Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Publication
- File Type
Articles 1 - 30 of 53
Full-Text Articles in Physical Sciences and Mathematics
Attenuated Skeletal Muscle Metabolism Explains Blunted Reactive Hyperemia After Prolonged Sitting, Cody Anderson, Elizabeth Pekas, Michael Allen, Song-Young Park
Attenuated Skeletal Muscle Metabolism Explains Blunted Reactive Hyperemia After Prolonged Sitting, Cody Anderson, Elizabeth Pekas, Michael Allen, Song-Young Park
UNO Student Research and Creative Activity Fair
Introduction: Although reduced post-occlusive reactive hyperemia (PORH) after prolonged sitting (PS) has been reported as impaired microvascular function, no specific mechanism(s) have been elucidated. One potential mechanism, independent of microvascular function, is that an altered muscle metabolic rate (MMR) may change the magnitude of PORH by modifying the oxygen deficit achieved during cuff-induced arterial occlusions. We speculated that if MMR changes during PS, this may invalidate current inferences about microvascular function during PS. Objective: Therefore, the objective of this study was to examine if peripheral leg MMR changes during PS and to ascertain whether the change in the oxygen deficit …
Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter
Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter
UNO Student Research and Creative Activity Fair
In the wake of the Tulsa, Oklahoma hospital shooting in the summer of 2022, it was made clear that more security needed to be implemented in healthcare facilities. As a result, I inquired: What is the happy balance for healthcare facilities to maintain their accessibility to the public while also implementing security measures to prevent terrorist attacks? With that base, I give recommendations in the areas of cybersecurity, physical infrastructure, and physical and mental health, based off the existing literature and data gathered from terrorist attacks against hospitals over several decades.
The Effects Of Demographics And Risk Factors On The Morphological Characteristics Of Human Femoropopliteal Arteries, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy
The Effects Of Demographics And Risk Factors On The Morphological Characteristics Of Human Femoropopliteal Arteries, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy
UNO Student Research and Creative Activity Fair
Background: Disease of the lower extremity arteries (Peripheral Arterial Disease, PAD) is associated with high morbidity and mortality. During disease development, the arteries adapt by changing their diameter, wall thickness, and residual deformations, but the effects of demographics and risk factors on this process are not clear.
Methods: Superficial femoral arteries from 736 subjects (505 male, 231 female, 12 to 99 years old, average age 51±17.8 years) and the associated demographic and risk factor variables were used to construct machine learning (ML) regression models that predicted morphological characteristics (diameter, wall thickness, and longitudinal opening angle resulting from the …
Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens
Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens
UNO Student Research and Creative Activity Fair
Human movement is inherently variable by nature. One of the most common analytical tools for assessing movement variability is the largest Lyapunov exponent (LyE) which quantifies the rate of trajectory divergence or convergence in an n-dimensional state space. One popular method for assessing LyE is the Wolf algorithm. Many studies have investigated how Wolf’s calculation of the LyE changes due to sampling frequency, filtering, data normalization, and stride normalization. However, a surprisingly understudied parameter needed for LyE computation is evolution time. The purpose of this study is to investigate how the LyE changes as a function of evolution time …
Using Graph Theoretical Methods And Traceroute To Visually Represent Hidden Networks, Jordan M. Sahs
Using Graph Theoretical Methods And Traceroute To Visually Represent Hidden Networks, Jordan M. Sahs
UNO Student Research and Creative Activity Fair
Within the scope of a Wide Area Network (WAN), a large geographical communication network in which a collection of networking devices communicate data to each other, an example being the spanning communication network, known as the Internet, around continents. Within WANs exists a collection of Routers that transfer network packets to other devices. An issue pertinent to WANs is their immeasurable size and density, as we are not sure of the amount, or the scope, of all the devices that exists within the network. By tracing the routes and transits of data that traverses within the WAN, we can identify …
Prediction Of Balance Control And Instability In Walking At Sea, Jungyeon Choi
Prediction Of Balance Control And Instability In Walking At Sea, Jungyeon Choi
Computer Science Graduate Research Workshop
No abstract provided.
Interactive Visualizations For Explanation In Ai, Ashley Ramsey
Interactive Visualizations For Explanation In Ai, Ashley Ramsey
Computer Science Graduate Research Workshop
No abstract provided.
Automated Program Repair For Api Misuse Vulnerabilities, Dip Kiran Pradhan Newar
Automated Program Repair For Api Misuse Vulnerabilities, Dip Kiran Pradhan Newar
Computer Science Graduate Research Workshop
No abstract provided.
New Approaches To Convex Polygon Formations, Rui Yang
New Approaches To Convex Polygon Formations, Rui Yang
Computer Science Graduate Research Workshop
No abstract provided.
Workload Prediction With Cost-Aware Data Analytics System, Anshuman Das Mohapatra
Workload Prediction With Cost-Aware Data Analytics System, Anshuman Das Mohapatra
Computer Science Graduate Research Workshop
No abstract provided.
Artificial-Intelligence-Based Approaches For Estimating Irregular Walking Surface With Wearable Sensor, Ru Ng
Computer Science Graduate Research Workshop
No abstract provided.
Building Interpretable Methods For Identifying Bridge Maintenance Patterns, Akshay Kale
Building Interpretable Methods For Identifying Bridge Maintenance Patterns, Akshay Kale
Computer Science Graduate Research Workshop
No abstract provided.
Using Deep Neural Network And Transformers To Extract Graphene Compounds And Properties, Ayman Ibn Jaman
Using Deep Neural Network And Transformers To Extract Graphene Compounds And Properties, Ayman Ibn Jaman
Computer Science Graduate Research Workshop
No abstract provided.
Deep Learning-Based Image Watermarking With Transform Invariant Representation Learning, Arjon Das
Deep Learning-Based Image Watermarking With Transform Invariant Representation Learning, Arjon Das
Computer Science Graduate Research Workshop
No abstract provided.
Reducing Loading On The Contralateral Limb Using Human-In-The-Loop Optimization, Siena Senatore
Reducing Loading On The Contralateral Limb Using Human-In-The-Loop Optimization, Siena Senatore
UNO Student Research and Creative Activity Fair
In most everyday activities, we head towards a specific goal by updating our choices for a more direct path. However, there are specific clinical tasks where taking the direct path is more challenging. Clinical investigations of optimizing a prosthesis involve the assessment of multiple parameter settings through trial and error rather than goal-directed optimization. We investigate if a human-in-the-loop optimization algorithm can guide manual alterations to a prosthesis-simulating device to reduce the ground reaction force on the contralateral limb. In most participants, the optimal condition reduced the loading rate on the contralateral limb compared to the initial condition tested. These …
Design And Development Of Software With A Graphical User Interface To Display And Convert Multiple Microscopic Histology Images, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy
Design And Development Of Software With A Graphical User Interface To Display And Convert Multiple Microscopic Histology Images, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy
UNO Student Research and Creative Activity Fair
Histological images are widely used to assess the microscopic anatomy of biological tissues. Recent advancements in image analysis allow the identification of structural features on histological sections that can help advance medical device development, brain and cancer research, drug discovery, vascular mechanobiology, and many other fields. Histological slide scanners create images in SVS and TIFF formats that were designed to archive image blocks and high-resolution textual information. Because these formats were primarily intended for storage, they are often not compatible with conventional image analysis software and require conversion before they can be used in research. We have developed a user-friendly …
Optimizing Networking Topologies With Shortest Path Algorithms, Jordan Sahs
Optimizing Networking Topologies With Shortest Path Algorithms, Jordan Sahs
UNO Student Research and Creative Activity Fair
Communication networks tend to contain redundant devices and mediums of transmission, thus the need to locate, document, and optimize networks is increasingly becoming necessary. However, many people do not know where to start the optimization progress. What is network topology? What is this “Shortest Path Problem”, and how can it be used to better my network? These questions are presented, taught, and answered within this paper. To supplement the reader’s understanding there are thirty-eight figures in the paper that are used to help convey and compartmentalize the learning process needed to grasp the materials presented in the ending sections.
In …
Encryption Decrypted, Alex Ramsey
Encryption Decrypted, Alex Ramsey
UNO Student Research and Creative Activity Fair
Encryption is a complex and bewildering process, yet it is absolutely foundational for secure and safe activities on the internet. Encryption, in its many forms, ultimately enables identity verification, password protection, secure conversation, cryptocurrency trade, and other online activities. Despite this widespread use, encryption is not a process easily explained to the layperson due to its complexity. Thus, the object of this research is to demystify the process of encryption and provide an understanding of one of the most common forms of modern encryption - RSA Encryption. This will be accomplished through the information provided on my poster as well …
Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton
Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton
UNO Student Research and Creative Activity Fair
Cryptography is often a critical component in secure software systems. Cryptographic primitive misuses often cause several vulnerability issues. To secure data and communications in applications, developers often rely on cryptographic algorithms and APIs which provide confidentiality, integrity, and authentication based on solid mathematical foundations. While many advanced crypto algorithms are available to developers, the correct usage of these APIs is challenging. Turning mathematical equations in crypto algorithms into an application is a difficult task. A mistake in cryptographic implementations can subvert the security of the entire system. In this research, we present an automated approach for Finding and Repairing Bugs …
A Formal Approach To Circle Formation In Multi-Agent Systems, Rui Yang
A Formal Approach To Circle Formation In Multi-Agent Systems, Rui Yang
Computer Science Graduate Research Workshop
No abstract provided.
Conflict Resolution Using Α-Shapes For Distributed Robotic Sampling Of Ambient Phenomena In Initially Unknown Environments, Brad Woosley
Conflict Resolution Using Α-Shapes For Distributed Robotic Sampling Of Ambient Phenomena In Initially Unknown Environments, Brad Woosley
Computer Science Graduate Research Workshop
No abstract provided.
Dynamic Lazy Grounding In Answer Set Programming, Brian Hodges
Dynamic Lazy Grounding In Answer Set Programming, Brian Hodges
Computer Science Graduate Research Workshop
No abstract provided.
Automatic Program Rewriting For Non-Ground Answer Set Programs, Nicholas Hippen
Automatic Program Rewriting For Non-Ground Answer Set Programs, Nicholas Hippen
Computer Science Graduate Research Workshop
No abstract provided.
Automated Tool Support For Security Bug Repair In Mobile Applications, Larry Singleton
Automated Tool Support For Security Bug Repair In Mobile Applications, Larry Singleton
Computer Science Graduate Research Workshop
No abstract provided.
Tool Support For Recurring Code Change Inspection With Deep Learning, Krishna Teja Ayinala
Tool Support For Recurring Code Change Inspection With Deep Learning, Krishna Teja Ayinala
Computer Science Graduate Research Workshop
No abstract provided.
Analysis Of Subgoal Data In Computer Science Principles - Data Cleaning, Hari Ramilison
Analysis Of Subgoal Data In Computer Science Principles - Data Cleaning, Hari Ramilison
Computer Science Graduate Research Workshop
No abstract provided.
Co-Designing An Academic Focus Mobile Application, Mohammad Farhad Afzali
Co-Designing An Academic Focus Mobile Application, Mohammad Farhad Afzali
Computer Science Graduate Research Workshop
No abstract provided.
Processing Narratives By Means Of Action Languages, Craig Olson
Processing Narratives By Means Of Action Languages, Craig Olson
Computer Science Graduate Research Workshop
No abstract provided.