Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 53

Full-Text Articles in Physical Sciences and Mathematics

Attenuated Skeletal Muscle Metabolism Explains Blunted Reactive Hyperemia After Prolonged Sitting, Cody Anderson, Elizabeth Pekas, Michael Allen, Song-Young Park Mar 2023

Attenuated Skeletal Muscle Metabolism Explains Blunted Reactive Hyperemia After Prolonged Sitting, Cody Anderson, Elizabeth Pekas, Michael Allen, Song-Young Park

UNO Student Research and Creative Activity Fair

Introduction: Although reduced post-occlusive reactive hyperemia (PORH) after prolonged sitting (PS) has been reported as impaired microvascular function, no specific mechanism(s) have been elucidated. One potential mechanism, independent of microvascular function, is that an altered muscle metabolic rate (MMR) may change the magnitude of PORH by modifying the oxygen deficit achieved during cuff-induced arterial occlusions. We speculated that if MMR changes during PS, this may invalidate current inferences about microvascular function during PS. Objective: Therefore, the objective of this study was to examine if peripheral leg MMR changes during PS and to ascertain whether the change in the oxygen deficit …


Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter Mar 2023

Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter

UNO Student Research and Creative Activity Fair

In the wake of the Tulsa, Oklahoma hospital shooting in the summer of 2022, it was made clear that more security needed to be implemented in healthcare facilities. As a result, I inquired: What is the happy balance for healthcare facilities to maintain their accessibility to the public while also implementing security measures to prevent terrorist attacks? With that base, I give recommendations in the areas of cybersecurity, physical infrastructure, and physical and mental health, based off the existing literature and data gathered from terrorist attacks against hospitals over several decades.


The Effects Of Demographics And Risk Factors On The Morphological Characteristics Of Human Femoropopliteal Arteries, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy Mar 2023

The Effects Of Demographics And Risk Factors On The Morphological Characteristics Of Human Femoropopliteal Arteries, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy

UNO Student Research and Creative Activity Fair

Background: Disease of the lower extremity arteries (Peripheral Arterial Disease, PAD) is associated with high morbidity and mortality. During disease development, the arteries adapt by changing their diameter, wall thickness, and residual deformations, but the effects of demographics and risk factors on this process are not clear.

Methods: Superficial femoral arteries from 736 subjects (505 male, 231 female, 12 to 99 years old, average age 51±17.8 years) and the associated demographic and risk factor variables were used to construct machine learning (ML) regression models that predicted morphological characteristics (diameter, wall thickness, and longitudinal opening angle resulting from the …


Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens Mar 2023

Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens

UNO Student Research and Creative Activity Fair

Human movement is inherently variable by nature. One of the most common analytical tools for assessing movement variability is the largest Lyapunov exponent (LyE) which quantifies the rate of trajectory divergence or convergence in an n-dimensional state space. One popular method for assessing LyE is the Wolf algorithm. Many studies have investigated how Wolf’s calculation of the LyE changes due to sampling frequency, filtering, data normalization, and stride normalization. However, a surprisingly understudied parameter needed for LyE computation is evolution time. The purpose of this study is to investigate how the LyE changes as a function of evolution time …


Using Graph Theoretical Methods And Traceroute To Visually Represent Hidden Networks, Jordan M. Sahs Jun 2022

Using Graph Theoretical Methods And Traceroute To Visually Represent Hidden Networks, Jordan M. Sahs

UNO Student Research and Creative Activity Fair

Within the scope of a Wide Area Network (WAN), a large geographical communication network in which a collection of networking devices communicate data to each other, an example being the spanning communication network, known as the Internet, around continents. Within WANs exists a collection of Routers that transfer network packets to other devices. An issue pertinent to WANs is their immeasurable size and density, as we are not sure of the amount, or the scope, of all the devices that exists within the network. By tracing the routes and transits of data that traverses within the WAN, we can identify …


Closing Social Apr 2022

Closing Social

Computer Science Graduate Research Workshop

No abstract provided.


Prediction Of Balance Control And Instability In Walking At Sea, Jungyeon Choi Apr 2022

Prediction Of Balance Control And Instability In Walking At Sea, Jungyeon Choi

Computer Science Graduate Research Workshop

No abstract provided.


Interactive Visualizations For Explanation In Ai, Ashley Ramsey Apr 2022

Interactive Visualizations For Explanation In Ai, Ashley Ramsey

Computer Science Graduate Research Workshop

No abstract provided.


Automated Program Repair For Api Misuse Vulnerabilities, Dip Kiran Pradhan Newar Apr 2022

Automated Program Repair For Api Misuse Vulnerabilities, Dip Kiran Pradhan Newar

Computer Science Graduate Research Workshop

No abstract provided.


New Approaches To Convex Polygon Formations, Rui Yang Apr 2022

New Approaches To Convex Polygon Formations, Rui Yang

Computer Science Graduate Research Workshop

No abstract provided.


Workload Prediction With Cost-Aware Data Analytics System, Anshuman Das Mohapatra Apr 2022

Workload Prediction With Cost-Aware Data Analytics System, Anshuman Das Mohapatra

Computer Science Graduate Research Workshop

No abstract provided.


Artificial-Intelligence-Based Approaches For Estimating Irregular Walking Surface With Wearable Sensor, Ru Ng Apr 2022

Artificial-Intelligence-Based Approaches For Estimating Irregular Walking Surface With Wearable Sensor, Ru Ng

Computer Science Graduate Research Workshop

No abstract provided.


Building Interpretable Methods For Identifying Bridge Maintenance Patterns, Akshay Kale Apr 2022

Building Interpretable Methods For Identifying Bridge Maintenance Patterns, Akshay Kale

Computer Science Graduate Research Workshop

No abstract provided.


Using Deep Neural Network And Transformers To Extract Graphene Compounds And Properties, Ayman Ibn Jaman Apr 2022

Using Deep Neural Network And Transformers To Extract Graphene Compounds And Properties, Ayman Ibn Jaman

Computer Science Graduate Research Workshop

No abstract provided.


Deep Learning-Based Image Watermarking With Transform Invariant Representation Learning, Arjon Das Apr 2022

Deep Learning-Based Image Watermarking With Transform Invariant Representation Learning, Arjon Das

Computer Science Graduate Research Workshop

No abstract provided.


Opening Social Apr 2022

Opening Social

Computer Science Graduate Research Workshop

No abstract provided.


Reducing Loading On The Contralateral Limb Using Human-In-The-Loop Optimization, Siena Senatore Mar 2022

Reducing Loading On The Contralateral Limb Using Human-In-The-Loop Optimization, Siena Senatore

UNO Student Research and Creative Activity Fair

In most everyday activities, we head towards a specific goal by updating our choices for a more direct path. However, there are specific clinical tasks where taking the direct path is more challenging. Clinical investigations of optimizing a prosthesis involve the assessment of multiple parameter settings through trial and error rather than goal-directed optimization. We investigate if a human-in-the-loop optimization algorithm can guide manual alterations to a prosthesis-simulating device to reduce the ground reaction force on the contralateral limb. In most participants, the optimal condition reduced the loading rate on the contralateral limb compared to the initial condition tested. These …


Design And Development Of Software With A Graphical User Interface To Display And Convert Multiple Microscopic Histology Images, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy Mar 2022

Design And Development Of Software With A Graphical User Interface To Display And Convert Multiple Microscopic Histology Images, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy

UNO Student Research and Creative Activity Fair

Histological images are widely used to assess the microscopic anatomy of biological tissues. Recent advancements in image analysis allow the identification of structural features on histological sections that can help advance medical device development, brain and cancer research, drug discovery, vascular mechanobiology, and many other fields. Histological slide scanners create images in SVS and TIFF formats that were designed to archive image blocks and high-resolution textual information. Because these formats were primarily intended for storage, they are often not compatible with conventional image analysis software and require conversion before they can be used in research. We have developed a user-friendly …


Optimizing Networking Topologies With Shortest Path Algorithms, Jordan Sahs Mar 2021

Optimizing Networking Topologies With Shortest Path Algorithms, Jordan Sahs

UNO Student Research and Creative Activity Fair

Communication networks tend to contain redundant devices and mediums of transmission, thus the need to locate, document, and optimize networks is increasingly becoming necessary. However, many people do not know where to start the optimization progress. What is network topology? What is this “Shortest Path Problem”, and how can it be used to better my network? These questions are presented, taught, and answered within this paper. To supplement the reader’s understanding there are thirty-eight figures in the paper that are used to help convey and compartmentalize the learning process needed to grasp the materials presented in the ending sections.

In …


Encryption Decrypted, Alex Ramsey Mar 2020

Encryption Decrypted, Alex Ramsey

UNO Student Research and Creative Activity Fair

Encryption is a complex and bewildering process, yet it is absolutely foundational for secure and safe activities on the internet. Encryption, in its many forms, ultimately enables identity verification, password protection, secure conversation, cryptocurrency trade, and other online activities. Despite this widespread use, encryption is not a process easily explained to the layperson due to its complexity. Thus, the object of this research is to demystify the process of encryption and provide an understanding of one of the most common forms of modern encryption - RSA Encryption. This will be accomplished through the information provided on my poster as well …


Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton Mar 2020

Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton

UNO Student Research and Creative Activity Fair

Cryptography is often a critical component in secure software systems. Cryptographic primitive misuses often cause several vulnerability issues. To secure data and communications in applications, developers often rely on cryptographic algorithms and APIs which provide confidentiality, integrity, and authentication based on solid mathematical foundations. While many advanced crypto algorithms are available to developers, the correct usage of these APIs is challenging. Turning mathematical equations in crypto algorithms into an application is a difficult task. A mistake in cryptographic implementations can subvert the security of the entire system. In this research, we present an automated approach for Finding and Repairing Bugs …


A Formal Approach To Circle Formation In Multi-Agent Systems, Rui Yang Apr 2019

A Formal Approach To Circle Formation In Multi-Agent Systems, Rui Yang

Computer Science Graduate Research Workshop

No abstract provided.


Conflict Resolution Using Α-Shapes For Distributed Robotic Sampling Of Ambient Phenomena In Initially Unknown Environments, Brad Woosley Apr 2019

Conflict Resolution Using Α-Shapes For Distributed Robotic Sampling Of Ambient Phenomena In Initially Unknown Environments, Brad Woosley

Computer Science Graduate Research Workshop

No abstract provided.


Dynamic Lazy Grounding In Answer Set Programming, Brian Hodges Apr 2019

Dynamic Lazy Grounding In Answer Set Programming, Brian Hodges

Computer Science Graduate Research Workshop

No abstract provided.


Automatic Program Rewriting For Non-Ground Answer Set Programs, Nicholas Hippen Apr 2019

Automatic Program Rewriting For Non-Ground Answer Set Programs, Nicholas Hippen

Computer Science Graduate Research Workshop

No abstract provided.


Automated Tool Support For Security Bug Repair In Mobile Applications, Larry Singleton Apr 2019

Automated Tool Support For Security Bug Repair In Mobile Applications, Larry Singleton

Computer Science Graduate Research Workshop

No abstract provided.


Tool Support For Recurring Code Change Inspection With Deep Learning, Krishna Teja Ayinala Apr 2019

Tool Support For Recurring Code Change Inspection With Deep Learning, Krishna Teja Ayinala

Computer Science Graduate Research Workshop

No abstract provided.


Analysis Of Subgoal Data In Computer Science Principles - Data Cleaning, Hari Ramilison Apr 2019

Analysis Of Subgoal Data In Computer Science Principles - Data Cleaning, Hari Ramilison

Computer Science Graduate Research Workshop

No abstract provided.


Co-Designing An Academic Focus Mobile Application, Mohammad Farhad Afzali Apr 2019

Co-Designing An Academic Focus Mobile Application, Mohammad Farhad Afzali

Computer Science Graduate Research Workshop

No abstract provided.


Processing Narratives By Means Of Action Languages, Craig Olson Apr 2019

Processing Narratives By Means Of Action Languages, Craig Olson

Computer Science Graduate Research Workshop

No abstract provided.