Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 20 of 20
Full-Text Articles in Physical Sciences and Mathematics
Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht
Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht
Theses/Capstones/Creative Projects
Algorithm run-time complexity analysis is an important topic in data structures and algorithms courses, but it is also a topic that many students struggle with. Commonly cited difficulties include the necessary mathematical background knowledge, the abstract nature of the topic, and the presentation style of the material. Analyzing the subject of algorithm analysis using multiple learning theories shows that course materials often leave out key steps in the learning process and neglect certain learning styles. Students can be more successful at learning algorithm run-time complexity analysis if these missing stages and learning styles are addressed.
Positive Dependency Graphs Revisited, Jorge Fandinno, Vladimir Lifschitz
Positive Dependency Graphs Revisited, Jorge Fandinno, Vladimir Lifschitz
Computer Science Faculty Publications
Theory of stable models is the mathematical basis of answer set programming. Several results in that theory refer to the concept of the positive dependency graph of a logic program. We describe a modification of that concept and show that the new understanding of positive dependency makes it possible to strengthen some of these results.
Using Graph Theoretical Methods And Traceroute To Visually Represent Hidden Networks, Jordan M. Sahs
Using Graph Theoretical Methods And Traceroute To Visually Represent Hidden Networks, Jordan M. Sahs
UNO Student Research and Creative Activity Fair
Within the scope of a Wide Area Network (WAN), a large geographical communication network in which a collection of networking devices communicate data to each other, an example being the spanning communication network, known as the Internet, around continents. Within WANs exists a collection of Routers that transfer network packets to other devices. An issue pertinent to WANs is their immeasurable size and density, as we are not sure of the amount, or the scope, of all the devices that exists within the network. By tracing the routes and transits of data that traverses within the WAN, we can identify …
Abstract Argumentation And Answer Set Programming: Two Faces Of Nelson’S Logic, Jorge Fandinno, Luis Fariñas Del Cerro
Abstract Argumentation And Answer Set Programming: Two Faces Of Nelson’S Logic, Jorge Fandinno, Luis Fariñas Del Cerro
Computer Science Faculty Publications
In this work, we show that both logic programming and abstract argumentation frameworks can be interpreted in terms of Nelson’s constructive logic N4. We do so by formalising, in this logic, two principles that we call noncontradictory inference and strengthened closed world assumption: the first states that no belief can be held based on contradictory evidence while the latter forces both unknown and contradictory evidence to be regarded as false. Using these principles, both logic programming and abstract argumentation frameworks are translated into constructive logic in a modular way and using the object language. Logic programming implication and abstract argumentation …
Prediction Of Balance Control And Instability In Walking At Sea, Jungyeon Choi
Prediction Of Balance Control And Instability In Walking At Sea, Jungyeon Choi
Computer Science Graduate Research Workshop
No abstract provided.
Interactive Visualizations For Explanation In Ai, Ashley Ramsey
Interactive Visualizations For Explanation In Ai, Ashley Ramsey
Computer Science Graduate Research Workshop
No abstract provided.
Automated Program Repair For Api Misuse Vulnerabilities, Dip Kiran Pradhan Newar
Automated Program Repair For Api Misuse Vulnerabilities, Dip Kiran Pradhan Newar
Computer Science Graduate Research Workshop
No abstract provided.
New Approaches To Convex Polygon Formations, Rui Yang
New Approaches To Convex Polygon Formations, Rui Yang
Computer Science Graduate Research Workshop
No abstract provided.
Workload Prediction With Cost-Aware Data Analytics System, Anshuman Das Mohapatra
Workload Prediction With Cost-Aware Data Analytics System, Anshuman Das Mohapatra
Computer Science Graduate Research Workshop
No abstract provided.
Artificial-Intelligence-Based Approaches For Estimating Irregular Walking Surface With Wearable Sensor, Ru Ng
Computer Science Graduate Research Workshop
No abstract provided.
Building Interpretable Methods For Identifying Bridge Maintenance Patterns, Akshay Kale
Building Interpretable Methods For Identifying Bridge Maintenance Patterns, Akshay Kale
Computer Science Graduate Research Workshop
No abstract provided.
Using Deep Neural Network And Transformers To Extract Graphene Compounds And Properties, Ayman Ibn Jaman
Using Deep Neural Network And Transformers To Extract Graphene Compounds And Properties, Ayman Ibn Jaman
Computer Science Graduate Research Workshop
No abstract provided.
Deep Learning-Based Image Watermarking With Transform Invariant Representation Learning, Arjon Das
Deep Learning-Based Image Watermarking With Transform Invariant Representation Learning, Arjon Das
Computer Science Graduate Research Workshop
No abstract provided.
Reducing Loading On The Contralateral Limb Using Human-In-The-Loop Optimization, Siena Senatore
Reducing Loading On The Contralateral Limb Using Human-In-The-Loop Optimization, Siena Senatore
UNO Student Research and Creative Activity Fair
In most everyday activities, we head towards a specific goal by updating our choices for a more direct path. However, there are specific clinical tasks where taking the direct path is more challenging. Clinical investigations of optimizing a prosthesis involve the assessment of multiple parameter settings through trial and error rather than goal-directed optimization. We investigate if a human-in-the-loop optimization algorithm can guide manual alterations to a prosthesis-simulating device to reduce the ground reaction force on the contralateral limb. In most participants, the optimal condition reduced the loading rate on the contralateral limb compared to the initial condition tested. These …
Design And Development Of Software With A Graphical User Interface To Display And Convert Multiple Microscopic Histology Images, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy
Design And Development Of Software With A Graphical User Interface To Display And Convert Multiple Microscopic Histology Images, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy
UNO Student Research and Creative Activity Fair
Histological images are widely used to assess the microscopic anatomy of biological tissues. Recent advancements in image analysis allow the identification of structural features on histological sections that can help advance medical device development, brain and cancer research, drug discovery, vascular mechanobiology, and many other fields. Histological slide scanners create images in SVS and TIFF formats that were designed to archive image blocks and high-resolution textual information. Because these formats were primarily intended for storage, they are often not compatible with conventional image analysis software and require conversion before they can be used in research. We have developed a user-friendly …
The 10th Annual Computer Science Workshop, Submissions, Abstract Template, Computer Science Department
The 10th Annual Computer Science Workshop, Submissions, Abstract Template, Computer Science Department
Computer Science Faculty Proceedings & Presentations
This is the abstract template for the 10th Annual Computer Science Graduate Research Workshop (2022). To learn more about this workshop, please visit: https://digitalcommons.unomaha.edu/csworkshop/2022/.
On The Security Of Bluetooth Low Energy In Two Consumer Wearable Heart Rate Monitors/Sensing Devices, Yesem Kurt Peker, Gabriel Bello, Alfredo J. Perez
On The Security Of Bluetooth Low Energy In Two Consumer Wearable Heart Rate Monitors/Sensing Devices, Yesem Kurt Peker, Gabriel Bello, Alfredo J. Perez
Computer Science Faculty Publications
Since its inception in 2013, Bluetooth Low Energy (BLE) has become the standard for short-distance wireless communication in many consumer devices, as well as special-purpose devices. In this study, we analyze the security features available in Bluetooth LE standards and evaluate the features implemented in two BLE wearable devices (a Fitbit heart rate wristband and a Polar heart rate chest wearable) and a BLE keyboard to explore which security features in the BLE standards are implemented in the devices. In this study, we used the ComProbe Bluetooth Protocol Analyzer, along with the ComProbe software to capture the BLE traffic of …
Factors Affecting Student Educational Choices Regarding Oer Material In Computer Science, Anastasia Angelopoulou, Rania Hodhod, Alfredo J. Perez
Factors Affecting Student Educational Choices Regarding Oer Material In Computer Science, Anastasia Angelopoulou, Rania Hodhod, Alfredo J. Perez
Computer Science Faculty Publications
The use of Open Educational Resources (OER) in course settings provides a solution to reduce the textbook barrier. Several published studies have concluded that high textbook costs may influence students' educational choices. However, there are other student characteristics that may be relevant to OER. In this work, we study various factors that may influence students' educational choices regarding OER and their impact on a student’s perspectives on OER use and quality. More specifically, we investigate whether there are significant differences in the frequency of use and perceived quality of the OER textbook based on gender, prior academic achievements, income, seniority, …