Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

University of Nebraska at Omaha

2019

Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 36

Full-Text Articles in Physical Sciences and Mathematics

Grounding Size Predictions For Answer Set Programs, Nicholas Hippen Dec 2019

Grounding Size Predictions For Answer Set Programs, Nicholas Hippen

Student Work

Answer set programming is a declarative programming paradigm geared towards solving difficult combinatorial search problems. Logic programs under answer set semantics can typically be written in many different ways while still encoding the same problem. These different versions of the program may result in diverse performances. Unfortunately, it is not always easy to identify which version of the program performs the best, requiring expert knowledge on both answer set processing and the problem domain. More so, the best version to use may even vary depending on the problem instance. One measure that has been shown to correlate with performance is …


Uncovering And Characterizing Splice Variants Associated With Survival In Lung Cancer Patients, Sean West, Sushil Kumar, Surinder K. Batra, Hesham Ali, Dario Ghersi Oct 2019

Uncovering And Characterizing Splice Variants Associated With Survival In Lung Cancer Patients, Sean West, Sushil Kumar, Surinder K. Batra, Hesham Ali, Dario Ghersi

Interdisciplinary Informatics Faculty Publications

Splice variants have been shown to play an important role in tumor initiation and progression and can serve as novel cancer biomarkers. However, the clinical importance of individual splice variants and the mechanisms by which they can perturb cellular functions are still poorly understood. To address these issues, we developed an efficient and robust computational method to: (1) identify splice variants that are associated with patient survival in a statistically significant manner; and (2) predict rewired protein-protein interactions that may result from altered patterns of expression of such variants. We applied our method to the lung adenocarcinoma dataset from TCGA …


Generation Of Crowd Arrival And Destination Locations/Times In Complex Transit Facilities, Brian Ricks, Andrew Dobson, Athanasios Krontiris, Kostas Bekris, Mubbasir Kapadia, Fred Roberts Oct 2019

Generation Of Crowd Arrival And Destination Locations/Times In Complex Transit Facilities, Brian Ricks, Andrew Dobson, Athanasios Krontiris, Kostas Bekris, Mubbasir Kapadia, Fred Roberts

Computer Science Faculty Publications

In order to simulate virtual agents in the replica of a real facility across a long time span, a crowd simulation engine needs a list of agent arrival and destination locations and times that reflect those seen in the actual facility. Working together with a major metropolitan transportation authority, we propose a specification that can be used to procedurally generate this information. This specification is both uniquely compact and expressive—compact enough to mirror the mental model of building managers and expressive enough to handle the wide variety of crowds seen in real urban environments. We also propose a procedural algorithm …


Phishing: Message Appraisal And The Exploration Of Fear And Self-Confidence, Deanna House, M. K. Raja Sep 2019

Phishing: Message Appraisal And The Exploration Of Fear And Self-Confidence, Deanna House, M. K. Raja

Information Systems and Quantitative Analysis Faculty Publications

Phishing attacks have threatened the security of both home users and organizations in recent years. Phishing uses social engineering to fraudulently obtain information that is confidential or sensitive. Individuals are targeted to take action by clicking on a link and providing information. This research explores fear arousal and self-confidence in subjects confronted by phishing attacks. The study collected data from multiple sources (including an attempted phishing attack). The survey results indicated that when individuals had a high level of fear arousal related to providing login credentials they had a decreased intention to respond to a phishing attack. Self-confidence did not …


Structural Bot Detection In Social Networks, Lale Madahali Aug 2019

Structural Bot Detection In Social Networks, Lale Madahali

Interdisciplinary Informatics Faculty Proceedings & Presentations

Social network platforms are a major part of toady’s life. They are usually used for entertainment, news, advertisements, and branding for businesses and individuals alike. However, use of automated accounts, also known as bots, pollute this environment and avoid having a reliable clean online world. In this work, I address the problem of detecting bots in online social networks.


The Effect Of Conversational Agent Skill On User Behavior During Deception, Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney Aug 2019

The Effect Of Conversational Agent Skill On User Behavior During Deception, Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney

Information Systems and Quantitative Analysis Faculty Publications

Conversational agents (CAs) are an integral component of many personal and business interactions. Many recent advancements in CA technology have attempted to make these interactions more natural and human-like. However, it is currently unclear how human-like traits in a CA impact the way users respond to questions from the CA. In some applications where CAs may be used, detecting deception is important. Design elements that make CA interactions more human-like may induce undesired strategic behaviors from human deceivers to mask their deception. To better understand this interaction, this research investigates the effect of conversational skill—that is, the ability of the …


Using The Solo Taxonomy To Understand Subgoal Labels Effect In Cs1, Adrienne Decker, Lauren E. Margulieux, Briana B. Morrison Jul 2019

Using The Solo Taxonomy To Understand Subgoal Labels Effect In Cs1, Adrienne Decker, Lauren E. Margulieux, Briana B. Morrison

Computer Science Faculty Proceedings & Presentations

This work extends previous research on subgoal labeled instructions by examining their effect across a semester-long, Java-based CS1 course. Across four quizzes, students were asked to explain in plain English the process that they would use to solve a programming problem. In this mixed methods study, we used the SOLO taxonomy to categorize student responses about problem-solving processes and compare students who learned with subgoal labels to those who did not. The use of the SOLO taxonomy classification allows us to look deeper than the mere correctness of answers to focus on the quality of the answers produced in terms …


The Rise Of Citizen Science In Health And Biomedical Research, Andrea Wiggins, John Wilbanks Jul 2019

The Rise Of Citizen Science In Health And Biomedical Research, Andrea Wiggins, John Wilbanks

Information Systems and Quantitative Analysis Faculty Publications

Citizen science models of public participation in scientific research represent a growing area of opportunity for health and biomedical research, as well as new impetus for more collaborative forms of engagement in large-scale research. However, this also surfaces a variety of ethical issues that both fall outside of and build upon the standard human subjects concerns in bioethics. This article provides background on citizen science, examples of current projects in the field, and discussion of established and emerging ethical issues for citizen science in health and biomedical research.


Design And Pilot Testing Of Subgoal Labeled Worked Examples For Five Core Concepts In Cs1, Lauren E. Margulieux, Briana B. Morrison, Adrienne Decker Jul 2019

Design And Pilot Testing Of Subgoal Labeled Worked Examples For Five Core Concepts In Cs1, Lauren E. Margulieux, Briana B. Morrison, Adrienne Decker

Computer Science Faculty Publications

Subgoal learning has improved student problem-solving performance in programming, but it has been tested for only oneto-two hours of instruction at a time. Our work pioneers implementing subgoal learning throughout an entire introductory programming course. In this paper we discuss the protocol that we used to identify subgoals for core programming procedures, present the subgoal labels created for the course, and outline the subgoal-labeled instructional materials that were designed for a Java-based course. To examine the effect of subgoal labeled materials on student performance in the course, we compared quiz and exam grades between students who learned using subgoal labels …


Grant Anon Minigames Extension, Justin Robbins May 2019

Grant Anon Minigames Extension, Justin Robbins

Theses/Capstones/Creative Projects

The Grant Anon system was designed to be a casualized version of the real-time strategy genre, a genre usually known for its difficulty and competitiveness because of Starcraft II, the most popular game in the genre. Grant Anon was designed as part of a capstone project, and this report details the extension that was created to add an additional element designed to make it easier for any player to enjoy Grant Anon: minigames. These minigames serve to reduce the skill needed to participate effectively in Grant Anon. This is accomplished by providing an alternative means of gaining an advantage over …


Cooperative Signaling Behavior: Signals For Open Source Project Health, Georg John Peter Link May 2019

Cooperative Signaling Behavior: Signals For Open Source Project Health, Georg John Peter Link

Information Systems and Quantitative Analysis Theses, Dissertations, and Student Creative Activity

The core contribution is a critique of signaling theory from investigating cooperative signaling behavior in the context of organizational engagement with open source projects. Open source projects display signals of project health which are used by organizations. Projects and organizations engage in cooperative signaling behavior when they work together to create signals. Signaling theory is critiqued in the cooperative context of organizational engagements with open source projects by describing how cooperative signaling behavior occurs in three processes: identifying, evaluating, and filtering new signals. The contribution is informed through engaged field research and interviews, which are presented as a thick description …


Expanding Controllability Of Hybrid Recommender Systems: From Positive To Negative Relevance, Behnam Rahdari, Chun-Hua Tsai, Peter Brusilovsky May 2019

Expanding Controllability Of Hybrid Recommender Systems: From Positive To Negative Relevance, Behnam Rahdari, Chun-Hua Tsai, Peter Brusilovsky

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

A hybrid recommender system fuses multiple data sources, usually with static and nonadjustable weightings, to deliver recommendations. One limitation of this approach is the problem to match user preference in all situations. In this paper, we present two user-controllable hybrid recommender interfaces, which offer a set of sliders to dynamically tune the impact of different sources of relevance on the final ranking. Two user studies were performed to design and evaluate the proposed interfaces.


Processing Narratives By Means Of Action Languages, Craig Olson May 2019

Processing Narratives By Means Of Action Languages, Craig Olson

Computer Science Theses, Dissertations, and Student Creative Activity

In this work we design a narrative understanding system Text2ALM that can be used in Question Answering domains. System Text2ALM utilizes an action language 𝒜ℒℳ to perform inferences on complex interactions of events described in narratives. The methodology that Text2ALM follows in its implementation was originally outlined by Yuliya Lierler, Daniela Inclezan, and Michael Gelfond in 2017 via a manual process, and this work serves as a proof of concept in a large-scale environment. Our system automates the conversion of a narrative to an 𝒜ℒℳ model containing facts about the narrative. We make use of the VerbNet lexicon that we …


A Communication Architecture For Crowd Management In Emergency And Disruptive Scenarios, Alfredo J. Perez, Sherali Zeadally Apr 2019

A Communication Architecture For Crowd Management In Emergency And Disruptive Scenarios, Alfredo J. Perez, Sherali Zeadally

Computer Science Faculty Publications

Crowd management aims to develop support infrastructures that can effectively manage crowds at any time. In emergency and disruptive scenarios this concept can minimize the risk to human life and to the infrastructure. We propose the Communication Architecture for Crowd Management (CACROM), which can support crowd management under emergency and disruptive scenarios. We identify, describe, and discuss the various components of the proposed architecture, and we briefly discuss open challenges in the design of crowd management systems for emergency and disruptive scenarios.


A Formal Approach To Circle Formation In Multi-Agent Systems, Rui Yang Apr 2019

A Formal Approach To Circle Formation In Multi-Agent Systems, Rui Yang

Computer Science Graduate Research Workshop

No abstract provided.


Conflict Resolution Using Α-Shapes For Distributed Robotic Sampling Of Ambient Phenomena In Initially Unknown Environments, Brad Woosley Apr 2019

Conflict Resolution Using Α-Shapes For Distributed Robotic Sampling Of Ambient Phenomena In Initially Unknown Environments, Brad Woosley

Computer Science Graduate Research Workshop

No abstract provided.


Dynamic Lazy Grounding In Answer Set Programming, Brian Hodges Apr 2019

Dynamic Lazy Grounding In Answer Set Programming, Brian Hodges

Computer Science Graduate Research Workshop

No abstract provided.


Automatic Program Rewriting For Non-Ground Answer Set Programs, Nicholas Hippen Apr 2019

Automatic Program Rewriting For Non-Ground Answer Set Programs, Nicholas Hippen

Computer Science Graduate Research Workshop

No abstract provided.


Automated Tool Support For Security Bug Repair In Mobile Applications, Larry Singleton Apr 2019

Automated Tool Support For Security Bug Repair In Mobile Applications, Larry Singleton

Computer Science Graduate Research Workshop

No abstract provided.


Tool Support For Recurring Code Change Inspection With Deep Learning, Krishna Teja Ayinala Apr 2019

Tool Support For Recurring Code Change Inspection With Deep Learning, Krishna Teja Ayinala

Computer Science Graduate Research Workshop

No abstract provided.


Analysis Of Subgoal Data In Computer Science Principles - Data Cleaning, Hari Ramilison Apr 2019

Analysis Of Subgoal Data In Computer Science Principles - Data Cleaning, Hari Ramilison

Computer Science Graduate Research Workshop

No abstract provided.


Co-Designing An Academic Focus Mobile Application, Mohammad Farhad Afzali Apr 2019

Co-Designing An Academic Focus Mobile Application, Mohammad Farhad Afzali

Computer Science Graduate Research Workshop

No abstract provided.


Processing Narratives By Means Of Action Languages, Craig Olson Apr 2019

Processing Narratives By Means Of Action Languages, Craig Olson

Computer Science Graduate Research Workshop

No abstract provided.


Intelligent And Human-Aware Decision Making For Semi-Autonomous Human Rehabilitation Assistance Using Modular Robots, Anoop Mishra Apr 2019

Intelligent And Human-Aware Decision Making For Semi-Autonomous Human Rehabilitation Assistance Using Modular Robots, Anoop Mishra

Computer Science Graduate Research Workshop

No abstract provided.


Machine Learning Techniques For Predicting Mobility-Related Perception Errors In Astronauts, Steven Belcher Apr 2019

Machine Learning Techniques For Predicting Mobility-Related Perception Errors In Astronauts, Steven Belcher

Computer Science Graduate Research Workshop

No abstract provided.


A Technique For Improving Classification Accuracy Of Highly Imbalanced And Sparse Datasets, Sindhura Bonthu Apr 2019

A Technique For Improving Classification Accuracy Of Highly Imbalanced And Sparse Datasets, Sindhura Bonthu

Computer Science Graduate Research Workshop

No abstract provided.


Learning From Imbalanced Datasets: Evaluating The Predictive Accuracy Of Minority Classes, Adithi Deborah Chakravarthy Apr 2019

Learning From Imbalanced Datasets: Evaluating The Predictive Accuracy Of Minority Classes, Adithi Deborah Chakravarthy

Computer Science Graduate Research Workshop

No abstract provided.


Two-Sided Matching For Mentor-Mentee Allocations—Algorithms And Manipulation Strategies, Christian Haas, Margeret Hall Mar 2019

Two-Sided Matching For Mentor-Mentee Allocations—Algorithms And Manipulation Strategies, Christian Haas, Margeret Hall

Information Systems and Quantitative Analysis Faculty Publications

In scenarios where allocations are determined by participant’s preferences, Two-Sided Matching is a well-established approach with applications in College Admissions, School Choice, and Mentor-Mentee matching problems. In such a context, participants in the matching have preferences with whom they want to be matched with. This article studies two important concepts in Two-Sided Matching: multiple objectives when finding a solution, and manipulation of preferences by participants. We use real data sets from a Mentor-Mentee program for the evaluation to provide insight on realistic effects and implications of the two concepts. In the first part of the article, we consider the quality …


Role Of Gender Differences On Individuals' Responses To Electronic Word-Of-Mouth In Social Interactions, Jonghak Sun, Seokwoo Song, Deanna House, Mintaek Kwon Mar 2019

Role Of Gender Differences On Individuals' Responses To Electronic Word-Of-Mouth In Social Interactions, Jonghak Sun, Seokwoo Song, Deanna House, Mintaek Kwon

Information Systems and Quantitative Analysis Faculty Publications

Considering the significant effects of electronic Word-of-Mouth (eWOM), this research explores how individuals respond to eWOM and whether gender differences exist in their perceptions. To do so, by employing the perspective of social interactions, we examine the proposed relationships are different between genders. We collected data using a survey and tested the hypotheses via path analysis. The results indicate that, gender differences were found specific to search effort, product involvement, and information credibility. Women with strong online ties had a tendency to be more involved in the product information and to find the information more credible. In addition, when women …


Design For Safety: Decreasing First Responder Health Risks Through Real-Time Bio-Sensor Alerts, Suzy Fendrick Mar 2019

Design For Safety: Decreasing First Responder Health Risks Through Real-Time Bio-Sensor Alerts, Suzy Fendrick

UNO Student Research and Creative Activity Fair

The focus of this research project is using the Design Thinking process to create an informative dashboard for first responders. Design Thinking involves empathizing with the user, defining the problems to be solved, ideation, creating prototypes, and testing. This iterate process focuses on the user, resulting in the most effective product possible. The dashboard will display real-time biosensor data from sensors in the first responders’ uniforms. This project is part of a larger project with the goal of vastly improving the safety of first responders during emergency hazardous material incidents.