models are unique in their use …


A Complete Coverage Algorithm For 3d Structural Inspection Using An Autonomous Unmanned Aerial Vehicle, Venkat Ramana Reddy Garlapati Dec 2017

A Complete Coverage Algorithm For 3d Structural Inspection Using An Autonomous Unmanned Aerial Vehicle, Venkat Ramana Reddy Garlapati

Student Work

This thesis presents a novel algorithm for complete coverage of three-dimensional structures to address the problem of autonomous structural inspection using an Unmanned Aerial Vehicle (UAV). The proposed approach uses a technique of cellular decomposition based on Morse decomposition to decompose the 3D target structure into 2D coverable faces that are subsequently connected using a graph-based representation. We then use graph traversal techniques such as the Traveling Salesman Problem (TSP) to generate a flight coverage path through the decomposed faces for a UAV to completely cover the target structure, while reducing the coverage time and distance. To test the validity …


Program Inspection And Testing Techniques For Code Clones And Refactorings In Evolving Software, Zhiyuan Chen Oct 2017

Program Inspection And Testing Techniques For Code Clones And Refactorings In Evolving Software, Zhiyuan Chen

Student Work

Developers often perform copy-and-paste activities. This practice causes the similar code fragment (aka code clones) to be scattered throughout a code base. Refactoring for clone removal is beneficial, preventing clones from having negative effects on software quality, such as hidden bug propagation and unintentional inconsistent changes. However, recent research has provided evidence that factoring out clones does not always reduce the risk of introducing defects, and it is often difficult or impossible to remove clones using standard refactoring techniques. To investigate which or how clones can be refactored, developers typically spend a significant amount of their time managing individual clone …


Tool Support For Capturing The Essence Of A Concern In Source Code, Chuntao Fu Aug 2017

Tool Support For Capturing The Essence Of A Concern In Source Code, Chuntao Fu

Student Work

Software evolves constantly to adapt to changing user needs. As it evolves, it becomes progressively harder to understand due to accumulation of code changes, increasing code size, and the introduction of complex code dependencies. As a result, it becomes harder to maintain, exposing the software to potential bugs and degradation of code quality. High maintenance costs and diminished opportunities for software reusability and portability lead to reduced return on investment, increasing the likelihood of the software product being discarded or replaced. Nevertheless, we believe that there is value in legacy software due to the amount of intellectual efforts that have …


Detection Of Comparability Subgraphs From Large Networks, Muthunagai Balakrishnamoorthy Aug 2017

Detection Of Comparability Subgraphs From Large Networks, Muthunagai Balakrishnamoorthy

Student Work

Real world large scale networks can be represented as graphs. This approach plays a key role in analysis in the domains of social networks [1] and bioinformatics [2], among others. Analyzing these networks is computationally complex and expensive, especially in terms of memory and time complexity. A popular technique subverting time and computation expense for analyzing networks is extracting substructures, which preserves more important information and less noise [12]. In this work, we use special a special substructure called comparability, which preserves transitive orientation. Our motive is to extract a maximal comparability subgraph since no algorithm exists. Our algorithm is …


Towards Student Engagement Analytics: Applying Machine Learning To Student Posts In Online Lecture Videos, Nicholas R. Stepanek May 2017

Towards Student Engagement Analytics: Applying Machine Learning To Student Posts In Online Lecture Videos, Nicholas R. Stepanek

Student Work

The use of online learning environments in higher education is becoming ever more prevalent with the inception of MOOCs (Massive Open Online Courses) and the increase in online and flipped courses at universities. Although the online systems used to deliver course content make education more accessible, students often express frustration with the lack of assistance during online lecture videos. Instructors express concern that students are not engaging with the course material in online environments, and rely on affordances within these systems to figure out what students are doing. With many online learning environments storing log data about students usage of …


Applications Of Graph Embedding In Mesh Untangling, Jake Quinn May 2017

Applications Of Graph Embedding In Mesh Untangling, Jake Quinn

Student Work

The subject of this thesis is mesh untangling through graph embedding, a method of laying out graphs on a planar surface, using an algorithm based on the work of Fruchterman and Reingold[1]. Meshes are a variety of graph used to represent surfaces with a wide number of applications, particularly in simulation and modelling. In the process of simulation, simulated forces can tangle the mesh through deformation and stress. The goal of this thesis was to create a tool to untangle structured meshes of complicated shapes and surfaces, including meshes with holes or concave sides. The goals of graph embedding, such …


Improving Software Quality By Synergizing Effective Code Inspection And Regression Testing, Bo Guo May 2017

Improving Software Quality By Synergizing Effective Code Inspection And Regression Testing, Bo Guo

Student Work

Software quality assurance is an essential practice in software development and maintenance. Evolving software systems consistently and safely is challenging. All changes to a system must be comprehensively tested and inspected to gain confidence that the modified system behaves as intended. To detect software defects, developers often conduct quality assurance activities, such as regression testing and code review, after implementing or changing required functionalities. They commonly evaluate a program based on two complementary techniques: dynamic program analysis and static program analysis. Using an automated testing framework, developers typically discover program faults by observing program execution with test cases that encode …


Algorithms For Modular Self-Reconfigurable Robots: Decision Making, Planning, And Learning, Ayan Dutta May 2017

Algorithms For Modular Self-Reconfigurable Robots: Decision Making, Planning, And Learning, Ayan Dutta

Student Work

Modular self-reconfigurable robots (MSRs) are composed of multiple robotic modules which can change their connections with each other to take different shapes, commonly known as configurations. Forming different configurations helps the MSR to accomplish different types of tasks in different environments. In this dissertation, we study three different problems in MSRs: partitioning of modules, configuration formation planning and locomotion learning, and we propose algorithmic solutions to solve these problems.

Partitioning of modules is a decision-making problem for MSRs where each module decides which partition or team of modules it should be in. To find the best set of partitions is …


Towards An Understanding Of The Mental Model Process While Writing Sql Queries, Zahra Hatami Jan 2017

Towards An Understanding Of The Mental Model Process While Writing Sql Queries, Zahra Hatami

Student Work

SQL (Structured Query Language) is a standard language to communicate with a relational database system. SQL is a core competency for people in the data management field and is, therefore, a foundational skill taught to users in information systems. This research analyzes users’ mental models while they formulate SQL queries. The purpose of this thesis is to understand the strategies users use. These strategies both reflect and help develop the users’ mental models. This research attempts to discover users' mental models while learning SQL for the purpose of finding better ways to teach SQL skills. This research analyzes data from …


Expectation-Centered Analytics For Instructors And Students, Suzanne L. Dazo Dec 2016

Expectation-Centered Analytics For Instructors And Students, Suzanne L. Dazo

Student Work

Learning analytics is the measurement, collection, analysis, and reporting of data about learners and their contexts. An outcome and primary goal of learning analytics should be to inform instructors, who are primary stakeholders, so that they can make effective decisions in their courses. To support instructor inquiry, I apply theory on reflective practice to learning analytic development. Articulating an instructor's pedagogical expectations is one way to begin facilitating a reflective practice. Expectations based on instructor goals serve as a natural next step and the springboard from which data can be collected. I hypothesize that a learning analytic that encodes and …


Myth Or Reality? Crowdsourcing As A Complex Problemsolving Model: Evidence From Software Developed By The Crowd And Professionals, Abhishek Tripathi Dec 2016

Myth Or Reality? Crowdsourcing As A Complex Problemsolving Model: Evidence From Software Developed By The Crowd And Professionals, Abhishek Tripathi

Student Work

Crowdsourcing is a problem-solving model. Conventional theory suggests that solving complex problems is a province of professionals, people with sufficient knowledge about the domain. Prior literature indicated that the crowd is also a great source for solving complex problems. However, there is a lack of experimental research to support that crowdsourcing is a useful model for complex problem-solving (CPS), especially in the software development context. The broad goal of this dissertation is to address this research gap and improve understanding of crowdsourcing as a viable and effective CPS model. This research proposed and tested a research model of perceived quality …


Determining The Interruption Of Services While Performing V2i Communication Using The Spmd Prototype, Binaya Raj Joshi Nov 2016

Determining The Interruption Of Services While Performing V2i Communication Using The Spmd Prototype, Binaya Raj Joshi

Student Work

The use of Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Roadside Unit (V2R) and Vehicle to Other (V2X) communications are increasingly applied over existing and upcoming transportation means by the United States Department of Transportation (USDOT) and other federal agencies. From previous statistical data, these technologies would primarily avoid or mitigate vehicle crashes and would provide more safety, mobility and various other benefits on the roads (“Traffic Safety Facts 2012,” 2013; “Traffic Safety Facts 2013” 2014). During the communication processes between vehicles, infrastructures and roadside units’ various sensitive data such as positions and speed of the vehicles, …


A Study Of Norm Formation Dynamics In Online Crowds, Nargess Tahmasbi Aug 2016

A Study Of Norm Formation Dynamics In Online Crowds, Nargess Tahmasbi

Student Work

In extreme events such as the Egyptian 2011 uprising, online social media technology enables many people from heterogeneous backgrounds to interact in response to the crisis. This form of collectivity (an online crowd) is usually formed spontaneously with minimum constraints concerning the relationships among the members. Theories of collective behavior suggest that the patterns of behavior in a crowd are not just a set of random acts. Instead they evolve toward a normative stage. Because of the uncertainty of the situations people are more likely to search for norms.

Understanding the process of norm formation in online social media is …


Understanding The Role Of Information Technology For Sustainable Development In Small Businesses And Micro-Enterprises, Jie Xiong Jul 2016

Understanding The Role Of Information Technology For Sustainable Development In Small Businesses And Micro-Enterprises, Jie Xiong

Student Work

Small businesses, including micro-enterprises, represent the majority of all firms in the world. This study investigates how Information and Communications Technologies (ICTs) can impact the performance of small businesses, including micro-enterprises. This research introduces an updated Information Technology for Development (IT4D) framework to investigate the key factors that influence the adoption of technology in small businesses. Through structural equation modeling (SEM) and factor analysis of 118 microenterprises in China, facilitating conditions, attitude toward using technology, and anxiety is positively related to the behavior intention to use IT. Also, the usage of ICTs and human capital have a positive effect towards …


Application Of Group Testing For Analyzing Noisy Networks, Vladimir Ufimtsev Jul 2016

Application Of Group Testing For Analyzing Noisy Networks, Vladimir Ufimtsev

Student Work

My dissertation focuses on developing scalable algorithms for analyzing large complex networks and evaluating how the results alter with changes to the network. Network analysis has become a ubiquitous and very effective tool in big data analysis, particularly for understanding the mechanisms of complex systems that arise in diverse disciplines such as cybersecurity [83], biology [15], sociology [5], and epidemiology [7]. However, data from real-world systems are inherently noisy because they are influenced by fluctuations in experiments, subjective interpretation of data, and limitation of computing resources. Therefore, the corresponding networks are also approximate. This research addresses these issues of obtaining …


The Ezsmt Solver: Constraint Answer Set Solving Meets Smt, Benjamin Susman May 2016

The Ezsmt Solver: Constraint Answer Set Solving Meets Smt, Benjamin Susman

Student Work

Constraint answer set programming is a promising research direction that integrates answer set programming with constraint processing. It is often informally related to the field of Satisfiability Modulo Theories. Yet, the exact formal link is obscured as the terminology and concepts used in these two research areas differ. In this thesis, by connecting these two areas, we begin the cross-fertilization of not only of the theoretical foundations of both areas but also of the existing solving technologies. We present the system EZSMT, one of the first solvers of this nature, which is able to take a large class of constraint …


Patterns And Signals Of Biology: An Emphasis On The Role Of Post Translational Modifications In Proteomes For Function And Evolutionary Progression, Oliver Bonham-Carter May 2016

Patterns And Signals Of Biology: An Emphasis On The Role Of Post Translational Modifications In Proteomes For Function And Evolutionary Progression, Oliver Bonham-Carter

Student Work

After synthesis, a protein is still immature until it has been customized for a specific task. Post-translational modifications (PTMs) are steps in biosynthesis to perform this customization of protein for unique functionalities. PTMs are also important to protein survival because they rapidly enable protein adaptation to environmental stress factors by conformation change. The overarching contribution of this thesis is the construction of a computational profiling framework for the study of biological signals stemming from PTMs associated with stressed proteins. In particular, this work has been developed to predict and detect the biological mechanisms involved in types of stress response with …


Temporal And Contextual Dependencies In Relational Data Modeling, Rajvardhan Bhaskar Patil Apr 2016

Temporal And Contextual Dependencies In Relational Data Modeling, Rajvardhan Bhaskar Patil

Student Work

Although a solid theoretical foundation of relational data modeling has existed for decades, critical reassessment from temporal requirements’ perspective reveals shortcomings in its integrity constraints. We identify the need for this work by discussing how existing relational databases fail to ensure correctness of data when the data to be stored is time sensitive. The analysis presented in this work becomes particularly important in present times where, because of relational databases’ inadequacy to cater to all the requirements, new forms of database systems such as temporal databases, active databases, real time databases, and NoSQL (non-relational) databases have been introduced. In relational …


Social Learning Systems: The Design Of Evolutionary, Highly Scalable, Socially Curated Knowledge Systems, Nolan Hemmatazad Dec 2015

Social Learning Systems: The Design Of Evolutionary, Highly Scalable, Socially Curated Knowledge Systems, Nolan Hemmatazad

Student Work

In recent times, great strides have been made towards the advancement of automated reasoning and knowledge management applications, along with their associated methodologies. The introduction of the World Wide Web peaked academicians’ interest in harnessing the power of linked, online documents for the purpose of developing machine learning corpora, providing dynamical knowledge bases for question answering systems, fueling automated entity extraction applications, and performing graph analytic evaluations, such as uncovering the inherent structural semantics of linked pages. Even more recently, substantial attention in the wider computer science and information systems disciplines has been focused on the evolving study of social …


Understanding User Engagement In The Open Collaboration Model Of Crowdsourcing, Cuong Nguyen Aug 2015

Understanding User Engagement In The Open Collaboration Model Of Crowdsourcing, Cuong Nguyen

Student Work

Crowdsourcing refers to the use of technologies to gather the collective effort and wisdom from an undefined group of online users for organizational innovation and/or problem solving. Further, open collaboration model refers to the crowdsourcing type wherein the crowd members discuss the submitted contributions among themselves to provide the final outcomes to problem owners. Regardless of crowdsourcing forms, a critical challenge for crowdsourcing service providers is to engage online participants in making sustained contributions. Inspired by Flow Theory (Csikszentmihalyi &

Csikszentmihayi, 1988), the purpose of this dissertation is to examine whether the conditions of challenge-skill balance and clear and immediate …


Efficient Simultaneous Task And Motion Planning For Multiple Mobile Robots Using Task Reachability Graphs, Brad Woosley Jul 2015

Efficient Simultaneous Task And Motion Planning For Multiple Mobile Robots Using Task Reachability Graphs, Brad Woosley

Student Work

In this thesis, we consider the problem of efficient navigation by robots in initially unknown environments while performing tasks at certain locations. In initially unknown environments, the path plans might change dynamically as the robot discovers obstacles along its route. Because robots have limited energy, adaptations to the task schedule of the robot in conjunction with updates to its path plan are required so that the robot can perform its tasks while reducing time and energy expended. However, most existing techniques consider robot path planning and task planning as separate problems. This thesis plans to bridge this gap by developing …


Characterization Of Common Videos With Signatures Extracted From Frame Transition Profiles, Abhiram Reddy Gaddampalli May 2015

Characterization Of Common Videos With Signatures Extracted From Frame Transition Profiles, Abhiram Reddy Gaddampalli

Student Work

People have access to a tremendous amount of video nowadays, both on television and Internet. The amount of video that a viewer has to choose from is so large that it is infeasible for a human to go through it all to find a video of interest. Organizing video into categories will make the process of large number of videos much faster and improves the ease of access. A profile created by observing the rate at which the contents of video frame changes helps in categorization of videos in different types. The experiments we conducted on three types of videos …


Analyzing Shakespeare’S Plays In A Network Perspective, Vikas Thotakuri Dec 2014

Analyzing Shakespeare’S Plays In A Network Perspective, Vikas Thotakuri

Student Work

Networks are popular models for representing interactions between entities in systems, such as in sociology, bioinformatics, and epidemiology. The entities in the networks are represented as vertices and their pair-wise interactions are represented as edges [1]. Many network metrics such as degree centrality (number of connections of an entity) and betweenness centrality (number of shortest paths passing through the entity) have been developed to rank the entities according to their importance [7] [10].Social networks are generally modeled on only one type of relation. Groups are open-ended, which means the number of participants and the time frame are not finite. Time …


Modeling And Tracking Relative Movement Of Object Parts, Praneeth Talluri Dec 2014

Modeling And Tracking Relative Movement Of Object Parts, Praneeth Talluri

Student Work

Video surveillance systems play an important role in many civilian and military applications, for the purposes of security and surveillance. Object detection is an important component in a video surveillance system, used to identify possible objects of interest and to generate data for tracking and analysis purposes. Not much exploration has been done to track the moving parts of the object which is being tracked. Some of the promising techniques like Kalman Filter, Mean-shift algorithm, Matching Eigen Space, Discrete Wavelet Transform, Curvelet Transform, Distance Metric Learning have shown good performance for keeping track of moving object.

Most of this work …


The Quasigroup Block Cipher And Its Analysis, Matthew J. Battey May 2014

The Quasigroup Block Cipher And Its Analysis, Matthew J. Battey

Student Work

This thesis discusses the Quasigroup Block Cipher (QGBC) and its analysis. We first present the basic form of the QGBC and then follow with improvements in memory consumption and security. As a means of analyzing the system, we utilize tools such as the NIST Statistical Test Suite, auto and crosscorrelation, then linear and algebraic cryptanalysis. Finally, as we review the results of these analyses, we propose improvements and suggest an algorithm suitable for low-cost FPGA implementation.


The Application Of Graph Theory To Access Control Systems, Eric Brown Apr 2014

The Application Of Graph Theory To Access Control Systems, Eric Brown

Student Work

Computer systems contain vital information that must be protected. One of the crucial aspects of protection is access control. A review of some of the research into ways in which access to the information in computers can be controlled focuses on a question about safety. The safety question asks, “Can a user ever gain access to a resource for which he is not authorized?” This question cannot be answered in general because of the unbounded, unrestricted nature of a general-purpose access control system. It can be answered only for systems that are specifically designed to restrict the actions that can …